What is data integrity?
What are the roles and characteristics of IT Controls?
Categories of IT Controls
* General Controls
* Application Controls
Nature of IT Controls
* Manaual Controls
* Automated Controls (Accurate, timely, efficiency, secure)
* IT dependent Manual Controls
Effectiveness of IT Controls
Functions of IT Controls
* Preventive Controls
* Detective Controls
* Corrective Controls
When should controls be implemented into the IT System?
Control procedures should be designed and put into place as the controls themselves are being developed.
* General IT controls are designed to ensure that an organizationʹs control environment is stable and well-managed.
* Application controls are built into typical business processes that use computer applications.
* Prevent, detect, and correct transaction error and fraud and are application‑specific, providing reasonable assurance as to system accuracy, completeness, and validity.
What are the functions of IT Controls?
IT control functions can be preventative, detective, or corrective. Preventative controls are designed to stop problems from ever occurring whereas corrective controls address problems once they have occurred and have been identified. A detective control is the mechanism that reveals issues that are not averted by preventative controls.
Preventative Controls
Detective Controls
Corrective Controls
What are the 3 systems access and segregation of duties?
What are Logical Access Controls?
1 of 3 Systems Access and Segregation of Duties (10 logical controls)
Logical Access Controls: use software and data to monitor and control access to information and computing systems.
What are authentication controls?
2 of 10 Logical Access Controls
What is access control lists?
4 of 10 Logical Access Controls
What is data encryption?
7 of 10 Logical Controls
The two types of encryptions are:
What are digital certificates?
9 of 10 Logical Access Controls
Digital certificates is, another form of data security. They are electronic documents created and digitally signed by a trusted party that certify the identity of the owners of a particular public key.
What are digital signatures?
10 of 10 Logical Access Controls
What are Physical Controls?
2 of 3 Systems Access and Segregtation of Duties (6 Physical controls)
Why are segregation of duties important in a computerized environment IT?
POSITIONS TO SEPERATE
What are the 4 components in Business Resillency?
What is a business continuity plan?
1 of 4 Business Resiliency plan
The appropriate order for developing a business continuity plan for disaster recovery is as follows:
1. Assess the key risks ex. business impact analysis.
2. identify mission-critical applications and data ex.critical personell, emergency contact list.
3. develop a plan for handling these applications,
4. determine responsibilities for parties involved in disaster recovery,
5. and test the recovery plan.
What is system availability controls?
2 of 4 Business Resiliency
Availability Controls ensure data will be available in the middle of disaster or uncertainty.
3 types of Back-Ups:
1. An incremental backup involves copying only the data items that have changed since the last backup each containing the results of one day’s transactions.
2. A differential backup copies all changes made since the last full back up each new back-up contains cumulative changes since the last full backup.
3. A full backup is an exact copy of the entire database
What is included in planning for risk management?
3 of 4 Business Resiliency
What is reporting risk?
Strategic risk
Includes the risk of choosing inappropriate
technology
Financial risk
Includes the risk of having financial resources lost,
wasted, or stolen.
Information risk
includes the risk of loss of data integrity and that of incomplete transactions.
What are Disaster Recovery plans?
4 of 4 Business Resiliency
What is the objective of data security controls?
What is a firewall?
User ID’s and uthentication that prevents unauthorized users from gaining access to network resources.