TimTaiLieu.vn - Thư viện tài liệu, ebook, đồ án, luận văn, tiểu luận, giáo trình các lĩnh vực CNTT, Ngoại ngữ, Luật, Kinh doanh, Tài chính, Khoa học...
Describe the major business activities and related information processing operations performed in the human resources management (HRM)/payroll cycle. Discuss the key decisions to be made in the HRM/payroll cycle and identify the information needed to make those decisions. Identify the major threats in the HRM/payroll cycle and evaluate the adequa...
17 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 914 | Lượt tải: 0
Describe the major business activities and related information processing operations performed in the production cycle. Identify major threats in the production cycle and evaluate the adequacy of various control procedures for dealing with those threats. Explain how a company’s cost accounting system can help it achieve its manufacturing goals. ...
16 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 848 | Lượt tải: 0
Explain the basic business activities and related information processing operations performed in the expenditure cycle. Discuss the key decisions to be made in the expenditure cycle, and identify the information needed to make those decisions. Identify major threats in the expenditure cycle, and evaluate the adequacy of various control procedures...
20 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 944 | Lượt tải: 0
Describe the basic business activities and related information processing operations performed in the revenue cycle. Discuss the key decisions that need to be made in the revenue cycle, and identify the information needed to make those decisions. Identify major threats in the revenue cycle, and evaluate the adequacy of various control procedures ...
18 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 903 | Lượt tải: 0
Describe the scope and objectives of audit work, and identify the major steps in the audit process. Identify the objectives of an information system audit, and describe the four-step approach necessary for meeting these objectives. Design a plan for the study and evaluation of internal control in an AIS. Describe computer audit software, and exp...
17 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 933 | Lượt tải: 0
Security (Chapter 8) Access to the system and its data is controlled and restricted to legitimate users. Confidentiality (Chapter 8) Sensitive organizational information (e.g., marketing plans, trade secrets) is protected from unauthorized disclosure. Privacy (Chapter 9) Personal information about customers is collected, used, disclosed, and m...
14 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 904 | Lượt tải: 0
Learning Objectives Identify and explain controls designed to protect the confidentiality of sensitive corporate information. Identify and explain controls designed to protect the privacy of customers’ personal information. Explain how the two basic types of encryption systems work.
16 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 846 | Lượt tải: 0
Discuss how the COBIT framework can be used to develop sound internal control over an organization’s information systems. Explain the factors that influence information systems reliability. Describe how a combination of preventive, detective, and corrective controls can be employed to provide reasonable assurance about information security.
23 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 865 | Lượt tải: 0
Learning Objectives Explain basic control concepts and explain why computer control and security are important. Compare and contrast the COBIT, COSO, and ERM control frameworks. Describe the major elements in the internal environment of a company Describe the four types of control objectives that companies need to set. Describe the events that...
20 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 853 | Lượt tải: 0
Learning Objectives Compare and contrast computer attack and abuse tactics. Explain how social engineering techniques are used to gain physical or logical access to computer resources. Describe the different types of malware used to harm computers.
13 trang | Chia sẻ: nguyenlinh90 | Ngày: 19/07/2019 | Lượt xem: 1236 | Lượt tải: 0