Page 49 - Demo
P. 49


                                    جميع الحقوق محفوظة ـ اإلعتداء عىل حق املؤلف 49 بالنسخ أو الطباعة يعرض فاعله للمسائلة القانونيةChapter threeRisks in IT environment, Cybersecurity Risk and IT GovernanceThis Chapter Covers the Following Points 1. What is the features IT environment? 2. What are the Opportunities enabled by IT? 3. What are IT Risk types? 4. What are Cybersecurity Risks? 5. What are the resulting Cyber-attacks? 6. What are the sources of Cyber risks? 7. What are the Controls for Cyber risks? 8. The role of IT Governance in an electronic system and role of external auditor in such environment. First: What are the features and Challenges of IT environment:IT changes at a rapid pace and presents new challenges that all organizations must address: 1. The proliferation of technology today enables more user access to an organization’s information than ever before. 2. Third parties are increasingly provided access to organizational information through the supply chain, customers, and service providers. 3. A greater variety of data has become readily available as organizations often store large volumes of sensitive and confidential information in virtualized infrastructure accessible through cloud computing. 4. The increasing number of devices that can be connected and always engaged in data exchange (a phenomenon known as the “internet of things”) 
                                
   43   44   45   46   47   48   49   50   51   52   53