Professional Documents
Culture Documents
LAB 01 AUDIT
Group Members
3
LAB 01
4
AUDIT DESIGN
5
AUDIT IMPLEMENTATION
6
7
8
CONFIGURATION :-
9
SOFTWARE TOOLS INSTALLED ON PC
10
AUDIT PERFORMANCE
Are there any vulnerabilities or weaknesses in the Information System that have not Yes
been addressed?
Are the computer systems in the labs being used in compliance with relevant policies No
and regulations (e.g., data privacy, cybersecurity)?
Are there any issues with the availability or performance of the software systems in the Yes
labs?
Safety Are there any hazards or safety concerns in the labs that have not been addressed? No
12
COMPLIANCE ISSUES IN IDENTITY ACCESS
MANAGEMENT/FINDINGS
1. Damaged Computers
2. Inadequate Hardware and Software Maintenance
3. Insufficient Software for Lab Tasks
13
STAKEHOLDERS ROLES
There are several key stakeholders who have a vested interest in the findings and recommendations
of the audit. These stakeholders include:
• Students: Students are the primary users of the computer science labs and rely on them to
complete their assignments and gain the knowledge and skills they need to succeed in their studies
• Faculty: Faculty members are responsible for overseeing the use of the computer science labs and
for teaching students in the labs.
• Staff: Staff members, including lab technicians and support staff, are responsible for maintaining
and supporting the computer science labs.
• Administration: The administration Bahria University has a broad oversight role in relation to the
computer science labs and is responsible for reviewing the audit report and implementing any
necessary changes. 14
POLICES PROPOSED TO RESOLVE THE
ISSUES
To address the issues identified during the audit a number of policies could be implemented. For
example, a policy could be established to repair or replace damaged computers in a timely manner,
to ensure that hardware and software systems are adequately maintained and updated, and to
provide training and support to students and faculty. To address any issues related to data security,
a policy could be implemented that outlines the procedures for protecting sensitive data in the labs,
such as encrypting data and restricting access to authorized individuals.
15
IMPACT OF POLICES ON NEW SYSTEM
The implementation of new policies to address the issues identified during the audit could have a
number of impacts on the overall system for managing the labs. By implementing policies that
address safety and emergency procedures, access control, and data security, the overall safety and
security of the labs could be improved. The implementation of new policies have a range of
positive impacts on the overall system for managing the labs. It will be important to carefully
evaluate the specific needs and resources of the labs in order to determine which policies are most
appropriate and effective.
16
THANK YOU
17