SlideShare a Scribd company logo
Procedural Controls
Procedural Controls
Procedural Controls
These methods provide maximum security
to operation of the information system.
Standard procedures are developed and
maintained manually and built in software
help display so that every one knows what to
do.
It promotes uniformity and
minimize the chance of error
and fraud.
It should be kept up-to-date so
that correct processing of each
activity is made possible.
Standard
procedures and
documentation
Authorization
requirements
Disaster recovery
Controls for
end-user
computing
refer to mandatory
activities, actions, rules, or
regulations.
 can give a policy its support and
reinforcement in direction.
could be internal, or externally
mandated (government laws
and regulations).
detailed step-by-step tasks that should
be performed to achieve a certain goal.
Example: procedures on how to
install operating systems
spell out how the policy,
standards, and guidelines will
actually be implemented in an
operating environment.
If a policy states that all
individuals who access
confidential information must be
properly authenticated.
ISO 9001 Documented Information
the terms “documents” and “records”
were formally used to refer to the
important information and data that
exists within a company.
DOCUMENT - information
that is discussed in ISO 9001
is also defined as the vital
information that must be
kept and evaluated
periodically.
RECORDS are usually retained for
long periods of time, while
DOCUMENTS hold data that is
maintained and frequently updated
or added to.
an access policy.
function of specifying access
rights/privileges to resources, which
is related to information
security and computer security in
general and to access control in
particular
security mechanism used to
determine user/client privileges
or access levels related to system
resources,including computer programs,
files, services, data and application
features.
normally preceded by
authentication for user
identity verification. System
administrators (SA) are typically
assigned permission levels
covering all system and user
resources.
involves a set of policies, tools and
procedures to enable the recovery or
continuation of vital technology
infrastructure and systems following a
natural or human-induced disaster.
CLASSIFICATION
PREVENTIVE MEASURES
CORRECTIVE MEASURES
DETECTIVE MEASURES
aim at
preventing an event from occurring.
for correcting
a system in case of a negative event
or disaster
focus on detecting
and discovering negative events.
EUC refers to computer
systems and platforms that
are meant to allow non-
programmers to create
working
computer applications.
EUC compilation of approaches meant
to better involve and
integrate end users and other non-
programmers into the world
of computing systems development.
Procedural Controls

More Related Content

PPTX
Office Automation System (OAS)
PPTX
Executive information system ( eis )
PPTX
Information system for strategic advantage
DOCX
Leaders are born and not made
PPTX
Decision Support System - Management Information System
PPTX
Types of mis
PPTX
strategic information system
PPT
Managing International Information Systems
Office Automation System (OAS)
Executive information system ( eis )
Information system for strategic advantage
Leaders are born and not made
Decision Support System - Management Information System
Types of mis
strategic information system
Managing International Information Systems

What's hot (20)

PPTX
Unit 5- Marketing Information System
PPTX
Structure of mis
PPTX
Management information System and its types
PPTX
Computer Information Systems
PPTX
Security and control in mis
PPT
Mis planning
PPTX
Characteristic of management information system
PDF
Business Process Re engineering
PDF
3 mis & business functions
DOCX
Role of Entrepreneur's in economic development and role of women entrepreneur's.
PPTX
Types o f information systems
PPTX
Mis & Decision Making
PPTX
introduction to management information systems (MIS)
PPTX
Enterprise management systems
PPT
PPTX
Strategic management Notes
PPTX
Generic process model
PPT
Security & control in management information system
PPTX
Functional information system
PPTX
Facility location & steps on location selection
Unit 5- Marketing Information System
Structure of mis
Management information System and its types
Computer Information Systems
Security and control in mis
Mis planning
Characteristic of management information system
Business Process Re engineering
3 mis & business functions
Role of Entrepreneur's in economic development and role of women entrepreneur's.
Types o f information systems
Mis & Decision Making
introduction to management information systems (MIS)
Enterprise management systems
Strategic management Notes
Generic process model
Security & control in management information system
Functional information system
Facility location & steps on location selection
Ad

Similar to Procedural Controls (20)

PPTX
End User Computing (EUC)
PPTX
Shivani shukla_B38_KnowledgeManagement
PPT
Is awareness government
PDF
For our discussion question, we focus on recent trends in security t.pdf
PPTX
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
PDF
ISO / IEC 27001:2005 – An Intorduction
PPTX
Security Baselines and Risk Assessments
PPTX
Understand issues related to use of information system
PDF
Ch09 Information Security Best Practices
PPTX
Accounting System Design and Development-Internal Controls
PDF
Ch06 Policy
PPT
Information Security Identity and Access Management Administration 07072016
PPSX
4 Operations Security
ODT
Ch.5 rq (1)
PDF
L9 quality assurance and documentation
PDF
ITGCs.pdf
PDF
Fundamentals of Information Systems Security
PPT
Testing
PPTX
12 security policies
PPTX
Information Security Management System ISO/IEC 27001:2005
End User Computing (EUC)
Shivani shukla_B38_KnowledgeManagement
Is awareness government
For our discussion question, we focus on recent trends in security t.pdf
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
ISO / IEC 27001:2005 – An Intorduction
Security Baselines and Risk Assessments
Understand issues related to use of information system
Ch09 Information Security Best Practices
Accounting System Design and Development-Internal Controls
Ch06 Policy
Information Security Identity and Access Management Administration 07072016
4 Operations Security
Ch.5 rq (1)
L9 quality assurance and documentation
ITGCs.pdf
Fundamentals of Information Systems Security
Testing
12 security policies
Information Security Management System ISO/IEC 27001:2005
Ad

More from Dr. Rosemarie Sibbaluca-Guirre (20)

PPTX
Korean Language: Culture 한국어 개요
PPTX
Korean Language Overview 한국어 개요
PPTX
Conjunction 접속사
PPTX
PPTX
Usage of Particles 입자의 사용
PPTX
Usage of Particles 입자의 사용
PPTX
Korean Word Order 한국어 단어 순서
PPTX
Korean Number 한국 번호
PPTX
ISAD 313-3_ TOOLS OF THE SYSTEM ANALYSIS.pptx
PPTX
ISAD 313-1_INTRODUCTION TO SYSTEMS.pptx
PPTX
ISAD 313-2_ SYSTEM ANALYSIS.pptx
PPTX
ISAD 313-4_ RESEARCH PROJECT.pptx
PPTX
ISAD 313-3_ SYSTEM FLOW.pptx
PPTX
ISAD 313-3_ MODELS.pptx
PPTX
ACCT11_9_Financial Position.pptx
PPTX
ACCT11_8_Equity.pptx
PPTX
ACCT11_7_Performance.pptx
PPTX
ACCT11_6_Worksheet.pptx
PPTX
ACCT11_5_Adjusting Entries.pptx
PPTX
ACCT11_4_Trial Balance.pptx
Korean Language: Culture 한국어 개요
Korean Language Overview 한국어 개요
Conjunction 접속사
Usage of Particles 입자의 사용
Usage of Particles 입자의 사용
Korean Word Order 한국어 단어 순서
Korean Number 한국 번호
ISAD 313-3_ TOOLS OF THE SYSTEM ANALYSIS.pptx
ISAD 313-1_INTRODUCTION TO SYSTEMS.pptx
ISAD 313-2_ SYSTEM ANALYSIS.pptx
ISAD 313-4_ RESEARCH PROJECT.pptx
ISAD 313-3_ SYSTEM FLOW.pptx
ISAD 313-3_ MODELS.pptx
ACCT11_9_Financial Position.pptx
ACCT11_8_Equity.pptx
ACCT11_7_Performance.pptx
ACCT11_6_Worksheet.pptx
ACCT11_5_Adjusting Entries.pptx
ACCT11_4_Trial Balance.pptx

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Hybrid model detection and classification of lung cancer
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
1. Introduction to Computer Programming.pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Encapsulation theory and applications.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Unlocking AI with Model Context Protocol (MCP)
NewMind AI Weekly Chronicles - August'25-Week II
Chapter 5: Probability Theory and Statistics
Heart disease approach using modified random forest and particle swarm optimi...
cloud_computing_Infrastucture_as_cloud_p
Tartificialntelligence_presentation.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Hybrid model detection and classification of lung cancer
Building Integrated photovoltaic BIPV_UPV.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
MIND Revenue Release Quarter 2 2025 Press Release
A comparative study of natural language inference in Swahili using monolingua...
1. Introduction to Computer Programming.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A comparative analysis of optical character recognition models for extracting...
TLE Review Electricity (Electricity).pptx
Encapsulation theory and applications.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

Procedural Controls

  • 4. These methods provide maximum security to operation of the information system. Standard procedures are developed and maintained manually and built in software help display so that every one knows what to do.
  • 5. It promotes uniformity and minimize the chance of error and fraud. It should be kept up-to-date so that correct processing of each activity is made possible.
  • 7. refer to mandatory activities, actions, rules, or regulations.  can give a policy its support and reinforcement in direction. could be internal, or externally mandated (government laws and regulations).
  • 8. detailed step-by-step tasks that should be performed to achieve a certain goal. Example: procedures on how to install operating systems
  • 9. spell out how the policy, standards, and guidelines will actually be implemented in an operating environment. If a policy states that all individuals who access confidential information must be properly authenticated.
  • 10. ISO 9001 Documented Information the terms “documents” and “records” were formally used to refer to the important information and data that exists within a company.
  • 11. DOCUMENT - information that is discussed in ISO 9001 is also defined as the vital information that must be kept and evaluated periodically.
  • 12. RECORDS are usually retained for long periods of time, while DOCUMENTS hold data that is maintained and frequently updated or added to.
  • 13. an access policy. function of specifying access rights/privileges to resources, which is related to information security and computer security in general and to access control in particular
  • 14. security mechanism used to determine user/client privileges or access levels related to system resources,including computer programs, files, services, data and application features.
  • 15. normally preceded by authentication for user identity verification. System administrators (SA) are typically assigned permission levels covering all system and user resources.
  • 16. involves a set of policies, tools and procedures to enable the recovery or continuation of vital technology infrastructure and systems following a natural or human-induced disaster.
  • 17. CLASSIFICATION PREVENTIVE MEASURES CORRECTIVE MEASURES DETECTIVE MEASURES aim at preventing an event from occurring. for correcting a system in case of a negative event or disaster focus on detecting and discovering negative events.
  • 18. EUC refers to computer systems and platforms that are meant to allow non- programmers to create working computer applications.
  • 19. EUC compilation of approaches meant to better involve and integrate end users and other non- programmers into the world of computing systems development.

Editor's Notes

  • #4: APPLICATION CONTROLS IPOS FACILITY CONTROL 1. Network Security 2. Physical Protection Controls 3. Biometric Controls 4. Computer-Failure Controls NETWORK SECURITY Encryption Authentication Message integrity Digital signatures Digital certificates Public key infrastructure (PKI) Security for wireless internet access 1. Service set identifiers (SSID) 2. Wired Equivalent Privacy (WEP): 3. Wi-Fi Protected Access (WPA)