History of information technology auditing

types of computer auditing

Also, it must be remembered that vigilance needs to be maintained over those who use the Internet for illegal activities, including those who are now using it for scams, crime, and covert activities that could potentially cause loss of life and harm to others.

Of course, the responsibility for ensuring that adequate internal controls are in place rests with the management. The needs of the mercantilists, which included the promotion of exchange and accumulation of capital, led to the development of money warehouses that served as depositories for the safekeeping of funds.

It seeks to thwart future scandals and restore investor confidence by, among other things, creating a public company accounting oversight board, revising auditor independence rules, revising corporate governance standards, and significantly increasing the criminal penalties for violations of securities laws.

Therefore, whereas management is to ensure, auditors are to assure. The Computer Security Act also assigned responsibility for developing governmentwide computer system security standards, guidelines, and security training programs to the National Bureau of Standards.

History of information technology auditing

The passage of the Homeland Security Act of and the inclusion of the Cyber Security Enhancement Act will have a substantial impact on private industry. Simply, society exercised an exchange of goods for goods. However, some of the laws observed contain far too many exceptions and exclusions to the point that their efficacy suffers. The unpredictability of customer needs and the shortness of product life cycles will cause the mix of production capabilities and underlying resources required by the organization to change constantly. A number[ who? This has led many organizations to concentrate on their core competencies and to outsource other parts of their value chain to specialized companies. They have been around since the s. Owing to its numerous inefficiencies and societies' demands to accommodate for the increased population, production, communication, and trading areas, this system was soon replaced by a modified barter exchange mechanism.

Also, the network must be very flexible because the organization is constantly changing. In addition, the government continues to utilize state-of-the-art techniques for the purpose of accessing information for the sake of "national security" justified currently under the Homeland Security Act.

Rated 5/10 based on 8 review
Download
History of information technology auditing