Syracuse University

|

AMAS

Skip to Content
People Search

Show All Results

    • About AMAS
    • Audit & Internal Control Resources
      • Types of Audits
      • Preparing for an Audit
      • Guidelines to General Internal Controls
        • Internal Control Types and Activities
        • Internal Controls for Cash Receipts and Revenue
        • Internal Controls for Procurements and Expenditures
        • Internal Controls For Payroll
        • Internal Controls For Fixed Assets and Inventory
      • Internal IT Controls
      • Ethical Conduct of Employees in Financial or Business Positions
      • Internal Controls, Risk Management and COSO
      • Audit, Security, Safety and Compliance Resources
    • Confidential Hotline
    • Conflict of Interest
    • Home
    • Internal IT Controls

    Internal IT Controls

    Internal IT Controls

    November 17, 2015 • by James MacLachlan

    Internal IT controls are processes implemented by Management to provide reasonable assurance measures are taken to protect the confidentiality and integrity of Syracuse University information system resources and data.  The following are high level IT topics with related risks, vulnerabilities and threats, and related control objectives and operational goals:

    • IT Management – Overarching IT Policies/Standards/Guidelines

      Fall Campus Crouse Maxwell Exterior
      Crouse College and Maxwell Hall in Fall
    • Audit Trails, Transaction Trails, Logging, and Activity Reports
    • Work Stations and Other Digital (Wireless) Devices
    • Virtual Machines/Cloud Services
    • Physical and Virtual Server Operations (Application, Web, Email)
    • Data Base Administration
    • Computer Applications and Application Packages (Third Party)
    • Network Hardware
    • Change Controls, Including Application Software, DBMS Software, and Operating System
    • Disaster Recovery, and Business Continuity, for all Critical Processing Systems
    • Software Licensing
    • Physical Security of Server Rooms and Related Computing Hardware
    • Logical Access to Systems and Data/Information Security

     

    © 2023 – Syracuse University. All Rights Reserved. • Accessibility | Privacy | Status | syr.edu