Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Series
Title Page
Copyright
Dedication
Preface
CONTROLS IN MODERN COMPUTER SYSTEMS
OVERALL FRAMEWORK
Part I: IT Audit Process
Chapter 1: Technology and Audit
TECHNOLOGY AND AUDIT
BATCH AND ONLINE SYSTEMS
ELECTRONIC DATA INTERCHANGE
ELECTRONIC BUSINESS
CLOUD COMPUTING
Chapter 2: IT Audit Function Knowledge
INFORMATION TECHNOLOGY AUDITING
WHAT IS MANAGEMENT?
MANAGEMENT PROCESS
UNDERSTANDING THE ORGANIZATION’S BUSINESS
ESTABLISHING THE NEEDS
IDENTIFYING KEY ACTIVITIES
ESTABLISH PERFORMANCE OBJECTIVES
DECIDE THE CONTROL STRATEGIES
IMPLEMENT AND MONITOR THE CONTROLS
EXECUTIVE MANAGEMENT’S RESPONSIBILITY AND CORPORATE GOVERNANCE
AUDIT ROLE
CONCEPTUAL FOUNDATION
PROFESSIONALISM WITHIN THE IT AUDITING FUNCTION
RELATIONSHIP OF INTERNAL IT AUDIT TO THE EXTERNAL AUDITOR
RELATIONSHIP OF IT AUDIT TO OTHER COMPANY AUDIT ACTIVITIES
AUDIT CHARTER
CHARTER CONTENT
OUTSOURCING THE IT AUDIT ACTIVITY
REGULATION, CONTROL, AND STANDARDS
Chapter 3: It Risk and Fundamental Auditing Concepts
COMPUTER RISKS AND EXPOSURES
EFFECT OF RISK
AUDIT AND RISK
AUDIT EVIDENCE
CONDUCTING AN IT RISK-ASSESSMENT PROCESS
NIST SP 800 30 FRAMEWORK
ISO 27005
THE “CASCARINO CUBE”
RELIABILITY OF AUDIT EVIDENCE
AUDIT EVIDENCE PROCEDURES
RESPONSIBILITIES FOR FRAUD DETECTION AND PREVENTION
NOTES
Chapter 4: Standards and Guidelines for IT Auditing
IIA STANDARDS
CODE OF ETHICS
ADVISORY
AIDS
STANDARDS FOR THE PROFESSIONAL PERFORMANCE OF INTERNAL AUDITING
ISACA STANDARDS
ISACA CODE OF ETHICS
COSO: INTERNAL CONTROL STANDARDS
BS 7799 AND ISO 17799: IT SECURITY
NIST
BSI BASELINES
NOTE
Chapter 5: Internal Controls Concepts Knowledge
INTERNAL CONTROLS
COST/BENEFIT CONSIDERATIONS
INTERNAL CONTROL OBJECTIVES
TYPES OF INTERNAL CONTROLS
SYSTEMS OF INTERNAL CONTROL
ELEMENTS OF INTERNAL CONTROL
MANUAL AND AUTOMATED SYSTEMS
CONTROL PROCEDURES
APPLICATION CONTROLS
CONTROL OBJECTIVES AND RISKS
GENERAL CONTROL OBJECTIVES
DATA AND TRANSACTIONS OBJECTIVES
PROGRAM CONTROL OBJECTIVES
CORPORATE IT GOVERNANCE
COSO AND INFORMATION TECHNOLOGY
GOVERNANCE FRAMEWORKS
NOTES
Chapter 6: Risk Management of the IT Function
NATURE OF RISK
RISK-ANALYSIS SOFTWARE
AUDITING IN GENERAL
ELEMENTS OF RISK ANALYSIS
DEFINING THE AUDIT UNIVERSE
COMPUTER SYSTEM THREATS
RISK MANAGEMENT
NOTES
Chapter 7: Audit Planning Process
BENEFITS OF AN AUDIT PLAN
STRUCTURE OF THE PLAN
TYPES OF AUDIT
Chapter 8: Audit Management
PLANNING
AUDIT MISSION
IT AUDIT MISSION
ORGANIZATION OF THE FUNCTION
STAFFING
IT AUDIT AS A SUPPORT FUNCTION
PLANNING
BUSINESS INFORMATION SYSTEMS
INTEGRATED IT AUDITOR VERSUS INTEGRATED IT AUDIT
AUDITEES AS PART OF THE AUDIT TEAM
APPLICATION AUDIT TOOLS
ADVANCED SYSTEMS
SPECIALIST AUDITOR
IT AUDIT QUALITY ASSURANCE
Chapter 9: Audit Evidence Process
AUDIT EVIDENCE
AUDIT EVIDENCE PROCEDURES
CRITERIA FOR SUCCESS
STATISTICAL SAMPLING
WHY SAMPLE?
JUDGMENTAL (OR NON-STATISTICAL) SAMPLING
STATISTICAL APPROACH
SAMPLING RISK
ASSESSING SAMPLING RISK
PLANNING A SAMPLING APPLICATION
CALCULATING SAMPLE SIZE
QUANTITATIVE METHODS
PROJECT-SCHEDULING TECHNIQUES
SIMULATIONS
COMPUTER-ASSISTED AUDIT SOLUTIONS
GENERALIZED AUDIT SOFTWARE
APPLICATION AND INDUSTRY-RELATED AUDIT SOFTWARE
CUSTOMIZED AUDIT SOFTWARE
INFORMATION-RETRIEVAL SOFTWARE
UTILITIES
ON-LINE INQUIRY
CONVENTIONAL PROGRAMMING LANGUAGES
MICROCOMPUTER-BASED SOFTWARE
TEST TRANSACTION TECHNIQUES
Chapter 10: Audit Reporting Follow-up
AUDIT REPORTING
INTERIM REPORTING
CLOSING CONFERENCES
WRITTEN REPORTS
CLEAR WRITING TECHNIQUES
PREPARING TO WRITE
BASIC AUDIT REPORT
EXECUTIVE SUMMARY
DETAILED FINDINGS
POLISHING THE REPORT
DISTRIBUTING THE REPORT
FOLLOW-UP REPORTING
TYPES OF FOLLOW-UP ACTION
Part II: Information Technology Governance
Chapter 11: Management
IT INFRASTRUCTURES
PROJECT-BASED FUNCTIONS
QUALITY CONTROL
OPERATIONS AND PRODUCTION
TECHNICAL SERVICES
PERFORMANCE MEASUREMENT AND REPORTING
MEASUREMENT IMPLEMENTATION
NOTES
Chapter 12: Strategic Planning
STRATEGIC MANAGEMENT PROCESS
STRATEGIC DRIVERS
NEW AUDIT REVOLUTION
LEVERAGING IT
BUSINESS PROCESS RE-ENGINEERING MOTIVATION
IT AS AN ENABLER OF RE-ENGINEERING
DANGERS OF CHANGE
SYSTEM MODELS
INFORMATION RESOURCE MANAGEMENT
STRATEGIC PLANNING FOR IT
DECISION SUPPORT SYSTEMS
STEERING COMMITTEES
STRATEGIC FOCUS
AUDITING STRATEGIC PLANNING
DESIGN THE AUDIT PROCEDURES
NOTE
Chapter 13: Management Issues
PRIVACY
COPYRIGHTS, TRADEMARKS, AND PATENTS
ETHICAL ISSUES
CORPORATE CODES OF CONDUCT
IT GOVERNANCE
SARBANES-OXLEY ACT
PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS
HOUSEKEEPING
NOTES
Chapter 14: Support Tools and Frameworks
GENERAL FRAMEWORKS
COSO: INTERNAL CONTROL STANDARDS
OTHER STANDARDS
GOVERNANCE FRAMEWORKS
NOTE
Chapter 15: Governance Techniques
CHANGE CONTROL
PROBLEM MANAGEMENT
AUDITING CHANGE CONTROL
OPERATIONAL REVIEWS
PERFORMANCE MEASUREMENT
ISO 9000 REVIEWS
Part III: Systems and Infrastructure Lifecycle Management
Chapter 16: Information Systems Planning
STAKEHOLDERS
OPERATIONS
SYSTEMS DEVELOPMENT
TECHNICAL SUPPORT
OTHER SYSTEM USERS
SEGREGATION OF DUTIES
PERSONNEL PRACTICES
OBJECT-ORIENTED SYSTEMS ANALYSIS
ENTERPRISE RESOURCE PLANNING
CLOUD COMPUTING
NOTES
Chapter 17: Information Management and Usage
WHAT ARE ADVANCED SYSTEMS?
SERVICE DELIVERY AND MANAGEMENT
COMPUTER-ASSISTED AUDIT TOOLS AND TECHNIQUES
NOTES
Chapter 18: Development, Acquisition, and Maintenance of Information Systems
PROGRAMMING COMPUTERS
PROGRAM CONVERSIONS
NO THANKS SYSTEMS DEVELOPMENT EXPOSURES
SYSTEMS DEVELOPMENT CONTROLS
SYSTEMS DEVELOPMENT LIFECYCLE CONTROL: CONTROL OBJECTIVES
MICRO-BASED SYSTEMS
CLOUD COMPUTING APPLICATIONS
NOTE
Chapter 19: Impact of Information Technology on the Business Processes and Solutions
IMPACT
CONTINUOUS MONITORING
BUSINESS PROCESS OUTSOURCING
E-BUSINESS
NOTES
Chapter 20: Software Development
DEVELOPING A SYSTEM
CHANGE CONTROL
WHY DO SYSTEMS FAIL?
AUDITOR’S ROLE IN SOFTWARE DEVELOPMENT
Chapter 21: Audit and Control of Purchased Packages and Services
IT VENDORS
REQUEST FOR INFORMATION
REQUIREMENTS DEFINITION
REQUEST FOR PROPOSAL
INSTALLATION
SYSTEMS MAINTENANCE
SYSTEMS MAINTENANCE REVIEW
OUTSOURCING
SAS 70 REPORTS
Chapter 22: Audit Role in Feasibility Studies and Conversions
FEASIBILITY SUCCESS FACTORS
CONVERSION SUCCESS FACTORS
Chapter 23: Audit and Development of Application Controls
WHAT ARE SYSTEMS?
CLASSIFYING SYSTEMS
CONTROLLING SYSTEMS
CONTROL STAGES
CONTROL OBJECTIVES OF BUSINESS SYSTEMS
GENERAL CONTROL OBJECTIVES
CAATS AND THEIR ROLE IN BUSINESS SYSTEMS AUDITING
COMMON PROBLEMS
AUDIT PROCEDURES
CAAT USE IN NON-COMPUTERIZED AREAS
DESIGNING AN APPROPRIATE AUDIT PROGRAM
Part IV: Information Technology Service Delivery and Support
Chapter 24: Technical Infrastructure
AUDITING THE TECHNICAL INFRASTRUCTURE
INFRASTRUCTURE CHANGES
COMPUTER OPERATIONS CONTROLS
OPERATIONS EXPOSURES
OPERATIONS CONTROLS
PERSONNEL CONTROLS
SUPERVISORY CONTROLS
INFORMATION SECURITY
OPERATIONS AUDITS
NOTES
Chapter 25: Service-Center Management
PRIVATE SECTOR PREPAREDNESS (PS PREP)
CONTINUITY MANAGEMENT AND DISASTER RECOVERY
MANAGING SERVICE-CENTER CHANGE
NOTES
Part V: Protection of Information Assets
Chapter 26: Information Assets Security Management
WHAT IS INFORMATION SYSTEMS SECURITY?
CONTROL TECHNIQUES
WORKSTATION SECURITY
PHYSICAL SECURITY
LOGICAL SECURITY
USER AUTHENTICATION
COMMUNICATIONS SECURITY
ENCRYPTION
HOW ENCRYPTION WORKS
ENCRYPTION WEAKNESSES
POTENTIAL ENCRYPTION
DATA INTEGRITY
DOUBLE PUBLIC KEY ENCRYPTION
STEGANOGRAPHY
INFORMATION SECURITY POLICY
NOTES
Chapter 27: Logical Information Technology Security
COMPUTER OPERATING SYSTEMS
TAILORING THE OPERATING SYSTEM
AUDITING THE OPERATING SYSTEM
SECURITY
CRITERIA
SECURITY SYSTEMS: RESOURCE ACCESS CONTROL FACILITY
AUDITING RACF
ACCESS CONTROL FACILITY 2
TOP SECRET
USER AUTHENTICATION
BYPASS MECHANISMS
SECURITY TESTING METHODOLOGIES
NOTES
Chapter 28: Applied Information Technology Security
COMMUNICATIONS AND NETWORK SECURITY
NETWORK PROTECTION
HARDENING THE OPERATING ENVIRONMENT
CLIENT SERVER AND OTHER ENVIRONMENTS
FIREWALLS AND OTHER PROTECTION RESOURCES
INTRUSION-DETECTION SYSTEMS
NOTE
Chapter 29: Physical and Environmental Security
CONTROL MECHANISMS
IMPLEMENTING THE CONTROLS
Part VI: Business Continuity and Disaster Recovery
Chapter 30: Protection of the Information Technology Architecture and Assets: Disaster-Recovery Planning
RISK REASSESSMENT
DISASTER—BEFORE AND AFTER
CONSEQUENCES OF DISRUPTION
WHERE TO START
TESTING THE PLAN
AUDITING THE PLAN
Chapter 31: Displacement Control
INSURANCE
SELF-INSURANCE
Part VII: Advanced IT Auditing
Chapter 32: Auditing E-commerce Systems
E-COMMERCE AND ELECTRONIC DATA INTERCHANGE: WHAT IS IT?
OPPORTUNITIES AND THREATS
RISK FACTORS
THREAT LIST
SECURITY TECHNOLOGY
“LAYER” CONCEPT
AUTHENTICATION
ENCRYPTION
TRADING PARTNER AGREEMENTS
RISKS AND CONTROLS WITHIN EDI AND E-COMMERCE
E-COMMERCE AND AUDITABILITY
COMPLIANCE AUDITING
E-COMMERCE AUDIT APPROACH
AUDIT TOOLS AND TECHNIQUES
AUDITING SECURITY CONTROL STRUCTURES
COMPUTER-ASSISTED AUDIT TECHNIQUES
NOTES
Chapter 33: Auditing UNIX/Linux
HISTORY
SECURITY AND CONTROL IN A UNIX/LINUX SYSTEM
ARCHITECTURE
UNIX SECURITY
SERVICES
DAEMONS
AUDITING UNIX
SCRUTINY OF LOGS
AUDIT TOOLS IN THE PUBLIC DOMAIN
UNIX PASSWORD FILE
AUDITING UNIX PASSWORDS
Chapter 34: Auditing Windows VISTA and Windows 7
HISTORY
NT AND ITS DERIVATIVES
AUDITING WINDOWS VISTA/WINDOWS 7
PASSWORD PROTECTION
VISTA/WINDOWS 7
SECURITY CHECKLIST
Chapter 35: Foiling the System Hackers
Chapter 36: Preventing and Investigating Information Technology Fraud
PREVENTING FRAUD
INVESTGATION
IDENTITY THEFT
NOTE
Appendix A: Ethics and Standards for the IS Auditor
ISACA CODE OF PROFESSIONAL ETHICS
RELATIONSHIP OF STANDARDS TO GUIDELINES AND PROCEDURES
Appendix B: Audit Program for Application Systems Auditing
Appendix C: Logical Access-Control Audit Program
Appendix D: Audit Program for Auditing UNIX/Linux Environments
Appendix E: Audit Program for Auditing Windows VISTA and Windows 7 Environments
About the Author
About the Website
Index
← Prev
Back
Next →
← Prev
Back
Next →