How a risk-based audit may address these concerns

Assignment Help Computer Network Security
Reference no: EM13667282

The management team of PVSS is concerned that the team may be trying to audit too many areas and that things may be missed. They are also concerned that PVSS will not be able to finish solving all of the issues in a timely manner. With this in mind, they have decided to focus on only a few key issues.

What is your understanding of how a risk-based audit may address these concerns?

Explain how you would describe to the management team the difference between a compliance and a substantive audit.

Provide examples to help clarify your explanation. Which type of audit should be performed in this project and why?

Reference no: EM13667282

Questions Cloud

Explain how many moles of nitrogen n2 are in 0.650 mol : Explain how many moles of nitrogen n2 are in 0.650 mol of ammonium carbonate (NH4) CO 3. Explain how many grams of this compound supply this much nitrogen
Find how far apart are the stones : A stone is dropped from the roof of a high building. A second stone is dropped 1.00 second later. Find how far apart are the stones when the second one has reached a speed of 11.0 m/s
Find the average deceleration of the boy : A boy jumps off a diving board 4.6 meter above the water's surface into a deep pool. Find the average deceleration (magnitude) of the boy while under the water
State the net ionic equation for the reaction : If a solution of Na2CO3 has a pH of 10. The CO32- on is the conjugate base of the HCO3- ion. State the net ionic equation for the reaction which makes a solution of Na2CO3 basic.
How a risk-based audit may address these concerns : What is your understanding of how a risk-based audit may address these concerns and explain how you would describe to the management team the difference between a compliance and a substantive audit.
Determine the resistivity of the air at the surface of earth : In the earth's atmosphere positive charges move toward the earth and negative charges moves away from it the total current is approximately 1800 Amp. Determine the resistivity of the air at the surface of the earth
Define the reaction of trans-1-bromo-2-isopropylcyclohexane : Forecast the product for the reaction of trans-1-bromo-2-isopropylcyclohexane with base under a) E2 conditions and b) E1 conditions. Utilizing appropriate structures
Find how much more work will be required to stretch it : If it requires 4.0 Joule of work to stretch a particular spring by 1.9 centimeter from its equilibrium length, find how much more work will be required to stretch it an additional 4.3 centimeter
Obtain coefficient of kinetic friction between cars and road : A 2250 kilogram car traveling at 10.0 m/s collides with a car of mass 2750 kilogram that is initially at rest at a stoplight. Obtain coefficient of kinetic friction between cars and road

Reviews

Write a Review

Computer Network Security Questions & Answers

  Increment value in one cell in excel

Discuss how to increment value in one cell in Excel if another cell is populated. or example, I have cell A that has values such as 1, 2, 3, 4 etc...

  What would the hash value of the modified file look like

Bob is concerned about the possibility of having his 100k byte file modified without his knowledge, so he calculates a 100 byte hash. Alice, unbeknownst to Bob, changes a single character in Bob's file.

  Instructions of research paper

The instructions of research paper is to write about steganography techniques and applications - types and techninques of steganography and then discuss in-depth how is is used, which technique is popular, include Figures of how the technique is us..

  Based on your understanding of networking concepts make a

based on your understanding of networking concepts create a 2- to 3-page report in a microsoft word document with

  Using rsa user ciphers text m with other user public key

Using RSA User1 ciphers his text M with User2 public key and he gets the cipher text C=371 he sends the Ciphertext to User2 who decrypts the cophertext with his private key.

  Give the security levels top secret-secret and confidential

Give the security levels Top SECRET,SECRET,CONFIDENTIAL, and UNCLASSIFIED (order from highest to lowest), and catergories A, B,C, specify what type of access (read,write, both or neither) is allowed in each of the following situations .

  Determine the encrypted message-s entropy

If this message is sent unencrypted and successfully received, determine its entropy? If this message is encrypted with DES using random 56-bit key, determine the encrypted message's entropy?

  How to demonstrate that the server is up and running

You have been asked to install an SVN repository on a server. The SVN will be remotely accessed using the svnserve daemon that is supplied with SVN (please note that this is not the most secure way to access an SVN repository)

  What security functions are typically outsourced

What security functions are typically outsourced?

  How many bits is the encrypted message

Based on the understanding of Q4 of Bart B, use the generated keys of Q2 - Part C to encrypt the message of Q1 - Part C using the Simplified DES algorithm.

  Describe and discuss the potential impact

Develop and ratify borderless cybersecurity policies that can be enforced through international litigation and accepted international sanctions via the United Nations.

  Federal government regulates labels

The federal government regulates labels, warranties, and consumer products. Without government regulation, what abuses are likely to occur?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd