IT °Å¹ö³Í½º, ÅëÁ¦, º¸¾È ±×¸®°í º¸Áõ ¾÷°èÀÇ ±Û·Î¹ú ¸®´õ
 
 
HOME > Ä¿¹Â´ÏƼ > IT ÅëÁ¦/º¸Áõ Àü¹®¿ë¾î
  application control (ÀÀ¿ë ÅëÁ¦, ¾ÖÇø®ÄÉÀÌ¼Ç ÅëÁ¦)
  ±Û¾´ÀÌ : ½ÅÀÎö     ³¯Â¥ : 07-06-20 19:32     Á¶È¸ : 5180     Ãßõ : 1     Æ®·¢¹é ÁÖ¼Ò
ÀÀ¿ë ÅëÁ¦´Â Á÷Á¢ À繫ÀûÀÎ ÅëÁ¦ ¸ñÀû (¿¹¸¦ µé¸é, Æ®·£Á§¼ÇÀÇ ¹«°á¼º(¿ÏÀü¼º, Á¤È®¼º ±×¸®°í À¯È¿¼º)°ú ºñ½ÂÀÎ Æ®·£Á§¼ÇÀÇ ¿¹¹æ ¹× Àû¹ß) À» Áö¿øÇϱâ À§Çؼ­ ºñÁî´Ï½º ÇÁ·Î¼¼½º ¾ÖÇø®ÄÉÀÌ¼Ç (½Ã½ºÅÛ) ³»¿¡ ³»ÀåµÈ ÅëÁ¦¸¦ ¸»ÇÑ´Ù.
 
ÀÀ¿ë ÅëÁ¦ ¸ÞÄ¿´ÏÁòµéÀº ÀϹÝÀûÀ¸·Î »ý¼º(origination)/ÀÔ·Â ÅëÁ¦, Ãâ·Â ÅëÁ¦ ±×¸®°í ÇÁ·Î¼¼½Ì ÅëÁ¦ µîÀ¸·Î ±¸ºÐµÉ ¼ö ÀÖ´Ù.
 
ÁÖ1) ºñÁî´Ï½º ÇÁ·Î¼¼½º °üÁ¡¿¡¼­´Â ÀÀ¿ë ÅëÁ¦ À¯ÇüÀ» ¾ÖÇø®ÄÉÀ̼ǿ¡ ³»ÀåµÈ ÀÀ¿ë ÅëÁ¦¸¦ ÀÚµ¿ ÅëÁ¦·Î ÇÏ°í, ±×¸®°í ¼öµ¿ ÅëÁ¦¿Í IT-ÀÇÁ¸Àû ¼öµ¿ ÅëÁ¦(È¥ÇÕÇü) µîÀ¸·Î ºÐ·ùÇÑ´Ù.
 
ÁÖ2) À§ÀÇ À繫ÀûÀÎ ÅëÁ¦ ¸ñÀûÀ» ó¸®ÇÏ°íÀÚ ÇÏ´Â Æ®·£Á§¼ÇÀÇ ¿ÏÀü¼º, Á¤È®¼º, ½ÂÀÎ ±×¸®°í Á¸À缺À¸·Îµµ Ç¥½ÃÇÒ ¼ö ÀÖ´Ù.

ÀÇ°ß¾²±â

¹øÈ£ Á¦¸ñ ±Û¾´ÀÌ ³¯Â¥ Á¶È¸ Ãßõ
Governance of IT Services (IT ¼­ºñ½º °Å¹ö³Í½º) (14) ½ÅÀÎö 09-05-12 27592 39
¹ø¿ª¾î ¼º¸³°úÁ¤ (13) ½ÅÀÎö 07-03-26 27376 24
75 IT-enabled business investment (IT-enabled ºñÁî´Ï½º ÅõÀÚ) ½ÅÀÎö 07-06-24 4575 2
74 a control deficiency (´ÜÀÏ ÅëÁ¦ ¹ÌºñÁ¡) ½ÅÀÎö 07-06-20 3898 2
73 IT general control (IT ÀÏ¹Ý ÅëÁ¦) ½ÅÀÎö 07-06-20 5122 4
72 application control (ÀÀ¿ë ÅëÁ¦, ¾ÖÇø®ÄÉÀÌ¼Ç ÅëÁ¦) ½ÅÀÎö 07-06-20 5181 1
71 COBIT¡¯s Information Criteria (COBIT¡¯s Á¤º¸ ±âÁØ) (1) ½ÅÀÎö 07-06-16 3910 1
70 issue (Çö¾È, À̽´) ½ÅÀÎö 07-06-09 3871 0
69 problem (¹®Á¦, ¹®Á¦Á¡) ½ÅÀÎö 07-06-09 3900 10
68 procedure (ÀýÂ÷) ½ÅÀÎö 07-06-09 4157 1
67 operational risk (¿î¿µ À§Çè) ½ÅÀÎö 07-05-29 4370 4
66 Inherent Limitations (Å»ýÀû ÇÑ°è) (1) ½ÅÀÎö 07-05-25 13267 3
65 Accreditation (Àΰ¡) ½ÅÀÎö 07-05-25 4610 10
64 certification (ÀÎÁõ) ½ÅÀÎö 07-05-25 3853 15
63 Deterrent control (¾ïÁ¦ ÅëÁ¦) ½ÅÀÎö 07-05-23 3939 9
62 directive control (ÁöÇâ ÅëÁ¦) ½ÅÀÎö 07-05-23 4163 10
61 vulnerability (Ãë¾à¼º) ½ÅÀÎö 07-05-21 3826 11
 1  2  3  4  5  6  7  8  9  10