Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
PHYSICAL SECURITY
9. For any other sensitive areas, are access controls to these areas
adequate? Examples of sensitive areas (besides the computer
room) would include communications closets, any UPS
equipment, and tape libraries.
LOGICAL ACCESS
12. *Determine the types of controls that are in place over the
issuance, maintenance, and termination of passwords. Do such
controls include:
c. Unique passwords?
b. System specifications?
c. Technical design?
g. Transition?
a. Systems documentation?
b. Program documentation?
c. Operations documentation?
d. Users documentation?
b. Backup assignments
c. Emergency procedures
5. Is the database and its data backed-up on a regular basis, and are
backups secured off-site?
c. Security controls?
d. Problem/incident reporting?
e. Contingency planning?
b. Testing of changes?
d. Documentation of changes?
Network controls address the threats and risks to sensitive and critical
data that are accessed and transmitted through networks. Network
controls ensure proper security performance and reliability of all
network components. Complete this section only if the university
processes material financial activity using this technology.
a. User training?
c. Security?
Question Yes No N/A Remarks
a. File server?
b. Cabling?
c. Modems?
PERSONAL COMPUTERS
c. Maintaining PC software?
a. Locked doors?
b. Cables?
c. Anchor pads?
d. Alarms?
e. Keyboard locks?
a. Passwords?
b. Directory locking/restricting?
d. Boot protection?
a. Cost/benefit analysis?
b. Design?
c. Testing?
d. Controls?
b. Changes tested?
b. Virus detection/prevention?
INTERNET
ELECTRONIC COMMERCE
b. Security breaches
c. Processing disruptions