live process audit monitoring
DESCRIPTION
Live Cyber Protection using Live Audit Monitoring TechnologyTRANSCRIPT
Downstream Systems Impacted
UNAUDITED ANOMALOUS
EVENTS
HISTORICAL INFORMATION PROCESSING
SECURITY PROCESSES
SYMANTEC
RIVERBED
CISCO
MICROSOFT
Cybersecurity
Risk/Fraud/AML
Loss of Public Infrastructure
Loss of Defence
Virus Infection
DATA PROCESSING
INFORMATION CAPTURE
Quality Assurance
Packaging
Accounting
Mail Room
Manufacturing
Digitization
Systems
0110000111011
NETWORK/MIDDLEWARE
TRANSPORT/INTEGRATION BUS
Live Process Audit Decision-Zone Inc.
CORPORATE BUSINESS PROCESS DOCUMENTED MAPS
NETWORK/MIDDLEWARE LIVE AUDITED NORMALEVENT
LIVE AUDITED
ANOMALOUSEVENT
TRANSPORT/INTEGRATION BUS
LIVE UNAUDITED
EVENT
LIVE AUDITED
EVENT
Downstream Systems Protected
LIVE INFORMATION PROCESSING
LIVE SECURITY PROCESSES
Protection Against Cybersecurity
Threats
Protection Against Risk/Fraud/AML
Threats
Infrastructure Protected
Defense Protected
Protection Against Virus Infection
Threats
LIVE PROTECTION
INFORMATION CAPTURE
Quality Assurance
Packaging
Accounting
Mail Room
Manufacturing
Digitization
Systems
0110000111011
SYMANTEC
RIVERBED
CISCO
MICROSOFT
INFORMATICS MANAGEMENT MODEL
ACTIVITIESJOB ROLES
Accounting Mail Room Manufacturing
BUSINESS PROCESSES
BUSINESS PROCESSES ARE END TO END INSTRUCTIONS DEFINED IN WORKFLOW DIAGRAMS, PROCESS MAPS, STATE CHARTS, FLOWCHARTS OR OTHER DOCUMENTS ON HOW A SET OF INDEPENDENT ACTIVITIES MUST PERFORM THEIR JOBS IN TERMS OF THE CONDITIONS, TIME & SEQUENCES FOR BUILDING A WIDGET.
INDEPENDENT ACTIVITIES
PROCESS AUTOMATION
Accounting
Mail RoomAUTOMATED DATA ENTRY
ACTIVITY
PROCESS AUTOMATION IS AN APPLICATION THAT COMBINIES TWO OR MORE ACTIVITIES TO GENERATE A SINGLE AUTOMATED ACTIVITY
SECURITY PROCESS
SECURITY PROCESSES ARE APPLICATIONS THAT AUTOMATE THE DEFINED PROCESSES AND RULES FOR THE ENFORCEMENT OF ACTIVITIES WITHIN THE BUSINESS PROCESS.
PROCESS AUDIT
PROCESS AUDIT APPLICATIONS VALIDATE EACH INDEPENDANT ACTIVITY LIVE USING THE BUSINESS PROCESS DOCUMENT INSTRUCTIONS. INVALID ACTIVITIES CAN TRIGGER SECURITY PROCESSES APPLICATIONS TO ENFORCE THE INVALID ACTIVITY LIVE