Page 48 - Auditinf Electronic System
P. 48
Chapter three
Risks in IT environment, Cybersecurity Risk and IT
Governance
This Chapter Covers the Following Points
1. What is the features IT environment?
2. What are the Opportunities enabled by IT?
3. What are IT Risk types?
4. What are Cybersecurity Risks?
5. What are the resulting Cyber-attacks?
6. What are the sources of Cyber risks?
7. What are the Controls for Cyber risks?
8. The role of IT Governance in an electronic system and role of external
auditor in such environment.
First: What are the features and Challenges of IT environment:
IT changes at a rapid pace and presents new challenges that all organizations must
address:
1. The proliferation of technology today enables more user access to an
organization’s information than ever before.
2. Third parties are increasingly provided access to organizational information
through the supply chain, customers, and service providers.
3. A greater variety of data has become readily available as organizations often
store large volumes of sensitive and confidential information in virtualized
infrastructure accessible through cloud computing.
4. The increasing number of devices that can be connected and always engaged
in data exchange (a phenomenon known as the “internet of things”)
48 49
جميع الحقوق محفوظة ـ الإعتداء على حق المؤلف بالنسخ أو الطباعة يعرض فاعله للمسائلة القانونية