Monday 7 November 2011

information system audit -new pattern

Information system audit  -new pattern
a) network controls.
b) isaca standards.
c) software configuration management.
d) organization structure, c) e-commerce.

2, explain the various steps involved in risk assessment.

5. briefly explain various validation controls to be applied at field, record, file and
batch level with example.

n. a) write in brief about segregation of duties.
b) differentiate the role of database administrator and data administrator
in auditing process.

what are various steps involved in security mechanisms under physical access
controls ?

you are on the internal audit staff of lensar ltd., a large producer of health and beauty products. your organizations main computer installation has a file library consisting of 5000 reels of tapes and 1000 disk packs. as being internal audit manager, identify 5 major threats and their respective controls. prepare a report which covers :
a) the objectives of audit.
b) identified threats and controls.
c) major controls to be examined w.r.t. physical access and logical access of file library.
d) list down the techniques and different agents for the evidence collection process for the case study.

Share This
Previous Post
Next Post

FYJC XI standard online admisson Process and declaraton of Merit list . Cut off List For prevous year also . 10 Th Results onlne declaraton Maharashtra Region .

0 comments: