Wednesday, May 6, 2020

Security Audit Essay - 2237 Words

Security auditing in any company involves establishing security levels in the company’s system. It comprises of vulnerability scans, reviewing applications and systems controls, and analyzing physical access into the system. Auditing is carried out to ensure information integrity of a company’s data and reliability of data exchange process through networked environment. In most cases, security auditing is done to ensure security measures are in place to protect the company against loss of information to the outside world. This paper addresses all the issues involved in security auditing of Ariam travel agency’s network and its premises. Security Audit Ariam travel agency handles bulk information that contains sensitive customers and†¦show more content†¦Therefore, we construct a topological representation of critical security models that we intend to implement within the organization. Among the tools are firewalls, proxy servers, encryption facilities, logical security and access controls, antivirus software and auditing systems. Infrastructural design As displayed on the above network diagram, Ariam Travel Agency comprises of six data centers with head data center located at Sydney. Since Sydney holds vital information, we shall opt to stock it with an extra security firewall. The firewall on each data center is placed before a switch connection. At the main data center, we structure the topology in a manner that is unique from all the other data centers. This is purposed for security reasons. The layout at this center is complex and many security measures will be put in place to ensure integrity. Data center personnel Each data center has a number of staff that has access to data. However, we limit the amount and type of data that various personnel can access. We implement use of key cards, secure login IDs, security tokens, cryptographic keys and biometrics to tighten security in data. Special user accounts have an addition security features and uses high-level facial recognition element. In addition, we seek to restructure passwords and codes, we while keep on updating the biometric data and cryptographicShow MoreRelatedEssay on Audit and Investment Securities731 Words   |  3 PagesWe do not believe that the auditors from Friehling amp; Horowitz exercised due care and maintained professional skepticism throughout the audit. According to the AICPA website, â€Å"due professional care imposes a responsibility upon each professional within an independent auditors organization to observe the standards of field work and reporting† (AICPA). This is because the auditors should have been skept ical of Madoff’s bank account and Chase and should have looked into what that bank account wasRead MoreA Report On Network Security Audit4059 Words   |  17 Pages Network Security Audit Jed Johnson, CGAP City Auditor Major Contributor Roshan Pulikkiel IT Auditor Christy Rodriguez, CPA Staff Auditor August 18, 2015 Report 201505 â€Æ' Table of Contents Page Authorization 1 Objective 1 Scope and Methodology 1 Overall Conclusion 2 Background 3 Management Accomplishments* 5 Opportunities for Improvement 6 AuthorizationRead MoreJohnson And Johnson Marketable Securities Audit Report2055 Words   |  9 Pages Johnson Johnson Marketable Securities Audit Report The purpose and responsibility of an audit is to provide reasonable assurance that the financial statements are free from material misstatements whether due to fraud or error. The audit will follow the authoritative guidance provided by the PCAOB and AICPA auditing standards. In relation to Johnson Johnson Company, it would be a plus if the auditor had experience with the Consumer, Pharmaceutical and Medical Devices, but not necessary sinceRead MoreBank Financial Audit Teams Need Financial And Security Files From All 58 Community Colleges Essay716 Words   |  3 Pagesand Overview Each year, OSA Financial Audit teams need financial and security files from all 58 Community Colleges (CC). Since the data files may be used in any engagement types (e.g. financial statement audits, federal compliance audits, information systems audits, performance audits, and investigations), files are requested regardless of whether or not OSA will be performing a financial statement audit for the current year. OSA Information Systems Audit (ISA) auditors request submission ofRead MoreRole Of Security Audits On Computer Forensics1239 Words   |  5 PagesRole of Security Audit Logs in Computer Forensics Sanjeev Shrestha Dept. Computer Science University of Idaho shre6177@vandals.uidaho.edu Abstract A large number of real-world applications, use audit trails or logs to keep in track of system usage and error handling information. Security aspect of these log files and their retrieval from an untrusted machine becomes a topic of vital importance in computer forensics investigation [2, 3]. Accurate retrieval of data from these log files for gatheringRead MoreAnalysis Of Morgan Security Audit Pricewaterhouse Cooper1095 Words   |  5 PagesJ.P.Morgan security audit Pricewaterhouse Cooper INTRO According to Institute of Global Ethics â€Å"Ethics in its broader sense, deals with human conduct in relation to what is morally good and bad, right and wrong. It is the application of values to decision making. These values include honesty, fairness, responsibility, respect and compassion† (He 2017) therefore they are principles of right conduct. Unlike morals which are the principles of right/improper conduct depends person to person. BODY Read MoreThe Ethics Of The Audit1632 Words   |  7 Pagesenvironment goes down, the rate of auditor litigation has increased. Lawsuits are a continuous threat to the auditing line of work. In this paper, we present evidence on lawsuits having a positive effect on auditors audit liabilities. It is the auditors’ responsibility to plan and complete the audit to obtain practical guarantee about if the financial statements are free of material misstatement or if they are caused by error or fraud. A mixture of court decisions and economic state of affairs has shapedRead MoreAudit Methodology For A Audit Essay1135 Words   |  5 PagesAudit methodology The audit methodology will be used as a step by step guideline that will be used by the auditors to keep track of their progress and enable them to ensure that quality standards are maintained during the auditing phase. To audit the International Bank of Africa information system we will go through five phases or steps. Step one: Planning The first phase will determine the sort of audit team that will be assembled. The team selected will be best placed to handle all obstacles andRead MoreSarbanes Oxley Act # 11 Titles971 Words   |  4 Pagesreliability of corporate disclosures made pursuant to the securities laws, and for other purposes†. (Sarbanes-Oxley Act, 2002) Title I of the SOX comprises the creation of the Public Accounting Oversight Board (PCAOB). The PCAOB is a private-sector, nonprofit corporation which oversees the auditors of public companies. It is to protect the interests of the investors and to further the public interest when preparing informative, fair, and independent audit reports. The title (PWC, 2016) consists of 9 subsectionsRead MoreSarbanes Oxley Act # 11 Titles1734 Words   |  7 Pagesreliability of corporate disclosures made pursuant to the securities laws, and for other purposes†. (Sarbanes-Oxley Act, 2002) Title I of the SOX involves the creation of the Public Accounting Oversight Board (PCAOB). The PCAOB is a private-sector, nonprofit corporation to oversee the auditors of public companies, in order to protect the interests of the investors and further the public interest in the preparation of informative, fair, and independent audit reports. There are 9 subsections in the title (PWC

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.