COBITFramework_ManagementGuidelines---IT治理框.ppt_第1頁
COBITFramework_ManagementGuidelines---IT治理框.ppt_第2頁
COBITFramework_ManagementGuidelines---IT治理框.ppt_第3頁
COBITFramework_ManagementGuidelines---IT治理框.ppt_第4頁
COBITFramework_ManagementGuidelines---IT治理框.ppt_第5頁
已閱讀5頁,還剩174頁未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)

文檔簡介

1、SITC: Service that verification, detection and correction of the accuracy of output occur; and that information provided in the output is used. AC6 Transaction Authentication and Integrity Before passing transaction data between internal applications and business/operational functions (in or outside

2、 the enterprise), check it for proper addressing, authenticity of origin and integrity of content. Maintain authenticity and integrity during transmission or transport,SITC: Service however, it is unstructured, rudimentary and prone to error. Configuration documentation accuracy is inconsistent, and

3、 only limited planning and impact assessment take place prior to a change. 3 Defined when There is a defined formal change management process in place, including categorisation, prioritisation, emergency procedures, change authorisation and release management, and compliance is emerging. Workarounds

4、 take place, and processes are often bypassed. Errors may occur and unauthorised changes occasionally occur. The analysis of the impact of IT changes on business operations is becoming formalised, to support planned rollouts of new applications and technologies,SITC: Service programs It provides pol

5、icies and standards that can be mandated It provides good practice and guidance It has controls that can be implemented on an as-is basis,SITC: Service &Security,172,Sample Questions,How does COBIT help management and audtors? Audit findings are now expressed in COBITs terms Audit requirements are p

6、roperly understood and defined Audit findings will be reduced using COBIT Management now understand what auditing is all about,SITC: Service &Security,173,Sample Questions,Which part of the COBIT toolset will help the business and IT understand how to measure results? Management guidelines Framework

7、 Control objectives IT Governance Implementation Guide Using COBIT and Val IT, 2nd edition,SITC: Service &Security,174,Sample Questions,COBIT helps to meet regulatory requirements by? Helps demonstrate adequate controls over IT activities Defining the precise control practices that apply to well kno

8、w regulations Specifying the specific control objectives which satisfy well know regulations Serving as a set of control objectives mandated by regulatory bodies,SITC: Service &Security,175,Sample Questions,COBIT is a framework and a prescribed set of practices? True False,SITC: Service &Security,17

9、6,Sample Questions,COBIT aids in the management of IT activities by? Identifying the control objectives for each activity Establishing the maturity levels for each activity Organizing IT activities into well-defined processes Defining the steps in each activity,SITC: Service &Security,177,Sample Que

10、stions,The register of IT suppliers is periodically reviewed and updated is an example of a: DS2? Control objective Key activity KGI Control Practice,SITC: Service &Security,178,Exercise 2,Non-existent,Level 0 Non-existent Management processes are not applied at all. Level 1 Initial/Ad Hoc Processes

11、 are ad hoc and disorganized. Level 2 Repeatable Processes follow a regular pattern. Level 3 Defined Processes are documented and communicated. Level 4 Managed Processes are monitored and measured. Level 5 Optimized Good practices are followed and automated,Level 0,Level 1,Level 2,Level 3,Level 4,Level 5,Initial/Ad Hoc,Repeatable,Defined,Managed,Optimized,Level 1,Level

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

最新文檔

評論

0/150

提交評論