Preview

Cobit Casestudy Tibo

Better Essays
Open Document
Open Document
8174 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cobit Casestudy Tibo
COBIT® CASE STUDY: TIBO

An extended case study in which students can apply their COBIT knowledge to a real-life situation

C O B I T ® i n A c a d e m i a TM

IT Governance Institute

1

COBIT
IT Governance Institute®
The IT Governance Institute (ITGI) (www.itgi.org) was established in 1998 to advance international thinking and standards in directing and controlling an enterprise’s information technology. Effective IT governance helps ensure that
IT supports business goals, optimises business investment in IT, and appropriately manages IT-related risks and opportunities. The IT Governance Institute offers symposia, original research and case studies to assist enterprise leaders and boards of directors in their IT governance responsibilities.
Information Systems Audit and Control Association®
With more than 35,000 members in more than 100 countries, the Information Systems Audit and Control Association
(ISACA®) (www.isaca.org) is a recognised worldwide leader in IT governance, control, security and assurance. Founded in 1969, ISACA sponsors international conferences, publishes the Information Systems Control Journal®, develops international information systems auditing and control standards, and administers the globally respected Certified
Information Systems Auditor™ (CISA®) designation, earned by more than 35,000 professionals since inception, and the
Certified Information Security Manager® (CISM®) designation, a groundbreaking credential earned by 5,000 professionals in its first two years.
Disclaimer
The IT Governance Institute, Information Systems Audit and Control Association [the “Owner(s)”] and the authors have designed and created COBIT in Academia and its related publications, titled COBIT® Case Study: TIBO, COBIT® Student
Book, COBIT® Caselets and COBIT® Presentation Package, (the “Work”), primarily as an educational resource for educators. The Owners make no claim that use of any of the Work will assure a successful outcome. The Work should not be

You May Also Find These Documents Helpful

  • Better Essays

    Hunton, J. A., Bryant, S. M., & Bagranoff, N. A. (2004). Core Concepts of Information Technology Auditing. New York: Wiley & Sons.…

    • 1178 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Before any strategy takes place, an auditor must determine the end result desired from the Information Technology being used as well as the type of technology being dealt with. The most important thing is security thus it is vital to know this technology in and out to be able to determine its strengths and weaknesses. This allows for proper compensation to combat such attacks whether they are fraudulent or accidental in nature. It is necessary to be familiar with different types of proven viable internal control setups to properly test and gage an IT’s internal control system. There are three different strategies use when testing internal controls. First includes assessing the controls using user control information. In this strategy, an auditor would gather computer-generated reports and compare those to all documentation on specific transactions. This process is also known as auditing around the computer because it deals with more hard copy documents. The next strategy entails using application controls to determine the level of risk…

    • 627 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Kudler Fine Foods

    • 1110 Words
    • 5 Pages

    Hunton, J., Bryant, S., & Bagranoff, N. (2004). Core Concepts of Information Technology Auditing. New Jersey: Wiley.…

    • 1110 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    IS 535 Essay Example

    • 1001 Words
    • 4 Pages

    helps a firm identify points at which information technology can most effectively enhance its competitive position.…

    • 1001 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Hunton, J. E., Bryant, S. M., & Bagranoff, N. A. (2004). Core concepts of information technology auditing. Hoboken, NJ: Wiley.…

    • 1007 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Acct 542 Audit Proposal

    • 1234 Words
    • 5 Pages

    Hunton, J.A., Bryant, S.M., & Bagranoff, N.A. (2004). Core Concepts of Information Technology Auditing. New York, New York: Wiley & Sons.…

    • 1234 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    * CompTIA is the vox of the world's aggregation technology (IT) manufacture. As a non-profit swop connexion advancing the globose interests of IT professionals and companies. It focuses its programs on quaternion primary areas: training, substantiation, advocacy and philanthropy. CompTIA is the directive businessperson of technology-neutral and vendor-neutral IT certifications. These certifications allow A quality, Web nonnegative and Warranty…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Audit Proposal

    • 1321 Words
    • 6 Pages

    Hunton, J. A., Bryant, S. M., & Bagranoff, N. A. (2004). Core concepts of information technology auditing. New York: Wiley & Sons.…

    • 1321 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Information Technology, IT, is an integral property in a business’ success. In order for an organization to reach its maximum potential this organization will need to be coordinated and integrated. For as the organization moves on to higher levels of integration it will find many potential benefits to be gained.…

    • 432 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    CATSA Case Analysis

    • 763 Words
    • 4 Pages

    CATSA’s mission is to become the world’s best in air transportation security by achieving corporate and operational excellence. It believes it can achieve this vision by being cost effective, clear accountability, networking with partners, pursuing innovation without compromising their ethics and values. One of the major key factor for CATSA’s success is that the company knows about its weaknesses and is strongly pursuing ways to remove them. Implementation of new BI will not only help the Balanced Scorecard in improving strategic management but will also help develop better capabilities in business processes such as planning, monitoring, operations, human resources and training. BI would also help CATSA consolidate its data and use it for invoice management, incident reporting and performance analysis of various attributes of business systems. With these steps towards future will definitely give CATSA an edge over other security agencies around the world.…

    • 763 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Canadian Shield Case

    • 1115 Words
    • 5 Pages

    As the leader of Information Systems at Canadian Shield, one of many subsidiaries of Assurance Centrale, Seamus Reynolds was tasked with piloting a new information system that could potentially replace the IS’s at all of Assurance Centrale’s regional offices. Five years after starting this project he was feeling the weight of the responsibility for a project that could eventually transform the entire enterprise.…

    • 1115 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Enterprise It at Cisco

    • 1038 Words
    • 5 Pages

    This case study goes through the evolution of IT governance at Cisco and the related project management. This case is a classic example of the result of a decentralized governance of business units. What happened to CISCO due to the decentralized governance, how the business processes were modified to overcome the chaos created by the decentralized governance and how the employees and management reacted to this change in CISCO’s business governance? This case clearly illustrates the effect of a totally decentralized governance and how changing to a centralized governance leads to unrest and resistance. It also illustrates how the cultural/managerial change effects the business decisions needed to be made by a company to achieve success. Essentially, the case shows that IT governance must be aligned with business activities and tie all functions together to support the company’s strategy.…

    • 1038 Words
    • 5 Pages
    Good Essays
  • Better Essays

    The role of auditing: an MIS audit examines the firms overall security environment as well as controls governing individual information systems…

    • 1209 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    C O L L E G E O F B U S I N E S S A D M I N I S T R A T I O N…

    • 5185 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Exponential growth of the Internet and the transmission bandwidth of the communication carrier is transforming the way businesses operate and communicate. In this technology-centric world, customers, partners, suppliers and employees are demanding unparalleled levels of service, collaboration and communications, to compete in the emerging market place. Technology has become so advanced and IT auditing advances as well. However, the fact still remains that even if technology has become very advanced risks and potential harm to integrity and accuracy of the data still remains especially in cyber commerce. Cyber commerce has three categories which are business-to-business (B2B), business-to-customers (B2C) and mobile commerce (m-commerce). Today, the term “e-commerce” includes all commercial activities performed through information technology and communication engineering, such as the Internet, virtual private networks (VPNs), automated teller machines (ATMs), electronic fund transfers (EFTs), electronic data interchange (EDI), e-supply chain management (e-SCM) and e-customer relationship management. E-commerce is now a trend and IT auditors must audit them to minimize the threats and risks that come with it. IT auditors look into existing internal controls, which might not have been optimized for the best results. There are several reasons why internal control cannot provide absolute assurance that objectives will be achieved: cost-benefit realities, collusion among employees and external events beyond an organization’s control.…

    • 2481 Words
    • 10 Pages
    Powerful Essays