pertemuan-14.1 © 2008 by abdul hayat information systems security and control informationsystems...

43
Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control Information Systems Security and Control INFORMATION INFORMATION SYSTEMS SYSTEMS SECURITY AND SECURITY AND CONTROL CONTROL Pertemuan 14

Upload: brianna-perkins

Post on 30-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.1 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

INFORMATIONINFORMATION

SYSTEMSSYSTEMS

SECURITY ANDSECURITY AND

CONTROLCONTROL

Pertemuan 14

Page 2: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.2 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

• Why are information systems so vulnerable to Why are information systems so vulnerable to destruction, error, abuse, and system quality destruction, error, abuse, and system quality problems?problems?

• What types of controls are available for What types of controls are available for information systems?information systems?

• What special measures must be taken to What special measures must be taken to ensure the reliability, availability and security ensure the reliability, availability and security of electronic commerce and digital business of electronic commerce and digital business processes?processes?

OBJECTIVES

Page 3: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.3 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

• What are the most important software What are the most important software quality assurance techniques?quality assurance techniques?

• Why are auditing information systems and Why are auditing information systems and safeguarding data quality so important?safeguarding data quality so important?

OBJECTIVES

Page 4: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.4 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

• Designing systems that are neither over-Designing systems that are neither over-controlled nor under-controlledcontrolled nor under-controlled

• Applying quality assurance standards in large Applying quality assurance standards in large systems projectssystems projects

MANAGEMENT CHALLENGES

Page 5: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.5 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

• Advances in telecommunications and Advances in telecommunications and computer softwarecomputer software

• Unauthorized access, abuse, or fraud Unauthorized access, abuse, or fraud

• Hackers Hackers

• Denial of service attackDenial of service attack

• Computer virusesComputer viruses

SYSTEM VULNERABILITY AND ABUSE

Why Systems are Vulnerable

Page 6: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.6 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

SYSTEM VULNERABILITY AND ABUSE

Telecommunication Network Vulnerabilities

Figure 14-1

Page 7: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.7 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

DisasterDisaster

• Destroys computer hardware, programs, Destroys computer hardware, programs, data files, and other equipment data files, and other equipment

SecuritySecurity

• Prevents unauthorized access, alteration, Prevents unauthorized access, alteration, theft, or physical damagetheft, or physical damage

SYSTEM VULNERABILITY AND ABUSE

Concerns for System Builders and Users

Page 8: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.8 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

ErrorsErrors

• Cause computers to disrupt or destroy Cause computers to disrupt or destroy organization’s record-keeping and organization’s record-keeping and operationsoperations

SYSTEM VULNERABILITY AND ABUSE

Concerns for System Builders and Users

Page 9: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.9 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

BugsBugs

• Program code defects or errorsProgram code defects or errors

Maintenance NightmareMaintenance Nightmare

• Maintenance costs high due to Maintenance costs high due to organizational change, software organizational change, software complexity, and faulty system analysis complexity, and faulty system analysis and designand design

SYSTEM VULNERABILITY AND ABUSE

System Quality Problems: Software and Data

Page 10: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.10 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

SYSTEM VULNERABILITY AND ABUSE

Points in the Processing Cycle where Errors Can Occur

Figure 14-2

Page 11: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.11 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

Data Quality ProblemsData Quality Problems

• Caused due to errors during data input or Caused due to errors during data input or faulty information system and database faulty information system and database designdesign

SYSTEM VULNERABILITY AND ABUSE

System Quality Problems: Software and Data

Page 12: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.12 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

SYSTEM VULNERABILITY AND ABUSE

The Cost of Errors over the Systems Development Cycle

Figure 14-3

Page 13: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.13 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

ControlsControls

• Methods, policies, and procedures that Methods, policies, and procedures that ensure protection of organization’s assetsensure protection of organization’s assets

• Ensure accuracy and reliability of Ensure accuracy and reliability of records, and operational adherence to records, and operational adherence to management standardsmanagement standards

CREATING A CONTROL ENVIRONMENT

Overview

Page 14: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.14 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

General controlsGeneral controls

• Establish framework for controlling Establish framework for controlling design, security, and use of computer design, security, and use of computer programs programs

• Include software, hardware, computer Include software, hardware, computer operations, data security, implementation, operations, data security, implementation, and administrative controlsand administrative controls

CREATING A CONTROL ENVIRONMENT

General Controls and Application Controls

Page 15: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.15 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

Security Profiles for a Personnel System

CREATING A CONTROL ENVIRONMENT

Figure 14-4

Page 16: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.16 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

Application controlsApplication controls

• Unique to each computerized applicationUnique to each computerized application

• Include input, processing, and output Include input, processing, and output controlscontrols

CREATING A CONTROL ENVIRONMENT

General Controls and Application Controls

Page 17: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.17 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

• On-line transaction processing:On-line transaction processing: Transactions entered online are Transactions entered online are immediately processed by computerimmediately processed by computer

• Fault-tolerant computer systems:Fault-tolerant computer systems: Contain extra hardware, software, and Contain extra hardware, software, and power supply components to provide power supply components to provide continuous uninterrupted servicecontinuous uninterrupted service

CREATING A CONTROL ENVIRONMENT

Protecting the Digital Firm

Page 18: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.18 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

• High-availability computing:High-availability computing: Tools and Tools and technologies enabling system to recover technologies enabling system to recover quickly from a crashquickly from a crash

• Disaster recovery plan:Disaster recovery plan: Runs business Runs business in event of computer outagein event of computer outage

• Load balancing:Load balancing: Distributes large Distributes large number of requests for access among number of requests for access among multiple servers multiple servers

CREATING A CONTROL ENVIRONMENT

Protecting the Digital Firm

Page 19: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.19 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

• Mirroring:Mirroring: Duplicating all processes and Duplicating all processes and transactions of server on backup server to transactions of server on backup server to prevent any interruption in serviceprevent any interruption in service

• Clustering:Clustering: Linking two computers Linking two computers together so that a second computer can together so that a second computer can act as a backup to the primary computer act as a backup to the primary computer or speed up processingor speed up processing

CREATING A CONTROL ENVIRONMENT

Protecting the Digital Firm

Page 20: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.20 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

FirewallsFirewalls

• Prevent unauthorized users from Prevent unauthorized users from accessing private networksaccessing private networks

• Two types: proxies and stateful inspectionTwo types: proxies and stateful inspection

Intrusion Detection SystemIntrusion Detection System

• Monitors vulnerable points in network to Monitors vulnerable points in network to detect and deter unauthorized intrudersdetect and deter unauthorized intruders

CREATING A CONTROL ENVIRONMENT

Internet Security Challenges

Page 21: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.21 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

Figure 14-5

CREATING A CONTROL ENVIRONMENT

Internet Security Challenges

Page 22: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.22 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

• Encryption:Encryption: Coding and scrambling of Coding and scrambling of messages to prevent their access without messages to prevent their access without authorizationauthorization

• Authentication:Authentication: Ability of each party in a Ability of each party in a transaction to ascertain identity of other transaction to ascertain identity of other partyparty

• Message integrity:Message integrity: Ability to ascertain Ability to ascertain that transmitted message has not been that transmitted message has not been copied or alteredcopied or altered

CREATING A CONTROL ENVIRONMENT

Security and Electronic Commerce

Page 23: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.23 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

• Digital signature:Digital signature: Digital code attached Digital code attached to electronically transmitted message to to electronically transmitted message to uniquely identify contents and senderuniquely identify contents and sender

• Digital certificate:Digital certificate: Attachment to Attachment to electronic message to verify the sender electronic message to verify the sender and to provide receiver with means to and to provide receiver with means to encode replyencode reply

CREATING A CONTROL ENVIRONMENT

Security and Electronic Commerce

Page 24: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.24 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

Public Key Encryption

CREATING A CONTROL ENVIRONMENT

Figure 14-6

Page 25: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.25 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

Digital Certificates

CREATING A CONTROL ENVIRONMENT

Figure 14-7

Page 26: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.26 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

Criteria for determining control Criteria for determining control structurestructure

• Importance of dataImportance of data

• Efficiency, complexity, and expense of Efficiency, complexity, and expense of each control techniqueeach control technique

• Level of risk if a specific activity or Level of risk if a specific activity or process is not properly controlledprocess is not properly controlled

CREATING A CONTROL ENVIRONMENT

Developing a Control Structure: Costs and Benefits

Page 27: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.27 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

MIS auditMIS audit

• Identifies all controls that govern Identifies all controls that govern individual information systems and individual information systems and assesses their effectivenessassesses their effectiveness

CREATING A CONTROL ENVIRONMENT

The Role of Auditing in the Control Process

Page 28: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.28 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

CREATING A CONTROL ENVIRONMENT

Sample Auditor’s List of Control Weaknesses

Figure 14-8

Page 29: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.29 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

• Development methodology:Development methodology: Collection Collection of methods, for every activity within every of methods, for every activity within every phase of development projectphase of development project

• Structured:Structured: Refers to fact that Refers to fact that techniques are carefully drawn up, step-techniques are carefully drawn up, step-by-step, with each step building on a by-step, with each step building on a previous oneprevious one

ENSURING SYSTEM QUALITY

Software Quality Assurance Methodologies and Tools

Page 30: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.30 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

• Structured analysis:Structured analysis: Method for Method for defining system inputs, processes, and defining system inputs, processes, and outputs, for partitioning systems into outputs, for partitioning systems into subsystems or modules subsystems or modules

• Data Flow Diagram (DFD):Data Flow Diagram (DFD): Graphically Graphically illustrates system’s component processes illustrates system’s component processes and flow of dataand flow of data

ENSURING SYSTEM QUALITY

Software Quality Assurance Methodologies and Tools

Page 31: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.31 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

ENSURING SYSTEM QUALITY

Data Flow Diagram for Mail-in University Registration System

Figure 14-9

Page 32: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.32 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

• Structured design:Structured design: Encompasses set of Encompasses set of design rules and techniques for designing design rules and techniques for designing systems from top downsystems from top down

• Structured programming:Structured programming: Organizing Organizing and coding programs that simplify control and coding programs that simplify control paths paths

ENSURING SYSTEM QUALITY

Software Quality Assurance Methodologies and Tools

Page 33: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.33 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

ENSURING SYSTEM QUALITY

High-Level Structure Chart For a Payroll System

Figure 14-10

Page 34: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.34 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

• Inflexible Inflexible

• Time-consumingTime-consuming

ENSURING SYSTEM QUALITY

Limitation of Traditional Methods

Page 35: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.35 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

ENSURING SYSTEM QUALITY

Tools and Methodologies for Object-Oriented Development

• Unified Modeling Language (UML)Unified Modeling Language (UML) has become industry standard for has become industry standard for analyzing and designing object-oriented analyzing and designing object-oriented systems.systems.

• Structural diagramsStructural diagrams describe the describe the relation between classes.relation between classes.

• Behavioral diagramsBehavioral diagrams describe describe interactions in an object-oriented system.interactions in an object-oriented system.

Page 36: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.36 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

ENSURING SYSTEM QUALITY

Basic Program Control Constructs

Figure 14-11

Page 37: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.37 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

• Automation of step-by-step methodologies Automation of step-by-step methodologies for software and systems development for software and systems development

• Reduces repetitive workReduces repetitive work

• Enforces standard development Enforces standard development methodology and design disciplinemethodology and design discipline

• Improves communication between users Improves communication between users and technical specialistsand technical specialists

ENSURING SYSTEM QUALITY

Computer-Aided Software Engineering (CASE)

Page 38: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.38 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

• Organizes and correlates design Organizes and correlates design componentscomponents

• Automates tedious and error-prone Automates tedious and error-prone portion of analysis and design, code portion of analysis and design, code generation, testing, and control rolloutgeneration, testing, and control rollout

ENSURING SYSTEM QUALITY

Computer-Aided Software Engineering (CASE)

Page 39: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.39 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

ENSURING SYSTEM QUALITY

Figure 14-12

Visible Analyst: A Tool to Automate Object-Oriented Analysis and Design

Page 40: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.40 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

Resource allocationResource allocation

• Determines how costs, time, and Determines how costs, time, and personnel are assigned to different personnel are assigned to different phases of systems development projectphases of systems development project

ENSURING SYSTEM QUALITY

Resource Allocation During Systems Development

Page 41: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.41 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

• Objective assessment of software used in Objective assessment of software used in the system in form of quantified the system in form of quantified measurementsmeasurements

ENSURING SYSTEM QUALITY

Software Metrics

Page 42: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.42 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

• Walkthrough:Walkthrough: Review of specification or Review of specification or design document by small group of people design document by small group of people

• Debugging:Debugging: Process of discovering and Process of discovering and eliminating errors and defects in program eliminating errors and defects in program codecode

ENSURING SYSTEM QUALITY

Testing

Page 43: Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

Pertemuan-14.43 © 2008 by Abdul Hayat

Information Systems Security and ControlInformation Systems Security and Control

Data quality auditData quality audit

• Survey and/or sample of files Survey and/or sample of files

• Determines accuracy and completeness of Determines accuracy and completeness of data data

Data cleansingData cleansing

• Correcting errors and inconsistencies in Correcting errors and inconsistencies in data to increase accuracy data to increase accuracy

ENSURING SYSTEM QUALITY

Data Quality Audit and Data Cleansing