answersLogoWhite

0

What has the transactions been used for, how has the transactions been used, auditee has continued to do business, failure to pay taxes during tax time frame

User Avatar

Wiki User

12y ago

What else can I help you with?

Continue Learning about Information Science

WHAT IS Non-repudiation of data?

Non-repudiation of data refers to the ability to prove that a specific individual took a particular action and cannot deny it later. It ensures that the sender of a message or creator of data cannot later deny the authenticity of their actions. This is often achieved through the use of digital signatures or audit logs.


How do you maintain confidentiality in information?

To maintain confidentiality in information, you can ensure data encryption, limit access to sensitive information only to authorized personnel, establish secure data storage practices, and regularly audit and monitor access to data. It is also important to establish clear policies and procedures for handling confidential information and provide training to staff on confidentiality protocols.


How can data integrity be maintained?

Data integrity can be maintained by implementing methods such as data validation, data encryption, access controls, regular backups, and audit trails. By ensuring that data is accurate, secure, and only accessible to authorized users, organizations can safeguard their data integrity. Regular monitoring and updates to security measures are also essential in maintaining data integrity.


What is Non-repudiation in information assurance?

Non-repudiation is the inability to deny sending a message, and is usually accomplished via digital signatures or a trusted third party (TTP). If the signature is known to belong to the sender, then we can assume that any message sent using that signature was sent with the knowledge of the sender. Therefore, the sender can not later say, "I never sent a resignation letter" when we have a digitally signed message saying otherwise. This method is common with asymmetric (public key) cryptography. When using a TTP, the sender will send a message (signed or not) to a third party which the sender and receiver have previously agreed upon, the TTP then forwards the message to the final recipient(s). This method of transmission is generally used with symmetric (private key) cryptography. Because the TTP has received the message, they essentially act as witnesses, so the sender can not deny having sent a message. The caveat with non-repudiation is that we assume the keys have not been compromised - but that's another discussion. The mechanics of how these forms of cryptography work can be found elsewhere on this site, or at sites dedicated to IA, cybersecurity, and cryptography.


What is an synonym for inquiry?

question, analysis, audit, catechizing, check, cross-examination, delving, disquisition, examination, exploration, fishing expedition, grilling, hearing, inquest, inquisition, inspection, interrogation, interrogatory, investigation, legwork, poll, probe, probing, pursuit, query, quest, question, questioning, quizzing, request, research, scrutiny, search, study, survey, third degree, trial balloon

Related Questions

What are the different types of files that are associated with tps?

TPS (Transaction Processing System) typically involves several types of files, including transaction files, master files, and audit files. Transaction files store individual transactions as they occur, master files maintain the current state of data, and audit files track changes for security and compliance purposes. Additionally, backup files may be used for data recovery and integrity. Each of these file types plays a crucial role in ensuring accurate and efficient transaction processing.


What do you mean by system audit?

System audit is a process of checking and illustrating a system.


What is partial audit?

An audit which is conducted considering the particular area of accounting. Under partial audit, audit of whole account is not conducted. Generally, transaction of business is related to cash, debtor, creditor, stock etc. A business may conduct an audit of any of these transactions. An auditor should conduct audit of that transaction as per the scope determined by the agreement. An auditor sign the report clearing stating that the engagement is 'partial audit'. If it is not done so, an auditor will be liable for the loss which is caused due to using the report as complete audit.


What are the main steps in the night audit process?

The main steps when conducting the night audit process includes security checks. The processing of the late charges, processing floats and the balance of the shifts.


What are the main steps in the conduct night audit process?

The main steps when conducting the night audit process includes security checks. The processing of the late charges, processing floats and the balance of the shifts.


What is night audit?

Night Audit is a common activity which is carried out by authorized persons such as Admin or Auditor. That is you must be privileged to audit. The auditor at the end of the day can do the audit on hotel transaction activities carried out on that day and get back to the management if found something improper.


How do you audit entertainment expenses?

The best way to audit entertainment expenses is to compare the receipts to the expenditures. When there is a problem you should contact the accounting department to get the details about the transaction.


What are audit queries?

Audit queries are questions asked by an auditor during an investigation. These may be used to gather information to come to a conclusion in the audit.


What is the importance of sampling in audit testing?

It takes too much time and effort to check each transaction.


What is audit client screening and what are audit client screening procedures?

During an audit, a client may be screened before the actual audit to inform them of what will take place. This is a time to give them information on what to bring and answer questions.


What is system auditing?

A system audit is an audit made throughoutÊthe computer system to determine the significance of their effectiveness and to recommend improvements. It is an audit of a system or subsystem against system requirements in order to show conformity or nonconformity to the system.Ê


What is sales audit trial?

I assume you mean "audit trail". An audit trail is any system set up to check who did what, and when.