This is the process of identifying vulnerabilities in the computer systems, networks, and the communication channels through techniques such as ethical hacking. It is performed as a part of auditing and also to defend the systems from further attacks. The vulnerabilities are identified, classified and reported so that necessary measures can be taken to fix them and protect the organization.
CAATS / Data Analysis
Computer assisted audit techniques (CAATs) refer to the use of technology to help you evaluate controls by extracting and examining relevant data. Sophisticated use of CAATs can be known as ‘data analytics’ and is increasingly being used across the profession. Data...