SlideShare a Scribd company logo
1 of 212
HAPTER 7 Information Systems Controls for Systems Reliability Part 1:  Information Security
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],SYSTEMS RELIABILITY
INTRODUCTION ,[object Object],[object Object],SECURITY SYSTEMS RELIABILITY ,[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY SYSTEMS RELIABILITY ,[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY SYSTEMS RELIABILITY ,[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY SYSTEMS RELIABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY AVAILABILITY SYSTEMS RELIABILITY ,[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY AVAILABILITY SYSTEMS RELIABILITY
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY AVAILABILITY SYSTEMS RELIABILITY
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FUNDAMENTAL INFORMATION SECURITY CONCEPTS ,[object Object],[object Object],[object Object],[object Object]
FUNDAMENTAL INFORMATION SECURITY CONCEPTS ,[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AS A MANAGEMENT ISSUE ,[object Object],[object Object]
FUNDAMENTAL INFORMATION SECURITY CONCEPTS ,[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TIME-BASED MODEL OF SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FUNDAMENTAL INFORMATION SECURITY CONCEPTS ,[object Object],[object Object],[object Object],[object Object]
DEFENSE IN DEPTH ,[object Object],[object Object],[object Object],[object Object]
DEFENSE IN DEPTH ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DEFENSE IN DEPTH ,[object Object],[object Object],[object Object],[object Object],[object Object]
DEFENSE IN DEPTH ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],Encryption Hardening Control Remote Access Control Physical Access Training
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],This is a contract for . . . Encryption Algorithm Xb&j &m 2 ep0%fg . . . Decryption Algorithm This is a contract for . . . Plaintext Plain- text Cipher- text Key + + Key
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object]
PREVENTIVE CONTROLS N.W. U S A CA The N.W. employee connects to the government agency’s website and clicks on the button for submitting bids on open contracts.
PREVENTIVE CONTROLS N.W. U S A CA The browser moves to a secure web page displaying the lock icon.
PREVENTIVE CONTROLS N.W. U S A CA ,[object Object],[object Object],[object Object],[object Object],Digital certificate for USA Public key for USA
PREVENTIVE CONTROLS N.W. U S A CA ,[object Object],Digital certificate for N.W. Public key for N.W.
PREVENTIVE CONTROLS N.W. U S A ,[object Object],USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],NW’s Bid USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],[object Object],Hash of NW Bid NW’s Bid USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],[object Object],Digital signature Hash of NW Bid NW’s Bid Coded w/ NW private key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],[object Object],[object Object],[object Object],Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],[object Object],[object Object],[object Object],USA Public N.W. Public Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Coded w/ NW private key Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key Coded w/ USA public key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Hash of NW Bid NW’s Bid Coded w/ sym-metric key Symmetric Key USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Hash of NW Bid NW’s Bid Symmetric Key Hash of NW Bid USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],[object Object],Hash of NW Bid NW’s Bid Symmetric Key Hash of NW Bid USA Public N.W. Public
PREVENTIVE CONTROLS N.W. U S A ,[object Object],Hash of NW Bid NW’s Bid Symmetric Key Hash of NW Bid A-OK
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PREVENTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object]
DETECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CORRECTIVE CONTROLS ,[object Object]
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1

More Related Content

What's hot

Information classification
Information classificationInformation classification
Information classificationJyothsna Sridhar
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Transitioning to iso 27001 2013
Transitioning to iso 27001 2013Transitioning to iso 27001 2013
Transitioning to iso 27001 2013SAIGlobalAssurance
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...Habib Ullah Qamar
 
Implementing security
Implementing securityImplementing security
Implementing securityDhani Ahmad
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsUppala Anand
 
Is iso 27001, an answer to security
Is iso 27001, an answer to securityIs iso 27001, an answer to security
Is iso 27001, an answer to securityRaghunath G
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & complianceVandana Verma
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentationMidhun Nirmal
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001Hiran Kanishka
 
It governance in_higher_education_by_james_yung
It governance in_higher_education_by_james_yungIt governance in_higher_education_by_james_yung
It governance in_higher_education_by_james_yungnorsaidatul_akmar
 
Cobit 5 (Control and Audit Information System)
Cobit 5 (Control and Audit Information System)Cobit 5 (Control and Audit Information System)
Cobit 5 (Control and Audit Information System)Rudi Kurniawan
 

What's hot (20)

Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
Information classification
Information classificationInformation classification
Information classification
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Reduce admin time by 60% - Here is how
Reduce admin time by 60% - Here is how Reduce admin time by 60% - Here is how
Reduce admin time by 60% - Here is how
 
ISO 27001 Benefits
ISO 27001 BenefitsISO 27001 Benefits
ISO 27001 Benefits
 
Simplifying IT GRC
Simplifying IT GRCSimplifying IT GRC
Simplifying IT GRC
 
Transitioning to iso 27001 2013
Transitioning to iso 27001 2013Transitioning to iso 27001 2013
Transitioning to iso 27001 2013
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
 
Implementing security
Implementing securityImplementing security
Implementing security
 
Iso 27001 2013 Standard Requirements
Iso 27001 2013 Standard RequirementsIso 27001 2013 Standard Requirements
Iso 27001 2013 Standard Requirements
 
Is iso 27001, an answer to security
Is iso 27001, an answer to securityIs iso 27001, an answer to security
Is iso 27001, an answer to security
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & compliance
 
it grc
it grc it grc
it grc
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001
 
Popular Pitfalls In Isms Compliance
Popular Pitfalls In Isms CompliancePopular Pitfalls In Isms Compliance
Popular Pitfalls In Isms Compliance
 
Fix nix, inc
Fix nix, incFix nix, inc
Fix nix, inc
 
It governance in_higher_education_by_james_yung
It governance in_higher_education_by_james_yungIt governance in_higher_education_by_james_yung
It governance in_higher_education_by_james_yung
 
Cobit 5 (Control and Audit Information System)
Cobit 5 (Control and Audit Information System)Cobit 5 (Control and Audit Information System)
Cobit 5 (Control and Audit Information System)
 

Similar to Ais Romney 2006 Slides 07 Is Control1

CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxInfosectrain3
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
ISMS Requirements
ISMS RequirementsISMS Requirements
ISMS Requirementshumanus2
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsPECB
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfAbuHanifah59
 
20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptxSuman Garai
 
Achieving ISO 27001 Certification.pdf
Achieving ISO 27001 Certification.pdfAchieving ISO 27001 Certification.pdf
Achieving ISO 27001 Certification.pdfmicroteklearning21
 
Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Chandan Singh Ghodela
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptxPrashant Singh
 
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014Accounting_Whitepapers
 
Information security means protecting information (data) and informa.pdf
Information security means protecting information (data) and informa.pdfInformation security means protecting information (data) and informa.pdf
Information security means protecting information (data) and informa.pdfANSAPPARELS
 
gray_audit_presentation.ppt
gray_audit_presentation.pptgray_audit_presentation.ppt
gray_audit_presentation.pptKhalilIdhman
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, aMaximaSheffield592
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.pptImXaib
 
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxRunning Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxhealdkathaleen
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Aissharing notes123
 

Similar to Ais Romney 2006 Slides 07 Is Control1 (20)

CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
ISMS Requirements
ISMS RequirementsISMS Requirements
ISMS Requirements
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
 
20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx20220911-ISO27000-SecurityStandards.pptx
20220911-ISO27000-SecurityStandards.pptx
 
Achieving ISO 27001 Certification.pdf
Achieving ISO 27001 Certification.pdfAchieving ISO 27001 Certification.pdf
Achieving ISO 27001 Certification.pdf
 
Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001Whitepaper iso 27001_isms | All about ISO 27001
Whitepaper iso 27001_isms | All about ISO 27001
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptx
 
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014
 
Information security means protecting information (data) and informa.pdf
Information security means protecting information (data) and informa.pdfInformation security means protecting information (data) and informa.pdf
Information security means protecting information (data) and informa.pdf
 
gray_audit_presentation.ppt
gray_audit_presentation.pptgray_audit_presentation.ppt
gray_audit_presentation.ppt
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, a
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxRunning Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
 
Unit 4 standards.ppt
Unit 4 standards.pptUnit 4 standards.ppt
Unit 4 standards.ppt
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
 

More from sharing notes123

Bliana Grp Twitter Presentation
Bliana Grp Twitter PresentationBliana Grp Twitter Presentation
Bliana Grp Twitter Presentationsharing notes123
 
Jasmeet Grp Facebook It Group Assig
Jasmeet Grp Facebook It Group AssigJasmeet Grp Facebook It Group Assig
Jasmeet Grp Facebook It Group Assigsharing notes123
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virussharing notes123
 
Chen-special-topic-01-Multimedia
Chen-special-topic-01-MultimediaChen-special-topic-01-Multimedia
Chen-special-topic-01-Multimediasharing notes123
 
Dennis Chap 09 Data Communication
Dennis Chap 09 Data CommunicationDennis Chap 09 Data Communication
Dennis Chap 09 Data Communicationsharing notes123
 
Amr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility ProgramsAmr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility Programssharing notes123
 
Pramilah Chap 04 System Unit
Pramilah Chap 04 System UnitPramilah Chap 04 System Unit
Pramilah Chap 04 System Unitsharing notes123
 
Adeyinka Chap 03 Application Software
Adeyinka Chap 03 Application SoftwareAdeyinka Chap 03 Application Software
Adeyinka Chap 03 Application Softwaresharing notes123
 
Jasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To ComputersJasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To Computerssharing notes123
 
Gevita Chap 10 Database Management
Gevita Chap 10 Database ManagementGevita Chap 10 Database Management
Gevita Chap 10 Database Managementsharing notes123
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2sharing notes123
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Issharing notes123
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abusesharing notes123
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databasessharing notes123
 
Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development Strategiessharing notes123
 

More from sharing notes123 (20)

Uthaya Chap 05 Input
Uthaya Chap 05 InputUthaya Chap 05 Input
Uthaya Chap 05 Input
 
Amr Grp Friendster
Amr Grp FriendsterAmr Grp Friendster
Amr Grp Friendster
 
Bliana Grp Twitter Presentation
Bliana Grp Twitter PresentationBliana Grp Twitter Presentation
Bliana Grp Twitter Presentation
 
Jasmeet Grp Facebook It Group Assig
Jasmeet Grp Facebook It Group AssigJasmeet Grp Facebook It Group Assig
Jasmeet Grp Facebook It Group Assig
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
Chen-special-topic-01-Multimedia
Chen-special-topic-01-MultimediaChen-special-topic-01-Multimedia
Chen-special-topic-01-Multimedia
 
Faizan Chap 07 Storage
Faizan Chap 07 StorageFaizan Chap 07 Storage
Faizan Chap 07 Storage
 
Dennis Chap 09 Data Communication
Dennis Chap 09 Data CommunicationDennis Chap 09 Data Communication
Dennis Chap 09 Data Communication
 
Bliana Chap 02 Internet
Bliana Chap 02 InternetBliana Chap 02 Internet
Bliana Chap 02 Internet
 
Amr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility ProgramsAmr Chap 08 Operating Systems & Utility Programs
Amr Chap 08 Operating Systems & Utility Programs
 
Pramilah Chap 04 System Unit
Pramilah Chap 04 System UnitPramilah Chap 04 System Unit
Pramilah Chap 04 System Unit
 
Adeyinka Chap 03 Application Software
Adeyinka Chap 03 Application SoftwareAdeyinka Chap 03 Application Software
Adeyinka Chap 03 Application Software
 
Mahendran Chap 06 Output
Mahendran Chap 06 OutputMahendran Chap 06 Output
Mahendran Chap 06 Output
 
Jasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To ComputersJasmeet Chap 01 Intro To Computers
Jasmeet Chap 01 Intro To Computers
 
Gevita Chap 10 Database Management
Gevita Chap 10 Database ManagementGevita Chap 10 Database Management
Gevita Chap 10 Database Management
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 
Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development Strategies
 

Recently uploaded

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 

Recently uploaded (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

Ais Romney 2006 Slides 07 Is Control1

  • 1. HAPTER 7 Information Systems Controls for Systems Reliability Part 1: Information Security
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 117.
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136.
  • 137.
  • 138.
  • 139.
  • 140.
  • 141.
  • 142.
  • 143.
  • 144.
  • 145.
  • 146.
  • 147.
  • 148.
  • 149.
  • 150.
  • 151.
  • 152.
  • 153.
  • 154.
  • 155. PREVENTIVE CONTROLS N.W. U S A CA The N.W. employee connects to the government agency’s website and clicks on the button for submitting bids on open contracts.
  • 156. PREVENTIVE CONTROLS N.W. U S A CA The browser moves to a secure web page displaying the lock icon.
  • 157.
  • 158.
  • 159.
  • 160.
  • 161.
  • 162.
  • 163.
  • 164.
  • 165.
  • 166.
  • 167.
  • 168.
  • 169.
  • 170.
  • 171.
  • 172.
  • 173.
  • 174.
  • 175.
  • 176.
  • 177.
  • 178.
  • 179.
  • 180.
  • 181.
  • 182.
  • 183.
  • 184.
  • 185.
  • 186.
  • 187.
  • 188.
  • 189.
  • 190.
  • 191.
  • 192.
  • 193.
  • 194.
  • 195.
  • 196.
  • 197.
  • 198.
  • 199.
  • 200.
  • 201.
  • 202.
  • 203.
  • 204.
  • 205.
  • 206.
  • 207.