SlideShare a Scribd company logo
1 of 15
Download to read offline
WHAT IS THE INFORMATION SYSTEM
AUDIT?
Axel KAPITA TSHISUYI
Information System Auditor|Project Management|E-governance|Business Analytics|Leadership|Web
Development| Author
2/16/2023 1
DEFINITIONS
The Information Systems Audit is a management
activity that aims to control the quality,
effectiveness, and efficiency in the execution of the
constituent elements of a company's Information
System (Data, software, processes, IT infrastructures,
project management, finances, Human resources,
tools and many more ) in the objective of
highlighting its SWOT (Strength, Weaknesses,
Opportunities, and Threats) in order to formulate
recommendations followed by actions-plan and a
behavior change policy.
2/16/2023 KINSHASA-RDC, AXEL KAPITA/2023 2
INFORMATION SYSTEM AUDIT PURPOSES
Generally, carrying out an information systems audit enables best dealing with current
problems, or even to anticipate them. This involves examining all the parties and all the
resources that come into play in its operation, in particular, it concerns essentially
procedures, processes, technologies, data, and personnel in order to detect the risks
that the company, through its system information, may not be able to achieve its
strategic objectives.
Specifically, the followings::
1. Increase accountability of stakeholders and shareholders;
2. Use of high-level good practice;
3. Understanding of the use made of all parts of the information system;
4. Assessment of strengths and weaknesses in order to support the business.
5. Assess the strategic and qualitative aspects of the information system;
6. An assurance of the reliability, sincerity, and fidelity of the financial statements;
7. Assess the Internal Control if it exists.
2/16/2023
KINSHASA-RDC, AXEL KAPITA/2023
3
BENEFICIARIES
1. The Information Systems Department in the order to
assess its effectiveness and performance;
2. The Finance Department in order to assess the
resources involved and see the reliability, fidelity, and
regularity of the financial statements;
3. General Manager to get a clear insight into the
activity of each department;
4. Shareholders/stakeholders to get a clear insight into
their investments and the enterprise’s health;
2/16/2023
KINSHASA-RDC, AXEL KAPITA/2023
4
CLASSIFICATIONS
We can classify different types of audits according
to the followings:
(i) their internal/external characteristics to the
audited structure; (ii) according to their specificities
(finances, information system security, project,
supply, stocks, purchases, studies, production, taxes,
and application compliances);
(iii) in terms of legal obligations (legal audit and
contractual audit).
2/16/2023
KINSHASA-RDC, AXEL KAPITA/2023
5
SKILLS REQUIRED
1. Effective communication;
2. Time management;
3. Analysis and critical-mind;
4. Solving Problem Methods;
5. Data Analysis;
6. Information systems;
7. Finances and accounting;
8. Risks management;
9. Overall understanding of sector area,
2/16/2023
KINSHASA-RDC, AXEL KAPITA/2023
6
FIELDS AREAS
1. Finances and accountings;
2. IT Networking,
3. Cyber security
4. Data Management;
5. Software;
6. Business Processes;
7. Human Resources;
8. Project Management;
2/16/2023
KINSHASA-RDC, AXEL KAPITA/2023
7
APPROACHES
An audit approach is defined as a strategy, method,
or technique used by an auditor to carry out his
mission. Thus, generally we have the following:
1. Audit by an exhaustive approach (Full-audit);
2. Audit by analyzing Internal Control;
3. Audit by risk approach
2/16/2023
KINSHASA-RDC, AXEL KAPITA/2023
8
EXECUTION PROCESS
1. Methodology definition;
2. Planning;
3. Work-Team designing;
4. Entity Understanding;
5. Risk assessment and analysis;
6. Investigations;
7. Reporting;
8. Recommendations following-up,
2/16/2023
KINSHASA-RDC, AXEL KAPITA/2023
9
GENERAL STANDARDS USED
1. COBIT for the information systems governance and
any other one;
2. ITIL for IT services provision and any other one;
3. ISO 9001 for quality management;
4. ISO 27001 for information system security;
5. CMMI for software projects management and any
other one;
6. PMPI for project management;
7. ISA for general audit and accounting;
8. COSO for Internal Control;
2/16/2023
KINSHASA-RDC, AXEL KAPITA/2023
10
ESSENTIAL CONCEPTS TO KNOW IN INFORMATION
SYSTEMS AUDIT
1. Information system assets
2. Evidence
3. Threat
4. Vulnerability
5. Impact
6. Audit trail,
7. Reliable Audit Trail
8. Framework
2/16/2023
KINSHASA-RDC, AXEL KAPITA/2023
11
TOOLS AND METHODS
1. Gap Analysis;
2. Lean Six Sigma for quality;
3. Total Quality Management;
4. Reengineering Process for process Assessment;
5. PDCA;
6. Getting Things Done;
7. Who, What, Where, How, How much,Why? 5 whys
8. Brainstorming;
9. Ishikawa Diagram;
10. Mind Mapping;
11. Scoring board, SMART, RACI, Causes-effect diagram;
2/16/2023
KINSHASA-RDC, AXEL KAPITA/2023
12
TECHNOLOGIES USED
1. Advanced Microsoft Excel;
2. Tableau Software;
3. Python programming;
4. SQL.
2/16/2023
KINSHASA-RDC, AXEL KAPITA/2023
13
DOCUMENTS FOR CONSULTATION
1. Business Impact Analysis;
2. Internal regulations and standards;
2/16/2023
KINSHASA-RDC, AXEL KAPITA/2023
14
THANKS YOU FOR READING
Contacts :
Links:
 https://www.linkedin.com/in/axel-kapita-1125a832/
https://www.amazon.fr/dp/B096TTDLMJ
https://public.tableau.com/app/profile/kapita.tshisuyi
E-mail: axelkapita@proton.me
2/16/2023
KINSHASA-RDC, AXEL KAPITA/2023
15

More Related Content

Similar to WHAT IS THE INFORMATION SYSTEM AUDIT.pdf

· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
LynellBull52
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
Mohan M
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
abhichowdary16
 
Vizor Software for Solvency II Supervision
Vizor Software for Solvency II SupervisionVizor Software for Solvency II Supervision
Vizor Software for Solvency II Supervision
Conor Crowley
 
This domain reviews the diverse areas of knowledge needed to develop and man...
This domain reviews the diverse areas of  knowledge needed to develop and man...This domain reviews the diverse areas of  knowledge needed to develop and man...
This domain reviews the diverse areas of knowledge needed to develop and man...
bikheet
 

Similar to WHAT IS THE INFORMATION SYSTEM AUDIT.pdf (20)

· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf
 
Jason Allred Resume
Jason Allred ResumeJason Allred Resume
Jason Allred Resume
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
 
Information 2nd lesson
Information 2nd lessonInformation 2nd lesson
Information 2nd lesson
 
Nagios Conference 2013 - Jorge Higueros - Trust Management in Monitoring Fina...
Nagios Conference 2013 - Jorge Higueros - Trust Management in Monitoring Fina...Nagios Conference 2013 - Jorge Higueros - Trust Management in Monitoring Fina...
Nagios Conference 2013 - Jorge Higueros - Trust Management in Monitoring Fina...
 
Profile_Kishore Sundar
Profile_Kishore SundarProfile_Kishore Sundar
Profile_Kishore Sundar
 
Euro cacs2019 169
Euro cacs2019 169Euro cacs2019 169
Euro cacs2019 169
 
IntroToActiveAuditHandbookEN.pptx
IntroToActiveAuditHandbookEN.pptxIntroToActiveAuditHandbookEN.pptx
IntroToActiveAuditHandbookEN.pptx
 
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive ApproachThe 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Vizor Software for Solvency II Supervision
Vizor Software for Solvency II SupervisionVizor Software for Solvency II Supervision
Vizor Software for Solvency II Supervision
 
Ict governance
Ict governanceIct governance
Ict governance
 
An Overview Of Predictive Analysis Techniques And Applications
An Overview Of Predictive Analysis  Techniques And ApplicationsAn Overview Of Predictive Analysis  Techniques And Applications
An Overview Of Predictive Analysis Techniques And Applications
 
Smart Grid Readiness - Self Assessment Tool
Smart Grid Readiness - Self Assessment ToolSmart Grid Readiness - Self Assessment Tool
Smart Grid Readiness - Self Assessment Tool
 
This domain reviews the diverse areas of knowledge needed to develop and man...
This domain reviews the diverse areas of  knowledge needed to develop and man...This domain reviews the diverse areas of  knowledge needed to develop and man...
This domain reviews the diverse areas of knowledge needed to develop and man...
 
Audit fieldwork
Audit fieldworkAudit fieldwork
Audit fieldwork
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrain
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
 

Recently uploaded

Recently uploaded (20)

Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
 
Construction Project Management | Coursera 2024
Construction Project Management | Coursera 2024Construction Project Management | Coursera 2024
Construction Project Management | Coursera 2024
 
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg PartnershipUnlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
Unlocking the Future - Dr Max Blumberg, Founder of Blumberg Partnership
 
Reviewing and summarization of university ranking system to.pptx
Reviewing and summarization of university ranking system  to.pptxReviewing and summarization of university ranking system  to.pptx
Reviewing and summarization of university ranking system to.pptx
 
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote SpeakerLeadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
Leadership in Crisis - Helio Vogas, Risk & Leadership Keynote Speaker
 
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdfImagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
Imagine - Creating Healthy Workplaces - Anthony Montgomery.pdf
 
Becoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette ThompsonBecoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette Thompson
 
Empowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdfEmpowering Local Government Frontline Services - Mo Baines.pdf
Empowering Local Government Frontline Services - Mo Baines.pdf
 
situational leadership theory by Misba Fathima S
situational leadership theory by Misba Fathima Ssituational leadership theory by Misba Fathima S
situational leadership theory by Misba Fathima S
 
Disrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdfDisrupt or be Disrupted - Kirk Vallis.pdf
Disrupt or be Disrupted - Kirk Vallis.pdf
 
LoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner CircleLoveLocalGov - Chris Twigg, Inner Circle
LoveLocalGov - Chris Twigg, Inner Circle
 
Peak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian DugmorePeak Performance & Resilience - Dr Dorian Dugmore
Peak Performance & Resilience - Dr Dorian Dugmore
 
Intro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptxIntro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptx
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC Bootcamp
 
Imagine - HR; are handling the 'bad banter' - Stella Chandler.pdf
Imagine - HR; are handling the 'bad banter' - Stella Chandler.pdfImagine - HR; are handling the 'bad banter' - Stella Chandler.pdf
Imagine - HR; are handling the 'bad banter' - Stella Chandler.pdf
 
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
 
Discover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdfDiscover -CQ Master Class - Rikita Wadhwa.pdf
Discover -CQ Master Class - Rikita Wadhwa.pdf
 
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
 
Continuous Improvement Posters for Learning
Continuous Improvement Posters for LearningContinuous Improvement Posters for Learning
Continuous Improvement Posters for Learning
 
Continuous Improvement Infographics for Learning
Continuous Improvement Infographics for LearningContinuous Improvement Infographics for Learning
Continuous Improvement Infographics for Learning
 

WHAT IS THE INFORMATION SYSTEM AUDIT.pdf

  • 1. WHAT IS THE INFORMATION SYSTEM AUDIT? Axel KAPITA TSHISUYI Information System Auditor|Project Management|E-governance|Business Analytics|Leadership|Web Development| Author 2/16/2023 1
  • 2. DEFINITIONS The Information Systems Audit is a management activity that aims to control the quality, effectiveness, and efficiency in the execution of the constituent elements of a company's Information System (Data, software, processes, IT infrastructures, project management, finances, Human resources, tools and many more ) in the objective of highlighting its SWOT (Strength, Weaknesses, Opportunities, and Threats) in order to formulate recommendations followed by actions-plan and a behavior change policy. 2/16/2023 KINSHASA-RDC, AXEL KAPITA/2023 2
  • 3. INFORMATION SYSTEM AUDIT PURPOSES Generally, carrying out an information systems audit enables best dealing with current problems, or even to anticipate them. This involves examining all the parties and all the resources that come into play in its operation, in particular, it concerns essentially procedures, processes, technologies, data, and personnel in order to detect the risks that the company, through its system information, may not be able to achieve its strategic objectives. Specifically, the followings:: 1. Increase accountability of stakeholders and shareholders; 2. Use of high-level good practice; 3. Understanding of the use made of all parts of the information system; 4. Assessment of strengths and weaknesses in order to support the business. 5. Assess the strategic and qualitative aspects of the information system; 6. An assurance of the reliability, sincerity, and fidelity of the financial statements; 7. Assess the Internal Control if it exists. 2/16/2023 KINSHASA-RDC, AXEL KAPITA/2023 3
  • 4. BENEFICIARIES 1. The Information Systems Department in the order to assess its effectiveness and performance; 2. The Finance Department in order to assess the resources involved and see the reliability, fidelity, and regularity of the financial statements; 3. General Manager to get a clear insight into the activity of each department; 4. Shareholders/stakeholders to get a clear insight into their investments and the enterprise’s health; 2/16/2023 KINSHASA-RDC, AXEL KAPITA/2023 4
  • 5. CLASSIFICATIONS We can classify different types of audits according to the followings: (i) their internal/external characteristics to the audited structure; (ii) according to their specificities (finances, information system security, project, supply, stocks, purchases, studies, production, taxes, and application compliances); (iii) in terms of legal obligations (legal audit and contractual audit). 2/16/2023 KINSHASA-RDC, AXEL KAPITA/2023 5
  • 6. SKILLS REQUIRED 1. Effective communication; 2. Time management; 3. Analysis and critical-mind; 4. Solving Problem Methods; 5. Data Analysis; 6. Information systems; 7. Finances and accounting; 8. Risks management; 9. Overall understanding of sector area, 2/16/2023 KINSHASA-RDC, AXEL KAPITA/2023 6
  • 7. FIELDS AREAS 1. Finances and accountings; 2. IT Networking, 3. Cyber security 4. Data Management; 5. Software; 6. Business Processes; 7. Human Resources; 8. Project Management; 2/16/2023 KINSHASA-RDC, AXEL KAPITA/2023 7
  • 8. APPROACHES An audit approach is defined as a strategy, method, or technique used by an auditor to carry out his mission. Thus, generally we have the following: 1. Audit by an exhaustive approach (Full-audit); 2. Audit by analyzing Internal Control; 3. Audit by risk approach 2/16/2023 KINSHASA-RDC, AXEL KAPITA/2023 8
  • 9. EXECUTION PROCESS 1. Methodology definition; 2. Planning; 3. Work-Team designing; 4. Entity Understanding; 5. Risk assessment and analysis; 6. Investigations; 7. Reporting; 8. Recommendations following-up, 2/16/2023 KINSHASA-RDC, AXEL KAPITA/2023 9
  • 10. GENERAL STANDARDS USED 1. COBIT for the information systems governance and any other one; 2. ITIL for IT services provision and any other one; 3. ISO 9001 for quality management; 4. ISO 27001 for information system security; 5. CMMI for software projects management and any other one; 6. PMPI for project management; 7. ISA for general audit and accounting; 8. COSO for Internal Control; 2/16/2023 KINSHASA-RDC, AXEL KAPITA/2023 10
  • 11. ESSENTIAL CONCEPTS TO KNOW IN INFORMATION SYSTEMS AUDIT 1. Information system assets 2. Evidence 3. Threat 4. Vulnerability 5. Impact 6. Audit trail, 7. Reliable Audit Trail 8. Framework 2/16/2023 KINSHASA-RDC, AXEL KAPITA/2023 11
  • 12. TOOLS AND METHODS 1. Gap Analysis; 2. Lean Six Sigma for quality; 3. Total Quality Management; 4. Reengineering Process for process Assessment; 5. PDCA; 6. Getting Things Done; 7. Who, What, Where, How, How much,Why? 5 whys 8. Brainstorming; 9. Ishikawa Diagram; 10. Mind Mapping; 11. Scoring board, SMART, RACI, Causes-effect diagram; 2/16/2023 KINSHASA-RDC, AXEL KAPITA/2023 12
  • 13. TECHNOLOGIES USED 1. Advanced Microsoft Excel; 2. Tableau Software; 3. Python programming; 4. SQL. 2/16/2023 KINSHASA-RDC, AXEL KAPITA/2023 13
  • 14. DOCUMENTS FOR CONSULTATION 1. Business Impact Analysis; 2. Internal regulations and standards; 2/16/2023 KINSHASA-RDC, AXEL KAPITA/2023 14
  • 15. THANKS YOU FOR READING Contacts : Links:  https://www.linkedin.com/in/axel-kapita-1125a832/ https://www.amazon.fr/dp/B096TTDLMJ https://public.tableau.com/app/profile/kapita.tshisuyi E-mail: axelkapita@proton.me 2/16/2023 KINSHASA-RDC, AXEL KAPITA/2023 15