IT °Å¹ö³Í½º, ÅëÁ¦, º¸¾È ±×¸®°í º¸Áõ ¾÷°èÀÇ ±Û·Î¹ú ¸®´õ
 
 
HOME > Ä¿¹Â´ÏƼ > IT ÅëÁ¦/º¸Áõ Àü¹®¿ë¾î
  application control (ÀÀ¿ë ÅëÁ¦, ¾ÖÇø®ÄÉÀÌ¼Ç ÅëÁ¦)
  ±Û¾´ÀÌ : ½ÅÀÎö     ³¯Â¥ : 07-06-20 19:32     Á¶È¸ : 5356     Ãßõ : 1     Æ®·¢¹é ÁÖ¼Ò
ÀÀ¿ë ÅëÁ¦´Â Á÷Á¢ À繫ÀûÀÎ ÅëÁ¦ ¸ñÀû (¿¹¸¦ µé¸é, Æ®·£Á§¼ÇÀÇ ¹«°á¼º(¿ÏÀü¼º, Á¤È®¼º ±×¸®°í À¯È¿¼º)°ú ºñ½ÂÀÎ Æ®·£Á§¼ÇÀÇ ¿¹¹æ ¹× Àû¹ß) À» Áö¿øÇϱâ À§Çؼ­ ºñÁî´Ï½º ÇÁ·Î¼¼½º ¾ÖÇø®ÄÉÀÌ¼Ç (½Ã½ºÅÛ) ³»¿¡ ³»ÀåµÈ ÅëÁ¦¸¦ ¸»ÇÑ´Ù.
 
ÀÀ¿ë ÅëÁ¦ ¸ÞÄ¿´ÏÁòµéÀº ÀϹÝÀûÀ¸·Î »ý¼º(origination)/ÀÔ·Â ÅëÁ¦, Ãâ·Â ÅëÁ¦ ±×¸®°í ÇÁ·Î¼¼½Ì ÅëÁ¦ µîÀ¸·Î ±¸ºÐµÉ ¼ö ÀÖ´Ù.
 
ÁÖ1) ºñÁî´Ï½º ÇÁ·Î¼¼½º °üÁ¡¿¡¼­´Â ÀÀ¿ë ÅëÁ¦ À¯ÇüÀ» ¾ÖÇø®ÄÉÀ̼ǿ¡ ³»ÀåµÈ ÀÀ¿ë ÅëÁ¦¸¦ ÀÚµ¿ ÅëÁ¦·Î Çϰí, ±×¸®°í ¼öµ¿ ÅëÁ¦¿Í IT-ÀÇÁ¸Àû ¼öµ¿ ÅëÁ¦(È¥ÇÕÇü) µîÀ¸·Î ºÐ·ùÇÑ´Ù.
 
ÁÖ2) À§ÀÇ À繫ÀûÀÎ ÅëÁ¦ ¸ñÀûÀ» ó¸®ÇϰíÀÚ ÇÏ´Â Æ®·£Á§¼ÇÀÇ ¿ÏÀü¼º, Á¤È®¼º, ½ÂÀÎ ±×¸®°í Á¸À缺À¸·Îµµ Ç¥½ÃÇÒ ¼ö ÀÖ´Ù.

Àǰ߾²±â

¹øÈ£ Á¦¸ñ ±Û¾´ÀÌ ³¯Â¥ Á¶È¸ Ãßõ
Governance of IT Services (IT ¼­ºñ½º °Å¹ö³Í½º) (25) ½ÅÀÎö 09-05-12 32193 39
¹ø¿ª¾î ¼º¸³°úÁ¤ (16) ½ÅÀÎö 07-03-26 30285 24
75 IT-enabled business investment (IT-enabled ºñÁî´Ï½º ÅõÀÚ) ½ÅÀÎö 07-06-24 5162 2
74 a control deficiency (´ÜÀÏ ÅëÁ¦ ¹ÌºñÁ¡) ½ÅÀÎö 07-06-20 4124 2
73 IT general control (IT ÀÏ¹Ý ÅëÁ¦) ½ÅÀÎö 07-06-20 5411 4
72 application control (ÀÀ¿ë ÅëÁ¦, ¾ÖÇø®ÄÉÀÌ¼Ç ÅëÁ¦) ½ÅÀÎö 07-06-20 5357 1
71 COBIT¡¯s Information Criteria (COBIT¡¯s Á¤º¸ ±âÁØ) (1) ½ÅÀÎö 07-06-16 4101 1
70 issue (Çö¾È, À̽´) ½ÅÀÎö 07-06-09 4099 0
69 problem (¹®Á¦, ¹®Á¦Á¡) ½ÅÀÎö 07-06-09 4129 10
68 procedure (ÀýÂ÷) ½ÅÀÎö 07-06-09 4382 1
67 operational risk (¿î¿µ À§Çè) ½ÅÀÎö 07-05-29 4651 4
66 Inherent Limitations (Å»ýÀû ÇѰè) (1) ½ÅÀÎö 07-05-25 13590 3
65 Accreditation (Àΰ¡) ½ÅÀÎö 07-05-25 4776 10
64 certification (ÀÎÁõ) ½ÅÀÎö 07-05-25 4078 15
63 Deterrent control (¾ïÁ¦ ÅëÁ¦) ½ÅÀÎö 07-05-23 4114 9
62 directive control (ÁöÇâ ÅëÁ¦) ½ÅÀÎö 07-05-23 4367 10
61 vulnerability (Ãë¾à¼º) ½ÅÀÎö 07-05-21 4119 11
 1  2  3  4  5  6  7  8  9  10