Auditing model question paper
How to write a good audit programme?
Give essentials of a good audit programme
Describe briefly the provision of companies Act with regard to the appointment of an auditor
If you have already studied the auditing and services notes, then it’s time to move ahead and go through previous year auditing and services question paper
What are audit working papers?
Audit working papers are the property of the auditor
In order to keep professional ethic, it cannot discover to third party without consent of the client unless limited specified situations mentioned in ISA 230 Documentation and required by law, the examples are court order, for public interest and so on
What should be included in an audit report?
ICQ's, Checklists, and Forms OH MY! A record of the auditors' work should be retained in the form of working papers
Working papers should contain sufficient information to enable an experienced auditor having no previous connection with the audit to ascertain from them the evidence that supports the auditors' significant conclusions and judgments
Type of data model
An entity–attribute–value model (EAV) is a data model optimized for the space-efficient storage of sparse—or ad-hoc—property or data values, intended for situations where runtime usage patterns are arbitrary, subject to user variation, or otherwise unforeseeable using a fixed design.
The use-case targets applications which offer a large or rich system of defined property types, which are in turn appropriate to a wide set of entities, but where typically only a small, specific selection of these are instantiated for a given entity.
Therefore, this type of data model relates to the mathematical notion of a sparse matrix.
Process of identifying structural vulnerabilities
Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified and enumerated, and countermeasures prioritized.
The purpose of threat modeling is to provide defenders with a systematic analysis of what controls or defenses need to be included, given the nature of the system, the probable attacker's profile, the most likely attack vectors, and the assets most desired by an attacker.
Threat modeling answers questions like Where am I most vulnerable to attack?, What are the most relevant threats?, and What do I need to do to safeguard against these threats?.
Type of data model
An entity–attribute–value model (EAV) is a data model optimized for the space-efficient storage of sparse—or ad-hoc—property or data values, intended for situations where runtime usage patterns are arbitrary, subject to user variation, or otherwise unforeseeable using a fixed design.
The use-case targets applications which offer a large or rich system of defined property types, which are in turn appropriate to a wide set of entities, but where typically only a small, specific selection of these are instantiated for a given entity.
Therefore, this type of data model relates to the mathematical notion of a sparse matrix.
Process of identifying structural vulnerabilities
Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified and enumerated, and countermeasures prioritized.
The purpose of threat modeling is to provide defenders with a systematic analysis of what controls or defenses need to be included, given the nature of the system, the probable attacker's profile, the most likely attack vectors, and the assets most desired by an attacker.
Threat modeling answers questions like Where am I most vulnerable to attack?, What are the most relevant threats?, and What do I need to do to safeguard against these threats?.