Obtain a copy of COBIT (available at www.isaca.org) and read section DS5. Design a checklist for assessing
Question:
Obtain a copy of COBIT (available at www.isaca.org) and read section DS5.
Design a checklist for assessing each of the 11 detailed information security control objectives. The checklist should contain questions to which a Yes response represents a control strength, a No response represents a control weakness, plus a possible N/A response.
Provide a brief reason for asking each question. Organize your checklist as follows:
Transcribed Image Text:
Question Yes No N/A Reason for asking 1. Is there regular security awareness training? Training is one of the most important preventive controls because many security incidents happen due to either human error or social ngineering
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Answer rating: 77% (9 reviews)
C OBI T Control Objective Possible questions DS51 Does the person responsible for information securi...View the full answer
Answered By
Ashington Waweru
I am a lecturer, research writer and also a qualified financial analyst and accountant. I am qualified and articulate in many disciplines including English, Accounting, Finance, Quantitative spreadsheet analysis, Economics, and Statistics. I am an expert with sixteen years of experience in online industry-related work. I have a master's in business administration and a bachelor’s degree in education, accounting, and economics options.
I am a writer and proofreading expert with sixteen years of experience in online writing, proofreading, and text editing. I have vast knowledge and experience in writing techniques and styles such as APA, ASA, MLA, Chicago, Turabian, IEEE, and many others.
I am also an online blogger and research writer with sixteen years of writing and proofreading articles and reports. I have written many scripts and articles for blogs, and I also specialize in search engine
I have sixteen years of experience in Excel data entry, Excel data analysis, R-studio quantitative analysis, SPSS quantitative analysis, research writing, and proofreading articles and reports. I will deliver the highest quality online and offline Excel, R, SPSS, and other spreadsheet solutions within your operational deadlines. I have also compiled many original Excel quantitative and text spreadsheets which solve client’s problems in my research writing career.
I have extensive enterprise resource planning accounting, financial modeling, financial reporting, and company analysis: customer relationship management, enterprise resource planning, financial accounting projects, and corporate finance.
I am articulate in psychology, engineering, nursing, counseling, project management, accounting, finance, quantitative spreadsheet analysis, statistical and economic analysis, among many other industry fields and academic disciplines. I work to solve problems and provide accurate and credible solutions and research reports in all industries in the global economy.
I have taught and conducted masters and Ph.D. thesis research for specialists in Quantitative finance, Financial Accounting, Actuarial science, Macroeconomics, Microeconomics, Risk Management, Managerial Economics, Engineering Economics, Financial economics, Taxation and many other disciplines including water engineering, psychology, e-commerce, mechanical engineering, leadership and many others.
I have developed many courses on online websites like Teachable and Thinkific. I also developed an accounting reporting automation software project for Utafiti sacco located at ILRI Uthiru Kenya when I was working there in year 2001.
I am a mature, self-motivated worker who delivers high-quality, on-time reports which solve client’s problems accurately.
I have written many academic and professional industry research papers and tutored many clients from college to university undergraduate, master's and Ph.D. students, and corporate professionals. I anticipate your hiring me.
I know I will deliver the highest quality work you will find anywhere to award me your project work. Please note that I am looking for a long-term work relationship with you. I look forward to you delivering the best service to you.
3.00+
2+ Reviews
10+ Question Solved
Related Book For
Accounting Information Systems
ISBN: 978-0132552622
12th edition
Authors: Marshall B. Romney, Paul J. Steinbart
Question Posted:
Students also viewed these Computer Sciences questions
-
Obtain a copy of COBIT (available at www.isaca.org) and read the control objectives that relate to encryption (DS5.8 and DS5.11). What are the essential control procedures that organizations should...
-
Read the following case study, which describes the data requirements for a DVD rental company. The DVD rental company has several branches throughout the USA. The data held on each branch is the...
-
Define the type of attack in each of the following cases: a. A student breaks into a professors office to obtain a copy of the next test. b. A student gives a check for $10 to buy a used book. Later...
-
. The electric polarization P of a light wave for high values of the electric field E is given by: P= a(c,E+cE + cE) where a, c1, c2 and c3 are constants. Find the expression for the instantaneous...
-
After reading the section in this chapter on direct mail, develop guidelines to be used by a company when creating a direct mail program.
-
Explain the process by which a Steinway grand piano is constructed as a subsystem of a larger system. From what the text tells you, give some examples of how the production subsystem is affected by...
-
When a write of attachment may be obtained?
-
Chocolates has observed the following overhead costs for the past 12 months: The results of the regression analysis are: TC = $8,781 + ($0:63 Ã Number of Boxes) a. Plot the data and the...
-
A Company has Net Income of $1,200,000 Depreciation Expense of $500,000 A decrease in it's A/R from the beginning of the year to the end of the year in the amount of $50,000 An increase in it's...
-
Prepare a business case for the Global Treps project. Assume that the project will take six months to complete, use many volunteer hours, and cost about $120,000 for hardware, software, travel, and...
-
The chapter briefly discussed the following three common attacks against applications a. Buffer overflows b. SQL injection c. Cross-site scripting Required Research each of these three attacks and...
-
From the viewpoint of the customer, what are the advantages and disadvantages to the opt-in versus the opt-out approaches to collecting personal information? From the viewpoint of the organization...
-
In Example 5.4 on page 186, you and two friends decided to go to Wendys. Now, suppose that instead you go to McDonalds, which recently filled approximately 88.3% of the orders correctly. What is the...
-
How do the principals of Redundant Links, Link Aggregation, and Scalable Routing Protocols contribute to the Resilience and the Scalability of Networks? Explain.
-
How is logging and monitoring administered in ubuntu (Linux) ? What is the location of specific linux log files?
-
On January 1, 2019, the records of Claireborn Company showed the following accounts and balances in its property, plant, and equipment category: Land - P350,000 Land Improvements - P20,000 Buildings...
-
On January 1, 2024, Pet Friendly Stores adopted the retail inventory method. Inventory transactions at both cost and retail, and cost indexes for 2024 and 2025 are as follows: Beginning inventory...
-
Forest Company has five products in its inventory. Information about ending inventory follows. Cost $ 17 Unit Replacement Product Quantity Unit Cost A 500 $ 15 BCDE B 600 20 16 600 8 7 800 500 22 12...
-
In Problem perform the indicated operations and simplify. [(x - y) + 3z][ (x - y) - 3z]
-
During the year land was revalued and the surplus reported as Revaluation surplus; and an asset costing 80,000, written down to 38,000, was sold for 40,000. Identify the cost of any non-current...
-
You are the systems analyst for the Wee Willie Williams Widget Works (also known as Dub 5). Dub 5 has been producing computer keyboard components for more than 20 years and has recently signed an...
-
Contrast the logical and the physical views of data, and discuss why separate views are necessary in database applications. Describe which perspective is most useful for each of the following...
-
The relational data model represents data as being stored in tables. Spreadsheets are another tool that accountants use to employ a tabular representation of data. What are some similarities and...
-
A program that asks the user for a natural number and then calls a recursive function with that number as its argument. The recursive function would take an input value n as its parameter and print...
-
A company has the following costs: Employee salaries.17,000 Rent.11,000 Insurance.2,000 Depreciation on equipment.6,000 Variable costs: Labour24,000 : Materials16,000 : Direct Expenses2,000 :...
-
Consider the figure below in which a TCP sender and receiver communicate over a connection in which the sender-to-receiver segments may be lost. The TCP sender sends initial window of five segments...
Study smarter with the SolutionInn App