• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19

International Auditing.

Extracts from this document...

Introduction

Enrolment No.: 00054178 Tutor: Marlene Davies Tutorial group: Group 1 With the arrival of 21st century, there is a rapid growth in the development of using Internet as a marketplace between consumers and business and business and business. It becomes a core machine for commercial transaction. For thriving or even survival, we, as a customers or enterprises, ought to closely grip with the prompt development of this innovated new business environment. There are many people across the world to the Internet, especially business communities which regard the changes brought about by Internet as an opportunity. We also have been benefited by the changes. It is because there is a potential for us to have wide, flexible Internet shopping all over the world. We can now break the restriction of traditional market of buying and selling goods and services in local market. In other words, Internet opens a global market for both customer and business as long as breaking the limitation by the geographic area they are living. Therefore, giving business ability attracts or undertakes business with new customers and clients around the world outside traditional market. Apart from the above reason, there are many other reasons 'why companies adopt Internet?' Firstly, an increase in the pace of doing business is provided. Secondly, it can be acted as a powerful research tool of getting business information, news, academic information, market intelligence and so on from all over the world. Thirdly, the increased in competitive pressure derived from market sectors environment, companies without web are going to get an immediate lag and disadvantages. Finally, there is a relatively lower infrastructure cost incurred by operating via web site rather than a brick-and mortar shop or office. Those reasons related to the adoption of Internet of business mentioned above are the success of the Internet that some companies have been created to undertake trade solely through Internet. ...read more.

Middle

Finally, determine whether back-up files are periodically verified against the original to confirm that the back up has worked correctly and where back-up files are stored off-site determine when the security of the site was last reviewed and what action was taken to correct any deficiencies. PC control: The PC controls, both the existing strategies and acquisition procedure are necessary to assessed by auditors. Then auditors should ensure whether the existences of the standards for end user and/or PC applications development are in adequate scope. Guidance available to staff who manage and use PCs should be examined. Furthermore, identify management responsibilities for each PC system and determine risk of unauthorized physical access of PCs are those necessary actions should be taken by auditors. For reviewing the physical access of PCs, test check log-on procedure and the software to control log-on procedures ought to be under consideration. Review the purposes for which the PCs are used and the degree of vulnerability to the effects of interruptions to service and the appropriateness of locations of PCs and the general levels of threat and protection. Network controls: For network controls, firstly, auditors is necessary to obtain a copy of the organization's IS/IT strategy and a network diagram to ensure it whether it addresses network investment and the design promotes an appropriate level of security and resilience for the organization. Next step is to find out the network's responsible person whether he has adequate and appropriate training, then to examine the documentation for network management system and check whether it has been used and by whom. Moreover, see whether the instructions documented about the general usage of the network are up-to-date in user guide. Auditors should identify controls in place to identify unauthorized network connection to ensure that adequate controls are in place to stop unauthorized examination and amendment of networking protocols and settings. Furthermore, auditors ought to ask what policy the organization has on the use of encryption for the transmission of confidential data. ...read more.

Conclusion

This is less tangible than the other recommendations here, but no less important. A system administrator who views the web server as 'just another system to back up' will not pay as much heed to subtle indications of problems as someone who has a high personal stake in the machine's operation and performance. In the same vein, assigning a junior level security administrator to read the logs will not result in solid intrusion detection. System security The web server, database servers, middleware servers, access control devices, and physical controls should all be configured with the same level of integrity, control, and countermeasures as the firewalls. However, with every business opportunity there lies risk, and the Internet is no different. Challenging times lie ahead, for both auditors and their clients. Given that the Internet is accessible to everyone, there are definite risks associated with control and security. Generally, control awareness is not as high in East Asia as it is in the West. This attitude must change - not only in auditors and business managers, but also in the members of the general public. Until now auditors have been able to adopt either a substantive or compliance approach. In an e-commerce environment, traditional audit tests may not carry much meaning - so new method of assurance an auditing techniques need to be developed. Nevertheless, the primary issues of e-commerce presents to auditors of a business conducting trading through internet are audit trail, interrogation, security, reliability and privacy in respect of control, policies, procedures and standards. For the control issues should be taken into account by considerably care by auditors, the following elements should also be discussed. They are EDI controls, file controls, PC controls, network controls, Internet controls and data protection. The timeframe for wider acceptance of e-commerce is difficult to determine but there is every likelihood that digital cash and virtual shopping will be a common feature of business activity in both the public and private sectors in the next few year. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. Marked by a teacher

    business online

    4 star(s)

    Ask more than tell and share knowledge so that it can be used ? Celebrate success and learn from experience Shopping trip -Customers have certain needs from shopping with companies such a Tesco and other companies these are - clear aisles, to be able to get what they want at a good price, no queues and great staff.

  2. For my business report I am investigating the Co-op erative society supermarket.

    a highly successful year Food Group generated a profit figure of £775 million in 2003 to 2004 financial year. This year has been very successful for the Co-op group with a growth in the profit percentage and a substantial amount of revenue gained through sales of its goods and services.

  1. The Purpose and Scope of MIS - Management information systems.

    For example the banks exchange clearing information in compatible form which allows other bank's customers to use their cashpoint machines. There has been a significant change over the last 10 years in the way that people can make transactions and view their accounts, all without having to visit the branch.

  2. Business Aims and Objectives.

    Sometimes the form can be used as a report in legal action. In particular, administrative staff are involved in the following areas of health and safety: * All employees have a duty to work safely.

  1. Advantages and Disadvantages of e-commerce in terms of easyjet

    women, men, young adults etc. this information can then be used to know how to advertise their products to in future and who will be the target audience. Clearly this sort of statistical information is vital to businesses hoping to trade via the Internet, so that they have a good

  2. Strategic Planning of IS/IT: View on Strategic Resources

    of a good choice of products and markets in which to compete; instead, success many be attributable to its unique resources. The resources of a firm will provide the basis for its survival and success through time as external conditions in the environment change.

  1. The process of electroplating and how it is used to protect products.

    The quality control that is performed to ensure that there are no faults is that the raw component when being acidified has been removed of rust and scale. This is then quality assured by the foam forming on the surface of the acid then by being checked by a member

  2. Assessment of the Viability of Opening an Internet Café.

    Another reason why I believe that this business can be a success is due to the fact that my results show that the internet is mainly used for business and studies, meaning it is used in constructive way .Most people need to use it, they don't use it because they

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work