The Latest Progress and Concerns Regarding Mobile Technology Auditing
Abstract
The relevance of mobile technology in today’s world cannot be overstated. This is more so the case when it comes to convenience and efficiency enhancement. However, as much as mobile technology presents numerous benefits for organizations operating in today’s increasingly competitive marketplace, it also introduces several unique risks. This text concerns itself with mobile technology auditing. In so doing, it will not only highlight the latest approaches towards risk assessment, but also the controls that are being embraced in an attempt to mitigate risks associated with mobile technology.
Introduction
Smart devices such as tablets and phones have effectively revolutionized organizational processes and functionalities. In essence, a mobile device could be thought of as a “small computing device used for the assistance and convenience of certain aspects of a conventional computer in environments where carrying a computer would not be practical” (Institute of Internal Auditors, 2017). Today, thanks to mobile technology, we have a truly mobile workforce. With the computing power of today’s mobile devices, employees can function remotely as effectively as they would in a centralized physical office setting. It therefore follows that with mobile technology, business can be conducted in a way that is truly mobile via the utilization of a myriad of applications (apps) designed for various functionalities. With this in mind, it is important to note that while some organizations provide employees with mobile devices for the conduction of organizational duties and roles, others permit (or encourage) employees to make use of their own devices in what is commonly referred to as bring your own device (BYOD). Towards this end, it should be noted that whichever policy an organization has in place regarding the use of mobile devices (organization provided or BYOD), mobile technology still remains an expanding technology – effectively meaning that the use of mobile technology still presents a wide range of challenges and risks. This effectively warrants the adoption of a well-defined risk assessment, management, and control plan. The relevance of mobile technology auditing, therefore, cannot be overstated. This is more so the case when it comes to ensuring that the organization has in place strengthened security controls to rein in the various risks associated with the active utilization of mobile technology devices.
Technology Involved
In essence, it is important to note that the risks as well as controls relevant to mobile technology devices form the basis of audit procedures. These inform the direction of audit objectives as well as scope. Therefore, towards this end, the need to evaluate risk exposures cannot be overstated especially when it comes to the assessment of risk exposure. In the past, there have been a number of recurrent risks associated with mobile technology. Senft, Gallegos, and Davis (2012) identify these as “unauthorized access risks, physical security risks, mobile data storage device risk, operating system or application risk, network risk” (600). The nature as well as form of these risks keeps changing over time. In the words of Khan (2016), “in order for the proper controls for mobile apps to be developed and tested, one must first dissect the layers of risk.” As the author further points out, the said layers of risk could be numerous. In general however, in seeking to assess as well as evaluate the technology involved in mobile device security controls, various risks could be grouped into definitive categories.
i. Risks Relating to Information Security
Information security risks relate to not only applications, but also network connections as well as data storage and backup. With regard to applications, it should be noted that there are various apps (mostly developed by third party vendors) that users could download from app stores. Towards this end, if the relevant restrictions or limitations on third-party apps are not put in place by app stores as well as mobile technology platforms, mobile technology devices are left exposed to infections from Trojan horses, viruses, etc. Khan (2016) identifies four mobile app security risk segments – i.e. mobile...
References
Antonucci, D. (2017). The Cyber Risk Handbook: Creating and Measuring Effective Cyber Security Capabilities. Hoboken, NJ: John Wiley & Sons.
Institute of Internal Auditors (2017). Auditing Your Company's Mobile Devices - Institute of Internal Auditors Raleigh-Durham Chapter. Retrieved from https://chapters.theiia.org/raleigh-durham/News/ChapterDocuments/Auditing%20Mobile%20Devices.pdf
KPMG (2017). Top 10 Internal Audit Focus Areas for Technology Companies. Retrieved from https://assets.kpmg.com/content/dam/kpmg/us/pdf/2017/03/kpmg-top-10-internal-audit-tech-2017.pdf
Khan, M.J. (2016). Mobile App Security—Audit Framework. Retrieved from https://www.isaca.org/Journal/archives/2016/volume-4/Pages/mobile-app-security-audit-framework.aspx
Kim, D. & Solomon, M.G. (2016). Fundamentals of Information Systems Security (3rd ed.). Burlington, MA: Jones & Bartlett Publishers.
Senft, S., Gallegos, F. & Davis, A. (2012). Information Technology Control and Audit (4th ed.). New York, NY: CRC Press.
Tallez, J. & Zeadally, S. (2017). Mobile Payment Systems: Secure Network Architectures and Protocols. New York, NY: Springer
Tysiac, K. (2015). How Internal Audit Can Help Manage 10 Top Technology Risks. Retrieved from https://www.journalofaccountancy.com/news/2015/aug/internal-audit-technology-risks-201512911.html
Ethics Core-Tex is facing a number of problems that could result in negative publicity. At present, the company is facing multiple challenges but has escaped major headlines. Thus, its stock price has not been hit too hard as the result of the accounting accusations. For the CEO, there are a few key things that need to be done. The first move, the muzzling of the C-suite, is essential. From a public
Social Media Presence at LinkedIn Professional Picture Here Ibrahim Swaray Cyber Security Graduate/Cyber Security Officer at University of Maryland Ridgewood Area, Baltimore, Maryland -- Information and Cyber Security Current: University of Maryland University of College Previous: Northrop Tech, CPCI, Education: University of Maryland Send Ibrahim InMail Connect us.linkedin.com/pub/ibrahim-swaray/35/ab7/537 Contact Info Innovative cyber security graduate seeking position as an IT and Cyber Security Analyst to provide cyber, technical and information security advice for your organizations to protect your information assets. A broad knowledge
SAP'S EXTERNAL FINANCIAL REPORTING SAP External Financial Reporting SAP's external financial reporting History of SAP SAP has a proud 40-year history that is founded on their mantra of innovation. Their success has come from their innovative culture. The company was founded in 1972 when five like-minded former IBM employees came together and created a company with the vision of providing clients with technological innovations. The company was called Systemanalyse und Programmentwicklung (SAP) which was
This role is in response to clients' demands for a single trustworthy individual or firm to meet all of their financial needs. However, accountants are restricted from providing these services to clients whose financial statements they also prepare." (U.S. Department of Labor, Bureau of Labor Statistics, 2009) 1. Public Accounting The work entitled: "The Reality of the CPA's Role" states that modern CPAs work "behind the scenes as trusted advisors in
International Financial Reporting Standards (IFRS) Generally Accepted Accounting Principles (U.S. GAAP) US GAAP is the general accounting principles, standard, and procedures that the U.S. companies follow to prepare their financial statements. GAAP has combination of accepted standards that the companies should follow when recording and reporting their accounting information. For example, GAAP has set up the rules that companies should follow when preparing the financial data such as balance sheet, revenue recognition,
Apple Inc. that was previously known as Apple Computer, Inc. is an American multi-national corporation that deals in consumer electronics, personal computers and computer software and was founded in 1976. Steve Jobs was the co-founder of Apple. During his stay as CEO, company launched series of revolutionary technologies. He died on October 5, 2011. Currently, Tim Cook is the CEO of Apple. Before being on this position, Cook was Apple's
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now