Pertemuan 16 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.

Slides:



Advertisements
Similar presentations
COSO I COSO II. Meycor COSO, a Comprehensive Solution for Enterprise Risk Management (ERM)
Advertisements

1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Configuration Management
Software Quality Assurance Plan
Pertemuan 5-6 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Manajemen Basis Data Pertemuan 6 Matakuliah: M0264/Manajemen Basis Data Tahun: 2008.
Session - 15 RECOVERY CONTROL - 1 Matakuliah: M0184 / Pengolahan Data Distribusi Tahun: 2005 Versi:
Pertemuan 25 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Internal Control Pertemuan 05 s.d 06 Matakuliah: F0712 / Lab Sistem Informasi Akuntansi Tahun: 2007.
Pertemuan 7-8 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Pertemuan 9-10 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Pertemuan 15 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Testing - an Overview September 10, What is it, Why do it? Testing is a set of activities aimed at validating that an attribute or capability.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Purpose of the Standards
ITIL: Why Your IT Organization Should Care Service Support
Software Configuration Management
CSSE 375 Software Construction and Evolution: Configuration Management
Change Management Chris Colomb Trish Fullmer Jordan Bloodworth Veronica Beichner.
4. Quality Management System (QMS)
ITIL Process Management An Overview of Service Management Processes Presented by Jerree Catlin, Sue Silkey & Thelma Simons.
MSF Testing Introduction Functional Testing Performance Testing.
4. Quality Management System (QMS)
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Release & Deployment ITIL Version 3
Understanding (and Untangling) Verification and Validation Requirements ISO 9001 vs. CMMI-Dev 1.2.
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
The Key Process Areas for Level 2: Repeatable Ralph Covington David Wang.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Information Systems Security Computer System Life Cycle Security.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
Transaction Processing System
Service Management Processes
ITIL Process Management An Overview of Service Management Processes Thanks to Jerree Catlin, Sue Silkey & Thelma Simons University of Kansas.
End HomeWelcome! The Software Development Process.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Information Systems Security Operational Control for Information Security.
IT Requirements Management Balancing Needs and Expectations.
Georgia Institute of Technology CS 4320 Fall 2003.
Assessment Workshop Title of the Project (date). Project Title Assessment Workshop October 25, 2015© Company Name All rights reserved2 Agenda Purpose.
Pertemuan 3-4 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Test and Review chapter State the differences between archive and back-up data. Answer: Archive data is a copy of data which is no longer in regular.
Archival Workshop on Ingest, Identification, and Certification Standards Certification (Best Practices) Checklist Does the archive have a written plan.
DATABASE MANAGEMENT SYSTEM ARCHITECTURE
Software Configuration Management (SCM). Product Developer Disciplines One view of the world is that there are three types of activities are required.
Business Analysis. Business Analysis Concepts Enterprise Analysis ► Identify business opportunities ► Understand the business strategy ► Identify Business.
Copyright 2010, The World Bank Group. All Rights Reserved. Managing Data Processing Section B.
Project management Topic 3 Quality.
Purpose: The purpose of CMM Integration is to provide guidance for improving your organization’s processes and your ability to manage the development,
It was found in 1946 in Geneva, Switzerland. its main purpose is to promote the development of international standards to facilitate the exchange of goods.
Bina Nusantara 19 C H A P T E R SYSTEM CONSTRUCTION AND IMPLEMENTATION.
Pertemuan 15 Business and Information Process Rules, Risks, and Controls Matakuliah: M0034 /Informasi dan Proses Bisnis Tahun: 2005 Versi: 01/05.
State of Georgia Release Management Training
Pertemuan 14 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
ICS Area Managers Training 2010 ITIL V3 Overview April 1, 2010.
CMMI for Services, Version 1.3 Speaker: Business Excellence Date:
<<REQUIREMENTS FOR THE WHEELS CASE STUDY SYSTEM Pertemuan 5
Managing the IT Function
Description of Revision
ITIL: Why Your IT Organization Should Care Service Support
Engineering Processes
ITIL: Why Your IT Organization Should Care Service Support
ITIL: Why Your IT Organization Should Care Service Support
Engineering Processes
{Project Name} Organizational Chart, Roles and Responsibilities
What is a System? A system is a collection of interrelated components that work together to perform a specific task.
Presentation transcript:

Pertemuan 16 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007

Bina Nusantara SYSTEM IMPLEMENTATION

Bina Nusantara The System Implementation Process Implementation approach System testing User processes and procedures Management reports and controls Problem management/reporting User acceptance testing Help desk and production support training and readiness Data conversion and data correction processes Operational procedures and readiness Security

Bina Nusantara System Testing

Bina Nusantara User Processes and Procedures Should be reviewed an approved as part of acceptance testing. User reference materials should be designed for all levels of user expertise and should instruct them on the user of the application.

Bina Nusantara Management reports and controls The development of management reports and their associated controls needs to be included within the scope of the system implementation. The reports generated should be aligned with business requirements. The reports should be relevant to ensure effectiveness and efficiency of the report development effort.

Bina Nusantara Problem management/reporting A problem management system should consist of audit trails for problems and their solutions, timely resolution, prioritization escalation procedures, incident reports, accessibility to configuration, information coordination with change management, and a definition of any dependencies on outside services. The problem management process should ensure that all unexpected events (error, problems, etc.) are recorded, analyzed, and resolved in a timely manner.

Bina Nusantara User Acceptance Testing User acceptance testing is a key to application controls. It ensures that the application fulfills the agreed upon functional expectation of the users, meets established usability criteria, and satisfies performance guidelines prior to being implemented into production. Acceptance Team Agreed Upon Requirements Management Approval

Bina Nusantara Help desk and production support training and readiness Help desk an production support processes ensure that any problems experienced by the user are appropriately resolved in a timely manner It should provide the ability for customers to ask questions and receive effective answers. Help requests should be monitored to ensure that all problems are resolved in a timely manner. All problems should be recorded with the help desk to allow for their complete analysis and resolution.

Bina Nusantara Data conversion and data correction processes Conversion is the process whereby this information is either entered manually or transferred programmatically from the old system to the new system. A data conversion plan defines how the data is collected and verified for conversion. Test to be performed include comparing the original and converted files and checking the compatibility of the converted data with the new system, and ensuring transactions affecting both converted and not yet uncoverted data.

Bina Nusantara Data conversion and data correction processes The data conversion process often gets intermingled with data cleanup. Data cleanup is a process that companies embark upon to ensure that the most accurate and complete data gets transferred into the new system. Ideally, the data cleanup effort should happen prior to the planning for data conversion. This allows the conversion programmers to focus on converting the data as opposed to coding for data differences.

Bina Nusantara Operational procedures and readiness System documentation ensures maintainability of the system and its components and minimizes the likelihood of errors. – Source of the data- Program design – Data attributes- Interfaces to other application – Input screens- Control procedures – Data validations- Error handling – Data selection- Operating instructions – Security procedures- Archive, purge, & retrieval – Description of calculations- Backup, storage, & recovery

Bina Nusantara IT Disaster / Continuity Plan IT continuity plans should be reviewed to ensure that the company plans incorporate the resources necessary to recover the new application. Disaster recovery requirement area: – Processor requirements – Disk storage – Operating system versions Recovery procedures related to the new application should be tested as soon as possible after it is put into production.

Bina Nusantara Security When new systems are developed, appropriate security access controls need to be developed. The goal of application security is to safeguard information against unapproved disclosure or modification and damage or loss.