Computer security checklist
Not what you're looking for?
Design a checklist for assessing computer security controls. The checklist should be organized as follows:
Three major categories: preventive, detective, and corrective controls.
Appropriate subcategories for each major topic discussed in this chapter.
For each subcategory, develop individual questions about the existence of specific control procedures, each question should have three possible answers: Yes, NO, Not Applicable.
The text we are using is Accounting Information Systems
10th Edition
by Marshall B. Romney and Paul John Steinbart
© 2005 Prentice Hall
This information is supposed to help me later in the course to design an AIS.
Purchase this Solution
Solution Summary
921 Words, APA Format
Solution Preview
Please find the file attached. As you know, BrainMass is not an assignment-completion service. This response is meant to assist you in tackling your questions and to help you learn the material needed to understand the problems. Thanks
Computer security checklist
Computer security checklist
To protect the practice against viruses, computer theft, disasters and data loss, a computer security checklist is used (Practice Security Checklist). Security checklist contains the following terms like review of policy and procedures, diffusion testing from external and internal network, network device evaluation, topology evaluation, application evaluation, and server evaluation (Rahardjo, Triwidada, & Sutarman, 2004).
With the help of a checklist, risk could be reduced quickly and easily from viruses, hackers, computer theft and other similar threats. To protect the computer from viruses and threat, some simple steps are designed (Practice Security Checklist). They don't provide full protection but helps to reduce the risk. They are not hard to use, but they are very important. To maintain the security of a computer, proper checklist should be made, which must include:
? Back up: Backing up the practice management data regularly that is like an insurance policy. It allows the practice to recover fast and run rapidly after a data loss. The hardware could be replaced and application software could be reloaded from original media, recovery of data files (Practice Security Checklist).
? Physical Security: A key step in securing the information stored is to ensure that physical security of desktop, laptop and server ...
Education
- MBA (IP), International Center for Internationa Business
- BBA, University of Rajasthan
Recent Feedback
- "Thank You so much! "
- "Always provide great help, I highly recommend Mr. Sharma over others, thanks again. "
- "great job. I will need another help from you. "
- "first class!"
- "Thank you for your great notes. Will you be willing to help me with one more assignment? "
Purchase this Solution
Free BrainMass Quizzes
Paradigms and Frameworks of Management Research
This quiz evaluates your understanding of the paradigm-based and epistimological frameworks of research. It is intended for advanced students.
Basics of corporate finance
These questions will test you on your knowledge of finance.
Change and Resistance within Organizations
This quiz intended to help students understand change and resistance in organizations
Basic Social Media Concepts
The quiz will test your knowledge on basic social media concepts.
Motivation
This tests some key elements of major motivation theories.