Auditor's Guide to Information Systems Auditing

  • 6h 41m
  • Richard E. Cascarino
  • John Wiley & Sons (US)
  • 2007

A step-by-step guide to successful implementation and control of information systems

More and more, auditors are being called upon to assess the risks and evaluate the controls over computer information systems in all types of organizations. However, many auditors are unfamiliar with the techniques they need to know to efficiently and effectively determine whether information systems are adequately protected. Auditor's Guide to Information Systems Auditing presents an easy, practical guide for auditors that can be applied to all computing environments.

As networks and enterprise resource planning systems bring resources together, and as increasing privacy violations threaten more organization, information systems integrity becomes more important than ever.

About the Author

Richard Cascarino, MBA, CIA, CFE, CISM, has, for the last eighteen years, been providing consultancy and professional development services to clients throughout the southern African region as well as in Europe, the Middle East, and the United States. Well-known in international auditing circles as one of the most knowledgeable practitioners in the field, he is a regular speaker at international conferences and has presented courses throughout Africa, Europe, the Middle East, and the United States. He is a past president of the Institute of Internal Auditors in South Africa, was the founding regional director of the Southern African Region of the IIA-Inc., and is a member of both the Information Systems Audit and Control Association and the American Institute of Certified Fraud Examiners (South African Chapter). He is also a coauthor of Internal Auditing: An Integrated Approach.

In this Book

  • Auditor’s Guide to Information Systems Auditing
  • Technology and Audit
  • IS Audit Function Knowledge
  • IS Risk and Fundamental Auditing Concepts
  • Standards and Guidelines for IS Auditing
  • Internal Controls Concepts Knowledge
  • Risk Management of the IS Function
  • Audit Planning Process
  • Audit Management
  • Audit Evidence Process
  • Audit Reporting Follow-up
  • Management
  • Strategic Planning
  • Management Issues
  • Support Tools and Frameworks
  • Governance Techniques
  • Information Systems Planning
  • Information Management and Usage
  • Development, Acquisition, and Maintenance of Information Systems
  • Impact of Information Technology on the Business Processes and Solutions
  • Software Development
  • Audit and Control of Purchased Packages
  • Audit Role in Feasibility Studies and Conversions
  • Audit and Development of Application Controls
  • Technical Infrastructure
  • Service Center Management
  • Information Assets Security Management
  • Logical Information Technology Security
  • Applied Information Technology Security
  • Physical and Environmental Security
  • Protection of the Information Technology Architecture and Assets: Disaster Recovery Planning
  • Insurance
  • Auditing E-commerce Systems
  • Auditing UNIX/Linux
  • Auditing Windows
  • Foiling the System Hackers
  • Investigating Information Technology Fraud
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.4 of 38 users Rating 4.4 of 38 users (38)
Rating 4.6 of 21 users Rating 4.6 of 21 users (21)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)