Systems auditing should be the main approach that is adopted by internal auditors.
制度基础审计应该是内部审计主要采用的方法。
Compliance testing should be the standard form of testing used during systems auditing.
在整个系统审计中,复核性测试应当成为测试的标准形式。
Substantive testing, therefore, should have a limited role to play in systems auditing.
实质性测试在整个审计程序中只是被有限度的采用。
The Auditing subsystem enables the systems administrator to record security-relevant information, which can be analyzed later to detect potential and actual violations of the system's security policy.
系统管理员可以通过审计系统记录与安全性相关的信息,以后可以分析这些信息,寻找违反和可能违反系统安全策略的地方。
Auditing at every level of the systems (OS, database, application) is necessary, but it's only the bare beginnings.
在系统的每个层次上都进行审核是必要的,但这只是起步。
Ensure that the appropriate auditing and reconciliation systems are in place and tested.
确保存在适当的经过测试的审核和对帐系统。
Examples: definition of source and target systems, their table and fields structures and attributes, documentation for auditing derivations and dependencies.
示例:源和目标系统的定义、表和字段的结构和属性、用于审计派生和依赖关系的文档。
Obversely, suppliers seeking accreditation carrying more weight than their own claims of compliance could also retain the same auditing bodies to vouch for their systems.
很明显,认可比自我声称符合标准分量更重,供应商也雇用同样的审核公司来担保它们的体系。
This audit includes miscellaneous tests of the accounting records, internal control systems, and other auditing procedures as deemed necessary.
这种审计包括各种各样的对会计记录和内部控制系统的测试,以及其他被认为有必要的审计程序。
As important component in modern enterprise internal system, internal auditing systems are faced with severe situations.
作为现代企业内部制度的重要组成部分的内部审计制度所面临的形势更为严峻。
Lastly, personnel management, security systems, auditing system security management and other aspects of e-commerce.
最后从人员管理、保密制度、审计制度等方面论述了电子商务的安全管理。
Simulation results show that this method is valid in real security auditing systems.
将此方法应用于实际的安全审计系统,得到了较好的效果。
Syslog is an operating system administrative logging tool used in systems management and security auditing.
系统日志是操作系统管理员的日志工具,被用于系统管理和安全审核。
Most existing operating systems, database systems and application systems provide certain auditing mechanisms. However, audit information is only used as an after-the-fact evidence.
大多数操作系统、数据库系统及应用系统都提供了某种审计机制,但通常情况下审计信息仅被作为一种事后的证据。
Part Two: History and changes of auditing systems in China is introduced.
第二部分:我国国家审计的历史沿革。
Users can manage users accounts' creating, authorization and auditing operations through 4a system, and login the systems above by login 4a system.
用户使用4a系统统一进行账号的创建、授权与审计,并通过登录4 A系统来统一登录以上各种资源。
Users can manage users accounts' creating, authorization and auditing operations through 4a system, and login the systems above by login 4a system.
用户使用4a系统统一进行账号的创建、授权与审计,并通过登录4 A系统来统一登录以上各种资源。
应用推荐