IT Audit Reviewer
IT Audit Reviewer
IT Audit Reviewer
mgt
requirements
-Financial Audit
-Broader (operational
audit)
-Interests of outsiders
-Interests
of
organization
Standards, guidance, certification governed by:
-PICPA, FRSC, BOA
-IIA and ISACA
delegated by SEC
Fraud Audit objective: investigate anomalies
and gather evidence of fraud that may lead to
criminal conviction.
Certification: Certified Fraud Examiner (CFE)
Governed by: Association of Certified Fraud
Examiners (ACFE)
Role of Audit Committee
-Selected from Board of Directors, usually 3
members
-Outsiders (S-OX)
-Fiduciary responsibility to shareholders
-Serve as independent check and balance system
-Interact with internal auditors
-Hire, set fees, and interact with external auditors
-Resolve conflicts of GAAP between external
auditors and management
policies,
procedures designed to:
-safeguard assets
-promote efficiency
-ensure accuracy and reliability
-measure compliance with policies
practices,
Authorization is
Asset Custody
Participants:
IS Professionals gather facts about the users
problem, analyze the facts and formulate a
solution
End Users those for whom the system is built
Stakeholders individuals in/outside the firm
who have an interest in the system
Auditors
independent
checks of the accounting systems to identify
errors and misinterpretations
CHAPTER 2
IT Governance relatively new subset of
corporate governance that focuses on the
management and assessment of strategic IT
Sources
Centralized Data Processing all data
processing is performed by one or more large
computers housed at a central site that serves
users throughout the organization
Database Administrator (DBA) responsible
for security and integrity of the database
from
system
documentation for critical applications should be
backed up and stored off site along with the
applications
Backup Supplies and Source Documents
create back up inventories if supplies and source
documents
used
in
processing
critical
transactions
Testing the DRP most neglected aspect of
contingency planning
System Wide Controls
Password Control tool designed to allow
helpdesk staff to reset user password
Reusable Password same password for all
One time password password valid for only
one transaction
Email Risks
Spoofing forgery of an email header so that
the message appears to have originated from
someone other than the actual source
Spamming sent to thousands of users
Chain Letters letters convincing users to pass
them on another user