A key control concern described in Table 8.2 regarding the systems development manager is that “systems development can develop and implement systems without management approval.” Discuss a control described in this chapter that reduces the risk that unauthorized systems will be implemented.
Answer to relevant QuestionsDebate the following point: “Business continuity planning is really an IT issue.”The following is a list of 10 common security problems. For each problem, describe why it is a problem and choose a control plan from this chapter that would prevent or detect the problem from occurring. A. Criminals posing ...Examine the last column in Table for the following personnel only: security officer, chief information officer (CIO), systems development manager, quality assurance, and systems programming. For each of the five functions, ...Using the Internet, provide a summary of the major changes in COBIT 5 from COBIT 4.1.“If a business process is implemented with OLRT processing, we do not need to worry about update completeness and update accuracy.” Do you agree? Discuss fully.
Post your question