Purchase Solution

Computer security checklist

Not what you're looking for?

Ask Custom Question

Design a checklist for assessing computer security controls. The checklist should be organized as follows:
Three major categories: preventive, detective, and corrective controls.
Appropriate subcategories for each major topic discussed in this chapter.
For each subcategory, develop individual questions about the existence of specific control procedures, each question should have three possible answers: Yes, NO, Not Applicable.

The text we are using is Accounting Information Systems
10th Edition
by Marshall B. Romney and Paul John Steinbart
© 2005 Prentice Hall

This information is supposed to help me later in the course to design an AIS.

Purchase this Solution

Solution Summary

921 Words, APA Format

Solution Preview

Please find the file attached. As you know, BrainMass is not an assignment-completion service. This response is meant to assist you in tackling your questions and to help you learn the material needed to understand the problems. Thanks

Computer security checklist

Computer security checklist
To protect the practice against viruses, computer theft, disasters and data loss, a computer security checklist is used (Practice Security Checklist). Security checklist contains the following terms like review of policy and procedures, diffusion testing from external and internal network, network device evaluation, topology evaluation, application evaluation, and server evaluation (Rahardjo, Triwidada, & Sutarman, 2004).
With the help of a checklist, risk could be reduced quickly and easily from viruses, hackers, computer theft and other similar threats. To protect the computer from viruses and threat, some simple steps are designed (Practice Security Checklist). They don't provide full protection but helps to reduce the risk. They are not hard to use, but they are very important. To maintain the security of a computer, proper checklist should be made, which must include:
? Back up: Backing up the practice management data regularly that is like an insurance policy. It allows the practice to recover fast and run rapidly after a data loss. The hardware could be replaced and application software could be reloaded from original media, recovery of data files (Practice Security Checklist).
? Physical Security: A key step in securing the information stored is to ensure that physical security of desktop, laptop and server ...

Solution provided by:
Education
  • MBA (IP), International Center for Internationa Business
  • BBA, University of Rajasthan
Recent Feedback
  • "Thank You so much! "
  • "Always provide great help, I highly recommend Mr. Sharma over others, thanks again. "
  • "great job. I will need another help from you. "
  • "first class!"
  • "Thank you for your great notes. Will you be willing to help me with one more assignment? "
Purchase this Solution


Free BrainMass Quizzes
Paradigms and Frameworks of Management Research

This quiz evaluates your understanding of the paradigm-based and epistimological frameworks of research. It is intended for advanced students.

Basics of corporate finance

These questions will test you on your knowledge of finance.

Change and Resistance within Organizations

This quiz intended to help students understand change and resistance in organizations

Basic Social Media Concepts

The quiz will test your knowledge on basic social media concepts.

Motivation

This tests some key elements of major motivation theories.