Manual volume iii 29 it audit manual no 127 128 129

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ich routinely verify the tasks performed by the software and which provide in the restoration of the integrity through rollback or other means • application software is tested according to the project test plan and established testing standards before being approved by the user IT Audit Manual Volume III 29 IT Audit Manual No. 127 128 129 130 131 132 133 Item Yes Response No KD • adequate user reference and support manuals are prepared (preferably in electronic format) as part of every system development or modification process • the system design is re-assessed whenever significant, technological and/or logical discrepancies occur during system development or maintenance KD Reference: _______________________________ ___________________________________________ Whether system development life cycle methodology ensures that user reference and support materials are updated in an accurate and timely manner? KD Reference: _______________________________ ___________________________________________ Whether sensitivity assessment is required by the system development life cycle methodology to be performed during the initiation of new system development or modification? KD Reference: _______________________________ ___________________________________________ Whether system development life cycle methodology requires that basic security and internal control aspects of a new system to be developed or modified be assessed along with the conceptual design of the system in order to integrate security concepts in the design as early as possible? KD Reference: _______________________________ ___________________________________________ Whether logical security and application security issues are required by the system development life cycle methodology to be addressed and included in the design of new systems or modifications of existing ones? KD Reference: _______________________________ ___________________________________________ Whether the assessment of the security and internal control a...
View Full Document

This note was uploaded on 10/27/2013 for the course LAW 10-100 taught by Professor Parsons during the One '10 term at Bond College.

Ask a homework question - tutors are online