You are on page 1of 17

INFORMATION SYSTEMS AUDITING & ASSURANCE

LAB 01 AUDIT

Group Members

LAIBA HASHMI 02-235192-040

MUHAMMAD SHAFAY 02-235192-046

AWAIS IFTIKHAR 02-235192-042


2
INTRODUCTION

This presentation presents the findings of an audit of the Bahria University


computer science Lab NO 1. The objective of the audit was to assess the lab
compliance with the policies and guidelines defined by the Higher Education
Commission (HEC) on their website and to identify any areas for improvement. The
audit process included a review of relevant policies and guidelines, as well as a
review of any existing documentation related to the labs, including policies,
procedures, and user manuals.

3
LAB 01

4
AUDIT DESIGN

• Review of existing documentation


• Physical inspection of the labs
• Review of processes and procedures
• Review of relevant policies and guidelines:
• Review of incident response plans

5
AUDIT IMPLEMENTATION

For Audit implementation we have done a physical inspection of the


lab. A range of tools and techniques were utilized in order to ensure
that a thorough and comprehensive assessment of the lab was
conducted, including observation, and interviews with lab incharge.

6
7
8
CONFIGURATION :-

9
SOFTWARE TOOLS INSTALLED ON PC

10
AUDIT PERFORMANCE

Audit Area Question Response


Software Are the computer systems in the labs configured with the appropriate security settings No
and controls?

  Are there any vulnerabilities or weaknesses in the Information System that have not Yes
been addressed?

  Are the computer systems in the labs being used in compliance with relevant policies No
and regulations (e.g., data privacy, cybersecurity)?

  Are there any issues with the availability or performance of the software systems in the Yes
labs?

Hardware Is multimedia working properly? Yes


  Is there enough desk/bench space for the work and equipment in routine use? No

  Are keyboard in working condition? No


  Are there any issues with the physical layout or ergonomics of the labs? Yes
Resources Are there sufficient resources available to students in the labs (e.g., instructional materials,  
online resources) to support the use of the Information System? No
  Are there any There were no established guidelines for allocation of resources and No
capabilities?
  Are there any a formal information security control framework and I&T related policies No

Safety Are there any hazards or safety concerns in the labs that have not been addressed? No

  Does the lab have a first aid kit? Yes

Facilities Is there enough space for storage in the labs? Yes

  Is the area clean and free of clutter? No

  Is rubbish collected often enough in the labs? No

12
COMPLIANCE ISSUES IN IDENTITY ACCESS
MANAGEMENT/FINDINGS

1. Damaged Computers
2. Inadequate Hardware and Software Maintenance
3. Insufficient Software for Lab Tasks

13
STAKEHOLDERS ROLES
There are several key stakeholders who have a vested interest in the findings and recommendations
of the audit. These stakeholders include:
• Students: Students are the primary users of the computer science labs and rely on them to
complete their assignments and gain the knowledge and skills they need to succeed in their studies
• Faculty: Faculty members are responsible for overseeing the use of the computer science labs and
for teaching students in the labs.
• Staff: Staff members, including lab technicians and support staff, are responsible for maintaining
and supporting the computer science labs.
• Administration: The administration Bahria University has a broad oversight role in relation to the
computer science labs and is responsible for reviewing the audit report and implementing any
necessary changes. 14
POLICES PROPOSED TO RESOLVE THE
ISSUES
To address the issues identified during the audit a number of policies could be implemented. For
example, a policy could be established to repair or replace damaged computers in a timely manner,
to ensure that hardware and software systems are adequately maintained and updated, and to
provide training and support to students and faculty. To address any issues related to data security,
a policy could be implemented that outlines the procedures for protecting sensitive data in the labs,
such as encrypting data and restricting access to authorized individuals.

15
IMPACT OF POLICES ON NEW SYSTEM

The implementation of new policies to address the issues identified during the audit could have a
number of impacts on the overall system for managing the labs. By implementing policies that
address safety and emergency procedures, access control, and data security, the overall safety and
security of the labs could be improved. The implementation of new policies have a range of
positive impacts on the overall system for managing the labs. It will be important to carefully
evaluate the specific needs and resources of the labs in order to determine which policies are most
appropriate and effective.

16
THANK YOU

17

You might also like