How does an audit performed using CobiT methodology differ from an audit that does not?© BrainMass Inc. brainmass.com October 25, 2018, 4:45 am ad1c9bdddf
The first thing you need to take note of is what is a regular information system or information technology audit and what is COBIT methodology. Note the following excerpts:
"An information system (IS) audit or information technology(IT) audit is an examination of the controls within an entity's Information technology infrastructure. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement. It is the process of collecting and evaluating evidence of an organization's information systems, practices, and operations." (Source: http://wikieducator.org/Information_Systems_Audit_Methodology)
"The Control Objectives for ...
This solution first tells you what COBIT is and provides you with information related to how an audit performed using Cobit methodology differ from an audit that does not.
Legal and Security Implications of E-Businesses
You are required to research and analyze the legal and /or security implications of implementing an e-business system in an enterprise.
Imagine you are launching a website where customers can buy online.
- What kind of security threats are out there.
- What security measures do you need to take? What can you do to avoid security breaches both from inside and outside the organization?
- What about SSL certificates?
- You also need to think about the data you are collecting.
- What will you do with that data?
- What are your legal responsibilities regarding data.
- What options are open to you in terms of payment processing? If you hire a third party can they look after security for you?
- What must you do to comply with the distance selling act
- What about copyright?