FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
IT ____ is a process that provides assurance for IT and IS and helps to mitigate risks associated with use of technology.
A
control
B
governance
C
risk management
D
review
Explanation: 

Detailed explanation-1: -An Information Technology audit is the examination and evaluation of an organization’s information technology infrastructure, applications, data use and management, policies, procedures and operational processes against recognized standards or established policies.

Detailed explanation-2: -The truth is all of auditing is pretty much broken down into four audit techniques: Inquiry (talking to people), Observation (observing processes), Inspection (looking over paperwork or system configurations), and Reperformance (reperforming a process).

Detailed explanation-3: -IT general controls (ITGC) are the basic controls that can be applied to IT systems such as applications, operating systems, databases, and supporting IT infrastructure. The objectives of ITGCs are to ensure the integrity of the data and processes that the systems support.

Detailed explanation-4: -A cybersecurity audit is used to find the presence of cybersecurity controls – such as firewalls and intrusion detection services, as well as physical security controls – and validate that they are working correctly and that compliance requirements are met.

There is 1 question to complete.