What will you do when you gather evidence of an incident

Assignment Help Management Information Sys
Reference no: EM131175193 , Length: 600 Words

Review "Gathering Audit Evidence," section of Ch. 3, "Audit Process," of CISA® Certified Information Systems Auditor® Study Guide.

As part of your internship, you will be asked to collect any IS incident. You must exercise due care when gathering evidence. The audit professional you are working with has asked you several questions related to this process:

What are the categories of audit standards you will use?

What will you do when you gather evidence of an incident?

Why do you need to know the positions of duties of IS employees as well as managers in terms of evidence collection?

How will you grade evidence?

Prepare and submit notes that document the answers to these evidence collection and documentation requirements. Each answer must be at least 150 words. Include a definition of information technology assurance framework and how it relates to recognizing and gathering evidence.

Reference no: EM131175193

Questions Cloud

Construct a profit diagram for classic option strategies : Construct a Profit Diagram for each of the following classic option strategies .-  What is the investor attempting to accomplish with each position?
Discount on trade credit agreement : Alternative A: Forgo the discount on its trade credit agreement, wait and pay the full $10,500 in one month. Alternative B: Borrow the money from Bank A, which has offered to lend the firm $10,332 for one month at an APR (compounded monthly) of 11..
Discuss the legal process used to prosecute the crime : Identify and classify all the key people involved in the crime including perpetrators and victims. Give all necessary background on the key players.
Necessitate idle demand deposits : 1. Which alternative should R. Morin select? 2. If the bank's compensating-balance requirement were to necessitate idle demand deposits equal to 15 percent of the loan, what effect would this have on the cost of the bank loan alternative?
What will you do when you gather evidence of an incident : What are the categories of audit standards you will use? What will you do when you gather evidence of an incident? Why do you need to know the positions of duties of IS employees as well as managers in terms of evidence collection?
Explain basics of the rfid components that were chosen : Explain Basics of RFID components that were chosen. Impact of implementation - A description of administrative procedures - human and process changes; any Changes in Organization policies or enhancements to include training requirements.
Bank within two business days : Your debit card is stolen, and you report it to your bank within two business days. How much money can you lose at most?
Mid-size firm pension fund management team : Congratulations. You have been promoted to vice president and director of your mid-size firm's pension fund management team located in Cincinnati, OH. Before you have even had the opportunity to settle into your new office, your senior vice presid..
Compare the specific fuel consumption for the outcastes : Calculate the hp which can be expected if the speed and mechanical efficiency remain the same. Compare the specific fuel consumption for the outcastes. if the air-fuel ratio for the supercharged engine is Mt, I. The air conditions are 1.013 hat an..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Social media and icloud and why it is important

The Internet - social media and iCloud and why it is important - Take a moment to reflect on The Internet as a social media / iCloud and why it is important to you.

  Algorithm for criminal justice purposes

Conduct a computer research on the MD5 algorithm and explain why it is considered an important part of the computer forensic analysis. What is it, how it is used and is it still a valid algorithm for Criminal Justice purposes

  Physical environment for secured databases

Physical Environment for Secured Databases

  Ais courses in terms of business processes

1. Why do we organize AIS courses in terms of business processes? 2. How are the five generic parts of the AIS applied/exemplified within the context of the acquisition/payment process?

  Health care information technology

Health care information technology - information technology act change the world of Medical Information Technology

  Electronic medical record for patients

What are the advantages and disadvantages of the electronic medical record for patients and for providers

  A discussion of the information used in the system

A full description of the new system, a description of its components, and the benefit it will provide to the business or organization

  Show how a software framework facilitates reuse

Software reuse - show how a software framework facilitates reuse

  Pros and cons presentation for social network

Pros and cons presentation for social network 3 power point slides plus a script for the 3 minutes presentation

  Option 1- identify a regional cluster in nsw or elsewhere

option 1- identify a regional cluster in nsw or elsewhere in australia that currently exists or where such development

  Describe a change pertaining to an it project

Imagine you work as an IT professional for a midsized company. Describe a change (i.e., a change of process, system, technique) pertaining to an IT project

  Analyze why the burden on managers is greater today

Analyze why the burden on managers is greater today than in previous years when it comes to using technology efficiently. Give two examples that defend this claim

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd