IT °Å¹ö³Í½º, ÅëÁ¦, º¸¾È ±×¸®°í º¸Áõ ¾÷°èÀÇ ±Û·Î¹ú ¸®´õ
 
 
HOME > Ä¿¹Â´ÏƼ > IT ÅëÁ¦/º¸Áõ Àü¹®¿ë¾î
  end user and user (ÃÖÁ¾»ç¿ëÀÚ¿Í »ç¿ëÀÚ)
  ±Û¾´ÀÌ : ½ÅÀÎö     ³¯Â¥ : 07-07-08 12:38     Á¶È¸ : 4533     Ãßõ : 11     Æ®·¢¹é ÁÖ¼Ò
ÃÖÁ¾»ç¿ëÀÚ(end user)´Â ºñÁî´Ï½º ÀÀ¿ë ¼­ºñ½º¿Í °ü·ÃÇÑ ¿î¿µ¿¡ Ã¥ÀÓÀÖ´Â »ç¶÷ÀÌ´Ù.±×¸®°í ÃÖÁ¾ »ç¿ëÀÚ´Â ÀÀ¿ë½Ã½ºÅÛÀ» ¼³°èÇÑ »ç¶÷°ú ÀÀ¿ë½Ã½ºÅÛÀ» ÇÁ·Î±×·¥ÇÏ°í, ¼­ºñ½ºÇÏ°í ȤÀº ¼³Ä¡ÇÏ´Â »ç¶÷°ú ±¸ºÐÇϱâ À§Çؼ­µµ ¾²ÀδÙ.
 
À§ÀÇ ¼³¸í´ë·Î, ÃÖÁ¾»ç¿ëÀÚ´Â »ç¿ëÀÚ(user) º¸´Ù ´õ ƯȭµÇ¾î ºñÁî´Ï½º ÀÀ¿ë½Ã½ºÅÛ¿¡ Á¢±ÙÇÒ »ç¶÷À» ÁöĪÇϸç, »ç¿ëÀÚ´Â º¸´Ù Æø³Ð°í, ±×¸®°í °ü¸®Àû ÀÌ¿ëÀÚ(accounts) ¹× Ç÷§Æû¿¡ Á¢±ÙÇϱâ À§ÇÑ ÀÌ¿ëÀÚ·Î ÂüÁ¶µÉ ¼ö ÀÖ´Ù.
 
CISA 2007 review manual Áß¿¡¼­ 

ÀÇ°ß¾²±â

¹øÈ£ Á¦¸ñ ±Û¾´ÀÌ ³¯Â¥ Á¶È¸ Ãßõ
Governance of IT Services (IT ¼­ºñ½º °Å¹ö³Í½º) (9) ½ÅÀÎö 09-05-12 26061 38
¹ø¿ª¾î ¼º¸³°úÁ¤ (8) ½ÅÀÎö 07-03-26 26459 24
90 risk model (À§Çè ¸ðµ¨) ½ÅÀÎö 07-09-13 3861 4
89 Discretionary access control (DAC : Àç·®Àû Á¢±Ù ÅëÁ¦) (1) ½ÅÀÎö 07-08-20 4974 6
88 data owner(µ¥ÀÌÅÍ ¼ÒÀ¯ÀÚ) ½ÅÀÎö 07-08-20 4085 10
87 reasonable assurance (ÇÕ¸®Àû º¸Áõ) ½ÅÀÎö 07-07-29 5546 13
86 stage-gates (½ºÅ×ÀÌÁö-°ÔÀÌÃ÷) ½ÅÀÎö 07-07-16 3934 5
85 Enterprise architecture for IT (IT¿ë ¿£ÅÍÇÁ¶óÀÌÁî ¾ÆÅ°ÅØó) ½ÅÀÎö 07-07-13 4288 2
84 enterprise architecture (¿£ÅÍÇÁ¸®ÀÌÁî ¾ÆÅ°ÅØó) ½ÅÀÎö 07-07-13 3974 9
83 guideline (Áöħ¼­ ȤÀº ¾È³»¼­) ½ÅÀÎö 07-07-13 3930 3
82 end user and user (ÃÖÁ¾»ç¿ëÀÚ¿Í »ç¿ëÀÚ) ½ÅÀÎö 07-07-08 4534 11
81 financial (statement) assertions or management assertions (À繫 ÁÖÀå ¶Ç´Â °æ¿µÀÚ ÁÖÀå) ½ÅÀÎö 07-07-07 7230 3
80 RACI chart (¾Ë¿¡À̾¾¾ÆÀÌ Â÷Æ® ¶Ç´Â µµÇ¥) ½ÅÀÎö 07-07-06 6805 7
79 a material weakness (Áß´ëÇÑ Ãë¾àÁ¡) (1) ½ÅÀÎö 07-07-01 4078 10
78 a significant deficiency (ÁÖ¿äÇÑ ¹ÌºñÁ¡) (1) ½ÅÀÎö 07-07-01 3988 5
77 program management office (PgMO : ÇÁ·Î±×·¥ °ü¸® ºÎ¼­ ȤÀº ±×·ì) (99) ½ÅÀÎö 07-07-01 24379 5
76 project management office (PMO : ÇÁ·ÎÁ§Æ® °ü¸® ºÎ¼­ ȤÀº ±×·ì) ½ÅÀÎö 07-06-26 4640 9
 1  2  3  4  5  6  7  8  9  10