CS 590M -- Information Systems

Chapter 14 -- Controlling Information Systems

(This page last modified June 23, 1997. Please send comments to H.E. Dunsmore)


Teaching Objectives

Key Terms

Hacker
Computer virus
Antivirus software
Fault-tolerant computer systems
On-line transaction processing
Security
Bugs
Controls
General controls
Application controls
Implementation controls
Software controls
Program security controls
Hardware controls
Computer operations controls
Data security controls
Administrative controls
Segregation of functions
Input controls
Input authorization
Data conversion
Batch control totals
Edit checks
Processing controls
Run control totals
Computer matching
Output controls
Standing data
Risk assessment
MIS audit
Resource allocation
Software metrics
Walkthrough
Debugging
Data quality audit

Chapter Outline

14.1 System Vulnerability and Abuse

Why Systems are Vulnerable

Concerns for System Builders and Users

System Quality Problems: Software and Data

14.2 Creating a Control Environment

General Controls

Application Controls

Developing a Control Structure: Costs and Benefits

The Role of Auditing in the Control Process

14.3 Ensuring System Quality

Software Quality Assurance

Data Quality Audits

Internet Resources

Swissair is discussed on pages 430-431.

The Internet Law Page contains a lengthy technical and legal discussion of Robert Morris' 1988 Internet Worm.

Much more information about available services may be found at Comdisco Continuity Services (formerly Disaster Recovery Services)and SunGard Recovery Services Websites.


Return to homepage of CS 590M - Information Systems

Return to homepage of CS 590M - Information Systems