SlideShare a Scribd company logo
Components of an organizational framework for security and control
 INFORMATION SYSTEMS CONTROL
 RISK ASSESSMENT
 SECURITY POLICY
 DISASTER RECOVERY PLANNING AND BUSINESS CONTINUITY PLANNING
 ROLE OF AUDITING
Introduction
The organizational framework Provides a structure For:
 Integrated Financial Planning,
 Project Tracking,
 Reporting and monitoring of performance indicators.
Information System Controls
 General Controls
 Govern design, security, use of computer programs and security of data files.
 combinations of hardware, software and manual procedures.
- Create an overall control environment.
Application Controls
 Specific controls unique to each computerized application
 Include both automated and manual procedures
 Ensure that only authorized data are completely and accurately processed by
that application
Risk Assessment
 A risk assessment is a process to identify potential hazards and analyze what could
happen if a hazard occurs.
Security Policy
 consists of statement ranking information risk, identifying acceptable security
goals, identifying the mechanisms for achieving these goals.
Disaster Recovery Planning and Business Continuity
Planning
 Disaster Recovery Planning: Plans for the restoration of disrupted
computing and communications services.
 Business Continuity Planning: How the company can restore business
operations after disaster occurs.
Role of Auditing
 Examine the firms overall security environment as well as controls governing
individual information systems.
 Reviews technologies, procedures, documentation, training and personnel.
 Ranks all controls weaknesses and estimates the probability of the occurences.
Conclusion
 Firms need to establish a good set of general and application controls.
 risk assessment evaluates information assets, identifies controls points and control
weakness and determines the most cost effective set of controls.
 It develops security policy and palns for continuing business operations
 Auditing helps organization to determine the effectiveness of security and control
their information systems.

More Related Content

PDF
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
PDF
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
PPTX
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
PPTX
MIS 22 Disaster Management
PPTX
Step by-step for risk analysis and management-yaser aljohani
PPTX
Step by-step for risk analysis and management-yaser aljohani
PPT
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
PDF
Ch09 Information Security Best Practices
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
MIS 22 Disaster Management
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
Ch09 Information Security Best Practices

Similar to MIS, or Management Information System, is a structured framework that uses technology, (20)

PPTX
Cybersecurity Assessment Framework - Slideshare.pptx
PPTX
Controls in Audit.pptx
PDF
CCISO_Certification_Training_Course-Outline.pdf
PPTX
Information system audit 2
PPT
Information Security Identity and Access Management Administration 07072016
PDF
Cyber Security Risk Mitigation Checklist
PDF
Qatar Proposal
PPTX
Enterprise governance risk_compliance_fcm slides
PPT
Information Security maintainance Security Engineering
PPTX
Presentation1.pptx
PDF
PPTX
Ultimate Guide to EHS Management.pptx
PPTX
Assuring Digital Strategic Initiatives by
PPTX
Physical Security Assessment
DOCX
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
DOCX
Example of fisma compliance analysis.1
PDF
What is the role of risk management in cybersecurity
PPTX
crisc Domain1 Governance PPT Slide shows
PDF
Guide for Applying The Risk Management Framework to Federal Information Systems
PPTX
Logging, monitoring and auditing
Cybersecurity Assessment Framework - Slideshare.pptx
Controls in Audit.pptx
CCISO_Certification_Training_Course-Outline.pdf
Information system audit 2
Information Security Identity and Access Management Administration 07072016
Cyber Security Risk Mitigation Checklist
Qatar Proposal
Enterprise governance risk_compliance_fcm slides
Information Security maintainance Security Engineering
Presentation1.pptx
Ultimate Guide to EHS Management.pptx
Assuring Digital Strategic Initiatives by
Physical Security Assessment
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
Example of fisma compliance analysis.1
What is the role of risk management in cybersecurity
crisc Domain1 Governance PPT Slide shows
Guide for Applying The Risk Management Framework to Federal Information Systems
Logging, monitoring and auditing
Ad

Recently uploaded (20)

PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PDF
Chapter 5_Foreign Exchange Market in .pdf
PDF
How to Get Funding for Your Trucking Business
PDF
Unit 1 Cost Accounting - Cost sheet
DOCX
Euro SEO Services 1st 3 General Updates.docx
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PDF
WRN_Investor_Presentation_August 2025.pdf
DOCX
Business Management - unit 1 and 2
PDF
Nidhal Samdaie CV - International Business Consultant
PDF
Business model innovation report 2022.pdf
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PDF
Training And Development of Employee .pdf
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
Types of control:Qualitative vs Quantitative
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PPTX
HR Introduction Slide (1).pptx on hr intro
PDF
Laughter Yoga Basic Learning Workshop Manual
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
COST SHEET- Tender and Quotation unit 2.pdf
Chapter 5_Foreign Exchange Market in .pdf
How to Get Funding for Your Trucking Business
Unit 1 Cost Accounting - Cost sheet
Euro SEO Services 1st 3 General Updates.docx
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
WRN_Investor_Presentation_August 2025.pdf
Business Management - unit 1 and 2
Nidhal Samdaie CV - International Business Consultant
Business model innovation report 2022.pdf
Ôn tập tiếng anh trong kinh doanh nâng cao
Training And Development of Employee .pdf
ICG2025_ICG 6th steering committee 30-8-24.pptx
Types of control:Qualitative vs Quantitative
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
HR Introduction Slide (1).pptx on hr intro
Laughter Yoga Basic Learning Workshop Manual
Ad

MIS, or Management Information System, is a structured framework that uses technology,

  • 1. Components of an organizational framework for security and control  INFORMATION SYSTEMS CONTROL  RISK ASSESSMENT  SECURITY POLICY  DISASTER RECOVERY PLANNING AND BUSINESS CONTINUITY PLANNING  ROLE OF AUDITING
  • 2. Introduction The organizational framework Provides a structure For:  Integrated Financial Planning,  Project Tracking,  Reporting and monitoring of performance indicators.
  • 3. Information System Controls  General Controls  Govern design, security, use of computer programs and security of data files.  combinations of hardware, software and manual procedures. - Create an overall control environment.
  • 4. Application Controls  Specific controls unique to each computerized application  Include both automated and manual procedures  Ensure that only authorized data are completely and accurately processed by that application
  • 5. Risk Assessment  A risk assessment is a process to identify potential hazards and analyze what could happen if a hazard occurs.
  • 6. Security Policy  consists of statement ranking information risk, identifying acceptable security goals, identifying the mechanisms for achieving these goals.
  • 7. Disaster Recovery Planning and Business Continuity Planning  Disaster Recovery Planning: Plans for the restoration of disrupted computing and communications services.  Business Continuity Planning: How the company can restore business operations after disaster occurs.
  • 8. Role of Auditing  Examine the firms overall security environment as well as controls governing individual information systems.  Reviews technologies, procedures, documentation, training and personnel.  Ranks all controls weaknesses and estimates the probability of the occurences.
  • 9. Conclusion  Firms need to establish a good set of general and application controls.  risk assessment evaluates information assets, identifies controls points and control weakness and determines the most cost effective set of controls.  It develops security policy and palns for continuing business operations  Auditing helps organization to determine the effectiveness of security and control their information systems.