Preview

Acc 624 Information Technology Auditing

Powerful Essays
Open Document
Open Document
746 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Acc 624 Information Technology Auditing
ACC 624
Information Technology Auditing
Spring, 2013
Ram Engira
Office: BENT Hall 364
Hours: By appointment ONLY
Telephone: Cell (917)597-9523 e-Mail: Currently engirar@stjohns.edu or rengira@gmail.com

The Course: This course provides an overview of controls relating to IT governance, databases and their structures, networks, client servers systems, IT service delivery, business continuity, disaster recovery, IS security, cryptography, firewalls, IDS, IPS, backups, recovery, and distributed systems.

Text:

Required: ISACA, CISA Review Manual- 2013, ISACA publication, Code# CRM11- Required Note: You can buy any edition of the aforementioned text. 2008,2009, 2010, and 2011 editions are all good, and are much cheaper from various sources
…show more content…
|1,2 |Instructor Handouts (PP |Financial Auditing, Operational Auditing, IT Auditing, Forensics auditing, role of IIA, ISACA, |
| |decks) |certifications of CIA and CISA |
| | |IT technical refresher |
| | |Introduction to IT Auditing |
| | |Theory and Practice of “Controls” |
|3 |CRM Domain 1 |IS Audit Process |
|4 |CRM Domain 1 |IS Audit Process |
|5 |CRM Domain 2 |IT Governance

You May Also Find These Documents Helpful

  • Good Essays

    As a Staff I assigned to the audit of a publicly traded company, your senior has asked you to evaluate both share-based payment reporting and special purpose entities (SPE) reporting for the company.…

    • 498 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    ACC 491 Syllabus

    • 1444 Words
    • 13 Pages

    This course is the first in a two-part series that deals with auditing a company 's financial reports, internal controls, and…

    • 1444 Words
    • 13 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CMGT430 2015 SYLLABUS

    • 2598 Words
    • 16 Pages

    This course covers the managerial and technical considerations related to access controls, authentication, external attacks,…

    • 2598 Words
    • 16 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    NT2580 Introduction to Information Security Unit 1 Information Systems Security Fundamentals © ITT Educational Services, Inc. All rights reserved. Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. NT2580…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tags: sec402, sec 402, Cyber Security, sec 402 Cyber Security, strayer university, sec 402 strayer, sec 402 complete class, sec402 entire, sec 402 complete, sec 402 case study 1, case study, assignment, complete class, sec 402 Case Study 1 - The Critical Need for Information Security, sec 402 Assignment 1 - Developing the Corporate Strategy for Information Security, sec 402 Case Study 2 - Developing the Forensics, Continuity, Incident Management, and Security Training, sec402 Assignment 2 - Implementing Network and Personnel Security Measures, The Rookie Chief Information Security Officer, sec402 term paper The Rookie Chief Information Security Officer, sec 402 mid, sec402 midterm exam, sec 402 final, sec402 final exam, testbank, quiz bank…

    • 265 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    ACC 546 Audit Report

    • 736 Words
    • 3 Pages

    Anderson, Olds, and Watershed (AOW) has completed the audit of the financial statements for the year ended December 31, 2007 for Apollo Shoes, Inc. The financial statements include the balance sheet, the income statement, the statement of retained earnings, and the statement of cash flows. The audit has been performed in accordance with generally accepted auditing principles in the United States. AOW has also reviewed Management’s Report on Internal Control Over Financial Reporting and have concluded that Apollo Shoes, Inc. has effective controls in place for financial reporting. The criteria for internal controls has been established by the Committee of Sponsoring Organizations of the Treadway Commission (COSO). “The COSO internal components include the following: 1) Control Environment, 2) Risk Assessment, 3) Control Activities, 4) Information and Communication 5) Monitoring” (Arens, Elder, & Beasley, 2007, p. 294). AOW has followed the criteria set forth by COSO and also by generally accepted auditing principles for the purpose of expressing an opinion about the financial statements and internal controls for financial reporting. The management of Apollo Shoes, Inc. is responsible for the financial documents and for implementing and maintaining effective internal controls. AOW has a responsibility to express an opinion regarding the fairness of the financial statements and the effectiveness of the internal control over financial reporting. AOW did not conduct an audit on the financial statements of Apollo Shoes, Inc for the year ended December 31, 2006. This audit was conducted by another company. They have provided us with the audit for the year ended December 31, 2006. The audit was used for comparative amounts.…

    • 736 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Course schedule IST7100 1 1

    • 1602 Words
    • 10 Pages

    If you would like more precise information regarding the textbook(s) for this class, please visit the bookstore website at http://www.wilmcoll.edu/bookstore…

    • 1602 Words
    • 10 Pages
    Good Essays
  • Best Essays

    554 Infrastructure

    • 3120 Words
    • 13 Pages

    This course focuses on the managerial level of knowledge and terminology for telecommunications and computer networks. This course covers the concepts and application of the Internet; server and storage architectures; and regulatory considerations.…

    • 3120 Words
    • 13 Pages
    Best Essays
  • Satisfactory Essays

    Exam 1 Study Guide

    • 332 Words
    • 2 Pages

    3. Plan on additional study efforts for the specific topics noted on the study guide.…

    • 332 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This course covers the managerial and technical considerations related to access controls, authentication, external attacks, and other risk areas facing the enterprise. This course will also survey the techniques to prevent unauthorized computer and facility access as well the concepts for protecting the hardware and software assets of the enterprise.…

    • 2331 Words
    • 10 Pages
    Satisfactory Essays
  • Better Essays

    Louwers, T. J., Ramsay, R. J., Sinason, D. H, Strawser, J. R. (2007). Auditing & Assurance Services (2nd Ed.). New York: McGraw-Hill/Irwin…

    • 1198 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Liberal Arts

    • 3433 Words
    • 14 Pages

    • Hall, James A., (2011), Information Technology Auditing, 3e, Mason: South-Western Cengage Learning (Referred to as “IT Audit Text” in the Readings List for each class)…

    • 3433 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    It Strategy

    • 2195 Words
    • 9 Pages

    The main text for this course is the book “Adventures of an IT Leader”, also called IVK after the company in the book.…

    • 2195 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Is 305 Week 3 Lab

    • 806 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 806 Words
    • 4 Pages
    Good Essays