Appropriate Control Procedures: Tools like COBIT, to mitigate security threats
Monitor & remedial Action: Continuous cycle of developing policies, communicating them, implementing specific controls, monitoring performance, taking corrective action
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Reliable Systems:
A
Protects confidential information (encryption & VPN)
Privacy (focused on protecting personal info)
Produces info that is: - Accurate - Timely - Authorized
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
(4) Categories of Integrity Controls:
A
Source Data Controls: all source docs are authorized, validated, accurate, complete, properly accounted for, entered into the system in a timely manner
Data Entry Controls: validate input by checking to ensure data is entered correctly
Processing Controls: Ensure data is processed correctly using labels, recalculating totals, reduce data transmission errors
Output Controls: User reviews by reconciling accounts