UNCC MBAD 7090 - AUDIT METHOD AND TECHNIQUES FOR OPERATIONS (16 pages)

Previewing pages 1, 2, 3, 4, 5 of 16 page document View the full content.
View Full Document

AUDIT METHOD AND TECHNIQUES FOR OPERATIONS



Previewing pages 1, 2, 3, 4, 5 of actual document.

View the full content.
View Full Document
View Full Document

AUDIT METHOD AND TECHNIQUES FOR OPERATIONS

27 views

Lecture Notes


Pages:
16
School:
University of North Carolina - Charlotte
Course:
Mbad 7090 - Mobile Marketing and Analytics

Unformatted text preview:

Fall 2008 MBAD 7090 IS Security Audit and Control Dr Zhao 1 CHAPTER 16 AUDIT METHOD AND TECHNIQUES FOR OPERATIONS OBJECTIVES Key IT operation areas and disaster recovery planning DBMS recovery Telecommunications End user computing IS Security Audit and Control Dr Zhao Contingency Fall 2008 2 CONTINGENCY AND DISASTERRECOVERY PLANNING Definition recovery is the process policies and procedures of restoring operations critical to the resumption of business including regaining access to data records hardware software etc communications incoming outgoing toll free fax etc workspace and other business processes after a natural or human induced disaster Business recovery Disaster recovery is a subset of business recovery IS Security Audit and Control Dr Zhao Disaster Fall 2008 3 DISASTER RECOVERY PLANNING a written plan Updated frequently Tested frequently Phase 1 regular inspection and walk through Phase 2 planned disaster simulation Phase 3 disaster simulation without warning Varying degrees of disaster A video IS Security Audit and Control Dr Zhao Need Fall 2008 Management support Documented 4 DBMS RECOVERY The ability to recover and continue business operations is critical in today s 7 day a week 24 hour a day business environment IS Security Audit and Control Dr Zhao Businesses have increasing reliance on timely and reliable access to central databasemanagement systems Fall 2008 5 TRANSACTION PROPERTIES Goal ensure data integrity from transactions IS Security Audit and Control Dr Zhao Atomicity preclusion partially completed transactions Permanence Serialization of transactions do not use inconsistent data from partially completed transactions Prevention of cascading aborts an incomplete transaction cannot reveal results to other transactions Consistency Fall 2008 6 DBMS RISKS errors and anomalies from operating system or hardware Communication failure Media failure Disk crashes controller failure head crashes or media degradation Malicious intents IS Security Audit



View Full Document

Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view AUDIT METHOD AND TECHNIQUES FOR OPERATIONS and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view AUDIT METHOD AND TECHNIQUES FOR OPERATIONS and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?