application controls of the information systems

application controls of the information systems
taikomosios informacinių sistemų kontrolės priemonės statusas Aprobuotas sritis auditas apibrėžtis Viešojo juridinio asmens vadovo patvirtintos informacinių sistemų vartotojų instrukcijos ir procedūros, skirtos duomenų įvedimo į konkrečią kompiuterių programą, jų apdorojimo ir rezultatų pateikimo vidaus kontrolei užtikrinti. atitikmenys: angl. application controls of the information systems šaltinis Lietuvos Respublikos finansų ministro įsakymo „Dėl Lietuvos Respublikos finansų ministro 2003 m. gegužės 2 d. įsakymo Nr. 1K-117 „Dėl Pavyzdinės vidaus audito metodikos, Vidaus auditorių profesinės etikos taisyklių ir Vidaus audito poreikio įvertinimo analizės metmenų patvirtinimo“ pakeitimo“ projektas

Lithuanian dictionary (lietuvių žodynas). 2015.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Certified Information Systems Auditor — [1] Certified Information Systems Auditor (CISA) is a professional certification for Information Technology Audit professionals sponsored by ISACA, formerly the Information Systems Audit and Control Association. Candidates for the certification… …   Wikipedia

  • Certified Information Systems Auditor - CISA — A certification available for professionals who conduct audits of information systems. The CISA credential is sponsored by the Information Systems Audit and Control Association (ISACA) and is the global standard for information systems audit,… …   Investment dictionary

  • Information technology audit process — Information technology audit process:Generally Accepted Auditing Standards (GAAS)In 1947, the American Institute of Certified Public Accountants (AICPA) adopted GAAS to establish standards for audits. The standards cover the following three… …   Wikipedia

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

  • Certified Information Systems Security Professional — CISSP Logo Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by International Information Systems Security Certification Consortium (ISC)². (ISC)² is a self declared… …   Wikipedia

  • information system — Introduction       an integrated set of components for collecting, storing, processing, and communicating information (information science). Business firms, other organizations, and individuals in contemporary society rely on information systems… …   Universalium

  • Information technology controls — In business and accounting, Information technology controls (or IT controls) are specific activities performed by persons or systems designed to ensure that business objectives are met. They are a subset of an enterprise s internal control. IT… …   Wikipedia

  • Information technology audit — An information technology audit, or information systems audit, is an examination of the controls within an Information technology (IT) infrastructure. An IT audit is the process of collecting and evaluating evidence of an organization s… …   Wikipedia

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

  • Information Technology Infrastructure Library — The Information Technology Infrastructure Library (I), is a set of good practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. In its current form (known as ITILv3 and ITIL 2011 edition), ITIL… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”