Preview

Ho Yu ITGC

Powerful Essays
Open Document
Open Document
1328 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ho Yu ITGC
ITGC Area
Summary of Issue
Strength or Weakness
IT Management
FFC has an IT strategic plan
Strength
IT Management
CIO reports only to the Chief Financial Officer
Weakness
IT Management
Applications, Operations, Information Security, and Database Administration are reported to the CIO
Weakness
IT Management
FFC has an IT steering committee –
1. the Senior Vice President (SrVP) and Chief Information Officer (CIO)
2. the VP, Applications
3. the VP, Data Base Administration (DBA)
4. the VP, Operations
5. the VP, Information Security (IS)
6. the Executive Vice President and Chief Financial Officer (CFO)
7. the SrVP, Internal Audit
Strength
Systems Development
FFC design, develop, and implement systems in a logical fashion
Strength
Systems Development
FFC consider internal controls as an integral part of systems design
Strength
Systems Development
FFC’s Internal Audit Department is involved as a voting member of the project teams. Internal audit performs post-implementation reviews on all projects over $2 million
Weakness
Systems Development
IT personnel adequately tested the new bio-coding payment system prior to its implementation.
Strength
Data Security
FFC’s computer room within its data center is locked at all times. All outside contractors or visitors must first contact the data center manager for entry into the computer room. Each must bring an official picture ID, sign a visitors’ log, and be escorted at all times by data center personnel during the visit
Strength
Data Security
Environmental control are in place in the computer room. Appropriate maintenance staff test these controls semi-annually
Strength
Data Security
The VP, IS is responsible for modifying and/disabling user IDs for personnel whose job duties change because of promotions, transfers, and/or terminations based on the Transfers and Terminations report, which the Human Resources department forwards to the VP each month
Weakness
Data Security
The IT executive Steering Committee revised FFC’s

You May Also Find These Documents Helpful

  • Good Essays

    NTC362 Week 2 INDP part 1

    • 719 Words
    • 3 Pages

    The IT data center houses the hospital HIS system. There are three servers in the data center: A Windows exchange server, Internet server, and a RAS server. All three servers are IBM 3250’s with MS Windows Exchange Server and Linux Apache operating systems. There are also a 10 Tera Byte NAS, Cisco…

    • 719 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lock the servers into their own room with keycard or fingerprint access only. Only authorized IT staff shall have access. Management, vendors and all other authorized guest shall be escorted by an authorized IT staff member. Video surveillance should be maintained and monitored at all access…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    All of the servers will be virtual, and a backup of each server will be refreshed weekly and saved to cloud storage. All company data will be backed up and saved to cloud storage daily. All users requiring remote access will have a VPN set up with strict login requirements. These users will also have their laptops checked by the IT department on a monthly basis to ensure that they are in compliance with company security policy.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    3. Which departments will need what permissions as far as access to computers, printers, and scanners?…

    • 335 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    In order maintain control over who has access to what in the center we need first ensure that only those that need access to the center are granted the appropriate permissions to the areas that they need. The revolving door should only allow one person through at a time, this will help to prevent someone without access from slipping by with some one that does have access or allow a person with access giving access to some that is not authorized in the build. This will be done with a using simple radio frequency identification (RFID) cards for the initial access to the building’s lobby. Both entry and exit will require that the card be read so that a log of who enters and leaves the building can be kept. Entry to the staff offices will simply be with a RFID card reader. With these cards, we can select what areas they have access to according to their needs . The front double doors and access to the receiving area can only be opened from the inside of the building. By allowing one-way access we ensure that hacking of the reader is not possible.…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP). Informing the users will be of what is acceptable and unacceptable use of the system. This layer also needs constant monitoring.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Knowledge Unit 103 V1

    • 993 Words
    • 4 Pages

    1.1 Visitor Sign-In: Gresham Blake needs to maintain records of who is present on site at all times. Visitors must sign in at the front desk when they arrive on campus. They must sign out upon leaving Gresham Blake. It is imperative that all visitors follow this procedure so that Gresham Blake staff is aware of who is in-store in the event of an emergency.…

    • 993 Words
    • 4 Pages
    Good Essays
  • Good Essays

    7) When granting access to LAN systems for GUESTS (i.e. auditors, consultants, third-party individuals, etc.), what security controls do you recommend be implemented in order to maximize CIA of production systems and data?…

    • 518 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The procedures for workstation care and maintenance include making sure there is no trip hazards e.g. portable radiator wires, phone wires and computer cables. This also would include making sure that the wires aren't tangled or aren't spread all over your desk. Making sure that the desk is tidy and clean, making sure that everything has been put back to how it was before e.g. no litter, no pieces of paper laying on the table and just general tidiness.…

    • 1015 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cyp 3.4

    • 1912 Words
    • 8 Pages

    * every morning-should be rooms checked and inspected visually- windows, doors, taps, toilet flushes- if they work properly, emergency exits must be clear and easy to open from inside, electrical sockets covered, room temperature checked, heaters covered, all chemicals out of the reach of children.…

    • 1912 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    P6 Operational Issues

    • 665 Words
    • 3 Pages

    Increase security by providing log in and password verification system for each of their employees that need to access their data.…

    • 665 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    case studies week 6

    • 627 Words
    • 3 Pages

    The unit director can conduct an in-service with the different department that uses the computer about hand washing or the use of alcohol foam. He or she can post signs about hand washing or put a screen saver on the computer that says “Did you wash away the Germs?”…

    • 627 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the setting there should never be any unauthorized person. If a visitor comes into the setting it’s important for that person to sign in the visitor’s book. It’s also important for that visitor to wear a visitors badge so everyone in the setting is aware that the visitor is authorized. If I or the staff seen a visitor in the building without a badge on then it’s important for me to challenge the visitor. For example asking where they are going or what room do they…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Treats that this company is vulnerable to are but not limited to tornado, malware, equipment failure, stolen data, DoS attacks & social engineer. The like likelihood of each is moderate to high. Headquarter is located right in tornado alley. Since this building house all three serves, a direct hit would result in a total loss. Since the users connect to the LAN with Windows Vista which is very outdate the risk of malware is also high. Along with having all three servers in a central location, there is no mention of any backup locations or even if a DRP is in place. Therefore equipment failure (loss of data) is very high. There is a mention of a direct attached storage but it appears that there is no AUP in place. This means everyone has access to the data. Stolen confidential data of a customer is a serious and costly risk. There is no mention of any firewalls in place. If the servers are not protected by firewalls or intrusion detection systems can result in loss of availability. Users and social engineering is the weakest and easily the most vulnerable. Lack of access controls and security awareness can result in serious loss of confidentiality and hackers are real threat in today’s world. With the sales people accessing the network through a home office and share internet connection with headquarters, this is the bulk of the concern.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hoi an

    • 1111 Words
    • 5 Pages

    The ancient town of Hoi An, 30 km south of Da Nang, lies on the banks of the Thu River. Occupied by early foreign traders as Japanese, Chinese, Portuguese, Spanish … Hoi An was one of the major trading centers of Southeast Asia in the 16th century and was very popular with the name Faifoo.…

    • 1111 Words
    • 5 Pages
    Good Essays