Preview

Information Technology Audit

Good Essays
Open Document
Open Document
1293 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Technology Audit
INFORMATION SYSTEMS AUDIT

Introduction An information technology audit, or information systems audit, is an examination of the controls within an Information technology (IT) infrastructure. IT auditing is a branch of general auditing concerned with governance (control) of information and communications technologies (computers). IT auditors primarily study computer systems and networks from the point of view of examining the effectiveness of their technical and procedural controls to minimise risks. IT audits are also known as automated data processing (ADP) audits and computer audits or IS, IT or ICT auditing and systems auditing. They were formerly called electronic data processing (EDP) audits History of IS Audit The concept of IT auditing was formed in the mid-1960s. Since that time, IT auditing has gone through numerous changes, largely due to advances in technology and the incorporation of technology into business. Functions of IS/IT Auditor IT Auditor often is the translator of business risk, as it relates to the use of IT, to management, someone who can check the technicalities well enough to understand the risk (not necessarily manage the technology) and make a sound assessment and present risk-oriented advice to management. IT auditors review risks relating to IT systems and processes, some of them are: 1. Inadequate information security (e.g. missing or out of date antivirus controls, open computer ports, open systems without password or weak passwords etc.) 2. Inefficient use of corporate resources, or poor governance (e.g. huge spending on unnecessary IT projects like printing resources, storage devices, high power servers and workstations etc.) 3. Ineffective IT strategies, policies and practices (including a lack of policies for use of Information and Communication Technology (ICT) resources, Internet usage policies, Security practices etc.) 4. IT-related frauds (including phishing, hacking etc)
1 Compiled by: Mr.Avadh Yadav,Bos,Noida

You May Also Find These Documents Helpful

  • Satisfactory Essays

    the . Auditing: A Risk Analysis Approach, 5th Edition 16, contains a computer audit practice case. In addition, a practical…

    • 2996 Words
    • 16 Pages
    Satisfactory Essays
  • Good Essays

    Before any strategy takes place, an auditor must determine the end result desired from the Information Technology being used as well as the type of technology being dealt with. The most important thing is security thus it is vital to know this technology in and out to be able to determine its strengths and weaknesses. This allows for proper compensation to combat such attacks whether they are fraudulent or accidental in nature. It is necessary to be familiar with different types of proven viable internal control setups to properly test and gage an IT’s internal control system. There are three different strategies use when testing internal controls. First includes assessing the controls using user control information. In this strategy, an auditor would gather computer-generated reports and compare those to all documentation on specific transactions. This process is also known as auditing around the computer because it deals with more hard copy documents. The next strategy entails using application controls to determine the level of risk…

    • 627 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Auditing

    • 6093 Words
    • 25 Pages

    In statistical sampling methods used in substantive testing, an auditor most likely would stratify a population into meaningful groups if A. Probability-proportional-to-size (PPS) sampling is used. B. The population has highly variable recorded amounts. C. The auditor's estimated tolerable misstatement is extremely small. D. The standard deviation of recorded amounts is relatively small.…

    • 6093 Words
    • 25 Pages
    Satisfactory Essays
  • Powerful Essays

    The development of auditing in the fast growth of technology, which directly contributes to information technology auditing, internal control standards and guidelines explained by Yang (2004). Technology, electronic data processing, and information system have altered the way organizations handle its business, endorsing operational efficiency and assist decision-making. American Institute of Certified Public Accountants (AICPA) and the Information Systems Audit and Control Association (ISACA), have provided standards to allow and deliver required guidance to auditors. In SAS No. 48, "the effects of computer processing on the examination of financial statements," explained and suggested auditors to consider the methods of computer data processing and other important factors such as planning and supervision, study and assessment of internal control, evidential matter, systematic review procedures, and requirements of the audit team. It also underlined the individual characteristics of information technology systems that should be measured by the auditor when directing the assessment process. In SAS No. 94 recognized the types of systems, controls and evidence auditors faced. The author…

    • 1346 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Acc/490 Week 4

    • 2141 Words
    • 9 Pages

    The generalized auditing software is designed to be used, and is adaptable to virtually any organization that requires auditing services. Audit software can be further selected as appropriate depending on the type of audit that needs to be performed. For example, an organization with a control environment that is high risk or ineffective can be tailored to by using auditing software that incorporates high fraud risk environments. Organizations that have a greater than average susceptibility to risk in the network environment should use auditing software specifically designed to address these…

    • 2141 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    It Audit

    • 356 Words
    • 2 Pages

    When you tested that total gross less total taxes less total deductions equals net pay, were there differences between the Computed_Net and Net_Pay fields? If so, obtain a report of all records where differences exist and explain what is probably causing the differences.…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Hunton, J. E. (2004). Core concepts of Information Technology auditing. In. (Ed), Conducting the IT audit (pp. 207-227). Retrieved from Retrieved from University of Phoenix eBook Collection Database…

    • 2536 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Firms need to establish a good set of both general and application controls for their information systems. A risk assessment evaluates information assets, identifies control points and control weaknesses, and determines the most cost-effective set of controls. Firms must also develop a coherent corporate security policy and plans for continuing business operations in the event of disaster or disruption. The security policy includes polices for acceptable use and identity management. Comprehensive and systematic MIS auditing helps organizations determine the effectiveness of security and controls for their information systems.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Strategic Audit

    • 630 Words
    • 2 Pages

    Many companies begin their operation in different ways. Some companies start with a lot of capital and become successful, while others start with very little capital and still find success. However, once profitability has been achieved, it can be very difficult to maintain in the long run. One tool many managers use in order to keep operations running smoothly is the strategic audit. A strategic audit is used to compare current operations with ideal operating conditions. A strategic audit defines what strengths and weaknesses a company may have. Finally, a strategic audit is usually used to define what needs to change or where the company can improve and how.…

    • 630 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Having defined what we are going to audit and provide assurance on, we have to determine the most appropriate approach or strategy for carrying out our audit work. First we need to determine the correct scope of our audit. To achieve this we need to investigate, analyse and define: • the business processes concerned • the platforms and information systems which are supporting the business process as well as interconnectivity with other platforms or systems • the IT roles and responsibilities defined, including what has been in- or out-sourced • associated business risks and strategic choices…

    • 52875 Words
    • 212 Pages
    Powerful Essays
  • Good Essays

    The MIS manager in many organizations is encountering a new group concerned with the data processing function — the internal EDP auditor.' These auditors often have a broad role ranging from evaluating data processing controls to reviewing data security and new system developments. However, in many organizations, the auditor's role is not clear. This article integrates the results of our own survey with a review of recent literature in an attempt to explain more precisely the potential internal audit roles in the systems development process. After describing the sample, we review the rationale for audit involvement and the constraints upon such involvement as perceived by the internal auditor. This is followed by a report of our study of design phase auditing activities in 39 large organizations. The boundaries and role of the audit function are simultaneously reviewed in light of these activities. Finally, the, potential contribution to the MIS manager is noted, and recommendations are offered to the MIS manager interested in promoting a constructive working relationship with Internal auditors.'…

    • 3837 Words
    • 16 Pages
    Good Essays
  • Powerful Essays

    Is Goverance Frameworks

    • 2453 Words
    • 10 Pages

    Information Technology (IT) Governance is a subset of corporate governance that focuses on the management, assessment, performance and risk of IT resources in an organisation. IT governance was strongly pushed after the Sarbanes-Oxley Act in the USA (which came as a result from the numerous accounting scandals in the early 2000s such as Enron). IT governance is aligned with the goals and objectives of the firm and to hopefully create value through the effective and efficient use of IT resources. It is a tool that is used by many stakeholders such as executive management and the Board of Directors to assist them in reducing risk, creating value, set polices and internal controls of the firm. COBIT 4.0 defines IT Governance as ‘the responsibility of executives and the board of directors, and consists of the leadership, organisational structures and processes that ensure that the enterprise’s IT sustains and extends the organisation’s strategies and objectives.’ A framework must be implement which sets out the standards, best practices and rules that must be adhered to for IT Governance to be successful. This report will identify, compare, discuss and analyse the three most used frameworks worldwide; ISO 38500, COBIT and ITIL v3.…

    • 2453 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Auditing

    • 849 Words
    • 4 Pages

    In 2001, Harris Scarfe's suppliers and customers, and even a large number of the company’s staff, were shocked when the thriving business was suddenly faced with cash-flow problems. The company made headlines in South Australia when concerned suppliers, from whom Harris Scarfe had purchased large amounts of stock on credit, entered the flagship store in Rundle Mall, and began retrieving their stock directly from the shelves, before shocked staff and customers.…

    • 849 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    The integrated test facility technique (ITF) involves auditors establishing a mini company or dummy company on the live files processed by an application system. For example, in a payroll system, auditors might establish a master-file record for a fictitious employee. Auditors then submit test data to the application system as part of the normal transaction data entered into the system. They monitor the effects of their test data on the dummy entity they have established.…

    • 1142 Words
    • 4 Pages
    Good Essays
  • Good Essays

    o Through computers, a single person performs functions of multiple persons who were earlier part of the internal…

    • 9312 Words
    • 38 Pages
    Good Essays