-
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years, 1 month ago
An information risk profile is an evaluation of the types, amounts and priority of information risk that an organization finds acceptable and unacceptable (risk appetite).
Organizations use a risk profile as a way to mitigate potential risks and threats.
An information risk profile is critical to the success of an organization’s i…[Read more]
-
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years, 1 month ago
List risks associated with database management systems (DBMS)
Database systems interface with many different technologies and have a significant impact on a company’s resources and culture. The changes introduced by the adoption of a database system must be properly managed to ensure that they help advance the company’s objectives. The fact tha…[Read more]
-
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years, 1 month ago
Key benefits of relational databases vs traditional file system?
A database is generally used for storing related, structured data, with well defined data formats, in an efficient manner for insert, update and/or retrieval.
A file system is a more unstructured data store for storing arbitrary, probably unrelated data. The file system is more…[Read more]
-
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years, 1 month ago
What are key characters of relational database management systems?
Relational database management systems are a collection of data items organized as a set of formally-described tables from which data can be accessed or reassembled in many different ways without having to reorganize the database tables.
The key characters are as below:
1.…[Read more] -
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years, 1 month ago
Have you ever had evidence of fraud occurring? Been pressured (e.g. by an employer) to commit an act that was morally or legally questionable?
I have both had evidence of fraud occurring and been pressured by my boss to commit a fraudulent act. In fact, I witnessed my boss using the company’s credit card to go out on happy hours and have fun. T…[Read more]
-
Brou Marie Joelle Alexandra Adje commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
Daniel, you are right, humans are the biggest threat to the procure to pay process. Any steps involving humans actions i risky. In fact, given human nature, it’s impossible to stamp out fraudulent intent. However, organisations can reduce the likelihood of a successful attempt at misappropriation with the right checks and balances in place. U…[Read more]
-
Brou Marie Joelle Alexandra Adje commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
Good point Said. I also think that the good receipt step is also highly “prone” to Fraud because there could be instances where there are receipts for goods that are never been delivered. This type of fraud is not easy and sometimes impossible to detect right away. Take for example a building site. If the concrete is being supplied by a…[Read more]
-
Brou Marie Joelle Alexandra Adje commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
I definitely agree with you Sean. I’d even add that assertions are also important to investors, since most of the financial metric used to evaluate a company’s stock is computed using figures from the company’s financial statements. If the figures are inaccurate, that would obviously result in misleading financial metrics, such as earnings per…[Read more]
-
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years, 1 month ago
Vu, something similar happened to me twice with my debit card. The first time I was in Philly checking my bank account and noticed that my card was used to purchase gas in new jersey. The second time I was travelling from phoenix to Philly before taking off i checked my statement and and the minute I landed I did the same thing, and realized an…[Read more]
-
Brou Marie Joelle Alexandra Adje commented on the post, Week 3 Questions, on the site 8 years, 1 month ago
In class we discussed several dimensions of Management Assertions. Which do you believe is the most important? Why?
In my opinion, accuracy is the most important because the principal element an auditor reviews is the reliability of the financial statement assertions. The main objective of the work performed by the auditor is that of obtaining…[Read more] -
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years, 1 month ago
The concept of ‘Assertions’ is important to accountants. Who else is it important to? Why?
Assertions are also important to auditors because they assist them in considering a wide range of issues that are relevant to the authenticity of financial statements for example.
The consideration of management assertions during the various sta…[Read more] -
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years, 1 month ago
Security from the Ground Up: The Need for Data Classification
The article I found is about data classification and its importance within an organization. This article emphasizes the fact that when talking about data breaches we too often think about external threats and focus on firewalls, encryption and network monitoring as best tools to…[Read more]
-
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years, 1 month ago
Fred I do not agree when you say that ” it costs more money to react to a problem, than to prevent the problem.” In fact, when assessing risk, organizations have 4 options :
Mitigate risk – activities with a high likelihood of occurring, but financial impact is small. The best response is to use management control systems to reduce the risk o…[Read more]
-
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years, 1 month ago
Integrity and availability are the two information security objective that could be put at risk if safeguards are applied.
In fact, Integrity refers to guarding against improper information modification or destruction whereas, safeguard offers the option to “change the data, to remove or modify the sensitive information and then make the c…[Read more] -
Brou Marie Joelle Alexandra Adje commented on the post, Week 2 Questions, on the site 8 years, 1 month ago
Risk assessment is indeed a major component of control framework. It is the basis of any type of audit. The audit team is responsible for overseeing the risks and address them. if the auditors can not clearly identify the concerns they face, they cannot do their job properly.
-
Brou Marie Joelle Alexandra Adje commented on the post, Week 2 Questions, on the site 8 years, 1 month ago
Sean you are right, COBIT is usually used by internal IT organizations , whereas ITIL can be used by any organization providing internal or external IT services
Overall, I think the primary difference between these two frameworks is that COBIT is general and defines audit and compliance requirement for IT, as opposed to ITIL which helps to…[Read more]
-
Brou Marie Joelle Alexandra Adje commented on the post, Week 2 Questions, on the site 8 years, 1 month ago
I agree with Annamarie. Checklists help to ensure that the audit is conducted in a systematic and comprehensive manner, and the proper evidence and documentation are obtained. I think they help auditors do a better job and shouldn’t be dismissed
-
Brou Marie Joelle Alexandra Adje commented on the post, Week 2 Questions, on the site 8 years, 1 month ago
Exactly! And then the solution approach is eventually a mix of both the management- response and recommendation approach. In fact in the solution approach, the auditors are providing ideas to solve the issues based on their control knowledge (recommendation) and, the customers are providing ideas for resolutions based on their operational…[Read more]
-
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years, 1 month ago
Why do we need control framework to guide IT auditing?
We need control frameworks to guide IT auditing in order to :
Identify and minimize risk
Contribute to business value
Set the criteria for the it auditing process
Ensure compliance
Easily monitor performance -
Brou Marie Joelle Alexandra Adje posted a new activity comment 8 years, 1 month ago
What are the key activities within each phase?
Phase 1 Key activity : risk assessment and checklist
The audit team needs to understand what the audit will entail, which areas will be reviewed before doing anything.Phase 2 key activity is: documentation
It is needed to meet the standards of the profession.
It is crucial that…[Read more] - Load More