Final approval should be obtained prior to placing a new system into operation is the activity that can be fall into which control?
Click on the arrows to vote for the correct answer
A. B. C. D.B
The correct answer to this question is B. System development control.
System development control is a critical aspect of information security that ensures that information systems are designed, developed, and implemented in a secure and effective manner. The objective of system development controls is to ensure that information systems meet the needs of the organization, support business objectives, and provide the necessary level of security to protect sensitive data and critical systems.
One of the key activities within system development control is the process of testing and approval prior to placing a new system into operation. This activity involves a series of steps designed to ensure that the system has been thoroughly tested, meets all functional requirements, and is secure and reliable.
Final approval should be obtained prior to placing a new system into operation to ensure that any issues or vulnerabilities have been identified and resolved before the system is put into production. This activity is critical to ensuring that the system is ready for use and meets the needs of the organization.
In contrast, the other options in this question are not directly related to the process of testing and approval prior to placing a new system into operation.
Organizations and operations control focuses on the overall management and control of an organization's operations, including the development of policies and procedures, risk management, and performance measurement.
Access control involves the management of user access to information systems and resources, including the implementation of authentication and authorization controls to ensure that only authorized users are granted access to sensitive data.
Procedural control involves the implementation of policies and procedures to ensure that information systems are used in a secure and effective manner, including the enforcement of security policies, the monitoring of system usage, and the implementation of disaster recovery plans.
Therefore, the correct answer to this question is B. System development control.