25.03.2015 Aufrufe

e-Government - ein Prüfungsleitfaden - EUROSAI IT Working Group

e-Government - ein Prüfungsleitfaden - EUROSAI IT Working Group

e-Government - ein Prüfungsleitfaden - EUROSAI IT Working Group

MEHR ANZEIGEN
WENIGER ANZEIGEN

Sie wollen auch ein ePaper? Erhöhen Sie die Reichweite Ihrer Titel.

YUMPU macht aus Druck-PDFs automatisch weboptimierte ePaper, die Google liebt.

79<br />

System audit<br />

– The process of collecting and evaluating evidence to form an opinion on<br />

whether an information system (user application) safeguards assets,<br />

maintain data integrity, allows organizational goals to be achieved and<br />

determine the efficient use of resources.<br />

Technical audit – The process of collecting and evaluating evidence to form an opinion on<br />

whether (components of) the <strong>IT</strong> infrastructure safeguards assets, maintain<br />

data integrity, allows organizational goals to be achieved and determine<br />

the efficient use of resources. <strong>IT</strong> infrastructure here means<br />

computer hardware, networks, operating systems and all other software<br />

that are not user applications (database management, security software,<br />

data center management systems, etc.).<br />

Telematics<br />

Timeliness<br />

User system<br />

Collection of technologies that combine telecommunications and computing.<br />

– In information security, a property assured by a system’s control sited<br />

immediately before the user application to ensure that when operational<br />

updating cycles occurs the data processing of downloaded transactions<br />

takes place in a timely manner.<br />

– A system application that involves some systematic, <strong>IT</strong>-based and manual<br />

administrative functions in a given area.<br />

Validity/approval – In information security, a property assured by a system’s control sited<br />

immediately before the user application to ensure that an approval procedure<br />

of collective received transactions is in place and that approval is<br />

performed by properly authorised personnel (e.g. validation to ensure that<br />

only transactions pertaining to the public body are transferred to the user<br />

application).<br />

Vulnerability<br />

– A weakness in a system that can be exploited to violate the system's<br />

intended behaviour. There may be security, integrity, availability and<br />

other vulnerabilities. The act of exploiting vulnerability represents a<br />

threat, which has an associated risk of b<strong>ein</strong>g exploited.

Hurra! Ihre Datei wurde hochgeladen und ist bereit für die Veröffentlichung.

Erfolgreich gespeichert!

Leider ist etwas schief gelaufen!