Reference no: EM131137340
IT Governance and Internal Controls Continues
Choose one topic of interest to you and discuss
1. Define and discuss examples of physical and logical security measures often used by organizations in computer operations.
2. Here are five organization level controls related to IS/IT. Define and give examples for at least two. Together, let's cover them all: (1) personnel policies; (2) ?le security controls; (3) business continuity planning; (4) computer facility controls; and (5) access to computer ?les.
3. The purpose of application controls is to prevent, detect, and correct errors and irregularities in processing transactions and fall into the categories of 1) input controls, 2) processing controls and 3) output controls. Define and give examples for at least two. Together, let's cover them all.
Post your responses in the attached topics. Be careful in following the conversation threads.
COSO vs COBIT
From your readings this week and additional research, how is ISACA's Cobit framework different or similar to the COSO framework we discussed previously?
What are the Authors Thinking -
We should be concerned what auditors are thinking about when they audit our systems since we are held in compliance. Review PowerPoint - Chapter 11, Auditing ERP under Course Content and share any comments related to what you find interesting.
OPTIONAL: CGEIT Career Path
We discussed earlier the issue of IT Governance with ERP systems and the importance of strategic alignment, value delivery, risk management and performance management. ISACA offers a certification in the area of enterprise IT governance, for which your skills as financial and IT managers are uniquely suited. Visit ISACA's CGEIT to learn more. Please feel free to share any comments on the certification. Does it seem worthwhile? Do you know anyone who has it? Could you see yourself pursuing one?
Based on the measurement of comfortable living
: In Indonesia, comfortable living occurs at about $30,000. Based on the measurement of comfortable living, which of the following is most likely to be true?
|
Make chart of all the traditional media serving
: You have been asked by the director of your school's student union to make a chart of all the traditional media serving your market to use in promoting the center's 50th-anniversary events. At the end of your media analysis, identify the top three t..
|
An input to the master production schedule
: Which of the following is an input to the master production schedule?
|
What is the maximum flow capacity for the system
: Northwest Natural Gas has a network of pipes that are used to transfer natural gas throughout its network. The following pipe network has pipe flow capacities in gallons per minute as shown. What is the maximum flow capacity for the system if the com..
|
Discuss examples of physical and logical security measures
: Define and discuss examples of physical and logical security measures often used by organizations in computer operations.
|
What is a psychological autopsy
: Give a brief summary of the timeline of events in this case. What is a psychological autopsy (equivocal death analysis)? Why was one ordered for the USS Iowa
|
Evaluate the influence line ordinates at the quarter points
: Evaluate the influence line ordinates at the quarter points of the span (b) Using the influence lines for reactions, construct the influence line for moment at point B. Compute the maxi mum value of RA produced by the set of wheel loads.
|
Perform an anova test and state the results
: 1) Ace Car Rental has three main models that are used in it midsize range of cars. The cars are very similar and perform at about the same level. Since the customer has to pay for the gas use during the rental period, the manager is often asked about..
|
What expectations might public funders have
: What expectations might public funders have that you are less likely to have to address with private funders? What kinds of programing do you think are currently at the top of the trend curve, and why?
|