Chapter 4: Security Part II-Auditing Database Systems 1. Basic data management 2. Data retrieval 3. Database authorization table Chapter 5: System Development and Program Change Activitie s 1. The operating system 2. An unintentional threat to the integrity of the operating system 3. Control activities that are found in an effective system development life cycle. Chapter 6: Transaction Processing and Financial Reporting-Systems Overview 1. The expenditure cycles. 2. Cost accounting system 3. The transaction cycles .