This is because banks in the world today maintain great amounts of personal data on employees and customers. The other reason is the existence of technology proliferation. The data thieves have become improved their inventiveness (Umar, 2004). The businesses, however, have not concentrated on keeping up on corporate policies, tools, training, procedures as well as compliance efforts. The audit and control technology, however, has been initiated by experts with the latest technology to provide the banks with comprehensive as well as pragmatic solutions as far as information security is concerned.The technology has a number of capabilities. One of the capabilities is that the technology utilizes modern procedures and techniques in determining risk tolerance as well as its relationship with the entrepreneur’s infrastructure. The technology’s procedures have been deliberated in a way that will minimize disruption of daily operations of the responsible individual. The technology also has cell-level audit trails. The technology’s software remotely monitors the files in the corporate file shares as well as in the share point document libraries (Moeller, 2010). The technology is also capable of keeping the revision history of all the responsible individual’s files. This is of great advantage to the entrepreneur since they are given an opportunity of comparing any two versions as well as restoring the prior versions.Another major capability of the audit and control security technology is that it has automated internal controls. It offers the owner of the technology to automate the key controls for the cell level auditing, change control, version control, duties’ segregation, data integrity, security and reporting. This means that the technology has a wide range of flexibility the owner can change it suit his or her specifications. It also offers an improved level of efficiency. The other capability is the technology’s web-based interface. The administrative user interface of the audit and control technology resembles the SharePoint server interface and hence easily understandable (Linux-- 2005).It is easy for a person to argue that the cost of installing a data control technology is high. However, more funds end up into waste when trying to recover stolen or damaged data. As it was once said prevention is better than cure, it is better
Gallegos, F., Taylor & Francis., & CRC Press. (2004). Information technology control and audit. Boca Raton, Fla: Auerbach Publications.
IT Governance Institute. (2004). OS/390-z/OS security, audit and control features. Rolling Meadows, IL: IT Governance Institute.
Linux-- security, audit and control features. (2005). Rolling Meadows, IL: Information Systems Audit and Control Association. New York: Wiley.
Moeller, R. R. (2010). IT audit, control, and security. Hoboken, N.J: Wiley.
Parker, X. L., & Graham, L. (2008). Information technology audits. Chicago, IL: CCH.
Umar, A. (2004). Information security and auditing in the digital age: A practical and managerial perspective. San Francisco: NGE Solutions, Inc.
Please type your essay title, choose your document type, enter your email and we send you essay samples