Introduction to IT Auditing

Slides:



Advertisements
Similar presentations
AUDITING : AN OVERVIEW. Auditing defined It is a critical and systematic examination or review of accounting reports, documents, records, procedures and.
Advertisements

IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
Alignment of COBIT to Botswana IT Audit Methodology
Analisa Proses. Terjemahan model analisis menjadi desain software.
Chapter 10 Accounting Information Systems and Internal Controls
ITAuditing Using GAS & CAATs
Welcome ISACA Baton Rouge Chapter Moving from COBIT 4.1 to COBIT 5 May 24, 2012.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
COBIT - II.
IT Governance Capability Maturity within Government
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Security Controls – What Works
By Collin Smith COBIT Introduction By Collin Smith
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Managing the Information Technology Resource Jerry N. Luftman
MIS350 Accounting Information Systems Course Context.
Advanced Accounting Information Systems
COBIT Framework Introduction. Problems with IT? – Increasing pressure to leverage technology in business strategies – Growing complexity of IT environments.
Measuring the effectiveness of government IT systems Current ANAO initiatives to enhance IT Audit integration and support in delivering Audit outcomes.
Internal Audit Process
1 Performance Auditing  In IT Environment  Evidence Gathering & Analysis Techniques  Computer Assisted Techniques  Use of IDEA.
Chapter 2 Careers in Fraud Examination and Financial Forensics.
Chapter Nine Conducting the IT Audit. Audit Standards AICPA — Statements of Auditing Standards (SASs) AICPA — Statements of Auditing Standards (SASs)
1 Homologues Group Meeting Slovenia, October 2009 Republika SlovenijaEuropean Union Ljubljana, October 2009 Introduction to IT audits PART II IT.
PEM-PAL - 2nd Internal auditors’ Community of Practice Workshop
Fraud & Internal Control Frank M. Klaus, CPA. Fraud Definition  Fraud is the misappropriation of assets for the benefit of an individual.  “Willful.
Professional Standards Committee and Frameworks for IT Audits
Satzinger Chp. 2 Part Part 4 of 4 2 Object-Oriented Analysis and Design with the Unified Process Testing Testing is critical discipline Testing activities.
Information Systems Development. Outline  Information System  Systems Development Project  Systems Development Life Cycle.
System Development Process Prof. Sujata Rao. 2Overview Systems development life cycle (SDLC) – Provides overall framework for managing system development.
Chapter Three IT Risks and Controls.
Overview:  Different controls in an organization  Relationship between IT controls & financial controls  The Mega Process Leads  Application of COBIT.
1 ISA&D7‏/8‏/ ISA&D7‏/8‏/2013 Systems Development Life Cycle Phases and Activities in the SDLC Variations of the SDLC models.
1 Chapter Three IT Risks and Controls. 2 The Risk Management Process Identify IT Risks Assess IT Risks Identify IT Controls Document IT Controls Monitor.
1. IT AUDITS  IT audits: provide audit services where processes or data, or both, are embedded in technologies.  Subject to ethics, guidelines, and.
7-Oct-15 System Auditing. AUDITING Auditing is a systematic process of objectively obtaining and evaluating evidence regarding assertions about economic.
Roadmap to Maturity FISMA and ISO 2700x. Technical Controls Data IntegritySDLC & Change Management Operations Management Authentication, Authorization.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
1 Information Technology (IT) Auditing & Control Instructor: Dr. Princely Ifinedo Cape Breton University (CBU)
Security Management Chao-Hsien Chu, Ph.D.
Copyright © 2007 Pearson Education Canada 1 Chapter 1: The Demand for Auditing and Assurance Services.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
Approaches to Systems Development
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Systems Analysis and Design in a Changing World, Fourth Edition
COBIT®. COBIT® - Control Objectives for Information and related Technology. C OBI T was initially created by the Information Systems Audit & Control Foundation.
Forensic and Investigative Accounting Chapter 13 Computer Forensics: A Brief Introduction © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago,
BA 559: IT Governance Ben Tsao. What is COBIT?  Control Objectives for Information and Related Technology  Control framework for IT  A set of best.
IT Auditor’s Role in IT Governance Fred C. Roth, CISA MIS Training Institute Session 425.
Change Management and COBIT®. Estonia & Finland Chapters Presentation Friday, November 5 th 2004 Charles Mansour CISA Tere päevast! ©Charles Mansour.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
CHANGE MANAGEMENT - PART 2 MODULE 7
Internal Audit Agency Integrity + Professionalism INTERNAL AUDIT AGENCY ISACA Presentation 15 July, 2013 Alisa Hotel, ACCRA.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
1 Using CobiT to Enhance IT Security Governance LHS © John Mitchell John Mitchell PhD, MBA, CEng, CITP, FBCS, MBCS, FIIA, CIA, CISA, QiCA, CFE LHS Business.
ISACA Willamette Valley Chapter Luncheon Thursday, March 20, 2008 Practical Auditors Guide for CobiT Steve Balough, CISA.
Information Systems Development. Outline  Information System  Systems Development Project  Systems Development Life Cycle.
MS in IT Auditing, Cyber Security, and Risk Assessment
Chapter 1 CISB424 IT Audit Overview.
BIL 424 NETWORK ARCHITECTURE AND SERVICE PROVIDING.
Auditing Information Technology
INFORMATION SYSTEM AUDIT
Chapter 1 (pages 4-9); Overview of SDLC
Alignment of COBIT to Botswana IT Audit Methodology
Governance, audit and digital preservation
Change Management and COBIT®. ISACA London Chapter Presentation
Presentation transcript:

Introduction to IT Auditing Chapter One Introduction to IT Auditing

Outline IT Governance The Systems Development Life Cycle (SDLC) Types of Information Systems The Role of the IT Auditor

IT Governance …the process for controlling an organization’s IT resources, including information and communication systems, and technology. …using IT to promote an organization’s objectives and enable business processes and to manage and control IT related risks.

Strategic Alignment

Information Criteria CIA Triangle Cobit “add-ons” Confidentialilty Integrity Availability Cobit “add-ons” Effectiveness Efficiency Compliance Reliability

CobiT’s IT Governance Management Guideline Identifies critical success factors, key goal and performance indicators, and an IT governance maturity model. IT governance framework begins with setting IT objectives and measures and compares performance against them

Systems development life cycle (SDLC) Provides overall framework for managing system development process All projects use some variation of SDLC Phases are sequential but may include some overlap May even include iterations of some or all of the phases

Phases of the Systems Development Lifecycle (SDLC) Project planning: initiate, ensure feasibility, plan schedule, obtain approval for project Analysis: understand business needs and processing requirements Design: define solution system based on requirements and analysis decisions Implementation: construction, testing, user training, and installation of new system Support: keep system running and improve

Systems development life cycle (SDLC) In COBIT, these phases (domains) are: Plan and Organize (PO) Acquire and Implement (AI) Deliver and Support (DS) Monitor and Evaluate (ME)

Types of Information Systems

Message Transmission Example

Types of Information Systems Information Systems include not only hardware and software but… People Procedures* Data In Cobit, these “assets” include Applications (like software) Technology (like hardware) Facilities * Note: Procedures (processes) are “subsets” of the domains in CobiT

IT and Transaction (Tx) Processing The IS collects transaction data The IS turns data into information Computerized Tx systems increase some risks and decrease others

What do IT auditors do? Ensure IT governance by assessing risks and monitoring controls over those risks Works as either internal or external auditor Works on many kind of audit engagements

Financial vs IT Audits IT auditors may work on financial audit engagements IT auditors may work on every step of the financial audit engagement Standards, such as SAS No. 94, guide the work of IT auditors on financial audit engagements IT audit work on financial audit engagements is likely to increase as internal control evaluation becomes more important

IT Audit Skills College education – IS, computer science, accounting Certifications – CPA, CFE, CIA, CISA, CISSP, and special technical certifications Technical IT audit skills – specialized technologies General personal and business skills

Professional Groups and Certifications – Alphabet Soup ISACA – CISA/CISM IIA – CIA ACFE – CFE AICPA – CPA and CITP

How to Structure an IT Audit AICPA Standards and Guidelines – GAAS, SAS, and SSAE IFAC Guidelines – harmonized or common international accounting standards and guidelines ISACA standards, guidelines, and procedures – includes CobiT and audit standards

An Overview of the Book Section I – an introduction to IT audit, the legal and ethical environment of the IT audit, introduction to risks and controls Section II – risks over specific processes and technologies – deployment of IS, operation of IS, network systems, and e-business systems Section III – how to do an It audit – use of CAATTs and a step-by-step IT audit Appendices – ACL tutorial and IT audit glossary