IT Security, Risks and Controls 3 Flashcards
Operations process goals should ensure:
1) effectiveness of operations
2) efficient resources
3) security of resources
effectiveness of operations
strives to ensure that an intended process is fulfilling its intended purpose (such as proper management authorization for overrides)
efficient resources
to have enough resources to ensure benefits of controls exceed the costs of those controls
security of resources
protect all tangible and intangible resources.
Validity checks and input controls vs authentication
Validity checks and input controls - ensure only valid data are entered.
Authentication controls - ensure authorized use of applications.
Methods to control access to appropriate users are
1) passwords and user IDs
2) menus for end-user computing access databases
3) independent review of transactions,
4) restricting user ability to load data,
5) requirement of appropriate validation
6) authorization
7) reporting control when the end user uploads data and recording access to company databases by the EUC application
Methods to control Computer Operations access to programs and data include
1) Segregation controls
2) backup and recovery
3) contingency processing
4) file protection rings
5) internal and external labels
Risks associated with End User Computing (EUC)
1) Management does not review results of applications appropriately
2) More personnel need to understand control concepts
3) End user applications are not always tested before implimented