• Bài giảng Romney_ais13 - Chapter 13: The Expenditure Cycle: Purchasing to Cash DisbursementsBài giảng Romney_ais13 - Chapter 13: The Expenditure Cycle: Purchasing to Cash Disbursements

    Learning Objectives Explain the basic business activities and related information processing operations performed in the expenditure cycle. Discuss the key decisions to be made in the expenditure cycle, and identify the information needed to make those decisions. Identify major threats in the expenditure cycle, and evaluate the adequacy of vario...

    pptx11 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 876 | Lượt tải: 0

  • Bài giảng Romney_ais13 - Chapter 12: The Revenue Cycle: Sales to Cash CollectionsBài giảng Romney_ais13 - Chapter 12: The Revenue Cycle: Sales to Cash Collections

    Learning Objectives Describe the basic business activities and related information processing operations performed in the revenue cycle. Discuss the key decisions that need to be made in the revenue cycle, and identify the information needed to make those decisions. Identify major threats in the revenue cycle, and evaluate the adequacy of variou...

    pptx12 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 799 | Lượt tải: 0

  • Bài giảng Romney_ais13 - Chapter 11: Auditing Computer-Based Information SystemsBài giảng Romney_ais13 - Chapter 11: Auditing Computer-Based Information Systems

    Learning Objectives Describe the nature, scope, and objectives of audit work, and identify the major steps in the audit process. Identify the six objectives of an information system audit, and describe how the risk-based audit approach can be used to accomplish these objectives. Describe the different tools and techniques auditors use to test so...

    pptx18 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 950 | Lượt tải: 0

  • Bài giảng Romney_ais13 - Chapter 10: Processing Integrity and Availability ControlsBài giảng Romney_ais13 - Chapter 10: Processing Integrity and Availability Controls

    Learning Objectives Identify and explain controls designed to ensure processing integrity. Identify and explain controls designed to ensure systems availability.

    pptx10 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 1227 | Lượt tải: 0

  • Bài giảng Romney_ais13 - Chapter 9: Confidentiality and Privacy ControlsBài giảng Romney_ais13 - Chapter 9: Confidentiality and Privacy Controls

    Learning Objectives Identify and explain controls designed to protect the confidentiality of sensitive information. Identify and explain controls designed to protect the privacy of customers’ personal information. Explain how the two basic types of encryption systems work.

    pptx9 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 810 | Lượt tải: 0

  • Bài giảng Romney_ais13 - Chapter 8: Controls for Information SecurityBài giảng Romney_ais13 - Chapter 8: Controls for Information Security

    Learning Objectives Explain how information security affects information systems reliability. Discuss how a combination of preventive, detective, and corrective controls can be employed to provide reasonable assurance about the security of an organization’s information system.

    pptx14 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 917 | Lượt tải: 0

  • Bài giảng Romney_ais13 - Chapter 7: Control and Accounting Information SystemsBài giảng Romney_ais13 - Chapter 7: Control and Accounting Information Systems

    Learning Objectives Explain basic control concepts and why computer control and security are important. Compare and contrast the COBIT, COSO, and ERM control frameworks. Describe the major elements in the internal environment of a company. Describe the four types of control objectives that companies need to set. Describe the events that affect...

    pptx21 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 876 | Lượt tải: 0

  • Bài giảng Romney_ais13 - Chapter 6: Computer Fraud and Abuse TechniquesBài giảng Romney_ais13 - Chapter 6: Computer Fraud and Abuse Techniques

    Learning Objectives Compare and contrast computer attack and abuse tactics. Explain how social engineering techniques are used to gain physical or logical access to computer resources. Describe the different types of malware used to harm computers.

    pptx17 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 870 | Lượt tải: 0

  • Bài giảng Romney_ais13 - Chapter 5: Computer FraudBài giảng Romney_ais13 - Chapter 5: Computer Fraud

    Learning Objectives Explain the threats faced by modern information systems. Define fraud and describe both the different types of fraud and the process one follows to perpetuate a fraud. Discuss who perpetrates fraud and why it occurs, including the pressures, opportunities, and rationalizations that are present in most frauds. Define computer...

    pptx13 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 971 | Lượt tải: 0

  • Bài giảng Romney_ais13 - Chapter 4: Relational DatabasesBài giảng Romney_ais13 - Chapter 4: Relational Databases

    Learning Objectives Explain the importance and advantages of databases, as well as the difference between database and file-based legacy systems. Explain the difference between logical and physical views of a database. Explain fundamental concepts of database systems such as DBMS, schemas, the data dictionary, and DBMS languages. Describe what ...

    pptx18 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 1018 | Lượt tải: 0