This essay focuses on the types of information system control and analyses the difference between the general management control and application controls. It also evaluates the security and risk management techniques that are needed for the purpose of ensuring the confidentiality, reliability, integrity, availability and security of digital business processes.