Computer audit control & security manual
Author : Institute of Internal Auditors-United Kingdom
Publisher :
Page : pages
File Size : 13,28 MB
Release : 1983
Category :
ISBN :
Author : Institute of Internal Auditors-United Kingdom
Publisher :
Page : pages
File Size : 13,28 MB
Release : 1983
Category :
ISBN :
Author : Institute of Internal Auditors
Publisher :
Page : pages
File Size : 43,8 MB
Release : 1984
Category : Auditing, Internal
ISBN :
Author : Robert F. Dacey
Publisher : DIANE Publishing
Page : 601 pages
File Size : 37,41 MB
Release : 2010-11
Category : Business & Economics
ISBN : 1437914063
FISCAM presents a methodology for performing info. system (IS) control audits of governmental entities in accordance with professional standards. FISCAM is designed to be used on financial and performance audits and attestation engagements. The methodology in the FISCAM incorp. the following: (1) A top-down, risk-based approach that considers materiality and significance in determining audit procedures; (2) Evaluation of entitywide controls and their effect on audit risk; (3) Evaluation of general controls and their pervasive impact on bus. process controls; (4) Evaluation of security mgmt. at all levels; (5) Control hierarchy to evaluate IS control weaknesses; (6) Groupings of control categories consistent with the nature of the risk. Illus.
Author : S. Rao Vallabhaneni
Publisher :
Page : 376 pages
File Size : 20,82 MB
Release : 1989-05-11
Category : Business & Economics
ISBN :
This manual provides practical guidelines on how to perform internal and external audit functions concerning computer security. There is also discussion of what to audit and why. All procedures are illustrated by means of the work programs given in each chapter. This is the first systematic audit guide for auditing computer security, covering methodology, mainframes, mini's, micro's, related audit concerns, and control guidelines.
Author : Javier F. Kuong
Publisher : Prentice Hall
Page : 424 pages
File Size : 15,55 MB
Release : 1987
Category : Business & Economics
ISBN :
Author : Ian J. Douglas
Publisher : Routledge
Page : 264 pages
File Size : 38,27 MB
Release : 1995
Category : Business & Economics
ISBN :
This handbook is an accessible introduction to modern computer audit for new recruits to the profession and for practising financial auditors who need to increase their knowledge of computer auditing. The book will help meet an increasing need for computer audit training in the auditing profession. The basic perspective taken for this handbook is that of the internal auditor and since this is wider than the remit of external auditing, the contents apply to both. Auditors and accountants who wish to develop their knowledge of computer audit and security will find the book especially useful. In addition, information technology professionals and computer science students who are finding issues of security and control increasingly important, will discover this handbook to be of significant use in their work. Published in association with the Institute of Internal Auditors, this book provides a comprehensive introduction to modern computer audit for new recruits to the profession, and for financial auditors who wish to increase their knowledge of computer auditing. The main topics covered include: *computer audit management *auditing applications *small business computers *computer assisted audit techniques *databases *legal and code of practice issues *computer abuse. The author and contributors are audit and security practitioners, with many years' experience in this field. Contributors: Ian Douglas, Deputy Head of Systems Audit at Barclays Bank. Alan Oliphant, Computer Audit Manager, Standard Life Assurance Company, and Chairman of Information Technology Audit Development Committee (IIA); David Bentley, Chief Internal Auditor, Leeds Permanent Building Society and Stephen Hinde (the two latter being Past Presidents, IIA, UK). Published in association with the Institute of Internal Auditors Provides a comprehensive introduction to computer audit for new recruits to this subject Ideal for financial auditors who wish to increase their knowledge of computer auditing
Author : United States. General Accounting Office. Accounting and Information Management Division
Publisher : DIANE Publishing
Page : 284 pages
File Size : 41,31 MB
Release : 1999
Category : Electronic data processing
ISBN : 1428974024
The manual is a companion to GAO's Financial Audit Manual (FAM) and discusses the control objectives that auditors should consider when assessing computer-related controls, and it provides examples of control techniques commonly used at federal agencies along with suggested audit procedures."
Author : Robert R. Moeller
Publisher :
Page : 616 pages
File Size : 25,28 MB
Release : 1989-09-06
Category : Business & Economics
ISBN :
Offers comprehensive, up-to-date guidance on new and evolving computer audit, control, and security issues. Each chapter contains both background discussions and sets of control objectives and audit procedures useful for the auditor in performing actual reviews. Since every organization is unique, these objectives and procedures are also included in diskette format so that auditors can tailor them to specific and individual audit projects.
Author : Robert R. Moeller
Publisher : John Wiley & Sons
Page : 696 pages
File Size : 44,33 MB
Release : 2010-10-12
Category : Business & Economics
ISBN : 0470877685
When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the IT Audit, Control, and Security describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.
Author : Thomas Peltier
Publisher : CRC Press
Page : 175 pages
File Size : 38,69 MB
Release : 1991-12-19
Category : Computers
ISBN : 1482275686
Here‘s your how-to manual for developing policies and procedures that maintain the security of information systems and networks in the workplace. It provides numerous checklists and examples of existing programs that you can use as guidelines for creating your own documents. You‘ll learn how to identify your company‘s overall