SlideShare a Scribd company logo
1 of 29
IT System &
Security Audit
JBIMS MIM SEM V 2015-2018
MUFADDAL NULLWALA – 15-I-131
Contents
1. Defining an IT Auditor
2. IT Auditor Certifications & ISACA
3. IT Audit Phases
4. Preparing to be Audited
5. How IT auditor audits an Applications
6. Auditing technology for Information System
IT Auditor
 An IT auditor identify ways in which an organization's
computer systems meets its needs, review configuration of
hardware and software programs designed for new
systems and check if the system controls are adequate.
 CISA, CISM, Networking, Hardware, Software, Information
quality Assurance, Cryptography Experts etc.
 IT Audits are done in Teams
ISACA
 www.isaca.org - ISACA is an international professional
association focused on IT governance.
 Originated in United States in 1967
 Certifications
Certified Information Systems Auditor (CISA)
Certified Information Security Manager (CISM)
Certified in the Governance of Enterprise IT (CGEIT)
Control Objectives for Information and Related Technology
(COBIT) 5
Certified in Risk and Information Systems Control (CRISC)
Cybersecurity Nexus Practitioner (CSX-P)
CISA
 The CISA (Certified Information Systems Auditor)
certification is renowned all across the globe as a standard
for Business Systems and Information technology
professionals who audit, monitor, access, and control data.
 Min. of 5 years of IS auditing, control or security work
experience
 Code of professional ethics
 Adhering to IS auditing standards
CISM
CISM – Certified Information Security Manager
Specialization
Information Security Governance
Risk Management
Information Security Program Management
Information Security Management
Response Management
Audit Phases
Pre-Audit
 Define Scope & Objectives
 Set Audit Intent
 Past Audit
 Review current Policies
 Audit Plan
 Checklists
 Site Survey (if required in some cases)
Audit
 Site Survey
 Meet Site Managers - What data, How & when it will be
collected
 Data Collection
 Interview Staff
 Access Control Assessments
 Vulnerability Assessments
 Exit meeting - Immediate problems, Questions & answer
for site managers, Preliminary findings
Post – Audit (Reporting)
 Preparation of detailed audit report
 Report contains
Introduction
Audit findings presented in separate sections
Auditors overall conclusion & opinion
Auditors reservations with respect to the audit
Detailed Audit findings & recommendations
Documents & references used
Materiality of Findings
Preparing To Be Audited
Audits are not for Confrontation
Auditees should participate & make themselves available
during the Audit
Auditees should make themselves aware of
 Intent/scope & objectives of the Audit
 What type of data will be collected
 What data should not be collected
 Auditors should also know that what data shouldn’t be
collected
Application Audit
 An assessment whose scope focuses on Business Critical
Processes or Application
 Any application or software running in the company to
carry out business
E.g. Payroll process that may span across several different
servers, databases, operating systems, applications, etc.
The level of controls is dependent on the degree of risk
involved in the incorrect or unauthorized processing of
data
Application Audit (cont.)
 Administration
 Inputs, Processing, Outputs
 Logical Security
 Disaster Recovery Plan
 Change Management
 User Support
 Third Party Services
 General Controls
Application Audit -
Administration
 The most important area of the audit, because this area
focuses on the overall ownership and accountability of the
application
 Roles & Responsibilities - development, change approval,
access authorization
Legal and Regulatory compliance issues
Application Audit - Inputs,
Processing, Outputs
 Looking for evidence of data preparation procedures,
reconciliation processes, handling requirements, etc.
 Run test transactions against the application
 Includes who can enter input and see output
 Retention of output and its destruction
Application Audit - Logical
Security
Looking at user creation and authorization as governed by
the application its self
User ID linked to a real person
Number of allowable unsuccessful log-on attempts
Minimum password length
Password expiration
Application Audit - Disaster
Recovery Plan
Looking for an adequate and performable disaster
recovery plan that will allow the application to be
recovered in a reasonable amount of time after a disaster
Backup guidelines, process documentation, offsite storage
guidelines, SLA’s with offsite storage vendors, etc.
Application Audit - Change
Control
 Examines the process changes to an application go
through
 Process is documented, adequate and followed
 Who is allowed to make a request a change, approve a
change and make the change
 Change is tested to check if it doesn’t break compliance
(determined in Administration) before being placed in to
production
Application Audit - User
Support
 One of the most overlooked aspects of an application
 User documentation (manuals, online help, etc.) - available
& up to date
 User training - productivity, proper use, security
 Process for user improvement requests
Application Audit - General
Controls
Examining the environment the application exists within
that affect the application
System administration / operations
Organizational logical security
Physical security
Organizational disaster recovery plans
Organizational change control process
License control processes
Virus control procedures
II. Auditing Technology for
Information Systems
 Review of Systems Documentation
 Test Data
 Integrated-Test-Facility (ITF) Approach
 Parallel Simulation
 Audit Software
 Embedded Audit Routines
Review of Systems Documentation
The auditor reviews documentation such as narrative
descriptions, flowcharts, and program listings.
In desk checking the auditor processes test or real data
through the program logic.
Test Data
The auditor prepares input containing both valid and
invalid data. Prior to processing the test data, the input is
manually processed to determine what the output should
look like.
The auditor then compares the computer-processed output
with the manually processed results.
Illustration of Test Data
Approach
Computer Operations Auditors
Integrated Test Facility (ITF)
Approach
A common form of an ITF is as follows:
 A dummy ITF center is created for the auditors.
 Auditors create transactions for controls they want to
test.
 Working papers are created to show expected results
from manually processed information.
 Auditor transactions are run with actual transactions.
 Auditors compare ITF results to working papers.
Illustration of ITF Approach
Parallel Simulation
The test data and ITF methods both process test data
through real programs. With parallel simulation, the
auditor processes real client data on an audit program
similar to some aspect of the client’s program.
The auditor compares the results of this processing with
the results of the processing done by the client’s program.
Audit Software
 Computer programs that permit computers to be used as
auditing tools include:
 Generalized audit software
Perform tasks such as selecting sample data from file,
checking computations, and searching files for unusual
items.
 P.C. Software
Allows auditors to analyze data from notebook computers
in the field.
Embedded Audit Routines
 In-line Code – Application program performs
Audit data collection while it processes data for normal
production purposes.
 System Control Audit
Review File (SCARF)– Edit tests for audit transaction
analysis are included in program. Exceptions are written to
a file for audit review.

More Related Content

What's hot

03.2 application control
03.2 application control03.2 application control
03.2 application controlMulyadi Yusuf
 
The information security audit
The information security auditThe information security audit
The information security auditDhani Ahmad
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentationMidhun Nirmal
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsEd Tobias
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample ReportRandy James
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubKaushal Trivedi
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best PracticesEvolve IP
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewNaresh Rao
 
Information systems audit and control
Information systems audit and controlInformation systems audit and control
Information systems audit and controlKashif Rana ACCA
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practicesamiable_indian
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
Information security governance
Information security governanceInformation security governance
Information security governanceKoen Maris
 

What's hot (20)

03.2 application control
03.2 application control03.2 application control
03.2 application control
 
The information security audit
The information security auditThe information security audit
The information security audit
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
information security management
information security managementinformation security management
information security management
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
Steps in it audit
Steps in it auditSteps in it audit
Steps in it audit
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample Report
 
Security audit
Security auditSecurity audit
Security audit
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
IT General Controls
IT General ControlsIT General Controls
IT General Controls
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
5.4 it security audit (mauritius)
5.4  it security audit (mauritius)5.4  it security audit (mauritius)
5.4 it security audit (mauritius)
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
Information systems audit and control
Information systems audit and controlInformation systems audit and control
Information systems audit and control
 
What is iso 27001 isms
What is iso 27001 ismsWhat is iso 27001 isms
What is iso 27001 isms
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Information security governance
Information security governanceInformation security governance
Information security governance
 

Similar to IT System & Security Audit

Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iiiAshish Desai
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docxLynellBull52
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
IS Audits and Internal Controls
IS Audits and Internal ControlsIS Audits and Internal Controls
IS Audits and Internal ControlsBharath Rao
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security Arish Roy
 
Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkatasunil patro
 
Unit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptxUnit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptxSharumathiR1
 
Tugas mandiri audit novita dewi 11353202277
Tugas mandiri audit  novita dewi 11353202277Tugas mandiri audit  novita dewi 11353202277
Tugas mandiri audit novita dewi 11353202277novita dewi
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1dGene Kim
 
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS              .docxRunning head AUDITING INFORMATION SYSTEMS PROCESS              .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS .docxjoellemurphey
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxJoshJaro
 
Computer system validation
Computer system validation Computer system validation
Computer system validation ShameerAbid
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.gueste080564
 

Similar to IT System & Security Audit (20)

Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
IS Audits and Internal Controls
IS Audits and Internal ControlsIS Audits and Internal Controls
IS Audits and Internal Controls
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security
 
Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkata
 
Inspace technologies
Inspace technologiesInspace technologies
Inspace technologies
 
Unit Iii
Unit IiiUnit Iii
Unit Iii
 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
 
Unit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptxUnit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptx
 
Bankauditin it env
Bankauditin it envBankauditin it env
Bankauditin it env
 
ITGCs.pdf
ITGCs.pdfITGCs.pdf
ITGCs.pdf
 
Tugas mandiri audit novita dewi 11353202277
Tugas mandiri audit  novita dewi 11353202277Tugas mandiri audit  novita dewi 11353202277
Tugas mandiri audit novita dewi 11353202277
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
 
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS              .docxRunning head AUDITING INFORMATION SYSTEMS PROCESS              .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptx
 
Computer system validation
Computer system validation Computer system validation
Computer system validation
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
 

More from Mufaddal Nullwala

Guide to Networking in Canada for Newcomers
Guide to Networking in Canada for NewcomersGuide to Networking in Canada for Newcomers
Guide to Networking in Canada for NewcomersMufaddal Nullwala
 
Canada for Newcomers - Economy and Employment
Canada for Newcomers - Economy and EmploymentCanada for Newcomers - Economy and Employment
Canada for Newcomers - Economy and EmploymentMufaddal Nullwala
 
Winters in Toronto - Self help guide for New Immigrants (PR's, Open Work Perm...
Winters in Toronto - Self help guide for New Immigrants (PR's, Open Work Perm...Winters in Toronto - Self help guide for New Immigrants (PR's, Open Work Perm...
Winters in Toronto - Self help guide for New Immigrants (PR's, Open Work Perm...Mufaddal Nullwala
 
ORGANISATIONAL MANAGEMENT - BOOK REVIEW - COMMUNICATING WITH EMPLOYEES IMPROV...
ORGANISATIONAL MANAGEMENT - BOOK REVIEW - COMMUNICATING WITH EMPLOYEES IMPROV...ORGANISATIONAL MANAGEMENT - BOOK REVIEW - COMMUNICATING WITH EMPLOYEES IMPROV...
ORGANISATIONAL MANAGEMENT - BOOK REVIEW - COMMUNICATING WITH EMPLOYEES IMPROV...Mufaddal Nullwala
 
FINANCIAL ANALYSIS - BOOK REVIEW - FAULT LINES - HOW HIDDEN FRACTURES STILL T...
FINANCIAL ANALYSIS - BOOK REVIEW - FAULT LINES - HOW HIDDEN FRACTURES STILL T...FINANCIAL ANALYSIS - BOOK REVIEW - FAULT LINES - HOW HIDDEN FRACTURES STILL T...
FINANCIAL ANALYSIS - BOOK REVIEW - FAULT LINES - HOW HIDDEN FRACTURES STILL T...Mufaddal Nullwala
 
Environmental Management - Energy Audit & Features
Environmental Management - Energy Audit & FeaturesEnvironmental Management - Energy Audit & Features
Environmental Management - Energy Audit & FeaturesMufaddal Nullwala
 
LEADERSHIP IN ORGANISATION (Organisational Leadership)
LEADERSHIP IN ORGANISATION (Organisational Leadership)LEADERSHIP IN ORGANISATION (Organisational Leadership)
LEADERSHIP IN ORGANISATION (Organisational Leadership)Mufaddal Nullwala
 
Marketing Management - Product Differentiation
Marketing Management - Product DifferentiationMarketing Management - Product Differentiation
Marketing Management - Product DifferentiationMufaddal Nullwala
 
Robotic Process Automation (RPA)
Robotic Process Automation (RPA)Robotic Process Automation (RPA)
Robotic Process Automation (RPA)Mufaddal Nullwala
 
SCM || CRM || Intrasoft - Case Study
SCM || CRM ||  Intrasoft - Case StudySCM || CRM ||  Intrasoft - Case Study
SCM || CRM || Intrasoft - Case StudyMufaddal Nullwala
 
Business Ethics - Metaphysics of Morals by Immanuel Kant
Business Ethics -  Metaphysics of Morals by Immanuel KantBusiness Ethics -  Metaphysics of Morals by Immanuel Kant
Business Ethics - Metaphysics of Morals by Immanuel KantMufaddal Nullwala
 
PRINCIPLES OF MANAGEMENT - PLANNING
PRINCIPLES OF MANAGEMENT - PLANNINGPRINCIPLES OF MANAGEMENT - PLANNING
PRINCIPLES OF MANAGEMENT - PLANNINGMufaddal Nullwala
 
Indian Economy & Startups generating Business & Jobs
Indian Economy & Startups generating Business & JobsIndian Economy & Startups generating Business & Jobs
Indian Economy & Startups generating Business & JobsMufaddal Nullwala
 
Marketing Management - Brand Building (eg.of Big Bazaar, WestSide, Globus)
Marketing Management - Brand Building  (eg.of Big Bazaar, WestSide, Globus)Marketing Management - Brand Building  (eg.of Big Bazaar, WestSide, Globus)
Marketing Management - Brand Building (eg.of Big Bazaar, WestSide, Globus)Mufaddal Nullwala
 
R Tribha - Business Plan for Waste Utiliszation
R Tribha - Business Plan for Waste UtiliszationR Tribha - Business Plan for Waste Utiliszation
R Tribha - Business Plan for Waste UtiliszationMufaddal Nullwala
 
International Labor Organisation - Labor Law
International Labor Organisation - Labor LawInternational Labor Organisation - Labor Law
International Labor Organisation - Labor LawMufaddal Nullwala
 
Organizational Change Management
Organizational Change ManagementOrganizational Change Management
Organizational Change ManagementMufaddal Nullwala
 
Change Management - Principles of Management
Change Management - Principles of ManagementChange Management - Principles of Management
Change Management - Principles of ManagementMufaddal Nullwala
 
Knowledge Management Solution
Knowledge Management SolutionKnowledge Management Solution
Knowledge Management SolutionMufaddal Nullwala
 

More from Mufaddal Nullwala (20)

Guide to Networking in Canada for Newcomers
Guide to Networking in Canada for NewcomersGuide to Networking in Canada for Newcomers
Guide to Networking in Canada for Newcomers
 
Canada for Newcomers - Economy and Employment
Canada for Newcomers - Economy and EmploymentCanada for Newcomers - Economy and Employment
Canada for Newcomers - Economy and Employment
 
Winters in Toronto - Self help guide for New Immigrants (PR's, Open Work Perm...
Winters in Toronto - Self help guide for New Immigrants (PR's, Open Work Perm...Winters in Toronto - Self help guide for New Immigrants (PR's, Open Work Perm...
Winters in Toronto - Self help guide for New Immigrants (PR's, Open Work Perm...
 
ORGANISATIONAL MANAGEMENT - BOOK REVIEW - COMMUNICATING WITH EMPLOYEES IMPROV...
ORGANISATIONAL MANAGEMENT - BOOK REVIEW - COMMUNICATING WITH EMPLOYEES IMPROV...ORGANISATIONAL MANAGEMENT - BOOK REVIEW - COMMUNICATING WITH EMPLOYEES IMPROV...
ORGANISATIONAL MANAGEMENT - BOOK REVIEW - COMMUNICATING WITH EMPLOYEES IMPROV...
 
FINANCIAL ANALYSIS - BOOK REVIEW - FAULT LINES - HOW HIDDEN FRACTURES STILL T...
FINANCIAL ANALYSIS - BOOK REVIEW - FAULT LINES - HOW HIDDEN FRACTURES STILL T...FINANCIAL ANALYSIS - BOOK REVIEW - FAULT LINES - HOW HIDDEN FRACTURES STILL T...
FINANCIAL ANALYSIS - BOOK REVIEW - FAULT LINES - HOW HIDDEN FRACTURES STILL T...
 
Environmental Management - Energy Audit & Features
Environmental Management - Energy Audit & FeaturesEnvironmental Management - Energy Audit & Features
Environmental Management - Energy Audit & Features
 
LEADERSHIP IN ORGANISATION (Organisational Leadership)
LEADERSHIP IN ORGANISATION (Organisational Leadership)LEADERSHIP IN ORGANISATION (Organisational Leadership)
LEADERSHIP IN ORGANISATION (Organisational Leadership)
 
Marketing Management - Product Differentiation
Marketing Management - Product DifferentiationMarketing Management - Product Differentiation
Marketing Management - Product Differentiation
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Robotic Process Automation (RPA)
Robotic Process Automation (RPA)Robotic Process Automation (RPA)
Robotic Process Automation (RPA)
 
SCM || CRM || Intrasoft - Case Study
SCM || CRM ||  Intrasoft - Case StudySCM || CRM ||  Intrasoft - Case Study
SCM || CRM || Intrasoft - Case Study
 
Business Ethics - Metaphysics of Morals by Immanuel Kant
Business Ethics -  Metaphysics of Morals by Immanuel KantBusiness Ethics -  Metaphysics of Morals by Immanuel Kant
Business Ethics - Metaphysics of Morals by Immanuel Kant
 
PRINCIPLES OF MANAGEMENT - PLANNING
PRINCIPLES OF MANAGEMENT - PLANNINGPRINCIPLES OF MANAGEMENT - PLANNING
PRINCIPLES OF MANAGEMENT - PLANNING
 
Indian Economy & Startups generating Business & Jobs
Indian Economy & Startups generating Business & JobsIndian Economy & Startups generating Business & Jobs
Indian Economy & Startups generating Business & Jobs
 
Marketing Management - Brand Building (eg.of Big Bazaar, WestSide, Globus)
Marketing Management - Brand Building  (eg.of Big Bazaar, WestSide, Globus)Marketing Management - Brand Building  (eg.of Big Bazaar, WestSide, Globus)
Marketing Management - Brand Building (eg.of Big Bazaar, WestSide, Globus)
 
R Tribha - Business Plan for Waste Utiliszation
R Tribha - Business Plan for Waste UtiliszationR Tribha - Business Plan for Waste Utiliszation
R Tribha - Business Plan for Waste Utiliszation
 
International Labor Organisation - Labor Law
International Labor Organisation - Labor LawInternational Labor Organisation - Labor Law
International Labor Organisation - Labor Law
 
Organizational Change Management
Organizational Change ManagementOrganizational Change Management
Organizational Change Management
 
Change Management - Principles of Management
Change Management - Principles of ManagementChange Management - Principles of Management
Change Management - Principles of Management
 
Knowledge Management Solution
Knowledge Management SolutionKnowledge Management Solution
Knowledge Management Solution
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

IT System & Security Audit

  • 1. IT System & Security Audit JBIMS MIM SEM V 2015-2018 MUFADDAL NULLWALA – 15-I-131
  • 2. Contents 1. Defining an IT Auditor 2. IT Auditor Certifications & ISACA 3. IT Audit Phases 4. Preparing to be Audited 5. How IT auditor audits an Applications 6. Auditing technology for Information System
  • 3. IT Auditor  An IT auditor identify ways in which an organization's computer systems meets its needs, review configuration of hardware and software programs designed for new systems and check if the system controls are adequate.  CISA, CISM, Networking, Hardware, Software, Information quality Assurance, Cryptography Experts etc.  IT Audits are done in Teams
  • 4. ISACA  www.isaca.org - ISACA is an international professional association focused on IT governance.  Originated in United States in 1967  Certifications Certified Information Systems Auditor (CISA) Certified Information Security Manager (CISM) Certified in the Governance of Enterprise IT (CGEIT) Control Objectives for Information and Related Technology (COBIT) 5 Certified in Risk and Information Systems Control (CRISC) Cybersecurity Nexus Practitioner (CSX-P)
  • 5. CISA  The CISA (Certified Information Systems Auditor) certification is renowned all across the globe as a standard for Business Systems and Information technology professionals who audit, monitor, access, and control data.  Min. of 5 years of IS auditing, control or security work experience  Code of professional ethics  Adhering to IS auditing standards
  • 6. CISM CISM – Certified Information Security Manager Specialization Information Security Governance Risk Management Information Security Program Management Information Security Management Response Management
  • 8. Pre-Audit  Define Scope & Objectives  Set Audit Intent  Past Audit  Review current Policies  Audit Plan  Checklists  Site Survey (if required in some cases)
  • 9. Audit  Site Survey  Meet Site Managers - What data, How & when it will be collected  Data Collection  Interview Staff  Access Control Assessments  Vulnerability Assessments  Exit meeting - Immediate problems, Questions & answer for site managers, Preliminary findings
  • 10. Post – Audit (Reporting)  Preparation of detailed audit report  Report contains Introduction Audit findings presented in separate sections Auditors overall conclusion & opinion Auditors reservations with respect to the audit Detailed Audit findings & recommendations Documents & references used Materiality of Findings
  • 11. Preparing To Be Audited Audits are not for Confrontation Auditees should participate & make themselves available during the Audit Auditees should make themselves aware of  Intent/scope & objectives of the Audit  What type of data will be collected  What data should not be collected  Auditors should also know that what data shouldn’t be collected
  • 12. Application Audit  An assessment whose scope focuses on Business Critical Processes or Application  Any application or software running in the company to carry out business E.g. Payroll process that may span across several different servers, databases, operating systems, applications, etc. The level of controls is dependent on the degree of risk involved in the incorrect or unauthorized processing of data
  • 13. Application Audit (cont.)  Administration  Inputs, Processing, Outputs  Logical Security  Disaster Recovery Plan  Change Management  User Support  Third Party Services  General Controls
  • 14. Application Audit - Administration  The most important area of the audit, because this area focuses on the overall ownership and accountability of the application  Roles & Responsibilities - development, change approval, access authorization Legal and Regulatory compliance issues
  • 15. Application Audit - Inputs, Processing, Outputs  Looking for evidence of data preparation procedures, reconciliation processes, handling requirements, etc.  Run test transactions against the application  Includes who can enter input and see output  Retention of output and its destruction
  • 16. Application Audit - Logical Security Looking at user creation and authorization as governed by the application its self User ID linked to a real person Number of allowable unsuccessful log-on attempts Minimum password length Password expiration
  • 17. Application Audit - Disaster Recovery Plan Looking for an adequate and performable disaster recovery plan that will allow the application to be recovered in a reasonable amount of time after a disaster Backup guidelines, process documentation, offsite storage guidelines, SLA’s with offsite storage vendors, etc.
  • 18. Application Audit - Change Control  Examines the process changes to an application go through  Process is documented, adequate and followed  Who is allowed to make a request a change, approve a change and make the change  Change is tested to check if it doesn’t break compliance (determined in Administration) before being placed in to production
  • 19. Application Audit - User Support  One of the most overlooked aspects of an application  User documentation (manuals, online help, etc.) - available & up to date  User training - productivity, proper use, security  Process for user improvement requests
  • 20. Application Audit - General Controls Examining the environment the application exists within that affect the application System administration / operations Organizational logical security Physical security Organizational disaster recovery plans Organizational change control process License control processes Virus control procedures
  • 21. II. Auditing Technology for Information Systems  Review of Systems Documentation  Test Data  Integrated-Test-Facility (ITF) Approach  Parallel Simulation  Audit Software  Embedded Audit Routines
  • 22. Review of Systems Documentation The auditor reviews documentation such as narrative descriptions, flowcharts, and program listings. In desk checking the auditor processes test or real data through the program logic.
  • 23. Test Data The auditor prepares input containing both valid and invalid data. Prior to processing the test data, the input is manually processed to determine what the output should look like. The auditor then compares the computer-processed output with the manually processed results.
  • 24. Illustration of Test Data Approach Computer Operations Auditors
  • 25. Integrated Test Facility (ITF) Approach A common form of an ITF is as follows:  A dummy ITF center is created for the auditors.  Auditors create transactions for controls they want to test.  Working papers are created to show expected results from manually processed information.  Auditor transactions are run with actual transactions.  Auditors compare ITF results to working papers.
  • 27. Parallel Simulation The test data and ITF methods both process test data through real programs. With parallel simulation, the auditor processes real client data on an audit program similar to some aspect of the client’s program. The auditor compares the results of this processing with the results of the processing done by the client’s program.
  • 28. Audit Software  Computer programs that permit computers to be used as auditing tools include:  Generalized audit software Perform tasks such as selecting sample data from file, checking computations, and searching files for unusual items.  P.C. Software Allows auditors to analyze data from notebook computers in the field.
  • 29. Embedded Audit Routines  In-line Code – Application program performs Audit data collection while it processes data for normal production purposes.  System Control Audit Review File (SCARF)– Edit tests for audit transaction analysis are included in program. Exceptions are written to a file for audit review.