• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19

International Auditing.

Extracts from this document...

Introduction

Enrolment No.: 00054178 Tutor: Marlene Davies Tutorial group: Group 1 With the arrival of 21st century, there is a rapid growth in the development of using Internet as a marketplace between consumers and business and business and business. It becomes a core machine for commercial transaction. For thriving or even survival, we, as a customers or enterprises, ought to closely grip with the prompt development of this innovated new business environment. There are many people across the world to the Internet, especially business communities which regard the changes brought about by Internet as an opportunity. We also have been benefited by the changes. It is because there is a potential for us to have wide, flexible Internet shopping all over the world. We can now break the restriction of traditional market of buying and selling goods and services in local market. In other words, Internet opens a global market for both customer and business as long as breaking the limitation by the geographic area they are living. Therefore, giving business ability attracts or undertakes business with new customers and clients around the world outside traditional market. Apart from the above reason, there are many other reasons 'why companies adopt Internet?' Firstly, an increase in the pace of doing business is provided. Secondly, it can be acted as a powerful research tool of getting business information, news, academic information, market intelligence and so on from all over the world. Thirdly, the increased in competitive pressure derived from market sectors environment, companies without web are going to get an immediate lag and disadvantages. Finally, there is a relatively lower infrastructure cost incurred by operating via web site rather than a brick-and mortar shop or office. Those reasons related to the adoption of Internet of business mentioned above are the success of the Internet that some companies have been created to undertake trade solely through Internet. ...read more.

Middle

Finally, determine whether back-up files are periodically verified against the original to confirm that the back up has worked correctly and where back-up files are stored off-site determine when the security of the site was last reviewed and what action was taken to correct any deficiencies. PC control: The PC controls, both the existing strategies and acquisition procedure are necessary to assessed by auditors. Then auditors should ensure whether the existences of the standards for end user and/or PC applications development are in adequate scope. Guidance available to staff who manage and use PCs should be examined. Furthermore, identify management responsibilities for each PC system and determine risk of unauthorized physical access of PCs are those necessary actions should be taken by auditors. For reviewing the physical access of PCs, test check log-on procedure and the software to control log-on procedures ought to be under consideration. Review the purposes for which the PCs are used and the degree of vulnerability to the effects of interruptions to service and the appropriateness of locations of PCs and the general levels of threat and protection. Network controls: For network controls, firstly, auditors is necessary to obtain a copy of the organization's IS/IT strategy and a network diagram to ensure it whether it addresses network investment and the design promotes an appropriate level of security and resilience for the organization. Next step is to find out the network's responsible person whether he has adequate and appropriate training, then to examine the documentation for network management system and check whether it has been used and by whom. Moreover, see whether the instructions documented about the general usage of the network are up-to-date in user guide. Auditors should identify controls in place to identify unauthorized network connection to ensure that adequate controls are in place to stop unauthorized examination and amendment of networking protocols and settings. Furthermore, auditors ought to ask what policy the organization has on the use of encryption for the transmission of confidential data. ...read more.

Conclusion

This is less tangible than the other recommendations here, but no less important. A system administrator who views the web server as 'just another system to back up' will not pay as much heed to subtle indications of problems as someone who has a high personal stake in the machine's operation and performance. In the same vein, assigning a junior level security administrator to read the logs will not result in solid intrusion detection. System security The web server, database servers, middleware servers, access control devices, and physical controls should all be configured with the same level of integrity, control, and countermeasures as the firewalls. However, with every business opportunity there lies risk, and the Internet is no different. Challenging times lie ahead, for both auditors and their clients. Given that the Internet is accessible to everyone, there are definite risks associated with control and security. Generally, control awareness is not as high in East Asia as it is in the West. This attitude must change - not only in auditors and business managers, but also in the members of the general public. Until now auditors have been able to adopt either a substantive or compliance approach. In an e-commerce environment, traditional audit tests may not carry much meaning - so new method of assurance an auditing techniques need to be developed. Nevertheless, the primary issues of e-commerce presents to auditors of a business conducting trading through internet are audit trail, interrogation, security, reliability and privacy in respect of control, policies, procedures and standards. For the control issues should be taken into account by considerably care by auditors, the following elements should also be discussed. They are EDI controls, file controls, PC controls, network controls, Internet controls and data protection. The timeframe for wider acceptance of e-commerce is difficult to determine but there is every likelihood that digital cash and virtual shopping will be a common feature of business activity in both the public and private sectors in the next few year. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. Marked by a teacher

    business online

    4 star(s)

    Tesco's growth in the UK business comes from new space and ideas, extensions to the existing stores and a multi-format approach. Tesco's sales of non-food, which are growing at around twice the rate of food. Customers of other companies have to shop else where for these non-food items where as

  2. For my business report I am investigating the Co-op erative society supermarket.

    a highly successful year Food Group generated a profit figure of £775 million in 2003 to 2004 financial year. This year has been very successful for the Co-op group with a growth in the profit percentage and a substantial amount of revenue gained through sales of its goods and services.

  1. The Purpose and Scope of MIS - Management information systems.

    For example the banks exchange clearing information in compatible form which allows other bank's customers to use their cashpoint machines. There has been a significant change over the last 10 years in the way that people can make transactions and view their accounts, all without having to visit the branch.

  2. Business Aims and Objectives.

    Even in a small organisation there is likely to be an IT specialist who solves basic problems and is responsible for obtaining more specialist help when required. The basic functions carried out by IT support staff may include the following: * Purchasing computer equipment and consumable items such as printer cartridges.

  1. The process of electroplating and how it is used to protect products.

    ease with which bright chromium may be applied, the white colour and good corrosion resistance of the nickel deposit and the relative simplicity of the nickel-plating process. The nickel deposit gives protection to the basis metal, and is itself preserved from surface oxidation by the bright chromium deposit ".

  2. The purpose of this document is to define the Context of Cain Motors Information ...

    These form the basis for periodic Highlight Reports issued to inform the project board of progress. 7.1. Project Manager The Project Manager will select people to do the work on the project and will be responsible for making sure that the work is done properly and completed on time.

  1. Advantages and Disadvantages of e-commerce in terms of easyjet

    Things change very rapidly in the world of the Internet. For example in the 12 months to October 2004, the number of people actively surfing the Web from home each month in Europe grew by 12% to 100 million, according to figures published by Nielson Net ratings (www.nielson-netratings.com).

  2. Assessment of the Viability of Opening an Internet Café.

    Another reason why I believe that this business can be a success is due to the fact that my results show that the internet is mainly used for business and studies, meaning it is used in constructive way .Most people need to use it, they don't use it because they

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work