Details

IT Audit, Control, and Security


IT Audit, Control, and Security


Wiley Corporate F&A, Band 13 1. Aufl.

von: Robert R. Moeller

80,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 12.10.2010
ISBN/EAN: 9780470877678
Sprache: englisch
Anzahl Seiten: 696

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the <i>IT Audit, Control, and Security</i> describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.
<p>Introduction xiii</p> <p><b>PART ONE: AUDITING INTERNAL CONTROLS IN AN IT ENVIRONMENT 1</b></p> <p><b>Chapter 1: SOx and the COSO Internal Controls Framework 3</b></p> <p>Roles and Responsibilities of IT Auditors 4</p> <p>Importance of Effective Internal Controls and COSO 6</p> <p>COSO Internal Control Systems Monitoring Guidance 21</p> <p>Sarbanes-Oxley Act 22</p> <p>Wrapping It Up: COSO Internal Controls and SOx 31</p> <p>Notes 31</p> <p><b>Chapter 2: Using CobiT to Perform IT Audits 32</b></p> <p>Introduction to CobiT 33</p> <p>CobiT Framework 35</p> <p>Using CobiT to Assess Internal Controls 39</p> <p>Using CobiT in a SOx Environment 51</p> <p>CobiT Assurance Framework Guidance 54</p> <p>CobiT in Perspective 55</p> <p>Notes 55</p> <p><b>Chapter 3: IIA and ISACA Standards for the Professional Practice of Internal Auditing 57</b></p> <p>Internal Auditing’s International Professional Practice Standards 58</p> <p>Content of the IPPF and the IIA International Standards 61</p> <p>Strongly Recommended IIA Standards Guidance 75</p> <p>ISACA IT Auditing Standards Overview 76</p> <p>Codes of Ethics: The IIA and ISACA 79</p> <p>Notes 81</p> <p><b>Chapter 4: Understanding Risk Management Through COSO ERM 82</b></p> <p>Risk Management Fundamentals 83</p> <p>Quantitative Risk Analysis Techniques 92</p> <p>IIA and ISACA Risk Management Internal Audit Guidance 94</p> <p>COSO ERM: Enterprise Risk Management 97</p> <p>IT Audit Risk and COSO ERM 113</p> <p>Notes 115</p> <p><b>Chapter 5: Performing Effective IT Audits 117</b></p> <p>IT Audit and the Enterprise Internal Audit Function 118</p> <p>Organizing and Planning IT Audits 122</p> <p>Developing and Preparing Audit Programs 127</p> <p>Gathering Audit Evidence and Testing Results 132</p> <p>Workpapers and Reporting IT Audit Results 142</p> <p>Preparing Effective IT Audits 148</p> <p>Notes 149</p> <p><b>PART TWO: AUDITING IT GENERAL CONTROLS 151</b></p> <p><b>Chapter 6: General Controls in Today’s IT Environments 153</b></p> <p>Importance of IT General Controls 154</p> <p>IT Governance General Controls 157</p> <p>IT Management General Controls 158</p> <p>IT Technical Environment General Controls 174</p> <p>Note 174</p> <p><b>Chapter 7: Infrastructure Controls and ITIL Service</b></p> <p>Management Best Practices 175</p> <p>ITIL Service Management Best Practices 176</p> <p>ITIL’s Service Strategies Component 179</p> <p>ITIL Service Design 181</p> <p>ITIL Service Transition Management Processes 189</p> <p>ITIL Service Operation Processes 194</p> <p>Service Delivery Best Practices 198</p> <p>Auditing IT Infrastructure Management 199</p> <p>Note 200</p> <p><b>Chapter 8: Systems Software and IT Operations General Controls 201</b></p> <p>IT Operating System Fundamentals 202</p> <p>Features of a Computer Operating System 206</p> <p>Other Systems Software Tools 209</p> <p><b>Chapter 9: Evolving Control Issues: Wireless Networks, Cloud Computing, and Virtualization 214</b></p> <p>Understanding and Auditing IT Wireless Networks 215</p> <p>Understanding Cloud Computing 220</p> <p>Storage Management Virtualization 225</p> <p><b>PART THREE: AUDITING AND TESTING IT APPLICATION CONTROLS 227</b></p> <p><b>Chapter 10: Selecting, Testing, and Auditing IT Applications 229</b></p> <p>IT Application Control Elements 230</p> <p>Selecting Applications for IT Audit Reviews 239</p> <p>Performing an Applications Controls Review: Preliminary Steps 242</p> <p>Completing the IT Applications Controls Audit 249</p> <p>Application Review Case Study: Client-Server Budgeting System 255</p> <p>Auditing Applications under Development 258</p> <p>Importance of Reviewing IT Application Controls 266</p> <p>Notes 266</p> <p><b>Chapter 11: Software Engineering and CMMi 267</b></p> <p>Software Engineering Concepts 267</p> <p>CMMi: Capability Maturity Model for Integration 269</p> <p>CMMi Benefits 280</p> <p>IT Audit, Internal Control, and CMMi 281</p> <p>Note 282</p> <p><b>Chapter 12: Auditing Service-Oriented Architectures and Record Management Processes 283</b></p> <p>Service-Oriented Computing and Service-Driven Applications 284</p> <p>IT Auditing in SOA Environments 294</p> <p>Electronic Records Management Internal Control Issues and Risks 300</p> <p>IT Audits of Electronic Records Management Processes 301</p> <p>Notes 303</p> <p><b>Chapter 13: Computer-Assisted Audit Tools and Techniques 304</b></p> <p>Understanding Computer-Assisted Audit Tools and Techniques 305</p> <p>Determining the Need for CAATTs 308</p> <p>CAATT Software Tools 311</p> <p>Steps to Building Effective CAATTs 326</p> <p>Importance of CAATTs for Audit Evidence Gathering 327</p> <p><b>Chapter 14: Continuous Assurance Auditing, OLAP, and XBRL 329</b></p> <p>Implementing Continuous Assurance Auditing 330</p> <p>Benefits of Continuous Assurance Auditing Tools 338</p> <p>Data Warehouses, Data Mining, and OLAP 339</p> <p>XBRL: The Internet-Based Extensible Markup Language 346</p> <p>Newer Technologies, the Continuous Close, and IT Audit 351</p> <p>Notes 351</p> <p><b>PART FOUR: IMPORTANCE OF IT GOVERNANCE 353</b></p> <p><b>Chapter 15: IT Controls and the Audit Committee 355</b></p> <p>Role of the Audit Committee for IT Auditors 356</p> <p>Audit Committee Approval of Internal Audit Plans and Budgets 357</p> <p>Audit Committee Briefings on IT Audit Issues 359</p> <p>Audit Committee Review and Action on Significant IT Audit Findings 360</p> <p>IT Audit and the Audit Committee 362</p> <p>Chapter 16: Val IT, Portfolio Management, and Project Management 363</p> <p>Val IT: Enhancing the Value of IT Investments 364</p> <p>IT Systems Portfolio and Program Management 371</p> <p>Project Management for IT Auditors 374</p> <p>Notes 383</p> <p><b>Chapter 17: Compliance with IT-Related Laws and Regulations 384</b></p> <p>Computer Fraud and Abuse Act 386</p> <p>Computer Security Act of 1987 387</p> <p>Gramm-Leach-Bliley Act 390</p> <p>HIPAA: Healthcare and Much More 395</p> <p>Other Personal Privacy and Security Legislative Requirements 403</p> <p>IT-Related Laws, Regulations, and Audit Standards 404</p> <p>Chapter 18: Understanding and Reviewing Compliance with ISO Standards 407</p> <p>Background and Importance of ISO Standards in a World of Global Commerce 408</p> <p>ISO Standards Overview 410</p> <p>ISO 19011 Quality Management Systems Auditing 419</p> <p>ISO Standards and IT Auditors 421</p> <p>Notes 421</p> <p><b>Chapter 19: Controls to Establish an Effective IT Security Environment 422</b></p> <p>Generally Accepted Security Standards 423</p> <p>Effective IT Perimeter Security 429</p> <p>Establishing an Effective, Enterprise-Wide Security Strategy 430</p> <p>Best Practices for IT Audit and Security 432</p> <p>Notes 433</p> <p><b>Chapter 20: Cybersecurity and Privacy Controls 434</b></p> <p>IT Network Security Fundamentals 435</p> <p>IT Systems Privacy Concerns 443</p> <p>PCI-DSS Fundamentals 446</p> <p>Auditing IT Security and Privacy 447</p> <p>Security and Privacy in the Internal Audit Department 448</p> <p>Notes 453</p> <p><b>Chapter 21: IT Fraud Detection and Prevention 454</b></p> <p>Understanding and Recognizing Fraud in an IT Environment 455</p> <p>Red Flags: Fraud Detection Signs for IT and Other Internal Auditors 456</p> <p>Public Accounting’s Role in Fraud Detection 461</p> <p>IIA Standards and ISACA Materials for Detecting and Investigating Fraud 462</p> <p>IT Audit Fraud Risk Assessments 464</p> <p>IT Audit Fraud Investigations 467</p> <p>IT Fraud Prevention Processes 468</p> <p>Fraud Detection and the IT Auditor 471</p> <p>Notes 471</p> <p><b>Chapter 22: Identity and Access Management 472</b></p> <p>Importance of Identity and Access Management 473</p> <p>Identity Management Processes 474</p> <p>Separation of Duties Identify Management Controls 477</p> <p>Access Management Provisioning 478</p> <p>Authentication and Authorization 479</p> <p>Auditing Identity and Access Management Processes 481</p> <p>Note 485</p> <p><b>Chapter 23: Establishing Effective IT Disaster Recovery Processes 486</b></p> <p>IT Disaster and Business Continuity Planning Today 487</p> <p>Building and Auditing an IT Disaster Recovery Plan 489</p> <p>Building the IT Disaster Recovery Plan 497</p> <p>Disaster Recovery Planning and Service Level Agreements 503</p> <p>Newer Disaster Recovery Plan Technologies: Data Mirroring Techniques 505</p> <p>Auditing Business Continuity Plans 506</p> <p>Disaster Recovery and Business Continuity Planning Going Forward 508</p> <p>Notes 508</p> <p><b>Chapter 24: Electronic Archiving and Data Retention 509</b></p> <p>Elements of a Successful Electronic Records Management Process 510</p> <p>Electronic Documentation Standards 516</p> <p>Implementing Electronic IT Data Archiving 517</p> <p>Auditing Electronic Document Retention and Archival Processes 519</p> <p><b>Chapter 25: Business Continuity Management, BS 25999, and ISO 27001 521</b></p> <p>IT Business Continuity Management Planning Needs Today 522</p> <p>BS 25999 Good Practice Guidelines 524</p> <p>Auditing BCM Processes 540</p> <p>Linking the BCM with Other Standards and Processes 543</p> <p>Notes 543</p> <p><b>Chapter 26: Auditing Telecommunications and IT Communications Networks 544</b></p> <p>Network Security Concepts 545</p> <p>Effective IT Network Security Controls 549</p> <p>Auditing a VPN Installation 555</p> <p>Note 557</p> <p><b>Chapter 27: Change and Patch Management Controls 558</b></p> <p>IT Change Management Processes 559</p> <p>Auditing IT Change and Patch Management Controls 573</p> <p>Notes 576</p> <p><b>Chapter 28: Six Sigma and Lean Technologies 577</b></p> <p>Six Sigma Background and Concepts 578</p> <p>Implementing Six Sigma 580</p> <p>Lean Six Sigma 587</p> <p>Notes 590</p> <p><b>Chapter 29: Building an Effective IT Internal Audit Function 591</b></p> <p>Establishing an IT Internal Audit Function 592</p> <p>Internal Audit Charter: An Important IT Audit Authorization 593</p> <p>Role of the Chief Audit Executive 595</p> <p>IT Audit Specialists 596</p> <p>IT Audit Managers and Supervisors 598</p> <p>Internal and IT Audit Policies and Procedures 599</p> <p>Organizing an Effective IT Audit Function 601</p> <p>Importance of a Strong IT Audit Function 604</p> <p>Note 605</p> <p><b>Chapter 30: Professional Certifications: CISA, CIA, and More 606</b></p> <p>Certified Information Systems Auditor Credentials 607</p> <p>Certified Information Security Manager Credentials 609</p> <p>Certificate in the Governance of Enterprise IT 611</p> <p>Certified Internal Auditor Responsibilities and Requirements 612</p> <p>Beyond the CIA: Other IIA Certifications 623</p> <p>CISSP Information Systems Security Professional Certification 628</p> <p>Certified Fraud Examiner Certification 628</p> <p>ASQ Internal Audit Certifications 629</p> <p>Other Internal Auditor Certifications 630</p> <p>Note 631</p> <p><b>Chapter 31: Quality Assurance Auditing and ASQ Standards 632</b></p> <p>Duties and Responsibilities of Quality Auditors 633</p> <p>Role of the Quality Auditor 635</p> <p>Performing ASQ Quality Audits 638</p> <p>Quality Assurance Reviews of IT Audit Functions 641</p> <p>Future Directions for Quality Assurance Auditing 647</p> <p>Notes 648</p> <p>Index 649</p>
<b>Robert R. Moeller</b> (Evanston, IL), CPA, CISA, PMP, CISSP, is the founder of Compliance and control Systems Associates, a consulting firm that specialized in internal audit and project management with a strong understanding of information systems, corporate governance and security. He has over 30 years of experience in internal auditing, ranging from launching new internal audit functions in several companies to serving as audit director for a Fortune 50 corporation. He held positions with Grant Thornton (National Director of Computer Auditing) and Sears Roebuck (Audit Director). A frequently published author and professional speaker, Moeller provides insights into many of the new rules impacting internal auditors today as well as the challenges audit committees face when dealing with Sarbanes-Oxley, internal controls, and their internal auditors. Moeller is the former president of the Institute of Internal Auditor's Chicago chapter and has served on the IIA's International Advanced Technology Committee. He is also the former chair of the AICPA's Computer Audit Subcommittee.

Diese Produkte könnten Sie auch interessieren:

Mindfulness
Mindfulness
von: Gill Hasson
PDF ebook
12,99 €
Counterparty Credit Risk, Collateral and Funding
Counterparty Credit Risk, Collateral and Funding
von: Damiano Brigo, Massimo Morini, Andrea Pallavicini
EPUB ebook
69,99 €