1. Discuss the risks, benefits, and audit issues related to cloud computing.
2. What is the role of internal audit for enterprise-wide risk management?
QUESTION 1
Risks related to cloud computing
• Evaluate Virtualization risks • Evaluate SaaS risks • Evaluate PaaS risks • Evaluate IaaS risks • Understand public cloud risks • Understand private cloud risks • Understand hybrid cloud risks • Evaluate cloud consumer risks • Evaluate cloud provider risks • Perform an analysis of the security risks
Benefits related to cloud computing
Highly scalable , low cost , affordable, great interface to users , easy accessibility, wide range of services to offer, secure etc.
Audit Issues related to cloud computing
Identify the risk of cloud computing operations.
Identify the risk audit of cloud computing operations.
Identify the audit standards of cloud computing operations.
Integrating the risk and audit process of cloud computing practice.
QUESTION 2.
The role of internal auditing in enterprise-wide risk management is an independent, objective assurance and consulting activity. Its core role with regard to enterprise-wide risk management is to provide objective assurance to the board on the effectiveness of risk management. Indeed, research has shown that board directors and internal auditors agree that the two most important ways that internal auditing provides value to the organization are in providing objective assurance that the major business risks are being managed appropriately and providing assurance that the risk management and internal control framework is operating effectively.
Enterprise-wide risk management activities and indicates which roles an effective professional internal audit activity should and, equally importantly, should not undertake. The key factors to take into account when determining internal auditing’s role are whether the activity raises any threats to the internal audit activity’s independence and objectivity and whether it is likely to improve the organization’s risk management, control and governance processes.
1. Discuss the risks, benefits, and audit issues related to cloud computing. 2. What is the...
A major area of concern for companies is the risks surrounding the telecommunications networks that support many of today’s enterprises. T/F In the United States, the American Society for Quality (ASQ), under its earlier name of American Society for Quality Control, played a leading role in setting standards and promoting best practices in quality control. T/F The risk management function may identify governmental actions that may place some foreign country operations at risk. T/F An important difference between an ERM...
Discuss the benefits and risks of genetic testing. What is the nurse’s role in the health care setting?
+1. Define what is meant by the following cloud computing terms and describe the potential benefits for a small computing company: a) Infrastructure as a service (4 Marks) b) Platform as a service (4 Marks) c) Software as a service (4 Marks) 2. Define what is meant by the following terms a) Multimedia (2 Marks) b) Hypertext (2 Marks) c) Metadata (2 Marks) d) XML (2 Marks
1. Discuss and explain network bandwidth and latency issues common to Internet architecture. (Maximum 50 words to discuss this topic) 2. Discuss and explain the importance of high availability and security within data centers and the primary data center facility components and hardware. (Maximum 50 words to discuss this topic) 3. Discuss and explain basic security concepts related to cloud computing, including Confidentiality, Integrity, Authenticity, Availability, Threat, Vulnerability, Risk, Security Controls, Security Mechanisms, Security Policies. (Maximum 50 words to discuss...
Find two examples of Information Technology risk issues. Trace the related events and discuss how a risk management approach may have prevented the issues from occurring. In discussing your classmates posts, dig deeper into the underlying sources of risk. Look at other organizations and see if you can identify the same types of risks.
6 Kshetri, N. (2013). Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy, 37(4-5), 372. doi:http://dx.doi.org.cyrano.ucmo.edu:2048/10.1016/j.telpol.2012.04.011. 7 R. Latif, H. Abbas, S. Assar, Q. Ali, "Cloud computing risk assessment: a systematic literature review," Future Information Technology, pp. 285-295, Springer, Berlin, Germany, 2014 10 Privacy-preserving multi-keyword ranked search over encrypted cloud data Ning Cao; Cong Wang; Ming Li; Kui Ren; Wenjing Lou.IEEE Transactions on Parallel and Distributed Systems Vol. 25, Iss. 1, (Jan 2014):...
Question #1 While the lecture emphasized the advantages of cloud computing - identify and discuss some challenges/pitfalls associate in general with cloud computing. Identify and discuss briefly 3 potential problems.
Discuss some of the important features of audit documentation and what are the risks of inadequate audit documentation.
DQ1. What is an Audit Work Program (some call it Audit Program)? The audit work program - Email Surveillance Audit Program – What is the structure and contents including various audit steps. Find 1-2 steps in the audit program where the audit software can be used. How can audit software be used to gather evidence?. (the Audit program (Email Surveillance Audit Program details is attached). DQ3. Review the contents of the Audit Manual of Office of University Audits at University...