SlideShare a Scribd company logo
1 of 14
The Importance of Security within 
the Computer Environment
Objectives 
• Identify and explain standard operating 
procedures of a computer centre. 
• Explain the need for computer room security. 
• Identify and describe computer systems auditing. 
• Explain prevailing safety regulations in computer 
centre. 
• Describe methods of preventing hazards (fire, 
flooding, sabotage, etc) .
What is Standard Operation Procedure 
An SOP is a procedure specific to your operation 
that describes the activities necessary to complete 
tasks in accordance with industry regulations, 
provincial laws or even just your own standards for 
running your business. Any document that is a 
“how to” falls into the category of procedures. In a 
manufacturing environment, the most obvious 
example of an SOP is the step by step production 
line procedures used to make products as well 
train staff.
Standard Operating Procedures of a 
Computer Centre 
The following are the standards procedure in operating a 
computer centre: 
Change Control: in addition to defining the formal 
change control process include a roster of change control 
and forms for change requests, plans and logs. 
Facilities: Injury prevention program information, 
documentation regarding power and cooling emergency 
shut off processes; fire suppression system information; 
unsafe condition reporting forms; new employee safety 
training information, logs and attendance records; illness 
or injury reporting forms; and visitor policies
SOPs of a Computer Centre 
• Human Resources: Include policies regarding 
technology training, as well as acceptable use policies, 
working hours and shift schedules, workplace violence 
policies, employee emergency contact update forms, 
vacation schedules and anti-harassment and 
discrimination policies. 
• Security: This a critical area. An IT organization should 
implement policies regarding third-party or customer 
system access, security violations, auditing, 
classification of sensitive resources, confidentiality, 
physical security, passwords, information control, 
encryption and system access controls
SOPs of Computer Centre 
• Templates: Providing templates for regularly used 
documentation types makes it easier to accurately 
capture the data you need in a format familiar to your 
staff. Templates to consider include policies, 
processes, logs, user guides and test/report forms. 
• Crisis Management: Having a crisis response scripted 
out in a advance goes a long way toward reducing the 
stress of a bad situation. Consider including crisis 
management documentation around definitions; a 
roster of crisis response team members; crisis 
planning; an escalation and notification matrix; a crisis 
checklist; guidelines for communications; situation 
update forms, policies and processes; and post-mortem 
processes and policies.
SOPs of Computer Centre 
• Deployment: Repeatable processes are the key to 
speedy and successful workload deployments. Staff 
should be provided with activation checklists, 
installation procedures, deployment plans, location of 
server baseline loads or images, revision history of past 
loads or images and activation testing processes. 
• Materials Management: Controlling your inventory of 
IT equipment pays off. Consider including these items 
in your organization's document library: policies 
governing requesting, ordering, receiving and use of 
equipment testing; procedures for handling storing, 
inventorying, and security hardware and software; and 
forms for requesting and borrowing hardware for 
testing.
SOPs of Computer Centre 
• Internal Communications: Interactions with other 
divisions and departments within your organization 
may be straightforward, but it is almost always helpful 
to provide a contact list of all employees in each 
department with their work phone numbers and email 
addresses. 
• Engineering Standards: Testing, reviewing and 
implementing new technology in the computer center 
is important for every organization. The following 
should be added to organization's SOP manuals: new 
technology request forms, technology evaluation 
forms and reports, descriptions of standards, testing 
processes, standards review and change processes and 
test equipment policies.
Need for Computer Room Security 
The vulnerability of business critical information systems and the data they 
contain within the Computer Room make the site a high value asset which 
requires a high degree of protection. A range of security measures are 
therefore in place to protect employees, information and physical assets, 
along with the reputation of the organization and interested third parties 
with equipment in the Computer Room. 
There usually policies for the computer room use such as the once stated 
below: 
• Hours of Operation 
• Available Facilities 
• Equipment Delivery 
• Environmental Restrictions and Considerations 
• Control of Equipment and Spares 
• Console equipment (monitor, keyboard and mouse) 
• Prohibited Items
Computer Systems Auditing. 
• Computer Systems Auditing also known as IT Audit or 
EDP Audit is an examination of the management 
controls within Information technology (IT) 
infrastructure. 
• The evaluation of obtained evidence determines if the 
information systems are safeguarding assets, 
maintaining data integrity, and operating effectively to 
achieve the organization's goals or objectives 
• CSA include but not limited to efficiency and security 
protocols, development processes, and IT governance 
or oversight.
Types of Computer Systems Auditing 
Various authorities have created differing taxonomies to distinguish the 
various types of IT audits. Goodman & Lawless state that there are three 
specific systematic approaches to carry out an IT audit: 
•Technological innovation process audit. This audit constructs a risk profile 
for existing and new projects. The audit will assess the length and depth of 
the company's experience in its chosen technologies, as well as its presence 
in relevant markets, the organization of each project, and the structure of the 
portion of the industry that deals with this project or product, organization 
and industry structure. 
•Innovative comparison audit. This audit is an analysis of the innovative 
abilities of the company being audited, in comparison to its competitors. This 
requires examination of company's research and development facilities, as 
well as its track record in actually producing new products. 
•Technological position audit: This audit reviews the technologies that the 
business currently has and that it needs to add. Technologies are 
characterized as being either "base", "key", "pacing" or "emerging".
Steps for Computer Auditing 
The following are basic steps in performing the 
Computer Audit Process: 
•Planning 
•Studying and Evaluating Controls 
•Testing and Evaluating Controls 
•Reporting 
•Follow-up
Prevailing Safety Regulations in 
Computer Centre. 
• Use only computer resources that are authorized. 
• Sharing of computer accounts is not allowed. 
• Users must not attempt making unauthorized 
connections to, breaking into, or adversely affecting 
the performance of other systems on the network, 
irrespective of whether these systems are owned by 
the Institute or not 
Abide by all applicable copyright laws and licenses. 
• Users must not intrude on the legitimate or convenient 
use of computer resources by others. 
• When sending personal messages to other users, 
always identify yourself as the sender. 
• Unauthorized commercial use is prohibited.
Methods of Preventing Hazards 
For the most part, these methods consist of the following 
elements, performed, more or less, in the following 
order. 
•Identify, characterize threats 
•Assess the vulnerability of critical assets to specific 
threats 
•Determine the risk (i.e. the expected likelihood and 
consequences of specific types of attacks on specific 
assets) 
•Identify ways to reduce those risks 
•Prioritize risk reduction measures based on a strategy

More Related Content

What's hot

Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
charlesgarrett
 
Managing your access control systems
Managing your access control systemsManaging your access control systems
Managing your access control systems
Walter Sinchak,
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slides
rahul kundu
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
Akhil Kumar
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
Wajahat Rajab
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
newbie2019
 

What's hot (18)

501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
Data backup and disaster recovery
Data backup and disaster recoveryData backup and disaster recovery
Data backup and disaster recovery
 
Software Licensing Simplified
Software Licensing SimplifiedSoftware Licensing Simplified
Software Licensing Simplified
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Access Controls
Access ControlsAccess Controls
Access Controls
 
Managing your access control systems
Managing your access control systemsManaging your access control systems
Managing your access control systems
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slides
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Network Security
Network Security Network Security
Network Security
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 
types of computers
 types of computers types of computers
types of computers
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 

Viewers also liked

Week1 safety,rules and regulations in the computer lab
Week1 safety,rules and regulations in the computer labWeek1 safety,rules and regulations in the computer lab
Week1 safety,rules and regulations in the computer lab
Zuheda
 
Operating system security
Operating system securityOperating system security
Operating system security
Sarmad Makhdoom
 
Citizen Service Center Standards
Citizen Service Center StandardsCitizen Service Center Standards
Citizen Service Center Standards
Malek Al Haddad
 
Week3 types of cp
Week3 types of cpWeek3 types of cp
Week3 types of cp
Liza Kamis
 
Hk training-11- key control
Hk  training-11- key controlHk  training-11- key control
Hk training-11- key control
Hari Nair
 
Operating system security
Operating system securityOperating system security
Operating system security
Rachel Jeewa
 

Viewers also liked (20)

Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
Week1 safety,rules and regulations in the computer lab
Week1 safety,rules and regulations in the computer labWeek1 safety,rules and regulations in the computer lab
Week1 safety,rules and regulations in the computer lab
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Operating system security
Operating system securityOperating system security
Operating system security
 
File security system
File security systemFile security system
File security system
 
Citizen Service Center Standards
Citizen Service Center StandardsCitizen Service Center Standards
Citizen Service Center Standards
 
File Security System_2
File Security System_2File Security System_2
File Security System_2
 
Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on Android
 
Disk Management
Disk ManagementDisk Management
Disk Management
 
Disk formatting
Disk formattingDisk formatting
Disk formatting
 
Control techniques chpt 19
Control techniques chpt 19Control techniques chpt 19
Control techniques chpt 19
 
Week3 types of cp
Week3 types of cpWeek3 types of cp
Week3 types of cp
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
 
Techniques of controlling
Techniques of controllingTechniques of controlling
Techniques of controlling
 
Hk training-11- key control
Hk  training-11- key controlHk  training-11- key control
Hk training-11- key control
 
Disk management / hard drive partition management / create drive or partition...
Disk management / hard drive partition management / create drive or partition...Disk management / hard drive partition management / create drive or partition...
Disk management / hard drive partition management / create drive or partition...
 
Importance of computers in Military
Importance of computers in MilitaryImportance of computers in Military
Importance of computers in Military
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Key and key control
Key and key controlKey and key control
Key and key control
 
control techniques
control techniquescontrol techniques
control techniques
 

Similar to The Importance of Security within the Computer Environment

Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk Assessments
Priyank Hada
 
what is system audit and objectives of system audit.pptx
what is system audit and objectives of system audit.pptxwhat is system audit and objectives of system audit.pptx
what is system audit and objectives of system audit.pptx
simratkaur290104
 
L9 quality assurance and documentation
L9 quality assurance and documentationL9 quality assurance and documentation
L9 quality assurance and documentation
OMWOMA JACKSON
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
Brenda Majewski
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
Priyank Hada
 

Similar to The Importance of Security within the Computer Environment (20)

CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk Assessments
 
CISM_WK_2.pptx
CISM_WK_2.pptxCISM_WK_2.pptx
CISM_WK_2.pptx
 
Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering Introduction
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
 
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
 
ISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An IntorductionISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An Intorduction
 
Computer_Maintenance_and_Trouble_Shootin.ppt
Computer_Maintenance_and_Trouble_Shootin.pptComputer_Maintenance_and_Trouble_Shootin.ppt
Computer_Maintenance_and_Trouble_Shootin.ppt
 
what is system audit and objectives of system audit.pptx
what is system audit and objectives of system audit.pptxwhat is system audit and objectives of system audit.pptx
what is system audit and objectives of system audit.pptx
 
L9 quality assurance and documentation
L9 quality assurance and documentationL9 quality assurance and documentation
L9 quality assurance and documentation
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
 
Incident response
Incident responseIncident response
Incident response
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
Compliance
ComplianceCompliance
Compliance
 
Auditing in Computerized Environment
Auditing in Computerized EnvironmentAuditing in Computerized Environment
Auditing in Computerized Environment
 
3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 

Recently uploaded (20)

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

The Importance of Security within the Computer Environment

  • 1. The Importance of Security within the Computer Environment
  • 2. Objectives • Identify and explain standard operating procedures of a computer centre. • Explain the need for computer room security. • Identify and describe computer systems auditing. • Explain prevailing safety regulations in computer centre. • Describe methods of preventing hazards (fire, flooding, sabotage, etc) .
  • 3. What is Standard Operation Procedure An SOP is a procedure specific to your operation that describes the activities necessary to complete tasks in accordance with industry regulations, provincial laws or even just your own standards for running your business. Any document that is a “how to” falls into the category of procedures. In a manufacturing environment, the most obvious example of an SOP is the step by step production line procedures used to make products as well train staff.
  • 4. Standard Operating Procedures of a Computer Centre The following are the standards procedure in operating a computer centre: Change Control: in addition to defining the formal change control process include a roster of change control and forms for change requests, plans and logs. Facilities: Injury prevention program information, documentation regarding power and cooling emergency shut off processes; fire suppression system information; unsafe condition reporting forms; new employee safety training information, logs and attendance records; illness or injury reporting forms; and visitor policies
  • 5. SOPs of a Computer Centre • Human Resources: Include policies regarding technology training, as well as acceptable use policies, working hours and shift schedules, workplace violence policies, employee emergency contact update forms, vacation schedules and anti-harassment and discrimination policies. • Security: This a critical area. An IT organization should implement policies regarding third-party or customer system access, security violations, auditing, classification of sensitive resources, confidentiality, physical security, passwords, information control, encryption and system access controls
  • 6. SOPs of Computer Centre • Templates: Providing templates for regularly used documentation types makes it easier to accurately capture the data you need in a format familiar to your staff. Templates to consider include policies, processes, logs, user guides and test/report forms. • Crisis Management: Having a crisis response scripted out in a advance goes a long way toward reducing the stress of a bad situation. Consider including crisis management documentation around definitions; a roster of crisis response team members; crisis planning; an escalation and notification matrix; a crisis checklist; guidelines for communications; situation update forms, policies and processes; and post-mortem processes and policies.
  • 7. SOPs of Computer Centre • Deployment: Repeatable processes are the key to speedy and successful workload deployments. Staff should be provided with activation checklists, installation procedures, deployment plans, location of server baseline loads or images, revision history of past loads or images and activation testing processes. • Materials Management: Controlling your inventory of IT equipment pays off. Consider including these items in your organization's document library: policies governing requesting, ordering, receiving and use of equipment testing; procedures for handling storing, inventorying, and security hardware and software; and forms for requesting and borrowing hardware for testing.
  • 8. SOPs of Computer Centre • Internal Communications: Interactions with other divisions and departments within your organization may be straightforward, but it is almost always helpful to provide a contact list of all employees in each department with their work phone numbers and email addresses. • Engineering Standards: Testing, reviewing and implementing new technology in the computer center is important for every organization. The following should be added to organization's SOP manuals: new technology request forms, technology evaluation forms and reports, descriptions of standards, testing processes, standards review and change processes and test equipment policies.
  • 9. Need for Computer Room Security The vulnerability of business critical information systems and the data they contain within the Computer Room make the site a high value asset which requires a high degree of protection. A range of security measures are therefore in place to protect employees, information and physical assets, along with the reputation of the organization and interested third parties with equipment in the Computer Room. There usually policies for the computer room use such as the once stated below: • Hours of Operation • Available Facilities • Equipment Delivery • Environmental Restrictions and Considerations • Control of Equipment and Spares • Console equipment (monitor, keyboard and mouse) • Prohibited Items
  • 10. Computer Systems Auditing. • Computer Systems Auditing also known as IT Audit or EDP Audit is an examination of the management controls within Information technology (IT) infrastructure. • The evaluation of obtained evidence determines if the information systems are safeguarding assets, maintaining data integrity, and operating effectively to achieve the organization's goals or objectives • CSA include but not limited to efficiency and security protocols, development processes, and IT governance or oversight.
  • 11. Types of Computer Systems Auditing Various authorities have created differing taxonomies to distinguish the various types of IT audits. Goodman & Lawless state that there are three specific systematic approaches to carry out an IT audit: •Technological innovation process audit. This audit constructs a risk profile for existing and new projects. The audit will assess the length and depth of the company's experience in its chosen technologies, as well as its presence in relevant markets, the organization of each project, and the structure of the portion of the industry that deals with this project or product, organization and industry structure. •Innovative comparison audit. This audit is an analysis of the innovative abilities of the company being audited, in comparison to its competitors. This requires examination of company's research and development facilities, as well as its track record in actually producing new products. •Technological position audit: This audit reviews the technologies that the business currently has and that it needs to add. Technologies are characterized as being either "base", "key", "pacing" or "emerging".
  • 12. Steps for Computer Auditing The following are basic steps in performing the Computer Audit Process: •Planning •Studying and Evaluating Controls •Testing and Evaluating Controls •Reporting •Follow-up
  • 13. Prevailing Safety Regulations in Computer Centre. • Use only computer resources that are authorized. • Sharing of computer accounts is not allowed. • Users must not attempt making unauthorized connections to, breaking into, or adversely affecting the performance of other systems on the network, irrespective of whether these systems are owned by the Institute or not Abide by all applicable copyright laws and licenses. • Users must not intrude on the legitimate or convenient use of computer resources by others. • When sending personal messages to other users, always identify yourself as the sender. • Unauthorized commercial use is prohibited.
  • 14. Methods of Preventing Hazards For the most part, these methods consist of the following elements, performed, more or less, in the following order. •Identify, characterize threats •Assess the vulnerability of critical assets to specific threats •Determine the risk (i.e. the expected likelihood and consequences of specific types of attacks on specific assets) •Identify ways to reduce those risks •Prioritize risk reduction measures based on a strategy