Audcise Final Output

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

AUDCISE FINAL OUTPUT

I. AUDITING IT GENERAL CONTROLS

A. System Development Process Case: Audio Visual Corporation

Required:

As an IT Auditor, identify the problems/weaknesses in the development of the new


system and provide control recommendations to AVC. Use the format below:

System Development Problems/Weaknesses Audit Recommendations


Process
Project initiation 1. Extensive resources AVC needs to make a
are required. balance between cost and
2. Project costs can be between cost and benefits
huge. form the new system so
3. It takes enormous that the maximum
time to develop a resources the entity can be
system. utilized with minimum
wastage.
System Analysis & Design Formulation of end-users Analyze the need of end
requirements is a users so that the new
complicated and tedious software can meet the
task. expectations.
Construction This stage is where much In this stage of the system
expertise is required so that development process,
a great system can be where end-users determine
constructed. the specific business need
for the proposed system
company should keep these
things in determination.
Testing & Quality Integrating the full testing The testing should be done
Assurance and quality assurance system in that the end users can be
is time-consuming and satisfied or accept the
hectic. proposed system.
Implementation Moving data and The implementation should
components from the old be done in phase manner
system to a new one is a so that it is acceptable to all
hazardous task and creates a stakeholders.
colossal problem.

B. Computer Operations and Access to Program & Data


Listed below are some scenarios. For each scenario, discuss the potential consequences
and give a prevention technique. Follow this format:

RISKS PREVENTIVE CONTROL


1. a. Damage of hardware system.  The organization should
b. Lost of data due to hardware formulate strict policies for
damage. banning food items in strategic
c. Data loss and hardware hardware locations.
damage incur a lot of additional  The smoke detector was highly
overhead of maintenance and sensitive nod its alarm went off,
repairing for the company. which triggered the sprinkler
system.
 There should be a warning alarm
from the sprinkler system before
it automatically goes in to ON
mode.
 In case the large fire, this warning
time is enough for activating fire
extinguishing system.
2. a. Malware infection may lead to  Strong application level firewall
serious security and integrity which protects the internal
concerns for the data and system system from portion of its own
within the organization. and also from external network.
b. Illegal access of data is  Installing strong antivirus
possible for external hackers. software which can detect and
c. The virus will spread in delete the presence of virus
geometric proportion which attacks.
makes the data to be destroyed  Regular system monitoring for
or corrupted leading to system illegal of unauthorized system
crash and other related damages. access through keystroke
monitoring and security scanning
software.
 Regularly scanning the entire
system for virus attacks.
3. a. Unauthorized data access for  The organization should
collecting sensitive information immediately take actions to
from internal network of an suspend or delete the login
organization. accounts of terminated
b. Illegal data leakage employees so that they don’t
c. Security threat to integrity of have future access to the system.
system and data.  As the employees was having
access to critical data like cases
control list and user IDs, all the
passwords for accessing these
data must be changed with
immediate effect.
 Stronger methods of user
authentication techniques like
one-time password should be
installed for preventing illegal
external access to system.
 Conducting regular system audit
trails for ensuring the data and
system integrity.

II. AUDITING IT APPLICATION CONTROLS


A. Brief Description of the Online System or Program

AliExpress is an e-commerce company that was founded in China in 2005 by Ma Dongrui


and Zhang Zhidong. The company's main focus is to sell products from other countries,
and it has over 20 million products listed on its website.

AliExpress is an online marketplace that connects consumers with sellers from around
the world. The app allows users to search for products and make purchases from these
sellers, which are arranged in categories based on their country of origin.

AliExpress offers an easy-to-use interface that allows users to search for and purchase
products from all over the world. Users can also use AliExpress to find local stores that
sell their products and then make purchases directly from these stores.

AliExpress has a large selection of products, with over 1 million unique offerings
available in each category. Users can filter by price range, brand, color, description, and
more. The application also enables users to save favorite products for easy access later.

B. Input/Edit Validation Controls Identified. Follow this format.

INPUT/ EDIT TESTING REMARKS/EVIDENCES


TECHNIQUES PROCEDURES
Range Check Allows user to
and Numeric- click/choose the
alphabetic specific color, shoe
check size and quantity.
The numeric-
alphabetic check is
used to prevent users
from entering data
incorrectly.
Numeric- Numeric-alphabetic
alphabetic check is used to
check and prevent users from
Completeness entering non-
Check alphabetical
characters, such as
numbers or
punctuation marks,
into a field.

Completeness check
ensures that the user
has filled out all
required fields in the
form.
Existence The existence check is
Check used to verify that a
value is available
before it is checked.

It is an effective
control because it
prevents incorrect
data from being
entered, which can
lead to a lot of
problems in the
system.
Validity Check Validity is used to
ensure that the user's
data matches the
requirements of the
system. Also checks
whether an input is
filled in correctly,
while the other
checks whether an
entire form is filled in
correctly.

You might also like