Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework

Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework

Computer Science

Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework.

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.

Write in essay format not in outline, bulleted, numbered or other list format.

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

Database Auditing and Monitoring within SOX Compliance Framework.

 

Compliance with SOX is not just a legal obligation, but also a sound business practice. Firms need to carry on ethically and deny entry to internal money associated systems. Thus, implementing SOX money associated security measures offers the side benefit of further helping with shielding the company from data burglary by internal threat or digital attack. SOX compliance may encompass a great deal of identical procedures from any data security endeavor. SOX pertains to all openly traded companies in the United States just as fully owned backups and international firms that are publicly traded and operate jointly in the United States. SOX similarly regulates audit companies that evaluate businesses that must agree to SOX. Privately held companies, a good purpose, and non-benefits are usually not needed to agree to all of SOX. Private organizations should just not deliberately destroy or contaminate money relevant items, and SOX includes wording to penalize those companies who do so. Privately held companies that are organizing an Initial Public Offering (IPO) need to be willing to agree to SOX before they reach up to the people.

While these requirements may seem to be straightforward in theory, really they may be somewhat challenging to fulfill. Most efforts keep monetary records on social database vaults. Typically, access to these data is restricted to authorized personnel through business programs such as ERP. An accidental error in the records may be unnoticed by the financial and auditing organizations responsible for validating the data? (Kuenkaikaew et al., 2013; Vasarhelyi, 2013). With regards to exactness, a more heinous situation is that of vindictive movement carried out by an individual who possesses the information necessary to bypass the edge firewall or who possesses neighborhood access (e.g., via telnet, direct support, or an engineer/DBA device) to fundamental budgetary databases.

Internal auditors unable to access effective programs and controls require understanding to assist compliance efforts:  Along with monitoring and safeguarding financial systems, SOX regulations need the establishment of a comprehensive management and monitoring capable of processing critical business data. In summary, compliance with SOX is the CEO's and CFO's duty. CIOs and other IT professionals, on the other hand, must adopt methods that meet the explicit and implicit criteria for integrity, security, credibility, and transparency as specified by this legislation.

The majority of database administrators are averse to enabling database recording features due to the negative impact on disk and disk space performance (Martin, Sanders, & Scalan, 2014). While they convert a large number of logging and management structures, the resultant data is laborious to decrease. Is this like to searching for the proverbial needle in a haystack? Consider a three-month record that supports quarterly releases. Additionally, anybody with access to this database record has the ability to modify the entry and erase all audit trails associated with this action, resulting in a troubling incident.

Requirements for Database Audits To improve database compliance and safeguard the database: a strategy that renders database operations completely transparent is required. Additionally, the system must provide robust reporting, alerting, access control, and monitoring capabilities (McNally, 2013). To discover and record current corporate policies, the solution used must be capable of automating the reporting system, which includes database design, organizational compliance, accreditation, and tracking. Database, risk assessment, and release and disclosure review. Accessing the report model created for SOX distribution provides an excellent scenario since this model does not need extensive setup and can be easily tailored to the company's requirements.