-
Shizhong Yang posted a new activity comment 8 years ago
Nice Post! I agree with your answers that lack of formal policy for SLA updates could be a common issue for auditors.
-
Shizhong Yang posted a new activity comment 8 years ago
Nice Post! I agree with your answers that cultural differences and language barriers could be risks for outsourcing.
-
Shizhong Yang posted a new activity comment 8 years ago
Explain common SLA issues identified by auditors
A service level agreement (SLA) is defined as a contract between a service provider and
a customer. It details the nature, quality, and scope of the service to be provided. It is also
sometimes referred to as a ‘service level contract’.
Failure to monitor SLAs can lead to problems of acc…[Read more] -
Shizhong Yang posted a new activity comment 8 years ago
What are the benefits and risks of out-sourcing?
Outsourcing most commonly known as offshoring has pros and cons to it. Most of the time, the advantages of outsourcing overshadow the disadvantages of outsourcing.
Benefits:
1. Swiftness and Expertise: Most of the times tasks are outsourced to vendors who specialize in their field. The…[Read more] -
Shizhong Yang posted a new activity comment 8 years ago
Absolutely, I agree with you. A VPN has several advantages which are cost saving and scalability.
-
Shizhong Yang posted a new activity comment 8 years ago
Vu Do, I agree with your answer that Open System Interconnection (OSI) model is a network framework to implement protocols through 7 different layers.
-
Shizhong Yang posted a new activity comment 8 years ago
What are the advantages of VPN?
VPN is popular both among home and corporate users. Its popularity is due to the fact that it brings unmatched benefits in an interconnected world full of challenges to information security and privacy.
VPN has unique advantages from which the top ones are improved security, privacy protection, access to…[Read more]
-
Shizhong Yang posted a new activity comment 8 years ago
What is OSI model? What’s the main function of each OSI layer?
OSI (Open Systems Interconnection) is reference model for how applications can communicate over a network. A reference model is a conceptual framework for understanding relationships. The purpose of the OSI reference model is to guide vendors and developers so the digital c…[Read more]
-
Shizhong Yang posted a new activity comment 8 years ago
Hi Alexandra Adje, I totally agree with you that protecting the operating system is one way to take precautions to protect information assets.
-
Shizhong Yang posted a new activity comment 8 years ago
I totally agree with you that the operating system is the primary level of software that allows your computer to accomplish beneficial work. Therefore, it is so important to protect operating systems.
-
Shizhong Yang posted a new activity comment 8 years ago
Johnson , I totally agree with your answers!!
-
Shizhong Yang posted a new activity comment 8 years ago
Johnson , I totally agree with you that DBMS has more benefits over traditional file system.
-
Shizhong Yang posted a new activity comment 8 years ago
I totally agree with your answer,Ming Hu!
-
Shizhong Yang posted a new activity comment 8 years ago
Wenting Lu,
You are absolutely right! We need control framework to guide IT auditing because it serves as guidelines for IT audtiors to follow. -
Shizhong Yang posted a new activity comment 8 years ago
Jianhui,
You are absolutely right.! I agree with you that employee and contractor’s behavior is the primary source of costly data. -
Shizhong Yang posted a new activity comment 8 years ago
Jianhui,
You are absolutely right.. There would be different kind of auditors such IT, Operational, Financial. All the content they are going to audited is emerging with the technology. It will be vital for auditors have some understanding of technology. -
Shizhong Yang posted a new activity comment 8 years, 2 months ago
Why is so important to protect operating systems?
An OS takes care for all input and output in a computer system. It manages users, processes, memory management, printing, telecommunication, networking etc.
It sends data to a disk, the printer, the screen and other peripherals connected to the computer
And because every machine is build…[Read more]
-
Shizhong Yang posted a new activity comment 8 years, 2 months ago
Question: Key benefits of relational databases vs traditional file system?
The biggest single difference is database systems actually know the data and the structure of the data they manage at a very deep level, while the lowest-level data item for file systems is typically the page (Paging).
At the lowest level, there is a lot of…[Read more]
-
Shizhong Yang posted a new activity comment 8 years, 2 months ago
Question: Comparing ITIL and COBIT: list some key similarities and difference based on your understanding.
COBIT (Control Objectives for Information and Related Technology) and ITIL (Information Technology Infrastructure Library) have been used by information technology professionals in the IT service management (ITSM) space for many years.…[Read more]
-
Shizhong Yang posted a new activity comment 8 years, 2 months ago
An IT audit is the examination and evaluation of an organization’s information technology infrastructure, policies and operations. Information technology audits determine whether IT controls protect corporate assets, ensure data integrity and are aligned with the business’s overall goals. IT auditors examine not only physical security controls,…[Read more]
- Load More