The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Audit Process:
Organizations contract or hire individuals with specific skills to conduct internal audits to ensure their organizations are following their documented policies, procedures, and processes. In addition, federal mandates are placed on specific organizations within industries requiring continuous audits, whereas organizations contract outside auditors to work with their internal auditors in determining the health of the organization.
Identify the internal and external processes used by auditors for your chosen organization from your Week One assignment.
Write a few paragraphs describing the processes you have identified. Be sure to include any Federal mandates imposed,
Create a 4- to 6-slide presentation  that depict processes typically followed within your chosen organization supporting internal and external audits.
Include two additional peer review resources to support your analysis.
The attached files are from Week 1 and Week 2.
Â
Â
1The Security Vulnerability Report of the CommonWealth One Federal Credit Union.Security vulnerability report clearly outlines any possible areas in which an organizationis vulnerable to attacks, loss of data and outrage. The vulnerability can be found in the mostpopular operating systems, firewalls, routers and the embedded systems. Vulnerability leads toentire system compromise and loss of sensitive information and the organization's data. Attackerstake advantage of the various vulnerabilities to exploit some confidential information from theirvictims. Organizations examine the most area where they are vulnerable to prepare reports onhow to rectify the systems to block any possible attack. Based on the vulnerability report,organizations are able to plan appropriately for budget and resource improvements for theweaker areas of security.CommonWealth One Federal Credit Unionis a local not-for-profit financial servicesprovider offering its members full service banking, including free checking, banking, specializedloans, savingsplans, investments, financial tools and educationalprograms.CommonWealth OneFederal Credit Union was chartered in 1944, with only 94 members and an all-volunteer staff.Since then, CommonWealth One has grown to become a full-service financial institution withover 36,000 members and over $300 million in assets.They have branches located in NorthernVirginia, Washington, DC and Harrisonburg, VA.The reasons for data intrusion are mostly
financial.This automatically makesCommonWealth One Federal Credit Uniona big target.Some applications may be compromisedthrough code injections.GozNym malware, for example, usually adds codes into organization’swebsite and generates pop-up screens requesting individual data.Through SQL injection,malware can get into delicate data in databases and/or get access to additional areas of thenetwork via a web application.Web application attacks are very difficult to spot since
Audit Process:
Organizations contract or hire individuals with specific skills to conduct internal audits to ensure their organizations are following their documented policies, procedures, and processes. In addition, federal mandates are placed on specific organizations within industries requiring continuous audits, whereas organizations contract outside auditors to work with their internal auditors in determining the health of the organization.
Identify the internal and external processes used by auditors for your chosen organization from your Week One assignment.
Write a few paragraphs describing the processes you have identified. Be sure to include any Federal mandates imposed,
Create a 4- to 6-slide presentation  that depict processes typically followed within your chosen organization supporting internal and external audits.
Include two additional peer review resources to support your analysis.
The attached files are from Week 1 and Week 2.
Â
 ATTACHMENT PREVIEW Download attachment
1The Security Vulnerability Report of the CommonWealth One Federal Credit Union.Security vulnerability report clearly outlines any possible areas in which an organizationis vulnerable to attacks, loss of data and outrage. The vulnerability can be found in the mostpopular operating systems, firewalls, routers and the embedded systems. Vulnerability leads toentire system compromise and loss of sensitive information and the organization's data. Attackerstake advantage of the various vulnerabilities to exploit some confidential information from theirvictims. Organizations examine the most area where they are vulnerable to prepare reports onhow to rectify the systems to block any possible attack. Based on the vulnerability report,organizations are able to plan appropriately for budget and resource improvements for theweaker areas of security.CommonWealth One Federal Credit Unionis a local not-for-profit financial servicesprovider offering its members full service banking, including free checking, banking, specializedloans, savingsplans, investments, financial tools and educationalprograms.CommonWealth OneFederal Credit Union was chartered in 1944, with only 94 members and an all-volunteer staff.Since then, CommonWealth One has grown to become a full-service financial institution withover 36,000 members and over $300 million in assets.They have branches located in NorthernVirginia, Washington, DC and Harrisonburg, VA.The reasons for data intrusion are mostly financial.This automatically makesCommonWealth One Federal Credit Uniona big target.Some applications may be compromisedthrough code injections.GozNym malware, for example, usually adds codes into organization’swebsite and generates pop-up screens requesting individual data.Through SQL injection,malware can get into delicate data in databases and/or get access to additional areas of thenetwork via a web application.Web application attacks are very difficult to spot since
Attachments:
-----------