Chapter 14 Flashcards
Whats IT governance
process to ensure the efficiency use of IT for a company to achieves its goals
What is COBIT
The most widely used international standard for IT governance
What are the two categories of COBIT
IT Governance objectives-Creating the strategy
Management IT objectives - Turning the strategy into Action
What are the five COBIT
Governance : Evaluate,Direct ,Monitor
Management: Align,Plan and Organize
Management : Build, acquire and implement
Management: Deliver, service and support
Management: Monitor, evaluate and assess
Whats is Governance : Evaluate,Direct ,Monitor controls objectives
Ensure IT benefit delivery
Ensure risk realization
Ensure resource optimization
The only IT governance focused domain in COBIT 2019
Whats is Management: Align,Plan and Organize control objectives
manage data , security and risk
Dress the way IT is used to meet organizational objectives
What is Management : Build, acquire and implement control objectives
manage changes , asset and project
Where the management assesses IT requirement , acquire the tech and implement them
What is : Management: Deliver, service and support control objectives
manage operation
manage continuity
manage security services
operational side of IT (IT support)
What is Management: Monitor, evaluate and assess control objectives
manage system of internal control,assurance
Focus on existing IT and if they meet the organization objectives
What does logical access controls do
identify ,authorize and provide users access to a computer info.
What does physical access controls do
help to keep track of who coming and going into the facility
Role based access control (RBAC) is to
restricted network for individual with specific roles that have a criteria if they acess the system or not
User access roles are
groups with predefined permission to which users are assigned , with each user assigned to only one role at a time
What is the hierarchy of user roles
Administrator
Creator
User
Read-only
Whats user authentification
process associating the username to each authorized user with unique identifier
Whats user access provisioning
formal process of granting access to a new user
What user access de-provisionning
formal process of changing users access
What are the two type of user access changes
Termination
Transfer