Chapter 14 Flashcards
(46 cards)
Whats IT governance
process to ensure the efficiency use of IT for a company to achieves its goals
What is COBIT
The most widely used international standard for IT governance
What are the two categories of COBIT
IT Governance objectives-Creating the strategy
Management IT objectives - Turning the strategy into Action
What are the five COBIT
Governance : Evaluate,Direct ,Monitor
Management: Align,Plan and Organize
Management : Build, acquire and implement
Management: Deliver, service and support
Management: Monitor, evaluate and assess
Whats is Governance : Evaluate,Direct ,Monitor controls objectives
Ensure IT benefit delivery
Ensure risk realization
Ensure resource optimization
The only IT governance focused domain in COBIT 2019
Whats is Management: Align,Plan and Organize control objectives
manage data , security and risk
Dress the way IT is used to meet organizational objectives
What is Management : Build, acquire and implement control objectives
manage changes , asset and project
Where the management assesses IT requirement , acquire the tech and implement them
What is : Management: Deliver, service and support control objectives
manage operation
manage continuity
manage security services
operational side of IT (IT support)
What is Management: Monitor, evaluate and assess control objectives
manage system of internal control,assurance
Focus on existing IT and if they meet the organization objectives
What does logical access controls do
identify ,authorize and provide users access to a computer info.
What does physical access controls do
help to keep track of who coming and going into the facility
Role based access control (RBAC) is to
restricted network for individual with specific roles that have a criteria if they acess the system or not
User access roles are
groups with predefined permission to which users are assigned , with each user assigned to only one role at a time
What is the hierarchy of user roles
Administrator
Creator
User
Read-only
Whats user authentification
process associating the username to each authorized user with unique identifier
Whats user access provisioning
formal process of granting access to a new user
What user access de-provisionning
formal process of changing users access
What are the two type of user access changes
Termination
Transfer
What is Dormant access
user has not accessed the system for significant period of time but still has an active role that grant them access
What are some control activities in logical security
Policies and procedures for suer access are documented
access to system is granted to each user based on the user business need
user access to systems is periodically reviewed for appropriateness
New access request are reviews and approved before being granted
Why do company used data center
to protect the physical component on which the systems and data are stored
What are the three keys environment of data center
Outside environment
Inside environment
Physical security
Whats is Business continuity planning
set of procedures that the business take to protect employees , stakeholders and assts in a disruptive events
Whats is business continuity planning subset
Disaster recovery