One factor often overlooked in creating and implementing information security policy is the human factor. Your reading this week explores this factor. One tool to help manage the human factor is the separation of duties (also called segregation of duties). Explain what separation of duties is and why it is important. What three functions should be separate in all transactions? Give an example of how duties can be separated using an example you might find in an organization. Your main post needs to be around 300 words and you need to make at least one reply to your classmates that is 100 words long. See the links below for more information: https://www.isaca.org/Journal/archives/2012/Volume-6/Pages/What-Every-IT-Auditor-Should-Know-About-Proper-Segregation-of-Incompatible-IT-Activities.aspx https://www.csoonline.com/article/2123120/separation-of-duties-and-it-security.html https://www.accountingtools.com/articles/what-is-separation-of-duties.html https://www.computerworld.com/article/2532680/the-key-to-data-security–separation-of-duties.html https://www.aicpa.org/interestareas/informationtechnology/resources/value-strategy-through-segregation-of-duties.html

One factor often overlooked in creating and implementing information security policy is the human factor. Your reading this week explores this factor. One tool to help manage the human factor is the separation of duties (also called segregation of duties). Explain what separation of duties is and why it is important. What three functions should be separate in all transactions? Give an example of how duties can be separated using an example you might find in an organization. Your main post needs to be around 300 words and you need to make at least one reply to your classmates that is 100 words long. See the links below for more information: https://www.isaca.org/Journal/archives/2012/Volume-6/Pages/What-Every-IT-Auditor-Should-Know-About-Proper-Segregation-of-Incompatible-IT-Activities.aspx https://www.csoonline.com/article/2123120/separation-of-duties-and-it-security.html https://www.accountingtools.com/articles/what-is-separation-of-duties.html https://www.computerworld.com/article/2532680/the-key-to-data-security–separation-of-duties.html https://www.aicpa.org/interestareas/informationtechnology/resources/value-strategy-through-segregation-of-duties.html. One factor often overlooked in creating and implementing information security policy is the human factor.  Your reading this week explores this factor.  One tool to help manage the human factor is the separation of duties (also called segregation of duties).  Explain what separation of duties is and why it is important.  What three functions should be separate in all transactions?  Give an example of how duties can be separated using an example you might find in an organization.
Your main post needs to be around 300 words and you need to make at least one reply to your classmates that is 100 words long.  See the links below for more information:
https://www.isaca.org/Journal/archives/2012/Volume-6/Pages/What-Every-IT-Auditor-Should-Know-About-Proper-Segregation-of-Incompatible-IT-Activities.aspx
https://www.csoonline.com/article/2123120/separation-of-duties-and-it-security.html
https://www.accountingtools.com/articles/what-is-separation-of-duties.html
https://www.computerworld.com/article/2532680/the-key-to-data-security–separation-of-duties.html
https://www.aicpa.org/interestareas/informationtechnology/resources/value-strategy-through-segregation-of-duties.html

One factor often overlooked in creating and implementing information security policy is the human factor. Your reading this week explores this factor. One tool to help manage the human factor is the separation of duties (also called segregation of duties). Explain what separation of duties is and why it is important. What three functions should be separate in all transactions? Give an example of how duties can be separated using an example you might find in an organization. Your main post needs to be around 300 words and you need to make at least one reply to your classmates that is 100 words long. See the links below for more information: https://www.isaca.org/Journal/archives/2012/Volume-6/Pages/What-Every-IT-Auditor-Should-Know-About-Proper-Segregation-of-Incompatible-IT-Activities.aspx https://www.csoonline.com/article/2123120/separation-of-duties-and-it-security.html https://www.accountingtools.com/articles/what-is-separation-of-duties.html https://www.computerworld.com/article/2532680/the-key-to-data-security–separation-of-duties.html https://www.aicpa.org/interestareas/informationtechnology/resources/value-strategy-through-segregation-of-duties.html