Details

Understanding and Conducting Information Systems Auditing


Understanding and Conducting Information Systems Auditing


Wiley Corporate F&A 1. Aufl.

von: Veena Hingarh, Arif Ahmed

81,99 €

Verlag: Wiley
Format: EPUB, PDF
Veröffentl.: 30.01.2013
ISBN/EAN: 9781118343753
Sprache: englisch
Anzahl Seiten: 304

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>A comprehensive guide to understanding and auditing modern information systems</b> <p>The increased dependence on information system resources for performing key activities within organizations has made system audits essential for ensuring the confidentiality, integrity, and availability of information system resources. One of the biggest challenges faced by auditors is the lack of a standardized approach and relevant checklist. <i>Understanding and Conducting Information Systems Auditing</i> brings together resources with audit tools and techniques to solve this problem.</p> <p>Featuring examples that are globally applicable and covering all major standards, the book takes a non-technical approach to the subject and presents information systems as a management tool with practical applications. It explains in detail how to conduct information systems audits and provides all the tools and checklists needed to do so. In addition, it also introduces the concept of information security grading, to help readers to implement practical changes and solutions in their organizations.</p> <ul> <li>Includes everything needed to perform information systems audits</li> <li>Organized into two sections—the first designed to help readers develop the understanding necessary for conducting information systems audits and the second providing checklists for audits</li> <li>Features examples designed to appeal to a global audience</li> </ul> <p>Taking a non-technical approach that makes it accessible to readers of all backgrounds, <i>Understanding and Conducting Information Systems Auditing</i> is an essential resource for anyone auditing information systems.</p>
<p>Preface xi</p> <p>Acknowledgments xv</p> <p><b>PART ONE: CONDUCTING AN INFORMATION SYSTEMS AUDIT 1</b></p> <p><b>Chapter 1: Overview of Systems Audit 3</b></p> <p>Information Systems Audit 3</p> <p>Information Systems Auditor 4</p> <p>Legal Requirements of an Information Systems Audit 4</p> <p>Systems Environment and Information Systems Audit 7</p> <p>Information System Assets 8</p> <p>Classification of Controls 9</p> <p>The Impact of Computers on Information 12</p> <p>The Impact of Computers on Auditing 14</p> <p>Information Systems Audit Coverage 15</p> <p><b>Chapter 2: Hardware Security Issues 17</b></p> <p>Hardware Security Objective 17</p> <p>Peripheral Devices and Storage Media 22</p> <p>Client-Server Architecture 23</p> <p>Authentication Devices 24</p> <p>Hardware Acquisition 24</p> <p>Hardware Maintenance 26</p> <p>Management of Obsolescence 27</p> <p>Disposal of Equipment 28</p> <p>Problem Management 29</p> <p>Change Management 30</p> <p>Network and Communication Issues 31</p> <p><b>Chapter 3: Software Security Issues 41</b></p> <p>Overview of Types of Software 41</p> <p>Elements of Software Security 47</p> <p>Control Issues during Installation and Maintenance 53</p> <p>Licensing Issues 55</p> <p>Problem and Change Management 56</p> <p><b>Chapter 4: Information Systems Audit Requirements 59</b></p> <p>Risk Analysis 59</p> <p>Threats, Vulnerability, Exposure, Likelihood, and Attack 61</p> <p>Information Systems Control Objectives 61</p> <p>Information Systems Audit Objectives 62</p> <p>System Effectiveness and Effi ciency 63</p> <p>Information Systems Abuse 63</p> <p>Asset Safeguarding Objective and Process 64</p> <p>Evidence Collection and Evaluation 65</p> <p>Logs and Audit Trails as Evidence 67</p> <p><b>Chapter 5: Conducting an Information Systems Audit 71</b></p> <p>Audit Program 71</p> <p>Audit Plan 72</p> <p>Audit Procedures and Approaches 75</p> <p>System Understanding and Review 77</p> <p>Compliance Reviews and Tests 77</p> <p>Substantive Reviews and Tests 80</p> <p>Audit Tools and Techniques 81</p> <p>Sampling Techniques 84</p> <p>Audit Questionnaire 85</p> <p>Audit Documentation 86</p> <p>Audit Report 87</p> <p>Auditing Approaches 89</p> <p>Sample Audit Work-Planning Memo 91</p> <p>Sample Audit Work Process Flow 93</p> <p><b>Chapter 6: Risk-Based Systems Audit 101</b></p> <p>Conducting a Risk-Based Information Systems Audit 101</p> <p>Risk Assessment 104</p> <p>Risk Matrix 105</p> <p>Risk and Audit Sample Determination 107</p> <p>Audit Risk Assessment 109</p> <p>Risk Management Strategy 112</p> <p><b>Chapter 7: Business Continuity and Disaster Recovery Plan 115</b></p> <p>Business Continuity and Disaster Recovery Process 115</p> <p>Business Impact Analysis 116</p> <p>Incident Response Plan 118</p> <p>Disaster Recovery Plan 119</p> <p>Types of Disaster Recovery Plans 120</p> <p>Emergency Preparedness Audit Checklist 121</p> <p>Business Continuity Strategies 122</p> <p>Business Resumption Plan Audit Checklist 123</p> <p>Recovery Procedures Testing Checklist 126</p> <p>Plan Maintenance Checklist 126</p> <p>Vital Records Retention Checklist 127</p> <p>Forms and Documents 128</p> <p><b>Chapter 8: Auditing in the E-Commerce Environment 147</b></p> <p>Introduction 147</p> <p>Objectives of an Information Systems Audit in the E-Commerce Environment 148</p> <p>General Overview 149</p> <p>Auditing E-Commerce Functions 150</p> <p>E-Commerce Policies and Procedures Review 155</p> <p>Impact of E-Commerce on Internal Control 155</p> <p><b>Chapter 9: Security Testing 159</b></p> <p>Cybersecurity 159</p> <p>Cybercrimes 160</p> <p>What Is Vulnerable to Attack? 162</p> <p>How Cyberattacks Occur 162</p> <p>What Is Vulnerability Analysis? 165</p> <p>Cyberforensics 168</p> <p>Digital Evidence 170</p> <p><b>Chapter 10: Case Study: Conducting an Information Systems Audit 173</b></p> <p>Important Security Issues in Banks 174</p> <p>Implementing an Information Systems Audit at a Bank Branch 180</p> <p>Special Considerations in a Core Banking System 185</p> <p><b>PART TWO: INFORMATION SYSTEMS AUDITING CHECKLISTS 197</b></p> <p><b>Chapter 11: ISecGrade Auditing Framework 199</b></p> <p>Introduction 199</p> <p>Licensing and Limitations 200</p> <p>Methodology 200</p> <p>Domains 200</p> <p>Grading Structure 202</p> <p>Selection of Checklist 203</p> <p>Format of Audit Report 206</p> <p>Using the Audit Report Format 207</p> <p><b>Chapter 12: ISecGrade Checklists 209</b></p> <p>Checklist Structure 209</p> <p>Information Systems Audit Checklists 210</p> <p><b>Chapter 13: Session Quiz 281</b></p> <p>Chapter 1: Overview of Systems Audit 281</p> <p>Chapter 2: Hardware Security Issues 284</p> <p>Chapter 3: Software Security Issues 286</p> <p>Chapter 4: Information Systems Audit Requirements 288</p> <p>Chapter 5: Conducting an Information Systems Audit 290</p> <p>Chapter 6: Risk-Based Systems Audit 293</p> <p>Chapter 7: Business Continuity and Disaster Recovery Plan 294</p> <p>Chapter 8: Auditing in an E-Commerce Environment 296</p> <p>Chapter 9: Security Testing 297</p> <p>About the Authors 299</p> <p>About the Website 301</p> <p>Index 303</p>
<p><b>VEENA HINGARH</b> is Joint Director of the South Asian Management Technologies Foundation, a center for research, training, and application in the areas of finance and risk management, which provides training in areas including IS auditing, enterprise risk management, and risk modeling. Winner of numerous merit-based awards during her career, Hingarh’s major areas of focus are IFRS and IS. She speaks frequently at conferences and platforms throughout Asia and the Middle East. Hingarh is a Chartered Accountant from the Institute of Chartered Accountants of India (ICAI), Certified Company Secretary of the Institute of Company Secretaries of India (ICSI), and Certified Information System Auditor (CISA) from ISACA (USA).</p> <p><b>ARIF AHMED</b> is a professor at and Director of the South Asian Management Technologies Foundation as well as a Chartered Accountant from the Institute of Chartered Accountants of India (ICAI). He is an Information Security Management System Lead Auditor for the British Standards Institution. Ahmed’s areas of focus are finance and risk management, and he has over two decades of postqualification experience in training and strategic consulting. He has been interviewed and quoted throughout the media and has spoken at various seminars and institutions, including the Institute of Chartered Accountants of India, XLRI, and the Institute of Company Secretaries of India.
<p>UNDERSTANDING <small>AND</small> CONDUCTING INFORMATION SYSTEMS AUDITING</p> <p>“This comprehensive book forms a basis for new auditors as well as experienced auditors working within an IT environment.  Covering, as it does, such aspects as hardware and software security, the conducting of an information systems risk-based audit, as well as business continuity and disaster recovery planning, it acts as a reference manual as well as an instruction manual.  Some of the focal areas such as security testing and vulnerability analysis are of particular benefit to the auditor, and the inclusion of ISecGrade Checklists makes this a must-have addition to any IT auditor’s library.” <p><b>—Richard Cascarino,</b> MBA, CIA, CRMA, CFE, CISM <p>“Network security among organizations remains a major challenge in the evolution of the digital economy. If it were simply a technology issue the organizations could rely on IT engineers to deploy marvels of technological excellence. But ensuring continuous security is more than a mere technical matter. The authors, who are an extraordinary blend of accounting professionals with rich international experience and network security experts (CISA certified), have superbly deployed their own professional expertise to bring out a practical guide to organizational security in the digital economy. Like a master blender they have provided a rich interdisciplinary perspective with centrality of managerial responsibility. The central theme is that both technological design and managerial systems must continuously evolve in tandem. The book will be an invaluable guide for such organizations that are looking to enhance their management control systems and dynamically evolve along with technological change.” <p><b>—Anil Rawat,</B> PhD, Director, Institute of Business Management & Technology; Director, International Academy for Knowledge, Innovation & Technology Management, Bangalore <p>“A balanced and practical book that covers all the key elements of information security. While it is an ideal reference for IS/IT managers, auditors, and chartered accountants, the book does not lose relevance for the practitioners of IS, and keeps up to the demands of business and industry by addressing current management and auditing techniques of information security. The templates available in the book are especially useful for quick, out-of-the-box implementation of an in-house or external IS audit. It’s a reference book, practitioner’s handbook, and a textbook on IS audit rolled into one!” <p><b>—Mridul Banerjee,</b> CISM, CRISC <p>“The authors provide an excellent overview of the information systems audit process, with an emphasis on today’s evolving newer technologies and issues, such as performing audits in an e-commerce environment and systems security testing. The book is particularly strong in providing good, precise definitions and the audit implications for many of the technology concepts—such as routers, thin clients, or cloud computing—that are frequently used by information system auditors but where accurate definitions are often difficult. This kind of information helps both information system auditing newcomers and experienced professionals. <p>In addition to a wide range of information systems auditing and risk-based materials, the book has a large section of detailed information systems audit checklists that can be tailored to many environments. The book is an excellent resource for the information systems audit professional.” <p><b>—Robert R. Moeller,</b> CPA, CISA, CISSP, author of multiple books on internal auditing, risk management, and IT governance

Diese Produkte könnten Sie auch interessieren:

Mindfulness
Mindfulness
von: Gill Hasson
PDF ebook
12,99 €
Counterparty Credit Risk, Collateral and Funding
Counterparty Credit Risk, Collateral and Funding
von: Damiano Brigo, Massimo Morini, Andrea Pallavicini
EPUB ebook
69,99 €