Auditing Information Systems
Have you been asked to perform an information systems audit and don't know where to start? Examine a company's hardware, software, and data organization and processing methods to ensure quality control and security with this easy, practical guide to auditing computer systems--the tools necessary to implement an effective IS audit. In nontechnical language and following the format of an IS audit program, you'll gain insight into new types of security certifications (e.g., TruSecure, CAP SysTrust, CPA WebTrust) as well as the importance of physical security controls, adequate insurance, and digital surveillance systems.
Order your copy today!
What people are saying - Write a review
We haven't found any reviews in the usual places.
PART TWO STANDARD INFORMATION SYSTEMS AUDIT APPROACH
PART THREE CONTEMPORARY INFORMATION SYSTEMS AUDITING CONCEPTS
Appendix A Professional Auditing Associations and Other Organizations Related to Information Systems Auditing and Computer Security
Appendix B Common Criteria for Information Technology Security Evaluation
Appendix C The International Organization for Standardization SevenLayer Open Systems Interconnection Reference Model
Other editions - View all
access capabilities activities application application software areas assess auditors badge central processing unit certificate Chapter client organization COBIT computer forensics computing systems contract control weaknesses Credit Union cryptography CSA workshop customers data processing database digital signature documentation effective electronic electronic commerce employees encryption ensure environment example external Fedwire financial institution financial statements functions hardware identified implemented Internal Audit Department internal control Internet issues loan logical security controls ment monitoring operating system organization’s parameters password perform physical security production professional recommended risk Seattle News Fax segregation of duties senior management service auditor service organization sign-on significant specific staff standards storage STUDY system access system security administrator system user ID telecommunications testing tion transactions TruSecure types U.S.A. Phone unauthorized access vendor organization virus wire transfer workstations