Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Auditing and Assurance: Case Study Question. Please answer it follow by the requirement. Thanks. Big data is presenting challenges to cybersecurity. For an example, the

Auditing and Assurance: Case Study Question. Please answer it follow by the requirement. Thanks.

image text in transcribed

Big data is presenting challenges to cybersecurity. For an example, the self-driving cars are predicted to churn out 4000 GB of data per hour of driving. Big data analytics, as an emerging analytical technology, offers the capability to collect, store, process, and visualize these vast amounts of data. Big Data Analyties in Cybersecurity examines security challenges surrounding big data and provides actionable insights that can be used to improve the current practices of network operators and administrators, Applying big data analytics in cybersecurity is critical. By exploiting data from the networks and computers, analysts can discover useful network information from data. Decision makers can make more informative decisions by using this analysis, including what actions need to be performed, and improvement recommendations to policies, guidelines, procedures, tools, and other aspects of the network processes, For many years, small businesses were an unlikely target for a sophisticated cyber-attack. A relatively unknown brand and fewer financial resources worked in their favor to fend off hackers. Not anymore. Today, the dam has broken for start-ups and small-midsize companies when it comes to cyber security. Auditors have commented that "Reliance on technology in today's society has led to a substantial increase in cybercrime. The impact of cybercrime on organisations has posed additional risk of materials misstatements which has becoming increasingly significant in relation to financial statement audits." The adoption in advance technology will enable auditor to fulfil one of the components within ISOM Iwhich will take effect from 15 Dec 2022.In ISOM I there are 8 components. The component of "resources" in ISOMI includes technological resources. Required: (1) Describe the role of auditor in relation of ISA 315 with regards to cyber security (8 marks) Discuss the FOUR categories/types of data analytics and its application in the business (with examples) (10 marks) Describe the changes embodied ISQM 1 as compared to ISQC1. (7 marks) (You are advised to compare and contrast the components with the ISQM1 and ISQC1) (iv) Explain how external auditor can apply information technology in an audit environment in relation to the component of resources" in the context of ISQM 1. (Provide some examples to support your explanation) (10 marks) Note: Do not discuss the basic tools such as email, whatapps and other basie communication tools used by auditors [Total: 35 marks Question 3

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Exploring Strategic Change

Authors: Julia Balogun, Veronica Hope Hailey, Stafanie Gustafsson

4th Edition

0273778919, 9780273778912

More Books

Students also viewed these Accounting questions