Page 48 - Auditinf Electronic System
P. 48

Chapter three
           Risks in IT environment, Cybersecurity Risk and IT

                                  Governance

    This Chapter Covers the Following Points

    1. What is the features IT environment?
    2. What are the Opportunities enabled by IT?
    3. What are IT Risk types?
    4. What are Cybersecurity Risks?

    5. What are the resulting Cyber-attacks?

    6. What are the sources of Cyber risks?

    7. What are the Controls for Cyber risks?

    8. The role of IT Governance in an electronic system and role of external
       auditor in such environment.

    First: What are the features and Challenges of IT environment:

    IT changes at a rapid pace and presents new challenges that all organizations must
    address:

        1. The proliferation of technology today enables more user access to an
           organization’s information than ever before.

        2. Third parties are increasingly provided access to organizational information
           through the supply chain, customers, and service providers.

        3. A greater variety of data has become readily available as organizations often
           store large volumes of sensitive and confidential information in virtualized
           infrastructure accessible through cloud computing.

        4. The increasing number of devices that can be connected and always engaged
           in data exchange (a phenomenon known as the “internet of things”)

48                                                             49
    ‫جميع الحقوق محفوظة ـ الإعتداء على حق المؤلف بالنسخ أو الطباعة يعرض فاعله للمسائلة القانونية‬
   43   44   45   46   47   48   49   50   51   52   53