Journal of Accounting and Management Information Systems (JAMIS)


Implementing a security strategy for wireless networks in auditing applications

Supp/2007 ,   p 263..268

Author(s):  
Alexandru Adrian GAVRILA
Delia BÄ‚BEANU


Keywords:   Audit tools, continuous audit, security strategy, wireless networks

Abstract:  

Continuous audit is a development of internal audit that is meant to assure that reports provided by the IS tools are correct and concluding. Continuous audit is realized much more often than traditional audit, due to the fact that generated reports are needed in real-time, perhaps even before the transaction sign-off. This environment implies that auditors use modern technologies and tools to monitor applications and provide reports in a timely fashion, that including working in untraditional places and connected with the company with wired or wireless networks. Wireless technologies enable one or several devices to communicate in the absence of physical connections, without requiring network or peripheral cabling. Due to numerous advantages provided, wireless technology has known unprecedented development and rapid propagation, starting with Wireless Wide Area Network – WWAN, Wireless Local Area Network – WLAN, cell phones and continuing with infrared devices such as remote controls, wireless Hi-Fi stereo handsets and microphones, cordless keyboards and mice. Enabling communication between devices without wires has many advantages in convenience, but at the same time it increases the utilization risks, because monitoring wireless networks and intrusion prevention has become much more difficult. This article presents the necessity of developing and implementing a security strategy for Wireless Networks in auditing applications.



Download:  

Back