Steps involved with an internal audit of the database(CyberSecurity) Database security

 Using the book or the Internet as a resource, describe the purpose of an audit.  Discuss the steps involved with an audit.  Give an example of missing a step and what that means for the validity of the audit.  Are there unimportant steps that could be left out?  If so, who decides their inclusion and validity?