Preview

Information Technology Audit

Good Essays
Open Document
Open Document
1293 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Technology Audit
INFORMATION SYSTEMS AUDIT

Introduction An information technology audit, or information systems audit, is an examination of the controls within an Information technology (IT) infrastructure. IT auditing is a branch of general auditing concerned with governance (control) of information and communications technologies (computers). IT auditors primarily study computer systems and networks from the point of view of examining the effectiveness of their technical and procedural controls to minimise risks. IT audits are also known as automated data processing (ADP) audits and computer audits or IS, IT or ICT auditing and systems auditing. They were formerly called electronic data processing (EDP) audits History of IS Audit The concept of IT auditing was formed in the mid-1960s. Since that time, IT auditing has gone through numerous changes, largely due to advances in technology and the incorporation of technology into business. Functions of IS/IT Auditor IT Auditor often is the translator of business risk, as it relates to the use of IT, to management, someone who can check the technicalities well enough to understand the risk (not necessarily manage the technology) and make a sound assessment and present risk-oriented advice to management. IT auditors review risks relating to IT systems and processes, some of them are: 1. Inadequate information security (e.g. missing or out of date antivirus controls, open computer ports, open systems without password or weak passwords etc.) 2. Inefficient use of corporate resources, or poor governance (e.g. huge spending on unnecessary IT projects like printing resources, storage devices, high power servers and workstations etc.) 3. Ineffective IT strategies, policies and practices (including a lack of policies for use of Information and Communication Technology (ICT) resources, Internet usage policies, Security practices etc.) 4. IT-related frauds (including phishing, hacking etc)
1 Compiled by: Mr.Avadh Yadav,Bos,Noida

You May Also Find These Documents Helpful

  • Good Essays

    Information technology and financial audits primary objectives are to ensure data integrity, safety, secure and operational effectiveness for Kudler’s business processes. Internal audit will provide an opinion on the accuracy and fairness of the financial statements. “This fairness evaluation is conducted in the context of generally accepted accounting principles (GAAP) and requires application of generalized auditing standards” (Bargranoff, 2008).…

    • 986 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Before any strategy takes place, an auditor must determine the end result desired from the Information Technology being used as well as the type of technology being dealt with. The most important thing is security thus it is vital to know this technology in and out to be able to determine its strengths and weaknesses. This allows for proper compensation to combat such attacks whether they are fraudulent or accidental in nature. It is necessary to be familiar with different types of proven viable internal control setups to properly test and gage an IT’s internal control system. There are three different strategies use when testing internal controls. First includes assessing the controls using user control information. In this strategy, an auditor would gather computer-generated reports and compare those to all documentation on specific transactions. This process is also known as auditing around the computer because it deals with more hard copy documents. The next strategy entails using application controls to determine the level of risk…

    • 627 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Group Paper

    • 1197 Words
    • 3 Pages

    For its information systems, the audit will assess the plans for automation, the budget for information technology, protection…

    • 1197 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    A popular saying is, “inspect what you expect,” and this is definitely true in the area of IT information security auditing. The goal should not be to catch rule breakers, but rather to work with IT and the business to ensure nothing slips through the cracks and that solid practices are always followed. Doing this will go a long way to ensuring and maintaining the expected information security policy of the…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Unit 4

    • 1878 Words
    • 8 Pages

    To be well defined and timely, an auditing strategy must provide useful tracking data on an organization's most important resources, critical behaviors, and potential risks. In a growing number of organizations, it must also provide absolute proof that IT operations comply with corporate and regulatory requirements.…

    • 1878 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Acct 542 Audit Proposal

    • 1234 Words
    • 5 Pages

    Hunton, J.A., Bryant, S.M., & Bagranoff, N.A. (2004). Core Concepts of Information Technology Auditing. New York, New York: Wiley & Sons.…

    • 1234 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Acc/490 Week 4

    • 2141 Words
    • 9 Pages

    The generalized auditing software is designed to be used, and is adaptable to virtually any organization that requires auditing services. Audit software can be further selected as appropriate depending on the type of audit that needs to be performed. For example, an organization with a control environment that is high risk or ineffective can be tailored to by using auditing software that incorporates high fraud risk environments. Organizations that have a greater than average susceptibility to risk in the network environment should use auditing software specifically designed to address these…

    • 2141 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    the . Auditing: A Risk Analysis Approach, 5th Edition 16, contains a computer audit practice case. In addition, a practical…

    • 2996 Words
    • 16 Pages
    Satisfactory Essays
  • Powerful Essays

    Auditing

    • 3280 Words
    • 14 Pages

    This report is for Wendig Ltd for the year ended July 2010. The report is focused on highlighting significant audit risks, Key assertions and relevant internal controls concerning various segments of the business namely Inventory balances and purchases transactions, Trade Receivables and Credit Sale System, Property Plant and equipment, Trade payables transactions and balances. The report in the end suggests relevant recommendations for each of the following.…

    • 3280 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Auditing

    • 6093 Words
    • 25 Pages

    In statistical sampling methods used in substantive testing, an auditor most likely would stratify a population into meaningful groups if A. Probability-proportional-to-size (PPS) sampling is used. B. The population has highly variable recorded amounts. C. The auditor's estimated tolerable misstatement is extremely small. D. The standard deviation of recorded amounts is relatively small.…

    • 6093 Words
    • 25 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Binoy Study

    • 751 Words
    • 4 Pages

    with the goals (Pathak, 2005). 4.0 Changing Roles of the auditors The impact of information technology on Organisations audit processes, 2012 Page | 2…

    • 751 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    auditing

    • 2136 Words
    • 9 Pages

    In this case, when Sam book a holiday trip with “The Easy as ABC to travel Co Ltd”, he is entering into an agreement. The information that is provided in the advertising in all local newspapers must not be false or misleading. If Sam enter into the contract on the basis of what was in the advertising given by the company, he can claim damages if the information turn out to be incorrect. He can file a complaint against the company because he is not satisfied with the overseas trip and he may be entitled to take the company to the small claim court. Businesses must take care that consumers aren't misled or deceived. Sam have been misled because the information that he received…

    • 2136 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    Is Goverance Frameworks

    • 2453 Words
    • 10 Pages

    Information Technology (IT) Governance is a subset of corporate governance that focuses on the management, assessment, performance and risk of IT resources in an organisation. IT governance was strongly pushed after the Sarbanes-Oxley Act in the USA (which came as a result from the numerous accounting scandals in the early 2000s such as Enron). IT governance is aligned with the goals and objectives of the firm and to hopefully create value through the effective and efficient use of IT resources. It is a tool that is used by many stakeholders such as executive management and the Board of Directors to assist them in reducing risk, creating value, set polices and internal controls of the firm. COBIT 4.0 defines IT Governance as ‘the responsibility of executives and the board of directors, and consists of the leadership, organisational structures and processes that ensure that the enterprise’s IT sustains and extends the organisation’s strategies and objectives.’ A framework must be implement which sets out the standards, best practices and rules that must be adhered to for IT Governance to be successful. This report will identify, compare, discuss and analyse the three most used frameworks worldwide; ISO 38500, COBIT and ITIL v3.…

    • 2453 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Cobit Casestudy Tibo

    • 8174 Words
    • 33 Pages

    With more than 35,000 members in more than 100 countries, the Information Systems Audit and Control Association…

    • 8174 Words
    • 33 Pages
    Better Essays
  • Good Essays

    The MIS manager in many organizations is encountering a new group concerned with the data processing function — the internal EDP auditor.' These auditors often have a broad role ranging from evaluating data processing controls to reviewing data security and new system developments. However, in many organizations, the auditor's role is not clear. This article integrates the results of our own survey with a review of recent literature in an attempt to explain more precisely the potential internal audit roles in the systems development process. After describing the sample, we review the rationale for audit involvement and the constraints upon such involvement as perceived by the internal auditor. This is followed by a report of our study of design phase auditing activities in 39 large organizations. The boundaries and role of the audit function are simultaneously reviewed in light of these activities. Finally, the, potential contribution to the MIS manager is noted, and recommendations are offered to the MIS manager interested in promoting a constructive working relationship with Internal auditors.'…

    • 3837 Words
    • 16 Pages
    Good Essays