Business Process Evaluation and Risk Management


  1. Run-to-run totals can verify data through various stages of application processing.

  2. Input/output controls should be implemented for both the sending and the receiving application in an integrated systems environment.

  3. The board of directors and executive officers are ultimately accountable for the functionality, reliability, and security within IT governance.

  4. Authentication techniques for sending and receiving data between EDI systems is crucial to prevent unauthorized transactions.

  5. Data-mining techniques can be used to help identify and investigate unauthorized transactions.

  6. After identifying potential security vulnerabilities, the IS auditor should perform a business impact analysis of the threats that would exploit the vulnerabilities.

  7. Network environments often add to the complexity of program-to-program communication, making application systems implementation and maintenance more difficult.



Exam Cram 2. CISA
Cisa Exam Cram 2
ISBN: B001EEFNHG
EAN: N/A
Year: 2005
Pages: 146

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net