Page 195 - Courses
P. 195

IT Essentials — Computer Operations

            Software Licensing Management

            Every piece of software used by an organization is accompanied by a license. Let’s explore the most
            common types of software licenses.

            Freeware/Shareware: Some licenses are what is known as freeware or shareware, meaning that
            simply agreeing to the conditions of use allows the use of the software free of charge.

            Conditional: Other licenses are free of charge for a period of time (e.g., 30 days) or based on specific
            conditions, including number of employees or number of devices, etc. This software may be
            provided on the honor system but auditors should be aware that fines and penalties are possible if
            the contract is violated.

            Personal: Software can also be purchased by personal license. A home computer will generally have
            a license for an operating system and each software application.

            Concurrent: Software, such as Microsoft 365 typically provide what is called, concurrent licensing —
            for up to five devices. Concurrent licenses must be tracked to ensure licensing is not violated. Some
            vendors have beacons that automatically report the number of concurrent sessions in use, which
            make it easy for the vendors to spot violators.

            Enterprise: An enterprise license is used when the organization states annually how many licenses
            they have and what is their expected growth rate over the next 12 months. The software vendor then
            sets fees based on the forecast. Variations between actual and forecasted license counts are
            reconciled during the annual billing process with each vendor.

            Asset Management

            “You cannot protect what you do not know you have.” This is a common statement when describing
            the importance of a complete and accurate asset inventory.

            Assets include data and information, technology (hardware and software), processes (policies and
            procedures), people, and intangible assets (patents, trademarks, and goodwill).

            Having a complete and accurate inventory of hardware and software is the only way to ensure there
            are no unauthorized devices or software licenses in your environment.

            Mapping the data and information assets to their associated hardware and software components (as
            well as the high-level business process and enterprise objective) is the best way to ensure that the
            suite of controls protecting the data or information asset will be sufficiently protected against the
            most probable (known) vulnerabilities, threats, and risks.





            Copyright © 2021 by The Institute of Internal Auditors, Inc. All rights reserved.
   190   191   192   193   194   195   196   197   198   199   200