Federal Information System Controls Audit Manual (FISCAM)


Book Description

FISCAM presents a methodology for performing info. system (IS) control audits of governmental entities in accordance with professional standards. FISCAM is designed to be used on financial and performance audits and attestation engagements. The methodology in the FISCAM incorp. the following: (1) A top-down, risk-based approach that considers materiality and significance in determining audit procedures; (2) Evaluation of entitywide controls and their effect on audit risk; (3) Evaluation of general controls and their pervasive impact on bus. process controls; (4) Evaluation of security mgmt. at all levels; (5) Control hierarchy to evaluate IS control weaknesses; (6) Groupings of control categories consistent with the nature of the risk. Illus.




Auditing Computer Security


Book Description

This manual provides practical guidelines on how to perform internal and external audit functions concerning computer security. There is also discussion of what to audit and why. All procedures are illustrated by means of the work programs given in each chapter. This is the first systematic audit guide for auditing computer security, covering methodology, mainframes, mini's, micro's, related audit concerns, and control guidelines.







Computer Audit and Control Handbook


Book Description

This handbook is an accessible introduction to modern computer audit for new recruits to the profession and for practising financial auditors who need to increase their knowledge of computer auditing. The book will help meet an increasing need for computer audit training in the auditing profession. The basic perspective taken for this handbook is that of the internal auditor and since this is wider than the remit of external auditing, the contents apply to both. Auditors and accountants who wish to develop their knowledge of computer audit and security will find the book especially useful. In addition, information technology professionals and computer science students who are finding issues of security and control increasingly important, will discover this handbook to be of significant use in their work. Published in association with the Institute of Internal Auditors, this book provides a comprehensive introduction to modern computer audit for new recruits to the profession, and for financial auditors who wish to increase their knowledge of computer auditing. The main topics covered include: *computer audit management *auditing applications *small business computers *computer assisted audit techniques *databases *legal and code of practice issues *computer abuse. The author and contributors are audit and security practitioners, with many years' experience in this field. Contributors: Ian Douglas, Deputy Head of Systems Audit at Barclays Bank. Alan Oliphant, Computer Audit Manager, Standard Life Assurance Company, and Chairman of Information Technology Audit Development Committee (IIA); David Bentley, Chief Internal Auditor, Leeds Permanent Building Society and Stephen Hinde (the two latter being Past Presidents, IIA, UK). Published in association with the Institute of Internal Auditors Provides a comprehensive introduction to computer audit for new recruits to this subject Ideal for financial auditors who wish to increase their knowledge of computer auditing




Federal information system controls audit manual. Volume I financial statement audits.


Book Description

The manual is a companion to GAO's Financial Audit Manual (FAM) and discusses the control objectives that auditors should consider when assessing computer-related controls, and it provides examples of control techniques commonly used at federal agencies along with suggested audit procedures."




Computer Audit, Control, and Security


Book Description

Offers comprehensive, up-to-date guidance on new and evolving computer audit, control, and security issues. Each chapter contains both background discussions and sets of control objectives and audit procedures useful for the auditor in performing actual reviews. Since every organization is unique, these objectives and procedures are also included in diskette format so that auditors can tailor them to specific and individual audit projects.




IT Audit, Control, and Security


Book Description

When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the IT Audit, Control, and Security describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.




Policies & Procedures for Data Security: A Complete Manual for Computer Systems and Networks


Book Description

Here‘s your how-to manual for developing policies and procedures that maintain the security of information systems and networks in the workplace. It provides numerous checklists and examples of existing programs that you can use as guidelines for creating your own documents. You‘ll learn how to identify your company‘s overall