Computer security checklist
Design a checklist for assessing computer security controls. The checklist should be organized as follows:
Three major categories: preventive, detective, and corrective controls.
Appropriate subcategories for each major topic discussed in this chapter.
For each subcategory, develop individual questions about the existence of specific control procedures, each question should have three possible answers: Yes, NO, Not Applicable.
The text we are using is Accounting Information Systems
10th Edition
by Marshall B. Romney and Paul John Steinbart
This information is supposed to help me later in the course to design an AIS.