Script On ISPROF
Script On ISPROF
Control Activities:
In other words, control activities (or controls) are procedures management implement
to safeguard assets, keep accurate and complete information, as well as achieve established
business goals and objectives.
The COBIT framework was created by ISACA to bridge the crucial gap between
technical issues, business risks and control requirements. COBIT can be implemented in any
organization from any industry to ensure quality, control and reliability of information
systems.
My Explanation on COBIT: So unsa may uses ni COBIT, COBIT can help the organization
na ma meet ang business challenges in regulatory compliance, risk management and aligning
IT strategy with organizational goals.
Detective controls are designed to find errors or problems after the transaction has
occurred. Detective controls are essential because they provide evidence that preventive
controls are operating as intended, as well as offer an after-the-fact chance to detect
irregularities.
Corrective Control: Examples include maintaining backup copies of files and correcting
data entry errors.
Corrective controls are designed to correct the errors and irregularities and ensure that
similar errors are not repeated once they are discovered. Corrective controls are built in the
form of procedures and manuals for the reference of the employees. Some controls are built
into the system, which automatically corrects the errors or prevents the occurrence of errors.
Information and Communication:
Relevant – In this scenario, the decision being made is whether to extend credit to a
customer. This decision involves assessing the customer's creditworthiness, which requires
relevant information to make an informed choice.
Reliable – The term "reliable" refers to the quality of being trustworthy and
consistent. Reliable information is information that can be depended upon to be accurate,
consistent, and true to the best of its ability.
Free from bias – Bias refers to a tendency or inclination to favor one perspective,
opinion, or outcome over others. Information that is free from bias is objective and impartial,
presenting facts and evidence without distorting or skewing them to serve a particular agenda
or viewpoint.
Complete – When we say that information is complete, it means that it includes all
the necessary or important aspects of an event or activity. In other words, nothing essential is
left out or omitted. For example, if someone provides a complete summary of a meeting, it
would cover all the key points discussed, decisions made, action items assigned, and any
other pertinent information. Similarly, a complete report on a project would include details
about its objectives, scope, progress, challenges faced, and outcomes achieved.
Timely – When we say that information is timely, it means that it is provided or made
available at the right moment or within an appropriate timeframe to facilitate decision-
making. In other words, the information is delivered when it is needed, allowing individuals
or organizations to make informed decisions promptly.
Monitoring:
These risk limits should be published and available to the business units, as each
business manager will be held accountable for assessing the line of business’ risks, creating a
risk action plan, and determining if their risks fall within or outside of the established
tolerances.
As part of the strategic planning process each year, business managers should be
required to complete a risk assessment of his or her area. Included in that is a risk assessment
of the business risks of each application or system that the line of business owns. COBIT or
similar standards like NIST, the International Organization for Standardization/International
Electro Technical
Available Guidance:
COBIT:
COBIT, which stands for Control Objectives for Information and Related
Technologies, is a widely recognized IT governance framework developed by ISACA
(Information Systems Audit and Control Association). It provides organizations with a
comprehensive set of best practices, guidelines, and principles for effective governance and
management of IT-related activities. COBIT serves as a valuable resource for organizations
seeking to enhance their IT governance practices, improve risk management capabilities, and
achieve alignment between IT and business objectives. Its internationally recognized
framework and control objectives provide organizations with a structured approach to
addressing IT challenges and opportunities effectively.
ISO/IEC:
It supports the general concepts specified in ISO/ IEC 27001, and applies to
organizations within most types of industries (e.g., commercial/private, government, non-for-
profit, etc.). The ISO/IEC 27005:2011 as well as the rest of the family of ISO/IEC standards
all assists organizations manage the security of assets, including, but not limited to, financial
information, intellectual property, employee details, or information entrusted by third parties.
ISACA:
The Information Systems Audit and Control Foundation is an associated not-for-profit
foundation committed to expanding the knowledge base of the profession through a
commitment to research.
ISACA plays a pivotal role in advancing the field of IT audit, control, and security by
providing a global platform for professional development, knowledge sharing, and
collaboration. Through its membership, certifications, resources, and advocacy efforts,
ISACA contributes to the ongoing growth and success of IT professionals and organizations
worldwide.
This provides an overview of the reasons for and the methods of risk analysis,
insurance alternatives, and what to look for in IT insurance coverage.
Conclusion:
Cyber Insurance:
Cyber insurance, also known as cyber liability insurance or cyber risk insurance, is a
type of insurance policy designed to protect businesses, organizations, and individuals from
financial losses and liabilities resulting from cyber-related incidents. These incidents may
include data breaches, cyberattacks, ransomware attacks, business interruption due to cyber
incidents, network failures, and other cybersecurity breaches. Cyber insurance, also known as
cyber liability insurance or cyber risk insurance, is a type of insurance policy designed to
protect businesses, organizations, and individuals from financial losses and liabilities
resulting from cyber-related incidents. These incidents may include data breaches,
cyberattacks, ransomware attacks, business interruption due to cyber incidents, network
failures, and other cybersecurity breaches.