IT AUDIT AND CONTROLS (BCIS 4361)

Term: 2021-2022 FA September-December

Faculty

Festus EllehShow MyInfo popup for Festus Elleh
Email address is hidden, click here to email
 

Schedule

Tue-Thu, 12:00 AM - 12:00 PM (10/25/2021 - 11/21/2021) Location: ONLN ONLN ONLN

Description

This course explores organizational and managerial issues relevant to planning and conducting IT audit and control activities. Covers the role of the IS auditor, the IS audit functions, and the anatomy of controls in an information systems environment. Access to systems, resources, and data audit controls. Access to IT performance design, placement, and quality of controls. Understand some of the basic theory underlying computer security policies, models, and problems.

IT AUDIT AND CONTROLS (BCIS 4361)

Term: 2021-2022 FA September-December

Faculty

Festus EllehShow MyInfo popup for Festus Elleh
Email address is hidden, click here to email
 

Schedule

Tue-Thu, 12:00 AM - 12:00 PM (10/25/2021 - 11/21/2021) Location: ONLN ONLN ONLN

Description

This course explores organizational and managerial issues relevant to planning and conducting IT audit and control activities. Covers the role of the IS auditor, the IS audit functions, and the anatomy of controls in an information systems environment. Access to systems, resources, and data audit controls. Access to IT performance design, placement, and quality of controls. Understand some of the basic theory underlying computer security policies, models, and problems.

IT AUDIT AND CONTROLS (BCIS 4361)

Term: 2021-2022 FA September-December

Faculty

Festus EllehShow MyInfo popup for Festus Elleh
Email address is hidden, click here to email
 

Schedule

Tue-Thu, 12:00 AM - 12:00 PM (10/25/2021 - 11/21/2021) Location: ONLN ONLN ONLN

Description

This course explores organizational and managerial issues relevant to planning and conducting IT audit and control activities. Covers the role of the IS auditor, the IS audit functions, and the anatomy of controls in an information systems environment. Access to systems, resources, and data audit controls. Access to IT performance design, placement, and quality of controls. Understand some of the basic theory underlying computer security policies, models, and problems.