ISAUDIT-INTRODUCTION - Information Systems Audit and...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Information Systems Audit and Control 1 Information Systems Audit and Control Introduction
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Information Systems Audit and Control 2 Need for IT audit come from several directions Auditors realized that computers had impacted their ability to perform the verification function Corporate and information processing management recognized that computers were key resources for computing in the business environment and similar to other valuable business resource within the Organization. Professional associations and Organizations, and government entities recognized the need for IT control and audit-ability. Need for IS Control and Audit
Background image of page 2
Information Systems Audit and Control 3 Need for IS Control and Audit
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Information Systems Audit and Control 4 Need for IS Control and Audit Reliance on computer systems Survival of organization Costs of data loss Costs of errors Inability to function Possibility of incorrect decisions
Background image of page 4
Information Systems Audit and Control 5 Security and abuse - from inside and outside: hacking, viruses, access Destruction and theft of assets Modification of assets Disruption of operations Unauthorized use of assets Physical harm Privacy violations Need for IS Control & Audit
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Information Systems Audit and Control 6 Destruction of assets Hardware, software, data, facilities, documentation, or supplier can be destroyed Theft of assets Hardware, software, data, facilities, documentation, or supplier can be illegally removed Modification of assets Hardware, software, data, facilities, or documentation can be modified in an unauthorized way Privacy violations The privacy of data pertaining to a person or an organization can
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 18

ISAUDIT-INTRODUCTION - Information Systems Audit and...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online