IT auditing provides a means to gain independent and objective assurance that risks related to the use and deployment of IT assets are appropriately managed. As discussed in week 1, these IT-related risks can include [SELECT ALL THAT APPLY]: a) Confidentiality – Sensitive information (e.g., personally identifiable information, intellectual property) is protected from unauthorized access and disclosure. b) Availability – Information is available when required to meet business objectives. c) Compliance – Information complies with those laws, regulations, contractual arrangements to which the business is subject. d) Integrity – Information is accurate and complete as well as valid in accordance with business rules and expectations.
IT auditing provides a means to gain independent and objective assurance that risks related to the use and deployment of IT assets are appropriately managed. As discussed in week 1, these IT-related risks can include [SELECT ALL THAT APPLY]:
a) Confidentiality – Sensitive information (e.g., personally identifiable information, intellectual property) is protected from unauthorized access and disclosure.
b) Availability – Information is available when required to meet business objectives.
c) Compliance – Information complies with those laws, regulations, contractual arrangements to which the business is subject.
d) Integrity – Information is accurate and complete as well as valid in accordance with business rules and expectations.
Step by step
Solved in 3 steps