IT °Å¹ö³Í½º, ÅëÁ¦, º¸¾È ±×¸®°í º¸Áõ ¾÷°èÀÇ ±Û·Î¹ú ¸®´õ
 
 
HOME > Ä¿¹Â´ÏƼ > IT ÅëÁ¦/º¸Áõ Àü¹®¿ë¾î
  a control deficiency (´ÜÀÏ ÅëÁ¦ ¹ÌºñÁ¡)
  ±Û¾´ÀÌ : ½ÅÀÎö     ³¯Â¥ : 07-06-20 20:22     Á¶È¸ : 3897     Ãßõ : 2     Æ®·¢¹é ÁÖ¼Ò
´ÜÀÏ ÅëÁ¦ ¹ÌºñÁ¡Àº ´ÜÀÏ ÅëÁ¦ÀÇ ¼³°è ȤÀº ¿î¿µÀÌ °æ¿µÁø ȤÀº Á÷¿øÀÌ Àڽŵ鿡°Ô ºÎ°úµÈ ¾÷¹«¸¦ ¼öÇàÇÏ´Â Á¤»óÀûÀÎ °úÁ¤¿¡¼­ ÀåºÎ ¿À±â¸¦ ½Å¼ÓÇÏ°Ô ¿¹¹æÇϰųª Àû¹ßÇÏÁö ¸øÇϵµ·Ï ÇÒ ¶§ Á¸ÀçÇÑ´Ù.
 
¼³°è»óÀÇ ´ÜÀÏ ¹ÌºñÁ¡Àº 1) ÇØ´ç ÅëÁ¦ ¸ñÀûÀ» ÃæÁ·½ÃÅ°±â À§ÇØ ÇÊ¿äÇÑ ´ÜÀÏ ÅëÁ¦°¡ ´©¶ôµÇ¾ú°Å³ª, 2) ÇöÁ¸ÇÏ´Â ´ÜÀÏ ÅëÁ¦°¡ ¼³°è´ë·Î ¿î¿µµÇ´õ¶óµµ, ÅëÁ¦ ¸ñÀûÀ» Ç×»ó ÃæÁ·½ÃÅ°Áö ¸øÇϵµ·Ï ºÎÀûÀýÇÏ°Ô ¼³°èµÇ¾úÀ» ¶§ Á¸ÀçÇÑ´Ù.
 
¿î¿µ»óÀÇ ´ÜÀÏ ¹ÌºñÁ¡Àº ÀûÀýÈ÷ ¼³°èµÈ ´ÜÀÏ ÅëÁ¦°¡ ¼³°è´ë·Î ¿î¿µÇÏÁö ¾Ê°Å³ª, ¶Ç´Â ÅëÁ¦¸¦ ¼öÇàÇÏ´Â »ç¶÷ÀÌ ÇÊ¿äÇÑ ±ÇÀ§ ȤÀº ÀÚÁúÀ» º¸À¯ÇÏÁö ¾Ê¾ÒÀ» ¶§ Á¸ÀçÇÑ´Ù.
 
PCAOBÀÇ ³»ºÎ ÅëÁ¦ °¨»ç Ç¥ÁØ Áß¿¡¼­

ÀÇ°ß¾²±â

¹øÈ£ Á¦¸ñ ±Û¾´ÀÌ ³¯Â¥ Á¶È¸ Ãßõ
Governance of IT Services (IT ¼­ºñ½º °Å¹ö³Í½º) (14) ½ÅÀÎö 09-05-12 27589 39
¹ø¿ª¾î ¼º¸³°úÁ¤ (13) ½ÅÀÎö 07-03-26 27373 24
75 IT-enabled business investment (IT-enabled ºñÁî´Ï½º ÅõÀÚ) ½ÅÀÎö 07-06-24 4574 2
74 a control deficiency (´ÜÀÏ ÅëÁ¦ ¹ÌºñÁ¡) ½ÅÀÎö 07-06-20 3898 2
73 IT general control (IT ÀÏ¹Ý ÅëÁ¦) ½ÅÀÎö 07-06-20 5122 4
72 application control (ÀÀ¿ë ÅëÁ¦, ¾ÖÇø®ÄÉÀÌ¼Ç ÅëÁ¦) ½ÅÀÎö 07-06-20 5180 1
71 COBIT¡¯s Information Criteria (COBIT¡¯s Á¤º¸ ±âÁØ) (1) ½ÅÀÎö 07-06-16 3910 1
70 issue (Çö¾È, À̽´) ½ÅÀÎö 07-06-09 3871 0
69 problem (¹®Á¦, ¹®Á¦Á¡) ½ÅÀÎö 07-06-09 3899 10
68 procedure (ÀýÂ÷) ½ÅÀÎö 07-06-09 4157 1
67 operational risk (¿î¿µ À§Çè) ½ÅÀÎö 07-05-29 4369 4
66 Inherent Limitations (Å»ýÀû ÇÑ°è) (1) ½ÅÀÎö 07-05-25 13267 3
65 Accreditation (Àΰ¡) ½ÅÀÎö 07-05-25 4610 10
64 certification (ÀÎÁõ) ½ÅÀÎö 07-05-25 3853 15
63 Deterrent control (¾ïÁ¦ ÅëÁ¦) ½ÅÀÎö 07-05-23 3939 9
62 directive control (ÁöÇâ ÅëÁ¦) ½ÅÀÎö 07-05-23 4163 10
61 vulnerability (Ãë¾à¼º) ½ÅÀÎö 07-05-21 3825 11
 1  2  3  4  5  6  7  8  9  10