What will you do when you gather evidence of an incident

Assignment Help Management Information Sys
Reference no: EM131700711

Assignment

Reference: "Gathering Audit Evidence" section of Ch. 3, "Audit Process," of CISA: Certified Information Systems Auditor Study Guide; and Ch. 36, "Preventing and Investigating Information Technology Fraud," of Auditor's Guide to IT Auditing.

As part of your internship, you will be asked to collect any IS/IT evidence in an incident. You must exercise due care when gathering evidence. The senior auditor you are working with has asked you several questions related to this process:

• What are the categories of audit standards you will use?
• What will you do when you gather evidence of an incident?
• Why do you need to know the positions of duties of IS/IT employees as well as managers in terms of evidence collection?
• How will you grade evidence?
• Why does the audit process consider fraud?
• What are internal controls?

Prepare a 1- to 2-page memo in Microsoft Word to the senior auditor you're working with to briefly answer each question.

Include a definition of what an information technology assurance framework is and how it relates to recognizing and gathering evidence.

Reference no: EM131700711

Questions Cloud

Context of organisational success : Write 3000 word paper explaining what continuous improvement means in the context of organisational success.
What are the essential elements of a mission statement : Describe the process that you plan to use to conduct research, identify findings, and develop the Comprehensive Project that is due in Unit 5.
Company did not have whistle-blower policy : What would you do if your company did not have a whistle-blower policy? Should the driver get his job back? Why or why not?
Discuss what are some techniques that you can use to utilize : Discuss at least 2 different ways end-users impact each stage. What are some techniques that you can use to utilize the day-to-day business
What will you do when you gather evidence of an incident : What will you do when you gather evidence of an incident? How will you grade evidence? Why does the audit process consider fraud? What are internal controls?
Growing business with active presence on social media : Imagine you are running a growing business with an active presence on social media.
What the tax implications associated with family members : ACC330 Federal Taxation: Discussion. To discussion, explain how transactions qualify as business expense deductions and provide examples
Discuss what do you attribute their effectiveness : Let us begin to first talk about your past experiences. What techniques have you used in the past when you were job hunting
What kind of organizational structure does organization use : What kind of organizational structure does the organization use? If it is part of a chain, what kind of structure does the entire organization use?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Write an is plan for njit purpose of the plan and their

write an is plan for njit purpose of the plan and their current it infrastructurewrite an is plan for one of the

  Information systems - preparing a reportyou work on the it

information systems - preparing a reportyou work on the it team at a local college. you are currently on a project that

  Find the power spectral density of an offset qpsk signal

Find the power spectral density of an offset QPSK signal produced by a random binary sequence in which symbols 1 and 0 (represented by ±1) are equally likely.

  Compare and contrast a context diagram

Context Diagram vs. Case Diagram - use case diagramand Compare and contrast a context diagram

  Proposal addressing new information systems in organization

prepare proposal addressing the potential implementation of new information systems in your organization.

  Research methodology explained in this solutiondemand for

research methodology explained in this solutiondemand for china rmb currency and will specifically focus on demand for

  What types of research have you experienced

In your experience, what types of research have you experienced? Would qualitative or quantitative variables be better to use in research? Explain.

  Discuss some controls that have had great degree of success

Authentication functions are widely used today to support network-based user authentication. Can you discuss some controls that have had a great degree of success? Which ones if any are not very useful and why?

  What role does technology play in a leadership role

What role does technology play in a leadership role?How can a leader use technology to communicate the organization's mission and other important information regarding the organization?What are some pros and cons of a leader using technology?

  Supply chain management - private vs public

supply chain management - private vs. public sectordifferentiate between the principles and practices of purchasing and

  Determine the user interface which is the most efficient

From the second e-Activity, examine the ease of use and the pros and cons of three (3) types of user interfaces available to the user today. Determine the user interface which is the most efficient and user friendly. Provide a rationale for your r..

  How much damage was controlled and minimized

Discussing step or majors which were taken to conquer this issue.How much damage was controlled and minimized.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd