10.08.2015 Views

Deze scriptie is geschreven door beide op persoonlijke titel

IT-control framework voor de Douanevereenvoudiging Self ... - Vurore

IT-control framework voor de Douanevereenvoudiging Self ... - Vurore

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Overzicht van tabellenTABEL 1: TYPEN CERTIFICATEN AEO................................................................................................................ 15TABEL 2: EISEN VANUIT DE WET- EN REGELGEVING DIE NIET VAN TOEPASSING ZIJN VOOR ONS ONDERZOEK .................... 28TABEL 3: EISEN VANUIT DE WET- EN REGELGEVING ............................................................................................. 29TABEL 4: EISEN VANUIT TOEZICHT ................................................................................................................... 32TABEL 5: SAMENGEVAT OVERZICHT VAN EISEN UIT WETGEVING EN TOEZICHT VOOR DSA ........................................... 38TABEL 6: RELEVANTE INFORMATIECRITERIA VOOR DE DSA................................................................................... 39TABEL 7: OVERZICHT EERSTE SELECTIE COBIT-PROCESSEN VOOR DSA .................................................................... 41TABEL 8: OVERZICHT BEHEERSDOELSTELLINGEN EN COBIT-PROCESSEN VOOR SOX (SHAHIM, 2009) ........................... 42TABEL 9: OVERZICHT VERSCHILLEN COBIT-PROCESSEN VOOR DSA EN SOX ............................................................. 42TABEL 10: IT-BEHEERSDOELSTELLINGEN RELEVANT VOOR DSA ............................................................................... 43TABEL 11: DEFINE THE INFORMATION ARCHITECTURE (PO2) ................................................................................. 44TABEL 12: ASSESS AND MANAGE IT RISK (PO9) .................................................................................................. 44TABEL 13: ACQUIRE AND MAINTAIN APPLICATION SOFTWARE (AI2) ........................................................................ 45TABEL 14: ACQUIRE AND MAINTAIN TECHNOLOGY INFRASTRUCTURE (AI3)............................................................... 45TABEL 15: ENABLE OPERATIONS (PO6, PO8, AI6, DS13) .................................................................................... 46TABEL 16: INSTALL AND ACCREDIT SOLUTIONS AND CHANGES (AI7) ........................................................................ 46TABEL 17: MANAGE CHANGES (AI6, AI7) ......................................................................................................... 47TABEL 18: DEFINE AND MANAGE SERVICE LEVELS (DS1) ....................................................................................... 47TABEL 19: MANAGE THIRD-PARTY SERVICES (DS2).............................................................................................. 48TABEL 20: ENSURE SYSTEMS SECURITY (DS5) ..................................................................................................... 49TABEL 21: MANAGE THE CONFIGURATION (DS9) ................................................................................................ 50TABEL 22: MANAGE PROBLEMS AND INCIDENTS (DS10)....................................................................................... 50TABEL 23: MANAGE DATA (DS11)................................................................................................................... 51TABEL 24: MANAGE THE PHYSICAL ENVIRONMENT (DS12) ................................................................................... 51TABEL 25: MANAGE OPERATIONS (DS13) ......................................................................................................... 52TABEL 26: ENSURE COMPLIANCE WITH EXTERNAL REQUIREMENTS (ME3) ................................................................ 52TABEL 27: PROVIDE IT GOVERNACE (ME4)........................................................................................................ 52TABEL 28: KWALITEITSCRITERIA VOLGENS COBIT (ITGI, 2007) .............................................................................. 70TABEL 29: OVERZICHT COBIT- PROCESSEN MET INFORMATIECRITERIA EN MIDDELEN (ITGI, 2007) ................................ 76TABEL 30: OVERZICHT COBIT-PROCESSEN RELEVANT VOOR DSA ............................................................................ 77vi

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!