Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Use the following as references for the requirements above: As the IT audit senior of the engagement, you are presenting to the IT manager and

image text in transcribed

Use the following as references for the requirements above:

image text in transcribed

image text in transcribed

image text in transcribed

As the IT audit senior of the engagement, you are presenting to the IT manager and partner (as part of the planning meeting) the results of the risk assessment performed in Exhibit 3.3. Based on such results (look at Exhibit 3.3, under the Risk Rating" and Action Priority columns), it seems clear that the audit should focus on Financial Application #2 (FA2). Nevertheless, the IT manager and partner, based on previous relevant experience, believe that the audit should be performed on Financial Application #1 (FA1). The planning meeting is over, and you still feel doubtful on the decision just made. Your task: Prepare a two-page memo to the audit manager (copying the partner) stating your reasons why FA2 should be audited first. In order to convince the audit manager and partner, you are to think outside the box. In other words, think of additional information not necessarily documented in the risk assessment shown in Exhibit 3.3, and document in your memo information related to: a. Any additional vulnerabilities or weaknesses that may currently be in place affecting FA2 b. Any additional threat-sources that can trigger the vulnerabilities or weaknesses you just identified for FA2 c. Any additional risks or situations involving exposure to loss for the financial information in FA2 d. Any additional controls or procedures that should be implemented to mitigate the risks just identified Exhibit 3.3 Risk Assessment Example for the IT Functional Audit Area Likelihood Determination Impact Likelihood Level Risk Rating Impact Probability Magnitude Level Assigned of Impact Value 0.50 High 75 Recommended Control Action Priority Threat-Source Risk Medium 37.5 Medium Financial IT Area / Application Vulnerability Financial IS Operations / Application. There is no #1 (FA1) offsite storage for data backups to provide reasonable assurance of availability in the event of a disaster. Hurricanes, system failures, unexpected shutdowns Backups of FA1 financial data are archived off-site to minimize risk that data are lost. FA1 information cannot be recovered in the event of system failure, impacting the Company's ability to report financial information according to established reporting requirements. Security parameters are not appropriately configured, allowing for potential unauthorized user access to FA1. 0.75 High 75 56.25 Unauthorized High users (hackers, terminated employees, and insiders) Information Security Several of the Company's logical security settings (i.e., passwords) configured for FA1 are not consistent with industry best practices. The identity of users High is authenticated to FA1 through passwords consistent with industry best practices minimum security values. Passwords must incorporate configuration for minimum length, periodic change, password history, lockout threshold, and complexity. (Continued) Exhibit 3.3 (Continued) Risk Assessment Example for the IT Functional Audit Area Risk Rating Recommended Control Action Priority Risk Likelihood Determination Impact Impact Likelihood Probability Magnitude Level Threat-Source Level Assigned of Impact Value Unauthorized Very High 1.00 High 75 users (hackers, terminated employees, and insiders) 75 Financial IT Area / Application Vulnerability Financial Information Application Security / FA2 #2 (FA2) owners do not periodically review user access privileges. Very High Users possess privileges that are not consistent with their job functions, allowing unauthorized or incorrect modifications to FA2's data, which could cause management decisions based upon misleading information. User access privileges within FA2 are periodically reviewed by application owners to verify access privileges remain appropriate and consistent with job requirements. 1.00 High 75 75 The security Very High Information Security Terminated user accounts are not removed from FA2. Unauthorized Very High users (terminated employees) Terminated users can gain access to FA2 and view or modify its financial information administrator is notified of employees who have been terminated. Access privileges of such employees are immediately changed to reflect their new status. (Continued) Exhibit 3.3 (Continued) Risk Assessment Example for the IT Functional Audit Area Likelihood Determination Impact Risk Rating Recommended Control Action Priority Risk 18.75 Low Impact Financial IT Area / Likelihood Probability Magnitude Level Application Vulnerability Threat-Source Level Assigned of Impact Value Change Control Unauthorized Low 0.25 High 75 Management / application Test results for changes and FA2 upgrades modifications are not approved by management, prior to their implementation into production. a Computed by multiplying the Probability Assigned" and the Impact Level Value." FA2 changes are not properly authorized Implementation of such changes could result in invalid or misleading data. Changes to FA2 are tested and approved by management prior to their implementation in production in accordance with test plans and results

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Accounting Managing Business Information Preliminary Edition Volume I

Authors: Thomas L. Albright , Robert W. Ingram

1st Edition

0324061625, 978-0324061628

More Books

Students also viewed these Accounting questions

Question

What do you know of my (the interviewers) research program?

Answered: 1 week ago