Free Essay

Technical Controls

In:

Submitted By ispep13
Words 1085
Pages 5
Administrative Controls

•How do Administrative Controls demonstrate "due care?"
Administrative Controls demonstrate “due care” by providing and following policies, procedures, and standards that allow a company to show that steps were taken to protect the network and or information that is hidden by a responsible parties. It is critical that the CIA (Confidentiality, Integrity and Availability) is vital in protecting data that companies have of its customers. Due care is defined by the Information Systems Audit and Control Association (ISACA) as:
2.1.1 The standard of “due care” is the level of diligence which a prudent and competent person would exercise under a given set of circumstances. “Due professional care” applies to an individual who professes to exercise a special skill such as information system auditing. Due professional care requires the individual to exercise that skill to a level commonly possessed by practitioners of that specialty.

2.1.2 Due professional care applies to the exercise or professional judgment in the conduct of work performed. Due care implies that the professional approaches matters requiring professional judgment with proper diligence.
Despite the exercise of due professional care and professional judgment, situations may nonetheless arise where an incorrect conclusion may be drawn from a diligent review of the available facts and circumstances. Therefore, the subsequent discovery of incorrect conclusions does not, in and of itself, indicate inadequate professional judgment or lack of diligence on the part of the IS auditor. (Information Sys)
Administrative Controls and due care should go hand in hand. One cannot hope to demonstrate due care without having the proper administrative controls such as a good Information Technology protection plan. An example of an administrative control is when a company wants you to change your password every 90 days and has a combination of 14 letters, numbers and symbols password that protects against dictionary attacks. The emergence of asking a question before you type a password to get into your bank account is a form of a policy and procedure showing that a company attempted a form of due care. The lack of administrative controls will negatively affect the corporation. They will have a huge liability if they did not offer any controls to protect the network and the customer’s information. Without the lack of administrative controls then that shows that there were not and due care taken. This provides a good door to be open for corporate law suits. With all of the different laws and regulations at the federal level such as Health Insurance Portability and Accountability Act (HIPAA), The Family Education Rights and Privacy Act (FERPA), and Sarbanes Oxley (SOX) it would be a pure act of negligence if a corporation avoided administrative controls for due care. Without any administrative controls it shows a blatant lack of consideration for your customer’s information and privacy.
•How do Administrative Controls influence the choice of Technical and Physical Controls? The policies, procedures and best practices are influence the technical and physical controls. Administrative controls guides the corporations on what must be done in order to protect the network. When those policies are implemented you get things like the gold standard or a base line image. A company will know that this image can be patched or does not have any security weaknesses at the moment it was created. Policies will be in place created by administrative controls that will state that scans will be done on computers and if an information assurance vulnerability assessment (IAVA) is found on the system then it will be patched with an update. If it cannot be patched then they may quarantine it until it can be repaired. Some physical controls work with technical controls. If a computer is off of the network for a certain period of time then they will not let the employee physically connect the computer back on the network until it has been scanned for any viruses thus protected the network and customers information from possible malware attacks. An Intrusion Detection System is a technical control, it detects when someone infiltrates a system and this gives the defenders on the system a warning that something has gone wrong. The policies or procedures that company could take for physical controls could limit access to certain areas by a sign or common access card (CAC). This physically stops people from entering sensitive areas or to computer systems that may hold valuable information. Physical controls include locks, barriers, mantraps and even location specific controls.
•How would the absence of Administrative Controls affect projects in the IT department?
The absence of Administrative Controls would affect the projects in the IT department by creating a wild west of planning. For example if you were to plan installing secret internet in a building without following any administrative controls, there is a good chance that it will not be in compliance with Chief Information Office and would probably fail an inspection. This happened to a company that I used to work for. They spent a lot of money on installing the cables but they had to have the right type of Protective Distribution System (PDS). The higher authorities will not turn on this specific internet the policies were not followed. In some places you may get far enough to install of complete some parts of the project however eventually if the project is large enough then you will get penalized and have a faulty system that should really not be in operation. You may have spent millions of dollars on something that is not even compliant with current laws and open yourself up to lawsuits if it could be proved that you did not take proper due care and if you did not have administrative controls in place before you started an Information Technology project.

References
Administrative controls-lecture. (n.d.). Retrieved from http://www.devryu.net/re/DotNextLaunch.asp?courseid=8667805&userid=2180995&sessionid=e44a8b3d0a&tabid=8SYJe0ytNKmuZiBnS6/1Iv4aM1sBUKkIIMARSCLlwPu9IzXCRecSN0IzdxJEwgC&sessionFirstAuthStore=true&macid=pcMJlvDH657/SeG7FxJmuP4oiZRtCTGb4UBFW7WdYd89IM1d0fvynK3q/x91BQ4SrlsC5s6c4rephksP5fzlK0KkGg9UQM8oOh33muetKsVsVjLv9ksurHzQmpZpeF3FxynMhgJfEihpEKomwd/FVLL4x6LWzWVW9DTg6gqj5AySVW41gMxHV0hcxSKRmsPDUHZsUy6Cf1FzJddTTMJc5TmkXzHpzgh/rwCAE57aZs=
Cantrell, B. (n.d.). Due care in the computing environment. Retrieved from http://www.giac.org/cissp-papers/142.pdf
Information Systems Audit and Control Association (ISACA) http://www.isaca.org/ContentManagement/ContentDisplay.cfm?ContentID=18550
Northcutt, S. (2009, September 1). Security controls. Retrieved from http://www.sans.edu/research/security-laboratory/article/security-controls
U.S. Department of Agriculture, Food Safety and Inspection Service. (2012). System and information integrity (1306.6). Retrieved from website: http://www.fsis.usda.gov/wps/wcm/connect/5f23b121-3b79-448d-8f7a-b0ec4f6596fc/1306.6.pdf?MOD=AJPERES

Similar Documents

Premium Essay

Technical Controls Paper

...Technical Controls Paper A.M SE578 Gordon Francois Keller Graduate School of Management January 22, 2012 Technical Controls Technical controls use technology as a basis for controlling the access and usage of sensitive data throughout a physical structure and over a network. Technical controls are far-reaching in scope and encompass such technologies as: * Encryption * Smart cards * Network authentication * Access control lists (ACLs) * File integrity auditing software Logical controls (also called technical controls) use software and data to monitor and control access to information and computing systems. For example: passwords, network and host based firewalls, network intrusion detection systems, access control lists, and data encryption are logical controls. An important logical control that is frequently overlooked is the principle of least privilege. The principle of least privilege requires that an individual, program or system process is not granted any more access privileges than are necessary to perform the task. A blatant example of the failure to adhere to the principle of least privilege is logging into Windows as user Administrator to read Email and surf the Web. Violations of this principle can also occur when an individual collects additional access privileges over time. This happens when employees' job duties change, or they are promoted to a new position, or they transfer to another department. The access privileges required...

Words: 905 - Pages: 4

Free Essay

Cis 408 Wk 10 Technical Paper

...CIS 408 WK 10 TECHNICAL PAPER To purchase this visit here: http://www.activitymode.com/product/cis-408-wk-10-technical-paper/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 408 WK 10 TECHNICAL PAPER CIS 408 WK 10 Technical Paper - Planning an Application Server Migration Technical Paper: Planning an Application Server Migration Imagine you are working for a large international purchasing company that has just bought a growing local company that manufactures western wear at several locations (it’s a group of cottage industries; remember from the other scenarios that it now has eight (8) satellite offices, four (4) large and four (4) small ones). The previous owner, Sam Yosemite, tells his IT team to provide support and information to your IT staff to help with the transition to your forest domain. Gathering information from the other writing assignment descriptions, decide the best ways to bring the “Wild Frontier” network into your domain, “Foghorn Leghorn” and migrate to your current standards. The business acquisition is largely superficial and the existing personnel structures will remain in place. You have to bring the “Wild Frontier” under the “Foghorn Leghorn” domain and make sure production needs are met at all the satellite locations. Your budget is fairly generous due to allocated funds for the transition, but will likely be much more constrained in the future. Take maintenance costs (both money and man-hours) into consideration as you design your solutions...

Words: 913 - Pages: 4

Free Essay

Computer Support Specialist

...Receive FREE Information From Featured Schools... Enter your zipcode to see school matches in your area! Enter your zip Use Current Location FIND SCHOOLS Privacy Policy (http://www.campusexplorer.com/company/legal/privacy/) A computer support specialist would provide the technical support for a company or organization's customers and/or the employer's subordinate's. They use computer software and equipment to assist them in providing advice and help to their employer and their employee's. They carry a variety of titles, such as, technical support specialist, information technology specialist (IT specialists), computer technician and several others. How to become a Computer Support Specialist A computer support specialist may need an associate's or bachelor's degree in computer science or other area of technology. A recognized apprenticeship may be recognized in this career field. A technical background would be expected usually accompanied by 1-2 years of training both formal and informal, such as, training with experienced workers. A vocational school may also be considered for an applicant. Job Description of a Computer Support Specialist A computer support specialist would watch over computer systems everyday in a company or organization and give minor repairs, when needed, to software, hardware or other equipment in this job. They would follow any specifications in installation or design of operating systems cables or other software and be sure the system operates correctly...

Words: 431 - Pages: 2

Free Essay

Sales and Marketing Executive

... ENGLISH, NYANJA&TONGA CONTACT No : +260950254807, +260968793352, EMAIL : bcchimusb562@gmail.com EDUCATIONALBACKGROUND 2012: Bachelor of Business Administration in CMIS; Rusangu University. 2005:Grade10-12; Namwala High School. 2002:Grade9; Itezhi-Tezhi Basic School. 2001:Grade1-8; Mujika Basic School, Monze. PROFESSIONAL QUALIFICATIONS * Candidate-Master’s Degree of Science in Information Technology * Candidate- Cisco Certified Network Associate * Certified Fiber Optic Technician * SMB Account Manager * BBA-Computer and Management Information Systems WORKEXPERIENCE * Am currently working with Smartnet Network Limited as Technical Sales and Marketing Engineer and assigned to the following tasks: * Searching for new clients, visiting them and developing long-term relationships with them through managing and interpreting their requirements. * Persuading clients to buy products or services * Deliver the purchased Items on time and issue out the delivery note. * Assessment of Tender requests, attending tender...

Words: 858 - Pages: 4

Premium Essay

Basketball

...12 of the Most Confusing Basketball Rules When taking a charge, does the defensive player have to be still? Basketball rules state that if a defensive player is in a legal defensive stance or position, the defensive player has the right to move in order to maintain his legal positioning. A charging call can be made even if the defensive player has one or both feet off of the ground when the offensive player makes contact with the defensive player. The basketball rule of “verticality” applies here. If a defensive player jumps straight up to block a shot and the offensive player jumps into and creates contact with the defender, an offensive charging call could be made. (Therefore, it is more important if a defender is squared up and contact is made to the defender’s chest than if the defender is moving.) Is a dribble illegal if it goes over the ball handler’s head?  Basketball rules states if the ball handler doesn’t “palm” the ball or place their hand under the ball, there is no dribbling violation. There is no basketball rule or restriction on how high a dribble can go. Is reaching into an offensive player's area a foul? If a defensive player “reaches in” to attempt a steal or distract the offensive player they are guarding and doesn’t create any contact, no foul should be called. Reaching in isn’t necessarily a foul until contact is created. Basketball rules state that the foul isn’t called reaching in, but holding or pushing. Is over the back a foul when rebounding...

Words: 2668 - Pages: 11

Free Essay

Case Study

...Introduction 1.1 Background Technical Analysis is the forecasting of future financial price movements based on an examination of past price movements. Like weather forecasting, technical analysis does not result in absolute predictions about the future. Instead, technical analysis can help investors anticipate what is "likely" to happen to prices over time. Technical analysis uses a wide variety of charts that show price over time. One of them is candlestick chart. By the grace of Almighty Allah I have been assigned to prepare a project paper on ‘Making Effective Decision in Stock Market through Candlestick Chart Analysis’. I believe that I have tried all the way to follow the previous studies retaining my originality in writing the report. Any analytical criticism and creative suggestion on this concern will receive my heartiest welcome. 1.2 Origin of the report Each professional degree needs practical knowledge of the respective field of discipline to be fruitful. Our MBA program also has a Project Report program, relating to the exchange of theoretical knowledge into the real life practical situation. The report entitled “Making Effective Decision in Stock Market through Candlestick Chart Analysis”. During the project paper program, I was under the supervision and guidance of Md. Hafizur Rahman Khan, Lecturer, Department of Business Administration, Leading University, Sylhet, Bangladesh. 1.3 Objectives (i) Main Objective: The...

Words: 4357 - Pages: 18

Premium Essay

Peppercorn Dining

...Week #7 Marketing Plan New 3 D Technical Service Project Student name: Brian Yan Keiser University Course: marketing management Section: 1 Professor:  Dr. John Fitzgerald Date: Apr.13.2012 Marketing Plan of the new 3 D technical service project Part 1 Executive summary 3 D technical service project, use the new technical to design your own MTV with your own photos. People’s life is only a few decades. We are just performance as a passenger to the world. Make our life meaningful and deserve, we need to save something to our future generations. This is a New-to-the-world product (service).This new 3 D technical service is an evaluation to the media market; it will help the consumers choose a better (at least I think so) way to keep their memories with more vivid and more realistic solution. Part 2 product idea This new type of 3 D technical service is a new product idea: 1) Save the necessary information from customer, select the suitable resources to write a story about the customer. (follow customer’s requirement) 2) Design a basic model with background and music (follow customer’s requirement) 3) Put the photos which customer wish to add into the MTV movie, transfer the photos to be a real animation. 4) Arrange the photos and complete the MTV movie with the new 3 D technical. 5) Save the customer’s own MTV movie with flash drive or CD. State the value proposition or a positioning statement We all have responsibility to our...

Words: 2603 - Pages: 11

Premium Essay

Network Solutions

...during projects ranging from large, strategic initiatives to small systems upgrades. * Jason Rush - Project Manager, Network Analyst Job Description: IT managers these types of managers are accountable for making certain an application, computer hardware product or service remains on target throughout the development process and delivery stages. They may have oversight of computer programmers, IT professionals, and system administrators. They have to also provide effective leadership and marketing communications expertise. A project manager job description can be defined as anyone that is given the responsibility of taking a project from start to finish and completing all the objectives along the way. At the same time maintaining control over what is said to be the three most important components of any job, Time, Cost, and Quality. More than just bringing the job in on time and on budget the project manager job description includes: Acting as a representative for the client and determining the exact needs of the client. Only after fully understanding the needs of the client will a project manager be able to lead a team of professionals to one common goal. After the project manager has met with the client to determine the goals it...

Words: 800 - Pages: 4

Free Essay

Informatic Needs Assessment

...Informatics Needs Assessment HCS/482 December 22, 2014 Matthew Taylor Informatics Needs Assessment Electronic charting is the move from paper charting to electronic charting. Soon all hospitals and physician offices will make this transition. When an organization if ready to make this change they should consider a needs assessment and use the recommendations made based on the results of the assessment. The purpose of this paper is to explain how and why a needs assessment must be completed before a new electronic health records may be selected. This paper will describe some of the factors that need to be considered in the needs assessment. I will also explain what data should be collected and how or where I can access it. The last thing I will describe is who I would consult and why. The purpose of the needs assessment is to define the gap between an organization’s current state and the needs of the organization with specific attention to the strategic plan (Hebda & Czar, 2013, p. 155). The needs assessment will assist in selecting the electronic health records that will fit the needs of the organization or practice. The process of the assessment should start with the development of a steering committee which should be multidisciplinary. The committee should use the mission and visionary statements to determine the goals. The members of each committee should state what they need from the system (Hebda & Czar, 2013, p. 158). I will discuss the processes that take place...

Words: 875 - Pages: 4

Premium Essay

Miss

...Orbex — Kuwait Office CHIEF MARKET STRATEGIST, 9/2013 TILL PRESENT. Key responsibilities: • Maintain an in-depth understanding and knowledge of our followed economies (G10 – BRICS), related market outlook, and analyzing the market using technical and fundamental analysis approaches. • Conduct intense researches and making forecast on market developments, broader economical trends, and monetary policies for central banks. • Analyzing financial information relating to specific financial assets (Forex & Money Markets, Bonds, indices, commodities, and derivatives instruments), using specialist media sources and the specialized platforms (Reuters Eikon & Bloomberg Professional). • Keeping up to date with market developments and all other areas that can affect the markets, e.g. movements in the economies of followed countries. • Writing research reports and trading strategies to be sent to clients. • Making presentations and recommendations. • Perform training session (In-house and online) for clients to practice trading strategies and ideas. • Regularly invited to express my opinion about recent market development on Major channels (such as: CNBC Arabia) , to find more about my track record please check my Twitter account @mzidan112 . CAVEO BROKREAGE CO. — Kuwait CHIEF FINANCIAL MARKET STRATEGIST, 1/2012 TILL 8/2013. Key responsibilities: • Maintain an in-depth understanding and knowledge of our trading approach and market outlook...

Words: 730 - Pages: 3

Free Essay

Stock Market Vol

...TABLE OF CONTENTS: Section 1: Introduction: Foreign Exchange Market Overview 5 Section 2: Technical Analysis in Forex Markets 6 Section 3: Basic Technical Analysis Patterns 9 Section 4: Technical Analysis: Charting Techniques 13 Section 4.1:Cycle based indicators 13 Section 4.1.1: Elliot Wave theory 13 Section 4.2:Momentum Indicators 17 Section 4.2.1:MACD: Moving Average Convergence Divergence 18 Section 4.2.2:RSI: Relative Strength Index 19 Section 4.3:Trend approach to technical analysis 21 Section 4.3.1: Moving Averages 21 Section 4.4: Chart Based Indicators 23 Section 4.4.1: Candlestick Charts 23 Section 5: Practical Application to Current trends in the Foreign Exchange Market 28 Section 5.1:Cycle Based 28 Section 5.1.1: Elliot wave 28 Section 5.2: Momentum Based 29 Section 5.2.1:Relative Strength Index 29 Section5.2.2: Moving Average Convergence/Divergence 30 Section 5.3: Trend Based 31 Section 5.3.1: Moving averages 31 Section 5.4: Chart Based 36 Section 5.4.1: Candlesticks 36 Section 6: Technical Analysis: Advantages & Disadvantages 38 Section 7: How traders and dealers use Technical Analysis? 39 Section 8: Bibliography 40 List of Graphs and Figures Figure 1: Technical analysis is based on the premise that markets trend and that those trends tend to persist. 7 Figure 2: Example of a downtrend turning into an uptrend 9 Figure 3: A long term Channel line, support and resistance level 10 Figure 4: head and shoulders pattern. 10 Figure 5: Example...

Words: 11066 - Pages: 45

Free Essay

Japanese Candlestick

...JAPANESE CANDLESTICK CHARTING TECHNIQUES ~-Y?~L&B~E!% L ?ABWt "Candles Exhaust Themselves to Give Light to Men" JAPANESE CANDLESTICK CHARTING TECHNIQUES A Contemporary Guide to the Ancient Investment Techniques of the Far East STEVE NISON NEW YORK INSTITUTE OF FINANCE NewYork London Toronto Sydney Tokyo Singapore Library of Congress Cataloging-in-Publication Data Nison, Steve. Japanese candlestick charting techniques : a contemporary guide to the ancient investment technique of the Far East I Steve Nison. p. cm. Includes bibliographical references and index. ISBN 0-13-931650-7 1. Stocks-Charts, diagrams, etc. 2. Investment analysis. I. Title. HG4638.N57 1991 90-22736 332.63'22-dc20 CIP This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional service. If legal advice or other expert assistance is required, the services of a competent professional person should be sought. From a Declaration of Principles Jointly Adopted by a Committee of the American Bar Association and a Committee of Publishers and Associations 01991 by Steve Nison All rights reserved. No part of this book may be reproduced in any form or by any means without permission in writing from the publisher. New York Institute of Finance Simon & Schuster Printed in the United States of America 1 0 9 8 7 Acknowledgements ...

Words: 32110 - Pages: 129

Premium Essay

Change Diagnosis

...Table of Contents 1. Introduction Page 3 2. Change Drivers Page 3 3. Images of Change Page 4 4. Strategic Change Initiative Page 5 5. Strategy and Culture Page 6 6. Getting the Heads Together Page 7 7. Resistance Page 9 8. Back to Work Page 10 9. Getting the Buy In Page 11 10. Resistance – Part 2 Page 13 11. Rolling It Out and Gaining Momentum Page 14 12. Evaluation Page 16 13. What I Took From This Page 17 Appendix A – Old Org Chart Appendix B – Change Memo Appendix C – Promotional Announcement Appendix D – New Org Chart Introduction Brookdale Senior Living (BKD) has been in operations since 1978 and is the largest senior living provider in the nation. (Assisted Living) Operating 565 senior living facilities and employing over 53,600 associates, BKD has positioned itself to grow and to become one of the sought after places to work in the nation. In addition to the facilities, BKD has 3 corporate offices; Nashville, Milwaukee, and Chicago with Milwaukee being the largest of the three. The offices are designated as the support center (Milwaukee), the corporate office (Nashville) and Chicago is just a satellite office that houses the Co-President and other executives. Of all the departments in the company, the IT department is the largest of the corporate departments and is housed in the Milwaukee office, the support center. There are currently over 120 associates in the...

Words: 5955 - Pages: 24

Premium Essay

International Banking and Finance

...our account is AUD 46,097.96 Overall Strategy In general, the overall strategy is the news that will be announced every day. In our opinion the economic news from many the foreign exchange rate websites are the main drivers of market developments such as interest rate, Consumer Price Index, unemployment rate and inflation etc.Those factors will be the big impact to the foreign exchange market in the world economy. The technical analysis is another strategy that we usually use to predict the trend of currency from the historical statistic information in trading process. They are including the chart and technical indicators which can help the investors to identify the future trend of those currencies. It is easy to indentify because it focus on the price movement of their currency. (Investopedia 2012) The fundamental analysis is the strategy that we can evaluate the foreign exchange rate of each currency in the future trend from the overall the economic, industry data, financial data and management. (Stockcharts 2012) Furthermore we use the technical combine with the...

Words: 2818 - Pages: 12

Premium Essay

It/284 Handling Difficult Customers

... Handling Difficult Customers To begin with, it helps when the technician understands what can cause the customer to become aggravated when calling customer support to express a technical problem. The following is a checklist of possible motives that could provoke a customer toward becoming hostile when dealing with a technical problem. * The customer thinks the support representative is not actively listening. * The support representative is not sufficiently trained on the method used to transfer calls to the proper department and accidently disconnects the customer. * The customer is kept on hold waiting for an overly long length of time without speaking to a technical representative. * The technical representative appears to exhibit a lack of concern as if they do not care about assisting the customer. * The customer may sense that because the representative is not attentive, he or she is forced to repeat the symptoms. * The customer may think prices the customer support company charges are too high. * The technical representative cannot help solve all of the customers’ problems. The three issues chosen to display how the customer could become upset, what a company can do to ease the customers’ frustrations, and the method used to reach an agreed upon resolution...

Words: 2005 - Pages: 9