Describe the three causes of information risk.
Answer to relevant QuestionsExplain how an audit trail might get “lost” within a computerized system.Explain the necessity for performing substantive testing even for audit clients with strong internal controls and sophisticated IT systems.Identify whether audit tests are used to evaluate internal access controls (I), external access controls (E), or both (B).What kinds of audit tools are used to perform routine tests on electronic data files taken from databases? List the types of tests that can be performed with these tools.Think about a place you have worked where computers were present. What are some physical and environmental controls that you have observed in the workplace? Provide at least two examples of each from your personal ...
Post your question