Strayer CIS598 Discussions (Full)
Strayer CIS598 Discussions
Week 1 Discussion
“Technology and Audit” Please respond to the following:
- How important is the documentation of the database environment? Moreover, how do you think the advent of cloud computing has affected electronic data interchange (EDI)? Are you in favor of outsourcing the auditing activity, and why or why not?
- How do computer-assisted audit solutions help the auditing process? How do different standards for professional performance of internal auditing help in maintaining the integrity of the process?
Week 2 Discussion
“Risk and Audit Management” Please respond to the following:
- How is corporate IT governance different from the usual practice? What are the elements of risk analysis? To what extent are common risk factors within individual applications and information systems helpful?
- What are the different types of audit and how is the structure of an audit plan devised? What are the essential techniques used for managing information technology audit quality?
Week 3 Discussion
“Audit Evidence Process and Strategic Planning” Please respond to the following:
- In what possible ways can an IT auditor collect audit evidence in order to express opinions? List three (3) different techniques for project scheduling. What are computer-assisted audit solutions?
- How do you develop a link of business intelligence and competitive strategies with corporate strategy? Does business process engineering provide any source of motivation to organizations?
Week 4 Discussion
“IT Management and Governance Issues” Please respond to the following:
- Do you think that amalgamation of IT technologies can create a serious threat for management? Why or why not? Do you think that governance framework provides complete solution for needs of information technology? Why or why not?
- Is change control necessary for use of modified technologies? How and in what possible ways? Among the three (3) primary areas of responsibility of IT department (technical support, system development, and operations), which of them plays an essential role in IT process, according to your point of view and why?
Week 5 Discussion
“Information Management and Software Development” Please respond to the following:
According to your point of view, which of the defined criteria of measurement is considered as most important for evaluation and monitoring of information systems? How does computer-aided software engineering (CASE) aid in analyzing and evaluating characteristics of a project?
Discuss how IT is impacting the business processes and applications of e-Business? How does the system development life cycle (SDLC) assist in accomplishing essential tasks and objectives of an organization?
Week 6 Discussion
“Audit Role and Development of Application Controls” Please respond to the following:
Do you think that criteria should be developed for the decision of buying audit and control of packages and services? Why or why not? Among the different factors for feasibility success, which do you consider to be the most important and why?
How is the auditing of application system carried out? What are the four (4) most important specific functions of configuration management and why are they important?
Week 7 Discussion
“Technology Security” Please respond to the following:
- Do you think that there is a need for classifying individual parts of a network? What is its importance in real-based applications? How can information asset security be enhanced by control techniques?
- How are the exposure and issues of logical access control explored with the help of access control software?
Week 8 Discussion
“Protection of the IT Architecture and Assets” Please respond to the following:
- How are the risks of natural events mitigated through control measures of physical security? Why has business continuity been recognized as a fundamental component of management’s role in achieving good corporate governance?
- Do you think that displacement control can cover a variety of threats? If yes, then in what ways? If not, then why not? Do you think that use of e-Commerce can impose serious challenges on organizations? Why or why not?
Week 9 Discussion
“Auditing UNIX/Linux and Preventing IT Fraud” Please respond to the following:
- Which of the unique features / characteristics of UNIX / Linux makes it different from other operating systems? Why has Windows 7 steadily become the operating system of choice in the corporate environment? Provide justification to support your answer.
- How do threats in a cloud environment multiply? Do you think that advances in computer science have come at a staggering pace and computer crime has remained in step with them? How and Why?
-
Rating:
/5
Solution: Strayer CIS598 Discussions (Full)