SlideShare ist ein Scribd-Unternehmen logo
1 von 138
HAPTER 8 Information Systems Controls for System Reliability Part 2:  Confidentiality, Privacy, Processing Integrity, and Availability
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY AVAILABILITY SYSTEMS RELIABILITY
CONFIDENTIALITY ,[object Object],SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY AVAILABILITY SYSTEMS RELIABILITY
CONFIDENTIALITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CONFIDENTIALITY ,[object Object],Categorization to reflect value and training in proper work practices Overall Shredding, thorough erasure, physical destruction Disposal Encryption Transmission Encryption and access controls Storage Controls Situation
CONFIDENTIALITY ,[object Object],[object Object],[object Object],[object Object]
CONFIDENTIALITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
CONFIDENTIALITY ,[object Object],[object Object],[object Object],[object Object]
CONFIDENTIALITY ,[object Object],[object Object],[object Object]
CONFIDENTIALITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CONFIDENTIALITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CONFIDENTIALITY ,[object Object],[object Object]
CONFIDENTIALITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CONFIDENTIALITY ,[object Object],[object Object],[object Object]
CONFIDENTIALITY ,[object Object],[object Object],[object Object]
CONFIDENTIALITY ,[object Object],[object Object],[object Object],[object Object]
CONFIDENTIALITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY AVAILABILITY SYSTEMS RELIABILITY
PRIVACY ,[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY AVAILABILITY SYSTEMS RELIABILITY
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING INTEGRITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY AVAILABILITY SYSTEMS RELIABILITY
AVAILABILITY ,[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AVAILABILITY ,[object Object],[object Object]
CHANGE MANAGEMENT CONTROLS ,[object Object],[object Object],[object Object],[object Object]
CHANGE MANAGEMENT CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CHANGE MANAGEMENT CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
CHANGE MANAGEMENT CONTROLS ,[object Object],[object Object]
CHANGE MANAGEMENT CONTROLS ,[object Object],[object Object],[object Object]
SUMMARY ,[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Accounting Information Systems
Accounting Information Systems Accounting Information Systems
Accounting Information Systems Tara Kissel, M.Ed
 
Topic 11 notes and question on ppe
Topic 11 notes and question on ppeTopic 11 notes and question on ppe
Topic 11 notes and question on ppesakura rena
 
Taxation principles: Dividend, Interest, Rental, Royalty and Other sources of...
Taxation principles: Dividend, Interest, Rental, Royalty and Other sources of...Taxation principles: Dividend, Interest, Rental, Royalty and Other sources of...
Taxation principles: Dividend, Interest, Rental, Royalty and Other sources of...Anny MuiiMuii
 
Topic 5 audit evidence and auditing procedure
Topic 5 audit evidence and auditing procedureTopic 5 audit evidence and auditing procedure
Topic 5 audit evidence and auditing proceduresakura rena
 
Internal Control on Sales
Internal Control on SalesInternal Control on Sales
Internal Control on SalesMaryam Khan
 
Chapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsChapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsTommy Zul Hidayat
 
Topic 9 audit of purchase and payment cycle + acc payables
Topic 9 audit of purchase and payment cycle + acc payablesTopic 9 audit of purchase and payment cycle + acc payables
Topic 9 audit of purchase and payment cycle + acc payablessakura rena
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal controlTommy Zul Hidayat
 
Generalized audit-software
Generalized audit-softwareGeneralized audit-software
Generalized audit-softwarekzoe1996
 
Chapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's PerspectiveChapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's Perspectiveermin08
 
Clasificación de las Finanzas
Clasificación de las FinanzasClasificación de las Finanzas
Clasificación de las FinanzasSineadAlvarez
 
Accounting information system
Accounting information systemAccounting information system
Accounting information systemNowMaster Academy
 
Auditor detection of fraud
Auditor detection of fraudAuditor detection of fraud
Auditor detection of fraudAnkitRaya
 
Control&accounting information system
Control&accounting information systemControl&accounting information system
Control&accounting information systemsellyhood
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networksjayussuryawan
 

Was ist angesagt? (20)

Accounting Information Systems
Accounting Information Systems Accounting Information Systems
Accounting Information Systems
 
Chapter 2 iba
Chapter 2 ibaChapter 2 iba
Chapter 2 iba
 
Topic 11 notes and question on ppe
Topic 11 notes and question on ppeTopic 11 notes and question on ppe
Topic 11 notes and question on ppe
 
Taxation principles: Dividend, Interest, Rental, Royalty and Other sources of...
Taxation principles: Dividend, Interest, Rental, Royalty and Other sources of...Taxation principles: Dividend, Interest, Rental, Royalty and Other sources of...
Taxation principles: Dividend, Interest, Rental, Royalty and Other sources of...
 
Paps 1006
Paps 1006Paps 1006
Paps 1006
 
Topic 5 audit evidence and auditing procedure
Topic 5 audit evidence and auditing procedureTopic 5 audit evidence and auditing procedure
Topic 5 audit evidence and auditing procedure
 
8
88
8
 
Internal Control on Sales
Internal Control on SalesInternal Control on Sales
Internal Control on Sales
 
Chapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsChapter 2 auditing it governance controls
Chapter 2 auditing it governance controls
 
Topic 9 audit of purchase and payment cycle + acc payables
Topic 9 audit of purchase and payment cycle + acc payablesTopic 9 audit of purchase and payment cycle + acc payables
Topic 9 audit of purchase and payment cycle + acc payables
 
Romney ch06
Romney ch06Romney ch06
Romney ch06
 
Pp 16-new
Pp 16-newPp 16-new
Pp 16-new
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal control
 
Generalized audit-software
Generalized audit-softwareGeneralized audit-software
Generalized audit-software
 
Chapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's PerspectiveChapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's Perspective
 
Clasificación de las Finanzas
Clasificación de las FinanzasClasificación de las Finanzas
Clasificación de las Finanzas
 
Accounting information system
Accounting information systemAccounting information system
Accounting information system
 
Auditor detection of fraud
Auditor detection of fraudAuditor detection of fraud
Auditor detection of fraud
 
Control&accounting information system
Control&accounting information systemControl&accounting information system
Control&accounting information system
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 

Andere mochten auch

Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1sharing notes123
 
Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1Sharing Slides Training
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesSharing Slides Training
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesSharing Slides Training
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisSharing Slides Training
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Issharing notes123
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 
AWS re:Invent 2016: Common Considerations for Data Integrity Controls in Heal...
AWS re:Invent 2016: Common Considerations for Data Integrity Controls in Heal...AWS re:Invent 2016: Common Considerations for Data Integrity Controls in Heal...
AWS re:Invent 2016: Common Considerations for Data Integrity Controls in Heal...Amazon Web Services
 

Andere mochten auch (14)

Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
 
Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1
 
Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1Ais Romney 2006 Slides 07 Is Control1
Ais Romney 2006 Slides 07 Is Control1
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
 
Ais Romney 2006 Slides 01 Overview
Ais Romney 2006 Slides 01 OverviewAis Romney 2006 Slides 01 Overview
Ais Romney 2006 Slides 01 Overview
 
Database auditing models
 Database auditing models  Database auditing models
Database auditing models
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Managerial Control
Managerial ControlManagerial Control
Managerial Control
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
AWS re:Invent 2016: Common Considerations for Data Integrity Controls in Heal...
AWS re:Invent 2016: Common Considerations for Data Integrity Controls in Heal...AWS re:Invent 2016: Common Considerations for Data Integrity Controls in Heal...
AWS re:Invent 2016: Common Considerations for Data Integrity Controls in Heal...
 
MHRA Data Integrity Requirements
MHRA Data Integrity RequirementsMHRA Data Integrity Requirements
MHRA Data Integrity Requirements
 

Ähnlich wie Ais Romney 2006 Slides 08 Is Control2

Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare ApplicationCitiusTech
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxTRSrinidi
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfV2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxV2Infotech1
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data securityEffOne_Technologies
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresSamuel Loomis
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
Top 5 Ways How Accounting Firms Can Protect Their Client Data
Top 5 Ways How Accounting Firms Can Protect Their Client Data Top 5 Ways How Accounting Firms Can Protect Their Client Data
Top 5 Ways How Accounting Firms Can Protect Their Client Data Avni Rajput
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case StudyEvelyn Donaldson
 
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...JustinFinch11
 
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatese-Safe Systems
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 

Ähnlich wie Ais Romney 2006 Slides 08 Is Control2 (20)

Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 
Data security
Data securityData security
Data security
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptx
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data security
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Top 5 Ways How Accounting Firms Can Protect Their Client Data
Top 5 Ways How Accounting Firms Can Protect Their Client Data Top 5 Ways How Accounting Firms Can Protect Their Client Data
Top 5 Ways How Accounting Firms Can Protect Their Client Data
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case Study
 
10 Things That Compromise Patient Data
10 Things That Compromise Patient Data10 Things That Compromise Patient Data
10 Things That Compromise Patient Data
 
Data Security Whitepaper
Data Security WhitepaperData Security Whitepaper
Data Security Whitepaper
 
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Security Privacy & Compliance for mHealth Apps 2014 ISRM Conference 2014
Security Privacy & Compliance for mHealth Apps 2014 ISRM Conference 2014Security Privacy & Compliance for mHealth Apps 2014 ISRM Conference 2014
Security Privacy & Compliance for mHealth Apps 2014 ISRM Conference 2014
 
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporates
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 

Mehr von Sharing Slides Training

Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesSharing Slides Training
 
Ais Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentAis Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentSharing Slides Training
 
Ais Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In ReaAis Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In ReaSharing Slides Training
 
Ais Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An ReaAis Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An ReaSharing Slides Training
 
Ais Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The ReaAis Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The ReaSharing Slides Training
 
Ais Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting SystemAis Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting SystemSharing Slides Training
 
Ais Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production CycleAis Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production CycleSharing Slides Training
 
Ais Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure CycleAis Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure CycleSharing Slides Training
 
Ais Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue CycleAis Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue CycleSharing Slides Training
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsSharing Slides Training
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseSharing Slides Training
 

Mehr von Sharing Slides Training (12)

Ais Romney 2006 Slides 20 System Design
Ais Romney 2006 Slides 20 System DesignAis Romney 2006 Slides 20 System Design
Ais Romney 2006 Slides 20 System Design
 
Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development Strategies
 
Ais Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentAis Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems Development
 
Ais Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In ReaAis Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In Rea
 
Ais Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An ReaAis Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An Rea
 
Ais Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The ReaAis Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The Rea
 
Ais Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting SystemAis Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting System
 
Ais Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production CycleAis Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production Cycle
 
Ais Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure CycleAis Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure Cycle
 
Ais Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue CycleAis Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue Cycle
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 

Kürzlich hochgeladen

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Kürzlich hochgeladen (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Ais Romney 2006 Slides 08 Is Control2

  • 1. HAPTER 8 Information Systems Controls for System Reliability Part 2: Confidentiality, Privacy, Processing Integrity, and Availability
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 117.
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136.
  • 137.
  • 138.