Which of the following procedures most likely could prevent IT personnel frommodifying programs to bypass automated controls?(1) Periodic management review of computer utilization reports and systems documentation.(2) Segregation of duties within IT for computer programming and computeroperations.(3) Participation of user department personnel in designing and approving newsystems.(4) Physical security of IT facilities in limiting access to IT equipment

Management Of Information Security
6th Edition
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:WHITMAN, Michael.
Chapter5: Developing The Security Program
Section: Chapter Questions
Problem 6E
icon
Related questions
Question

Which of the following procedures most likely could prevent IT personnel from
modifying programs to bypass automated controls?
(1) Periodic management review of computer utilization reports and systems documentation.
(2) Segregation of duties within IT for computer programming and computer
operations.
(3) Participation of user department personnel in designing and approving new
systems.
(4) Physical security of IT facilities in limiting access to IT equipment

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Fundamentals of managing system
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,