SlideShare a Scribd company logo
1 of 12
IS security objective

Confide
ntiality
integrit
y
availab
ility
Sensitive information
Sensitive information
Strategic plan – m & a pending, crucial decisions,
major expension
Business operation – client lists, process and
procedures (proprietary)
Finances - cost sheet, ratios(GP, NP), salaries wages,
precise salary information, loans, dividends
Need for control in IS
Increase the ability to capture, store, analyze and
process data
Safeguard assets to maintain data integrity
Covering access safeguards over computer programs,
data and any related equipment
System effectiveness and efficiency
Control built in well designed system
Impact of tech. on IC
Categories of control
1. PREVENTIVE 1. ADMIN 1. PHYSICAL 1. MGMT.
2. DETECTIVE 2. OPERATION 2. LOGICAL 2. APP.
3. CORRECTIVE 3. ACCOUNTS 3. ENVIORNMENTAL
4. COMPENSATORY
OBJECTIVE FUNCTION
AUDIT
FUNCTION
IS RESOURCES
FUNCTION
Admin – lawful, compliance of mgmt and other
statutory requirements
Operation – effectiveness, efficiency, objective
achieve, day to day business
Accounts – balance sheet, true & fair view, reliability
of financial control
OBJECTIVE
 Preventive – designed to prevent and control error and any malicious
activity
anti virus, passwords, firewall, smart cards, skilled personnel, segregation
of duties,
 Detective – designed to detect errors or malicious activity
cctv, log, anti virus, audit, reconciliation
 Corrective – designed to reduce the impact of error or malicious
activity
anti virus, back up, insurance, fire extinguisher, recovery plan
 Compensatory - reduce the probability of threats, many devices are
used in, cost of the lock should not be more than assets, organization
may not be able to implement control in that cast compensatory control
are used to such appropriateness
OTP, Buying something from reliance industries,
IS RESOURCES
Environmental
Issues
Primarily due to elements of nature
Natural resources, AC failure, electrical shock
Issues and revelations
Power supply to compiler equipment remains in
specifications
AC system properly working
Back up media protected from damage, magnet
effect etc.
Equipment kept free from dust and smoke
Food, beverage and tobaco product are prohibited
controls
Water/smoke detectors
Hand held fire extinguisher
Fire suppression system
a) Dry pipe b) water based c) halogen
• Regular inspection
• Electrical surge protectors
• Two substations
• Emergency power off switches
• wires in conduit and panels
• Documented and tested emergency evacuation plans

More Related Content

What's hot

IT environment analytics service
IT environment analytics serviceIT environment analytics service
IT environment analytics servicePeter Razenberg
 
Predictive Maintenance Solution -1019
Predictive Maintenance Solution -1019Predictive Maintenance Solution -1019
Predictive Maintenance Solution -1019Percy-Mitchell
 
Intro to DR 151201
Intro to DR 151201Intro to DR 151201
Intro to DR 151201kitsell
 
Tips to comply with GDPR during the pandemic
Tips to comply with GDPR during the pandemicTips to comply with GDPR during the pandemic
Tips to comply with GDPR during the pandemicHernan Huwyler, MBA CPA
 
Benefits of Addressable Fire Alarm System
Benefits of Addressable Fire Alarm SystemBenefits of Addressable Fire Alarm System
Benefits of Addressable Fire Alarm SystemDianaVicente6
 
Appa academy oms webinar
Appa academy oms webinarAppa academy oms webinar
Appa academy oms webinarMilsoftVPBusDev
 
Use of IoT in increasing opeartional efficiency in manufacturing plants- a ca...
Use of IoT in increasing opeartional efficiency in manufacturing plants- a ca...Use of IoT in increasing opeartional efficiency in manufacturing plants- a ca...
Use of IoT in increasing opeartional efficiency in manufacturing plants- a ca...Manish Saxena
 
Buildwave BCLM/Violog Overview
Buildwave BCLM/Violog OverviewBuildwave BCLM/Violog Overview
Buildwave BCLM/Violog Overviewjzurawski
 
Centralize Asset Information
Centralize Asset InformationCentralize Asset Information
Centralize Asset InformationDelhi, India
 
ADEPP & Configuration Management
ADEPP & Configuration ManagementADEPP & Configuration Management
ADEPP & Configuration ManagementFabienne Salimi
 
edischallengestheprevailingviewofelectricalcompliancemanagement
edischallengestheprevailingviewofelectricalcompliancemanagementedischallengestheprevailingviewofelectricalcompliancemanagement
edischallengestheprevailingviewofelectricalcompliancemanagementAshleigh Hurford
 
Arrelic Services | RCM
Arrelic Services | RCM Arrelic Services | RCM
Arrelic Services | RCM Arrelic
 
Predictive Maintenance
Predictive MaintenancePredictive Maintenance
Predictive MaintenanceSaama
 
Vulnerability Management for Healthcare Enterprise Networks
Vulnerability Management for Healthcare Enterprise NetworksVulnerability Management for Healthcare Enterprise Networks
Vulnerability Management for Healthcare Enterprise NetworksMedigate
 
Widgets Exercise Group 2
Widgets Exercise Group 2Widgets Exercise Group 2
Widgets Exercise Group 2debmalyakhan
 

What's hot (20)

IT environment analytics service
IT environment analytics serviceIT environment analytics service
IT environment analytics service
 
Predictive Maintenance Solution -1019
Predictive Maintenance Solution -1019Predictive Maintenance Solution -1019
Predictive Maintenance Solution -1019
 
Intro to DR 151201
Intro to DR 151201Intro to DR 151201
Intro to DR 151201
 
Tips to comply with GDPR during the pandemic
Tips to comply with GDPR during the pandemicTips to comply with GDPR during the pandemic
Tips to comply with GDPR during the pandemic
 
Energy management system
Energy management systemEnergy management system
Energy management system
 
Intelli grid
Intelli gridIntelli grid
Intelli grid
 
Benefits of Addressable Fire Alarm System
Benefits of Addressable Fire Alarm SystemBenefits of Addressable Fire Alarm System
Benefits of Addressable Fire Alarm System
 
Intro to DR
Intro to DRIntro to DR
Intro to DR
 
Appa academy oms webinar
Appa academy oms webinarAppa academy oms webinar
Appa academy oms webinar
 
Use of IoT in increasing opeartional efficiency in manufacturing plants- a ca...
Use of IoT in increasing opeartional efficiency in manufacturing plants- a ca...Use of IoT in increasing opeartional efficiency in manufacturing plants- a ca...
Use of IoT in increasing opeartional efficiency in manufacturing plants- a ca...
 
Buildwave BCLM/Violog Overview
Buildwave BCLM/Violog OverviewBuildwave BCLM/Violog Overview
Buildwave BCLM/Violog Overview
 
Predictive maintenance
Predictive maintenancePredictive maintenance
Predictive maintenance
 
Centralize Asset Information
Centralize Asset InformationCentralize Asset Information
Centralize Asset Information
 
AIA Industries Brochure
AIA Industries BrochureAIA Industries Brochure
AIA Industries Brochure
 
ADEPP & Configuration Management
ADEPP & Configuration ManagementADEPP & Configuration Management
ADEPP & Configuration Management
 
edischallengestheprevailingviewofelectricalcompliancemanagement
edischallengestheprevailingviewofelectricalcompliancemanagementedischallengestheprevailingviewofelectricalcompliancemanagement
edischallengestheprevailingviewofelectricalcompliancemanagement
 
Arrelic Services | RCM
Arrelic Services | RCM Arrelic Services | RCM
Arrelic Services | RCM
 
Predictive Maintenance
Predictive MaintenancePredictive Maintenance
Predictive Maintenance
 
Vulnerability Management for Healthcare Enterprise Networks
Vulnerability Management for Healthcare Enterprise NetworksVulnerability Management for Healthcare Enterprise Networks
Vulnerability Management for Healthcare Enterprise Networks
 
Widgets Exercise Group 2
Widgets Exercise Group 2Widgets Exercise Group 2
Widgets Exercise Group 2
 

Similar to Controls in information system

[PME] Power Monitoring Expert & AHF.pdf
[PME] Power Monitoring Expert & AHF.pdf[PME] Power Monitoring Expert & AHF.pdf
[PME] Power Monitoring Expert & AHF.pdfssuser31a3b0
 
Sespl Profile for Energy Auditing
Sespl Profile for Energy AuditingSespl Profile for Energy Auditing
Sespl Profile for Energy AuditingMaxpromotion
 
Operational Efficiency Based on Innovative Automation, Industry Expertise, En...
Operational Efficiency Based on Innovative Automation, Industry Expertise, En...Operational Efficiency Based on Innovative Automation, Industry Expertise, En...
Operational Efficiency Based on Innovative Automation, Industry Expertise, En...Sergey Mishin
 
IBM Maximo HSE Solution Presentation.pdf
IBM Maximo HSE Solution Presentation.pdfIBM Maximo HSE Solution Presentation.pdf
IBM Maximo HSE Solution Presentation.pdfPhanThnh52
 
Asset intelligence | Bridging the gap between corporate strategy and operatio...
Asset intelligence | Bridging the gap between corporate strategy and operatio...Asset intelligence | Bridging the gap between corporate strategy and operatio...
Asset intelligence | Bridging the gap between corporate strategy and operatio...Relegen Pty Ltd
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPace IT at Edmonds Community College
 
System1 details
System1 detailsSystem1 details
System1 detailsSATHYA BN
 
Risk mgmt key to security certifications v2
Risk mgmt key to security certifications v2Risk mgmt key to security certifications v2
Risk mgmt key to security certifications v2Jorge Sebastiao
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteTips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteHernan Huwyler, MBA CPA
 
01 facility management definition and scope opt
01   facility management definition and scope opt01   facility management definition and scope opt
01 facility management definition and scope optArya Wirabhuana
 
Hsse policy group 5 final
Hsse policy group 5 finalHsse policy group 5 final
Hsse policy group 5 finalSamarth Mewada
 
Business Objectives & Control Objectives in Information Technology
Business Objectives  &  Control Objectives  in  Information TechnologyBusiness Objectives  &  Control Objectives  in  Information Technology
Business Objectives & Control Objectives in Information TechnologyMufaddal Nullwala
 
OPAL-RT Smart transmission grid applications for real-time monitoring
OPAL-RT Smart transmission grid applications for real-time monitoringOPAL-RT Smart transmission grid applications for real-time monitoring
OPAL-RT Smart transmission grid applications for real-time monitoringOPAL-RT TECHNOLOGIES
 
Alert Plus PIOGA Presentation - oct'15
Alert Plus PIOGA Presentation - oct'15Alert Plus PIOGA Presentation - oct'15
Alert Plus PIOGA Presentation - oct'15Matt Murdock
 
Director Regulatory Compliance
Director Regulatory ComplianceDirector Regulatory Compliance
Director Regulatory ComplianceJim Streetman
 
Presentation rmc
Presentation   rmcPresentation   rmc
Presentation rmcolivda77
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 

Similar to Controls in information system (20)

[PME] Power Monitoring Expert & AHF.pdf
[PME] Power Monitoring Expert & AHF.pdf[PME] Power Monitoring Expert & AHF.pdf
[PME] Power Monitoring Expert & AHF.pdf
 
Sespl Profile for Energy Auditing
Sespl Profile for Energy AuditingSespl Profile for Energy Auditing
Sespl Profile for Energy Auditing
 
Operational Efficiency Based on Innovative Automation, Industry Expertise, En...
Operational Efficiency Based on Innovative Automation, Industry Expertise, En...Operational Efficiency Based on Innovative Automation, Industry Expertise, En...
Operational Efficiency Based on Innovative Automation, Industry Expertise, En...
 
IBM Maximo HSE Solution Presentation.pdf
IBM Maximo HSE Solution Presentation.pdfIBM Maximo HSE Solution Presentation.pdf
IBM Maximo HSE Solution Presentation.pdf
 
Asset intelligence | Bridging the gap between corporate strategy and operatio...
Asset intelligence | Bridging the gap between corporate strategy and operatio...Asset intelligence | Bridging the gap between corporate strategy and operatio...
Asset intelligence | Bridging the gap between corporate strategy and operatio...
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
 
System1 details
System1 detailsSystem1 details
System1 details
 
Risk mgmt key to security certifications v2
Risk mgmt key to security certifications v2Risk mgmt key to security certifications v2
Risk mgmt key to security certifications v2
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
Facility management
Facility managementFacility management
Facility management
 
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteTips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
 
01 facility management definition and scope opt
01   facility management definition and scope opt01   facility management definition and scope opt
01 facility management definition and scope opt
 
Hsse policy group 5 final
Hsse policy group 5 finalHsse policy group 5 final
Hsse policy group 5 final
 
Business Objectives & Control Objectives in Information Technology
Business Objectives  &  Control Objectives  in  Information TechnologyBusiness Objectives  &  Control Objectives  in  Information Technology
Business Objectives & Control Objectives in Information Technology
 
OPAL-RT Smart transmission grid applications for real-time monitoring
OPAL-RT Smart transmission grid applications for real-time monitoringOPAL-RT Smart transmission grid applications for real-time monitoring
OPAL-RT Smart transmission grid applications for real-time monitoring
 
Alert Plus PIOGA Presentation - oct'15
Alert Plus PIOGA Presentation - oct'15Alert Plus PIOGA Presentation - oct'15
Alert Plus PIOGA Presentation - oct'15
 
Director Regulatory Compliance
Director Regulatory ComplianceDirector Regulatory Compliance
Director Regulatory Compliance
 
Presentation rmc
Presentation   rmcPresentation   rmc
Presentation rmc
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Controls in information system

  • 3. Sensitive information Strategic plan – m & a pending, crucial decisions, major expension Business operation – client lists, process and procedures (proprietary) Finances - cost sheet, ratios(GP, NP), salaries wages, precise salary information, loans, dividends
  • 4. Need for control in IS Increase the ability to capture, store, analyze and process data Safeguard assets to maintain data integrity Covering access safeguards over computer programs, data and any related equipment System effectiveness and efficiency Control built in well designed system
  • 6. Categories of control 1. PREVENTIVE 1. ADMIN 1. PHYSICAL 1. MGMT. 2. DETECTIVE 2. OPERATION 2. LOGICAL 2. APP. 3. CORRECTIVE 3. ACCOUNTS 3. ENVIORNMENTAL 4. COMPENSATORY OBJECTIVE FUNCTION AUDIT FUNCTION IS RESOURCES
  • 7. FUNCTION Admin – lawful, compliance of mgmt and other statutory requirements Operation – effectiveness, efficiency, objective achieve, day to day business Accounts – balance sheet, true & fair view, reliability of financial control
  • 8. OBJECTIVE  Preventive – designed to prevent and control error and any malicious activity anti virus, passwords, firewall, smart cards, skilled personnel, segregation of duties,  Detective – designed to detect errors or malicious activity cctv, log, anti virus, audit, reconciliation  Corrective – designed to reduce the impact of error or malicious activity anti virus, back up, insurance, fire extinguisher, recovery plan  Compensatory - reduce the probability of threats, many devices are used in, cost of the lock should not be more than assets, organization may not be able to implement control in that cast compensatory control are used to such appropriateness OTP, Buying something from reliance industries,
  • 10. Environmental Issues Primarily due to elements of nature Natural resources, AC failure, electrical shock
  • 11. Issues and revelations Power supply to compiler equipment remains in specifications AC system properly working Back up media protected from damage, magnet effect etc. Equipment kept free from dust and smoke Food, beverage and tobaco product are prohibited
  • 12. controls Water/smoke detectors Hand held fire extinguisher Fire suppression system a) Dry pipe b) water based c) halogen • Regular inspection • Electrical surge protectors • Two substations • Emergency power off switches • wires in conduit and panels • Documented and tested emergency evacuation plans

Editor's Notes

  1. 3.8
  2. 3.12
  3. 3.14
  4. 3.16