



Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
The importance of ensuring the reliability and credibility of information systems, particularly when dealing with massive amounts of data. It covers the key concepts of controls, audits, testing, and security measures to protect data, programs, and equipment from various threats. The objectives and techniques of controls, the purpose and methods of auditing information systems, the classification and objectives of system testing, and the potential threats to information system security along with the measures to protect against them. It emphasizes the need for controls, audits, and security to maintain data security, privacy, and integrity, which are crucial for the effective and reliable operation of information systems.
Typology: Cheat Sheet
1 / 6
This page cannot be seen from the preview
Don't miss anything!
Chapter 8
It is very important to ensure the reliability of reports produced by an information system If unreliability is seen by users the entire credibility of the system is lost Ensuring reliability is not difficult for small systems but when a system has to handle massive data it is a challenge Systematic controls are thus essential when a system is designed. AUDITS Many organizations are now entirely dependent on computer based information system. These information systems contain financial data and other critical procedures. It is essential to protect the systems against frauds and ensure that sound accounting practices are followed. It is necessary to trace the origin and fix responsibilities when frauds occur. Audit methods primary purpose is to ensure this. TESTING Systems contain many individual subsystems. Usually sub-systems and programs are individually tested However when a whole system is integrated unforeseen errors may be seen. Thus before releasing a system the entire operational system should be tested for correctness and completeness. SECURITY Systems contain sensitive data about the organization and also about persons working in the organization. Sensitive data should be protected from spies, thieves or disgruntled employees. Thus access should be carefully controlled and provided only on a need to know basis. When computers are networked corruption/erasure may take place due to viruses. Services may be disrupted due to denial of service attacks thus systems should be designed with appropriate security measures. CONTROL- Method to ensure that a system processes data as per design and that all data is included and are correct AUDIT AND TESTING - Ensure that the system is built as per specifications and that processed results are correct. Protect systems from frauds.
Chapter 8 SECURITY- Protection of data resources,programs,and equipment from illegal use,theft,vandalism,accidents, disasters etc. NEED OF CONTROLS
Well defined responsibility for input preparation, delivery output use, operation and maintenance
Chapter 8 o Take sample inputs and manually apply processing rules and compare outputs with computer outputs
Use special audit packages to check system Audit package allows
Chapter 8 CLASIFICATION OF SYSTEM TESTS PROGRAM TESTS