Ontology support for Management System Audit Programs
|
|
|
- Clement Powell
- 10 years ago
- Views:
Transcription
1 Ontology support for Management System Audit Programs Protégé Assisted Management System Auditing A. Gehrmann,, S. Ishizu Aoyama Gakuin University, Japan
2 Auditing and audit programs Caution: : The term audit is used in many domains: Management, Computer security, Finance etc., We refer to Management System Audits as defined in ISO 19011:2002: systematic,, independent and documented process for obtaining audit evidence and evaluating it objectively to determine the extent to which audit criteria are fulfilled; ISO 19011:2002 clause 3.1 audit A set of audits for a defined purpose constitutes an audit program; ; e.g. evaluation of effectiveness of management system
3 Problem and approach 3 rd Party Management System Auditing is criticized for not delivering values; we see the difficulty to deal with organizational complexity as one main obstacle to value- adding auditing We understand the management of complexity of organizations as a main factor for improvement and propose the use of an audit ontology and protégé for enhancing the value of auditing
4 rigins of complexity in 3 rd party auditing.third Third party auditors have to deal with hundred of less familiar domain concepts in a very short time, but as human beings can cope only with 7 (+/- 2) concepts at a time.management standards are generic in nature and give raise to many interpretational issues,, therefore fundamental concepts such as Quality, Contract, Design Integrity and Availability of Information assets lacking often on clarity in the context of an organization and are not shared consistently between the auditee and the auditors; leads to conceptual inconsistencies / clashes.many Many requirements might be applicable : Quality and Information Security, IT risk management based, Quality Manuals, Internal Procedures, Auditee s s client s specification, Auditee s s client s s quality procedures.demand on documentation is high.organizational complexity is high (horizontal, vertical)
5 Conceptual clashes: Availability P (Appendix A): ISO/IEC 17799:2000 : he security goal that generates the ensuring that authorized quirement for protection against users have access to tentional or accidental attempts to information and associated Perform unauthorized deletion of assets when required data or Otherwise cause a denial of service or data Unauthorized use of system resources
6 uditing as on-going knowledge acquisition with Protégé Phase 4 Phase 1 Phase 3 Phase 2
7 uditing as on-going knowledge acquisition with protégé Phase 1
8 uditing as on-going knowledge acquisition with protégé Phase 2
9 uditing as on-going knowledge acquisition with protégé Phase 3
10 uditing as on-going knowledge acquisition with protégé Phase 4
11 Service: Total network solutions including information security solution A case: The auditee -Total Business Information Systems Ltd.- CEO Procurement Finance Technical service IT Hardware Software IT Security Installation Medical Network Testing General Windows Novell Development 5 Levels, 50 Engineers, 10 technical assistants, 10 clerical staff
12 The task ahead 12 Interviews at 5 levels covering variety of engineering fields Time available is limited to 3 working days 2 auditors CEO is non-technician, lawyer Managers: Former Hacker, MBA Students, Part-timer, timer, non-technical clerics 300 pages internal procedures and Management standard
13 Make conclusions nderstand Organizational Structure Identify Applicable Requirement Interpret Requirement In context Select Right Level in organization Select Right interviewee Gather facts Verify Common Understanding Move in Organization Link information Confirm findings
14 TBIS structure -organizational units-
15 Make conclusions derstand Organizational Structure Identify Applicable Requirement Interpret Requirement In context Select Right Level in organization Select Right interviewee Conduct interview, Gather facts Verify Common Understanding Move in Organization Link information Confirm findings
16 Selecting stored requirements
17 Make conclusions derstand Organizational Structure Identify Applicable Requirement erpret Requirement In context of a process Select Right Level in organization Select Right interviewee Gather facts Verify Common Understanding Move in Organization Link information Confirm findings
18 Selecting required processes and activities
19 Make conclusions derstand Organizational Structure Identify Applicable Requirement Interpret Requirement In context Select Right Level in organization Select Right interviewee Conduct interview, Gather facts Verify Common Understanding Move in Organization Link information Confirm findings
20 Recording an interview
21 Make conclusions derstand Organizational Structure Identify Applicable Requirement Interpret Requirement In context Select Right Level in organization Select Right interviewee Gather facts Refer to controlled concepts Move in Organization Link information Confirm findings
22 oncept verification quirement selection uirement verification Access to controlled concepts
23 Make conclusions derstand Organizational Structure Identify Applicable Requirement Interpret Requirement In context Select Right Level in organization Select Right interviewee Gather facts Verify Common Understanding Move in Organization Link information Confirm findings
24
25 Make conclusions derstand Organizational Structure Identify Applicable Requirement Interpret Requirement In context Select Right Level in organization Select Right interviewee Gather facts Verify Common Understanding Move in Organization Link information Confirm findings
26 The audit console in Protege Organizational Units
27 Make conclusions derstand Organizational Structure Identify Applicable Requirement Interpret Requirement In context Select Right Level in organization Select Right interviewee Gather facts Verify Common Understanding Move in Organization Review situations, Link information Confirm findings
28 Visualization of interview topics
29 Make conclusions derstand Organizational Structure Identify Applicable Requirement Interpret Requirement In context Select Right Level in organization Select Right interviewee Gather facts Verify Common Understanding Move in Organization Review situations, Link information Confirm findings
30 Summary - Key functions of an audit ontology Conduct systematically the audit Document audit process for obtaining audit evidence Evaluating evidence Determine the extent to which the audit criteria are fulfilled Protégé for systematic conduct and planning; Protégé as organizer Protégé as documentation tool Protégé as evaluation support tool Protégé for keeping track audit findings
31 Solutions for coping with complexity with a Protégé audit ontology. Protégé helps to organize concepts and make it possible to manage hundreds of them at a time. An audit ontology helps to identify conceptual clashes and helps to understand generic concepts in the context. Audit requirements are retrievable and their relationship are linked to concepts and required activities. Audit documentation can be prepared on the fly by using transformation for XML documents. Teams can exchange ontologies for improved communication. Organizational complexity can be managed by using an organizational model in the audit ontology
32 Usability of an audit ontology in protégé se/phase Description Benefits Obstacles dit planning Modeling of organization structure and organizational artifact Fast understanding by visualization and taxonomies Requires understanding of ontology concepts -site audit Creation of instances of organization concepts Linking artifacts Auditors have pre- defined concepts available Requires a reasonable degree of skill to use protégé Speed problems. dit cumentation Is required but not a purpose in itself Knowledge base stored in XML Audit findings and conclusions extracted Need customization of user interface/print/representation mmunication thin team Necessary for auditing in a team Instantaneous High technical requirement Understandability of knowledge representation -usability of owledge Currently not the focus of auditing; missed chance Domain vocabulary can be extended Usage in IT projects Part of system none
33 Future applications / expectations Expectation about features of protégé : Speed improvements (drawing, visualization) Possibility for customizing interface for knowledge acquisation Build-in in documentation customizing Implementation in OWL for reasoning and consistency Remote login and sharing ontology over distributed clients Import of industry ontologies SUO Mobile devices: tablet computer Protégé as server component for customized clients tool (files) for simplifying interface
34 Q/A
Translation Service Provider according to ISO 17100
www.lics-certification.org Certification Scheme S06 Translation Service Provider according to ISO 17100 Date of issue: V2.0, 2015-11-15 Austrian Standards plus GmbH Dr. Peter Jonas Heinestraße 38 1020
TOTAL QUALITY MANAGEMENT II QUALITY AUDIT
TOTAL QUALITY MANAGEMENT II Chapter 13: QUALITY AUDIT Dr. Shyamal Gomes Introduction: The term audit was defined in the 16th Century as the official examination of the accounts with verification by reference
FINAL DOCUMENT. Guidelines for Regulatory Auditing of Quality Management Systems of Medical Device Manufacturers Part 1: General Requirements
GHTF/SG4/N28R4:2008 FINAL DOCUMENT Title: Guidelines for Regulatory Auditing of Quality Management Systems of Medical Device Manufacturers Authoring Group: GHTF Study Group 4 Endorsed by: The Global Harmonization
Software Quality Standards and. from Ontological Point of View SMEF. Konstantina Georgieva
SMEF 10-11 June, 2010 Software Quality Standards and Approaches from Ontological Point of View Konstantina Georgieva Otto-von-Guericke University Magdeburg Department of Computer Science, Software Engineering
Procedure for Assessment of System and Software
Doc. No: STQC IT/ Assessment/ 01, Version 1.0 Procedure for Assessment of System and Software May, 2014 STQC - IT Services STQC Directorate, Department of Electronics and Information Technology, Ministry
ISMS Implementation Guide
atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation
ISO 9001:2008 Internal Audit Guidance
ISO 9001:2008 Internal Audit Guidance Contents Introduction... 3 About the Internal Audit Solution... 3 Forms & Records... 3 Internal Audit Procedure... 3 Document Reference Numbering... 4 Navigating the
GOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT. January 7, 2011
APPENDIX 1 GOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT January 7, 2011 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto TABLE OF CONTENTS
Auditing Process-based Quality Management Systems. Charlie Cianfrani and Jack West
Auditing Process-based Quality Management Systems Charlie Cianfrani and Jack West Agenda Course objectives What is an audit? How to prepare for and plan an audit How to conduct an audit How to report
ISO 27001 COMPLIANCE WITH OBSERVEIT
ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk
TABLE OF CONTENTS ABSTRACT ACKNOWLEDGEMENT LIST OF FIGURES LIST OF TABLES
TABLE OF CONTENTS ABSTRACT ACKNOWLEDGEMENT LIST OF FIGURES LIST OF TABLES ii iii x xiv CHAPTER 1: INTRODUCTION 1 1.0 Background 1 1.1 Research Motivation 4 1.2 Research Objectives 5 1.3 Project Scope 6
Internal Audit Hearing Sheet
Attached form Name of the financial institution Title and name of the manager Name and telephone number of the person in charge Internal Audit Hearing Sheet Please provide all officials in charge of the
COMBINE. Part B. Manual for Marine Monitoring in the. Programme of HELCOM. General guidelines on quality assurance for monitoring in the Baltic Sea
Manual for Marine Monitoring in the COMBINE Programme of HELCOM Part B General guidelines on quality assurance for monitoring in the Baltic Sea Annex B-3 Quality audit ANNEX B-3 QUALITY AUDIT 1. Objectives
An organization properly establishes and operates its control over risks regarding the information system to fulfill the following objectives:
p. 1 System Management Standards Proposed on October 8, 2004 Preface Today, the information system of an organization works as an important infrastructure of the organization to implement its management
Enabling Compliance Requirements using ISMS Framework (ISO27001)
Enabling Compliance Requirements using ISMS Framework (ISO27001) Shankar Subramaniyan Manager (GRC) Wipro Consulting Services [email protected] 10/21/09 1 Key Objectives Overview on ISO27001
HONG KONG ENVIRONMENTAL ELECTRICAL APPLIANCE COMPANY. Environmental Procedure
HONG KONG ENVIRONMENTAL ELECTRICAL APPLIANCE COMPANY Environmental Procedure Enquiry / Complaint / Nonconformity Handling (EP-07) Revision No. : 1 Prepared by : Mason Lee (EMR) Approved by : Jonathan Ho
CP14 ISSUE 5 DATED 1 st OCTOBER 2015 BINDT Audit Procedure Conformity Assessment and Certification/Verification of Management Systems
Certification Services Division Newton Building, St George s Avenue Northampton, NN2 6JB United Kingdom Tel: +44(0)1604-893-811. Fax: +44(0)1604-893-868. E-mail: [email protected] CP14 ISSUE 5 DATED 1 st OCTOBER
Certification Process Requirements
SAAS Certification Process Requirements SAAS Procedure 200 and ISO/IEC 17021 Social Accountability Accreditation Services, June 2010 Accreditation Process and Policies SAAS Normative Requirements SAAS
Web Services-Interoperability Organization Online Privacy Statement
Web Services-Interoperability Organization Online Privacy Statement Version 1.0 This document was last updated November 04, 2003. Your privacy is important to The Web Services-Interoperability Organization
Regulatory Compliance and its Impact on Software Development
Regulatory Compliance and its Impact on Software Development Abdelwahab Hamou-Lhadj Software Compliance Research Group Department of Electrical and Computer Engineering Concordia University 1455 de Maisonneuve
Auditor General s Office. Governance and Management of City Computer Software Needs Improvement
Auditor General s Office Governance and Management of City Computer Software Needs Improvement Transmittal Report Audit Report Management s Response Jeffrey Griffiths, C.A., C.F.E Auditor General, City
EDUCORE ISO 20000 Expert Training
EDUCORE ISO 20000 Expert Training Overview ISO/IEC 20000 is the first international standard for IT service management. It was developed in 2005, by ISO/IEC JTC1 SC7 and revised in 2011. ISO/IEC 20000-1:2005
Design Specification for IEEE Std 1471 Recommended Practice for Architectural Description IEEE Architecture Working Group 0 Motivation
Design Specification for IEEE Std 1471 Recommended Practice for Architectural Description IEEE Architecture Working Group 0 Motivation Despite significant efforts to improve engineering practices and technologies,
Frequently Asked Questions (FAQ) Guidelines for quality compliance of. eprocurement System?
Frequently Asked Questions (FAQ) Guidelines for quality compliance of eprocurement System 1. What is eprocurement? Electronic Procurement (eprocurement) is the use of Information and Communication Technology
Learning outcomes. Systems Engineering. Software Quality Management. Product reflects Process. Lecture 5. Introduction to Software Quality Management
Systems Engineering Lecture 5 Introduction to Software Quality Management Dr. Joanna Bryson Dr. Leon Watts University of Bath Department of Computer Science Learning outcomes After attending this lecture
Competency Unit: Exemplar Global AU Management Systems Auditing
Please visit: www.exemplarglobal.org for your region s Principal Office contact details. Email: [email protected] Competency Unit: Exemplar Global AU Management Systems Auditing How to use this document
NEOXEN MODUS METHODOLOGY
NEOXEN MODUS METHODOLOGY RELEASE 5.0.0.1 INTRODUCTION TO QA & SOFTWARE TESTING GUIDE D O C U M E N T A T I O N L I C E N S E This documentation, as well as the software described in it, is furnished under
What changes will ISO 9001:2015 bring?
What changes will ISO 9001:2015 bring? 1 Introduction This presentation will cover the following topics: The ISO 9001 Revision Process Key Inputs to ISO 9001:2015 The High Level Structure Key Changes in
What s New Guide: Version 5.6
What s New Guide: Version 5.6 A QUEST SOFTWARE COMPANY 1. 8 0 0. 4 2 4. 9 4 1 1 w w w. s c r i p t l o g i c. c o m WHAT S NEW IN ACTIVE ADMINISTRATOR 5.6? Contents...3 Active Administrator Product Overview...3
ISO 9001 Quality Management Systems. Tips for Internal Auditing
ISO 9001 Quality Management Systems Tips for Internal Auditing ...taking steps to improving your internal auditing. ISO 9001 Tips for Internal Auditing If you are developing or modifying your internal
ISO 9001:2008 STANDARD OPERATING PROCEDURES MANUAL
8200 Brownleigh Drive Raleigh, NC 27617-7423 Phone: (919) 510-9696 Fax: (919) 510-9668 ISO 9001:2008 STANDARD OPERATING PROCEDURES MANUAL ALLIANCE OF PROFESSIONALS & CONSULTANTS, INC. - 1 - Table of Contents
Solution Brief for ISO 27002: 2013 Audit Standard ISO 27002. Publication Date: Feb 6, 2015. EventTracker 8815 Centre Park Drive, Columbia MD 21045
Solution Brief for ISO 27002: 2013 Audit Standard Publication Date: Feb 6, 2015 8815 Centre Park Drive, Columbia MD 21045 ISO 27002 About delivers business critical software and services that transform
Pursuant to Convention No. 108 of the Council of Europe for the protection of persons with regard to the automated processing of personal data;
Decision No. 2011-316 dated 6 October 2011 adopting a standard for delivering privacy seals in audit procedures covering the protection of persons with regard to the processing of personal data The French
SECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT
SECTION B DEFINITION, PURPOSE, INDEPENDENCE AND NATURE OF WORK OF INTERNAL AUDIT Through CGIAR Financial Guideline No 3 Auditing Guidelines Manual the CGIAR has adopted the IIA Definition of internal auditing
SonaVault Email Archiving Software
SonaVault Email Archiving Software Sonasoft specifically architected it email archiving solution, SonaVault, for small and medium-sized enterprises (SME). SonaVault Email Archiving Software is a stand-alone
ISO/IEC 20000 IT Service Management - Benefits and Requirements for Service Providers and Customers
ISO/IEC 20000 IT Service Management - Benefits and Requirements for Service Providers and Customers Authors Ralf Buchsein, Manager, KESS DV-Beratung GmbH Klaus Dettmer, Product Manager, iet Solutions GmbH
This Business Management System Manual is based on ISO 9001:2008 requirements
Page 1 of 19 (Formerly: Quality Management System Manual) When the ISO 9001:2008 standard is identifying the Quality Manual or Quality Management System, Turbonetics is representing this requirement with
ISO 9001 Quality Management Systems Professional
ISO 9001 Quality Management Systems Professional Professional Certifications Sample Questions Sample Questions 1. The non-fulfillment of a specified requirement is called a: A. Concession B. Nonconformity
Developing a Theory-Based Ontology for Best Practices Knowledge Bases
Developing a Theory-Based Ontology for Best Practices Knowledge Bases Daniel E. O Leary University of Southern California 3660 Trousdale Parkway Los Angeles, CA 90089-0441 [email protected] Abstract Knowledge
ISO/IEC 20000 Part 1 the next edition. Lynda Cooper project editor for ISO20000 part 1
ISO/IEC 20000 Part 1 the next edition Lynda Cooper project editor for ISO20000 part 1 Agenda The ISO20000 series Why has it changed Changes ITIL3 impact New requirements Changed requirements How to prepare
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION
TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION The Customer Account Data Engine 2 Systems Development Guidelines; However, Process Improvements Are Needed to Address Inconsistencies September 30, Year
Building Decision Support through Dynamic Workflow Systems for Health Care Ontology Focus. Tanay Sharma B00098872 [email protected]
Building Decision Support through Dynamic Workflow Systems for Health Care Ontology Focus By Tanay Sharma B00098872 [email protected] Performed at Atlantic Innovation Fund St. Francis Xavier University Antigonish,
EMS Example Example EMS Audit Procedure
EMS Example Example EMS Audit Procedure EMS Audit Procedures must be developed and documented with goals which: Ensure that the procedures incorporated into the EMS are being followed; Determine if the
NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0
NASCIO EA Development Tool-Kit Solution Architecture Version 3.0 October 2004 TABLE OF CONTENTS SOLUTION ARCHITECTURE...1 Introduction...1 Benefits...3 Link to Implementation Planning...4 Definitions...5
Questions and Answers
Autodesk Citrix Ready Products Questions and Answers Citrix Systems, Inc. and Autodesk have partnered to provide customers with greater efficiency and flexibility in their use of Autodesk s applications.
Type of Personal Data We Collect and How We Use It
Philips Lumify App Privacy Notice This Privacy Notice was last changed on September 1, 2015. Philips Electronics North America Corporation ("Philips") strongly believes in protecting the privacy of the
Your Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc.
INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. February 2013 1 Executive Summary Adnet is pleased to provide this white paper, describing our approach to performing
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES
REALIZATION OF A RESEARCH AND DEVELOPMENT PROJECT (PRE-COMMERCIAL PROCUREMENT) ON CLOUD FOR EUROPE TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES ANNEX IV (D) TO THE CONTRACT NOTICE TENDER
IIA Super Conference
www.pwc.com IIA Super Conference Software Asset Management (SAM) Internal Audits Agenda Introduction Software Asset Management (SAM) overview Potential Internal Audit Approach Example Risk Areas Summary
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
IEEE ComputerSociety 1 Software and Systems Engineering Vocabulary
IEEE ComputerSociety 1 Software and Systems software. (1) computer programs, procedures and possibly associated documentation and data pertaining to the operation of a computer system (IEEE 828-2012 IEEE
An Enterprise Framework for Evaluating and Improving Software Quality
An Enterprise Framework for Evaluating and Improving Software Quality Abstract Philip Lew [email protected] With the world s economy increasingly driven by software products, there has been a relentless
3.11 System Administration
3.11 The functional area is intended to contribute to the overall flexibility, efficiency, and security required for operating and maintaining the system. Depending on the architecture of the system, system
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) VERSION 2.1 SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS 1 TABLE OF CONTENTS INTRODUCTION... 3 About The Service-Oriented Modeling Framework
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
Technology Partners. Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in 2009.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in 2009. We create innovative software solutions for SharePoint, Office 365, MS Windows Remote Desktop Services, and
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
ISO 9001 : 2000 Quality Management Systems Requirements
A guide to the contents of ISO 9001 : 2000 Quality Management Systems Requirements BSIA Form No. 137 February 2001 This document is the copyright of the BSIA and is not to be reproduced without the written
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
REPORT 2015/112 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2015/112 Audit of information and communication technology hosting services provided by third parties to the Office of the United Nations High Commissioner for Refugees Overall
Certification criteria for. Internal QMS Auditor Training Course
Certification criteria for Internal QMS Auditor Training Course CONTENTS 1. INTRODUCTION 2. LEARNING OBJECTIVES 3. ENABLING OBJECTIVES KNOWLEDGE & SKILLS 4. TRAINING METHODS 5. COURSE CONTENT 6. COURSE
Department of Information Technology Remote Access Audit Final Report. January 2010. promoting efficient & effective local government
Department of Information Technology Remote Access Audit Final Report January 2010 promoting efficient & effective local government Background Remote access is a service provided by the county to the Fairfax
Business Process Modeling Information Systems in Industry (372-1-4207 )
Business Process Modeling Information Systems in Industry (372-1-4207 ) Arnon Sturm The material of this presentation is adopted from various people including:, Pnina Soffer, Iris Reinhartz-Berger 1 Outline
1.1 The Nature of Software... Object-Oriented Software Engineering Practical Software Development using UML and Java. The Nature of Software...
1.1 The Nature of Software... Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering Software is intangible Hard to understand
Gallagher Vapour Recovery Monitoring
Gallagher Vapour Recovery Monitoring VR Site Monitoring The status display enables site operators to comply with VR legislation. The laws and guidelines for the New South Wales Vapour Recovery regulations
ONTOLOGY FOR MOBILE PHONE OPERATING SYSTEMS
ONTOLOGY FOR MOBILE PHONE OPERATING SYSTEMS Hasni Neji and Ridha Bouallegue Innov COM Lab, Higher School of Communications of Tunis, Sup Com University of Carthage, Tunis, Tunisia. Email: [email protected];
CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems
Date(s) of Evaluation: CHECKLIST ISO/IEC 17021:2011 Conformity Assessment Requirements for Bodies Providing Audit and Certification of Management Systems Assessor(s) & Observer(s): Organization: Area/Field
Intunex Oy Skillhive Service Description 1 / 6
Intunex Oy Skillhive Service Description 1 / 6 About Skillhive Skillhive is a social business application designed for connecting and sharing expertise within organizations. Skillhive enables employees
EUROLAB Cook Book Doc No. 13 ELECTRONIC RECORDS
ELECTRONIC RECORDS Introduction The increased use of computers and computer systems in laboratories have lead to an increased number of electronic records. There are a lot of advantages with electronic
THE PROCESS APPROACH IN ISO 9001:2015
International Organization for Standardization BIBC II, Chemin de Blandonnet 8, CP 401, 1214 Vernier, Geneva, Switzerland Tel: +41 22 749 01 11, Web: www.iso.org THE PROCESS APPROACH IN ISO 9001:2015 Purpose
Chapter 2 ISO 9001:2008 QMS
Chapter 2 ISO 9001:2008 QMS For internal use of BSNL only Page 1 ISO 9001:2008 QMS Introduction Everyone wants to achieve profits. Profits can come by more sales with some profit margin and also by cutting
NEOXEN MODUS METHODOLOGY
NEOXEN MODUS METHODOLOGY RELEASE 5.0.0.1 INTRODUCTION TO PROJECT MANAGEMENT GUIDE D O C U M E N T A T I O N L I C E N S E This documentation, as well as the software described in it, is furnished under
CAREER TRACKS PHASE 1 UCSD Information Technology Family Function and Job Function Summary
UCSD Applications Programming Involved in the development of server / OS / desktop / mobile applications and services including researching, designing, developing specifications for designing, writing,
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Application of ontologies for the integration of network monitoring platforms
Application of ontologies for the integration of network monitoring platforms Jorge E. López de Vergara, Javier Aracil, Jesús Martínez, Alfredo Salvador, José Alberto Hernández Networking Research Group,
Industry Services Quality Management System
Industry Services Quality Management System Canadian Grain Commission Audit & Evaluation Services Final report March, 2012 Table of contents 1.0 Executive summary...2 Authority for audit... 2 Background...
IRCA Briefing note ISO/IEC 20000-1: 2011
IRCA Briefing note ISO/IEC 20000-1: 2011 How to apply for and maintain Training Organization Approval and Training Course Certification IRCA 3000 Contents Introduction 3 Summary of the changes within ISO/IEC
Automated Test Approach for Web Based Software
Automated Test Approach for Web Based Software Indrajit Pan 1, Subhamita Mukherjee 2 1 Dept. of Information Technology, RCCIIT, Kolkata 700 015, W.B., India 2 Dept. of Information Technology, Techno India,
Design and Development of Ontology for Risk Management in Software Project Management
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Design and Development of Ontology for Risk Management in Software
The Infrastructure Audit Trail and Part 11
The Infrastructure Audit Trail and Part 11 Pamela Campbell Senior Consultant, Validation DataCeutics, Inc. [email protected] February 28, 2003 DataCeutics, Inc. 2003 Why am I Qualified to Make this
GUIDE 62. General requirements for bodies operating assessment and certification/registration of quality systems
GUIDE 62 General requirements for bodies operating assessment and certification/registration of quality systems First edition 1996 ISO/IEC GUIDE 62:1996(E) Contents Pag e Section 1: General 1 1.1 Scope
Aadhaar. Security Policy & Framework for UIDAI Authentication. Version 1.0. Unique Identification Authority of India (UIDAI)
Aadhaar Security Policy & Framework for UIDAI Authentication Version 1.0 Unique Identification Authority of India (UIDAI) Table of Contents ACRONYMS AND TERMS... 3 1. INTRODUCTION... 4 2. SECURITY CONSIDERATION...
SOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014
IT Vendor Due Diligence Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014 Carolinas HealthCare System (CHS) Second largest not-for-profit healthcare system
AUDITOR GUIDELINES. Responsibilities Supporting Inputs. Receive AAA, Sign and return to IMS with audit report. Document Review required?
1 Overview of Audit Process The flow chart below shows the overall process for auditors carrying out audits for IMS International. Stages within this process are detailed further in this document. Scheme
Development of an Ontology for the Document Management Systems for Construction
Development of an Ontology for the Document Management Systems for Construction Alba Fuertes a,1, Núria Forcada a, Miquel Casals a, Marta Gangolells a and Xavier Roca a a Construction Engineering Department.
Configuration Management
Configuration Management ProPath Office of Information and Technology Table of Contents Configuration Management Process Map... 1 Process: Configuration Management... 2 Configuration Management Description
EXAM PREPARATION GUIDE
EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27001 Lead Auditor The objective of the Certified ISO/IEC 27001 Lead Auditor examination is to ensure that the candidate has the knowledge and the skills to
SPICE International Standard for Software Process Assessment
SPICE International Standard for Software Process Assessment Marko Pyhäjärvi Helsinki, 31 st November 2004 Seminar on Quality Models for Software Engineering Department of Computer Science UNIVESITY OF
Information Security Management Systems
Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector
Do you know? "7 Practices" for a Reliable Requirements Management. by Software Process Engineering Inc. translated by Sparx Systems Japan Co., Ltd.
Do you know? "7 Practices" for a Reliable Requirements Management by Software Process Engineering Inc. translated by Sparx Systems Japan Co., Ltd. In this white paper, we focus on the "Requirements Management,"
Compliance Response Edition 07/2009. SIMATIC WinCC V7.0 Compliance Response Electronic Records / Electronic Signatures. simatic wincc DOKUMENTATION
Compliance Response Edition 07/2009 SIMATIC WinCC V7.0 Compliance Response Electronic Records / Electronic Signatures simatic wincc DOKUMENTATION Compliance Response Electronic Records / Electronic Signatures
