IT Auditing Using a System Perspective


Book Description

As the power of computing continues to advance, companies have become increasingly dependent on technology to perform their operational requirements and to collect, process, and maintain vital data. This increasing reliance has caused information technology (IT) auditors to examine the adequacy of managerial control in information systems and related operations to assure necessary levels of effectiveness and efficiency in business processes. In order to perform a successful assessment of a business’s IT operations, auditors need to keep pace with the continued advancements being made in this field. IT Auditing Using a System Perspective is an essential reference source that discusses advancing approaches within the IT auditing process, as well as the necessary tasks in sufficiently initiating, inscribing, and completing IT audit engagement. Applying the recommended practices contained in this book will help IT leaders improve IT audit practice areas to safeguard information assets more effectively with a concomitant reduction in engagement area risks. Featuring research on topics such as statistical testing, management response, and risk assessment, this book is ideally designed for managers, researchers, auditors, practitioners, analysts, IT professionals, security officers, educators, policymakers, and students seeking coverage on modern auditing approaches within information systems and technology.




Auditing Information and Cyber Security Governance


Book Description

"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom." – Ronald W. Hull, author, poet, and former professor and university administrator A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.




Auditing


Book Description

The explosion of data analytics in the auditing profession demands a different kind of auditor. Auditing: A Practical Approach with Data Analytics prepares students for the rapidly changing demands of the auditing profession by meeting the data-driven requirements of today's workforce. Because no two audits are alike, this course uses a practical, case-based approach to help students develop professional judgement, think critically about the auditing process, and develop the decision-making skills necessary to perform a real-world audit. To further prepare students for the profession, this course integrates seamless exam review for successful completion of the CPA Exam.










Security in Cyber-Physical Systems


Book Description

This book is a relevant reference for any readers interested in the security aspects of Cyber-Physical Systems and particularly useful for those looking to keep informed on the latest advances in this dynamic area. Cyber-Physical Systems (CPSs) are characterized by the intrinsic combination of software and physical components. Inherent elements often include wired or wireless data communication, sensor devices, real-time operation and automated control of physical elements. Typical examples of associated application areas include industrial control systems, smart grids, autonomous vehicles and avionics, medial monitoring and robotics. The incarnation of the CPSs can therefore range from considering individual Internet-of-Things devices through to large-scale infrastructures. Presented across ten chapters authored by international researchers in the field from both academia and industry, this book offers a series of high-quality contributions that collectively address and analyze the state of the art in the security of Cyber-Physical Systems and related technologies. The chapters themselves include an effective mix of theory and applied content, supporting an understanding of the underlying security issues in the CPSs domain, alongside related coverage of the technological advances and solutions proposed to address them. The chapters comprising the later portion of the book are specifically focused upon a series of case examples, evidencing how the protection concepts can translate into practical application.




IT Capability Maturity FrameworkTM (IT-CMFTM) 2nd edition


Book Description

Business organizations, both public and private, are constantly challenged to innovate and generate real value. CIOs are uniquely well-positioned to seize this opportunity and adopt the role of business transformation partner, helping their organizations to grow and prosper with innovative, IT-enabled products, services and processes. To succeed in this, however, the IT function needs to manage an array of inter-related and inter-dependent disciplines focused on the generation of business value. In response to this need, the Innovation Value Institute, a cross-industry international consortium, developed the IT Capability Maturity FrameworkTM (IT-CMFTM). This second edition of the IT Capability Maturity FrameworkTM (IT-CMFTM) is a comprehensive suite of tried and tested practices, organizational assessment approaches, and improvement roadmaps covering key IT capabilities needed to optimize value and innovation in the IT function and the wider organization. It enables organizations to devise more robust strategies, make better-informed decisions, and perform more effectively, efficiently and consistently. IT-CMF is: • An integrated management toolkit covering 36 key capability management disciplines, with organizational maturity profiles, assessment methods, and improvement roadmaps for each. • A coherent set of concepts and principles, expressed in business language, that can be used to guide discussions on setting goals and evaluating performance. • A unifying (or umbrella) framework that complements other, domain-specific frameworks already in use in the organization, helping to resolve conflicts between them, and filling gaps in their coverage. • Industry/sector and vendor independent. IT-CMF can be used in any organizational context to guide performance improvement. • A rigorously developed approach, underpinned by the principles of Open Innovation and guided by the Design Science Research methodology, synthesizing leading academic research with industry practitioner expertise ‘IT-CMF provides us with a structured and systematic approach to identify the capabilities we need, a way to assess our strengths and weaknesses, and clear pathways to improve our performance.’ Suresh Kumar, Senior Executive Vice President and Chief Information Officer, BNY Mellon ‘To successfully respond to competitive forces, organizations need to continually review and evolve their existing IT practices, processes, and cultural norms across the entire organization. IT-CMF provides a structured framework for them to do that.’ Christian Morales, Corporate Vice President and General Manager EMEA, Intel Corporation ‘We have successfully applied IT-CMF in over 200 assignments for clients. It just works. Or, as our clients confirm, it helps them create more value from IT.’ Ralf Dreischmeier, Senior Partner and Managing Director, The Boston Consulting Group ‘By using IT-CMF, business leaders can make sure that the tremendous potential of information technology is realized in their organizations.’ Professor Philip Nolan, President, Maynooth University ‘I believe IT-CMF to be comprehensive and credible. Using the framework helps organizations to objectively identify and confirm priorities as the basis for driving improvements.’ Dr Colin Ashurst, Senior Lecturer and Director of Innovation, Newcastle University Business School




Information Technology Control and Audit, Fifth Edition


Book Description

The new fifth edition of Information Technology Control and Audit has been significantly revised to include a comprehensive overview of the IT environment, including revolutionizing technologies, legislation, audit process, governance, strategy, and outsourcing, among others. This new edition also outlines common IT audit risks, procedures, and involvement associated with major IT audit areas. It further provides cases featuring practical IT audit scenarios, as well as sample documentation to design and perform actual IT audit work. Filled with up-to-date audit concepts, tools, techniques, and references for further reading, this revised edition promotes the mastery of concepts, as well as the effective implementation and assessment of IT controls by organizations and auditors. For instructors and lecturers there are an instructor’s manual, sample syllabi and course schedules, PowerPoint lecture slides, and test questions. For students there are flashcards to test their knowledge of key terms and recommended further readings. Go to http://routledgetextbooks.com/textbooks/9781498752282/ for more information.