e-Government - ein Prüfungsleitfaden - EUROSAI IT Working Group
e-Government - ein Prüfungsleitfaden - EUROSAI IT Working Group
e-Government - ein Prüfungsleitfaden - EUROSAI IT Working Group
Sie wollen auch ein ePaper? Erhöhen Sie die Reichweite Ihrer Titel.
YUMPU macht aus Druck-PDFs automatisch weboptimierte ePaper, die Google liebt.
79<br />
System audit<br />
– The process of collecting and evaluating evidence to form an opinion on<br />
whether an information system (user application) safeguards assets,<br />
maintain data integrity, allows organizational goals to be achieved and<br />
determine the efficient use of resources.<br />
Technical audit – The process of collecting and evaluating evidence to form an opinion on<br />
whether (components of) the <strong>IT</strong> infrastructure safeguards assets, maintain<br />
data integrity, allows organizational goals to be achieved and determine<br />
the efficient use of resources. <strong>IT</strong> infrastructure here means<br />
computer hardware, networks, operating systems and all other software<br />
that are not user applications (database management, security software,<br />
data center management systems, etc.).<br />
Telematics<br />
Timeliness<br />
User system<br />
Collection of technologies that combine telecommunications and computing.<br />
– In information security, a property assured by a system’s control sited<br />
immediately before the user application to ensure that when operational<br />
updating cycles occurs the data processing of downloaded transactions<br />
takes place in a timely manner.<br />
– A system application that involves some systematic, <strong>IT</strong>-based and manual<br />
administrative functions in a given area.<br />
Validity/approval – In information security, a property assured by a system’s control sited<br />
immediately before the user application to ensure that an approval procedure<br />
of collective received transactions is in place and that approval is<br />
performed by properly authorised personnel (e.g. validation to ensure that<br />
only transactions pertaining to the public body are transferred to the user<br />
application).<br />
Vulnerability<br />
– A weakness in a system that can be exploited to violate the system's<br />
intended behaviour. There may be security, integrity, availability and<br />
other vulnerabilities. The act of exploiting vulnerability represents a<br />
threat, which has an associated risk of b<strong>ein</strong>g exploited.