Term
|
Definition
| are controls that are present in the environment surrounding the information system. |
|
|
Term
|
Definition
| consists of separating the four basic functions of event processing: authorizing events, executing events, recording events, and safeguarding resources resulting from consummating events. |
|
|
Term
| Segregation of Duties Why? |
|
Definition
| to detect erroneous record keeping and limit the ability of a single employee to commit and conceal frauds, errors, or other kinds of system failures. |
|
|
Term
| Segregation of Duties What? |
|
Definition
| Custody, Authorization, and record keeping. (No one person should initiate the transaction, approve the transaction, record the transaction, reconcile balances, handle assets, or review reports). |
|
|
Term
| Segregation of Duties Also? |
|
Definition
| Should have a separate information system function with segregation with the ISF so that no one person has access to the computer, its programs, or live data. |
|
|
Term
|
Definition
| convert data into machine readable form and run the equipment. |
|
|
Term
|
Definition
| develop, write, and debug programs. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| controls access to data, programs, and documentation to reduce unauthorized program changes and computer operations. |
|
|
Term
|
Definition
| is a plan or process put in place to guide actions and thus achieve goals. |
|
|
Term
| Program Change Controls Why? |
|
Definition
| to ensure software development and software changes are appropriate and meet established objectives. |
|
|
Term
| Program Change Controls What? |
|
Definition
| a process to ensure that program development and program changes are properly authorized, tested, reviewed, and approved before implementation. |
|
|
Term
| Program Change Controls Also? |
|
Definition
| There should be separate development, test, and production environments to avoid program changes affecting live production. User acceptance testing should be conducted to help ensure new programs and changes to existing programs are acceptable and meet user expectations and are more thoroughly tested. Developers should not be allowed to move new or modified programs from the test environment to the production environment potentially escaping a complete review process. |
|
|
Term
|
Definition
| To ensure an adequate supply of competent and honest employees. |
|
|
Term
|
Definition
| Hire good people, develop them and invest in them, and keep them happy; supervise them; properly let them go when necessary. |
|
|
Term
|
Definition
| Background Checks, aptitude assessment, attitude and integrity evaluation. |
|
|
Term
|
Definition
| Challenging assignments, identified career paths, competitive salary and rewards. |
|
|
Term
|
Definition
| Training and education, performance evaluations. |
|
|
Term
|
Definition
| Forecasting turnover and labor needs, skill banks. |
|
|
Term
|
Definition
| Job rotation, required vacations, fidelity bonding. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Proper handling of terminations and reassignments to other areas. |
|
|
Term
|
Definition
| To ensure that organizational data/information and related data/information resources are not subject to unauthorized use, disclosure, modification, damage, or loss. |
|
|
Term
|
Definition
| Physically restrict people from getting close to the resources and keep them from having inappropriate access to the system. |
|
|
Term
|
Definition
| locks, guards, fences, badges, visitor logs. |
|
|
Term
|
Definition
| passwords, firewalls, encryption. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| prove you are who you say you are. |
|
|
Term
|
Definition
| what actions can you and can you not take. |
|
|
Term
|
Definition
| log and look for unusual system activity. |
|
|
Term
| Disaster Recovery and Backup Why? |
|
Definition
| When some disaster occurs, I want to be back up and running as quickly as possible. |
|
|
Term
| Disaster Recovery and Backup What? |
|
Definition
| I need to consider every component of my system and identify what could happen in the event of a disaster and prepare for such occurrences. |
|
|
Term
| Disaster Recovery and Backup Also? |
|
Definition
| Planning, documenting, training, and testing of my disaster recovery plan. Identify key functions/activities and assign responsibility for each function/activity. Backups such as hardware, software, telecommunications, data, people. Other such as personnel issues. |
|
|
Term
|
Definition
| ensuring that files are used for their intended purpose, cannot be altered unless warranted and are updated completely and correctly in a shared environment. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| allows tracing a transaction from its origin to its destination in accounting reports and vice versa; a record of system activity by system and application processes and by user activity of systems and applications. |
|
|
Term
|
Definition
| relating different sets of data to one another to identify and investigate differences and take corrective action when needed. |
|
|
Term
|
Definition
| physical inventory counts and accounts receivable confirmations. |
|
|
Term
| Variance Analysis and Analytical Review |
|
Definition
| Investigating and Resolving differences and changes. |
|
|
Term
|
Definition
| Control Objectives for Information and Related Technology. developed by the IT Governance Institute to provide guidance to managers, users, and auditors on the best practices for the management of Information Technology. |
|
|
Term
|
Definition
| IT is aligned with the business. IT enables the business and maximizes benefits. IT resources are used responsibly. IT risks are managed appropriately. |
|
|
Term
|
Definition
| the policies, procedures, practices, and organizational structures designed to provide reasonable assurance that business objectives will be achieved and that UNDESIRED events will be prevented or detected and corrected. |
|
|
Term
| COBIT's 4 Broad IT Control Process Domains |
|
Definition
| Plan and Organize, Acquire and Implement, Deliver and Support, Monitor and Evaluate. |
|
|
Term
|
Definition
| Establish strategic vision for IT. Develop tactics to plan, communicate, and manage realization of the strategic vision. |
|
|
Term
|
Definition
| Identify automated solutions. Develop and acquire IT solutions. Integrate IT solutions into operational processes. Manage changes to existing IT systems. |
|
|
Term
|
Definition
| Deliver required IT services. Ensure security and continuous service. Provide Support services. |
|
|
Term
|
Definition
| Monitor and evaluate the processes. |
|
|