[go: up one dir, main page]

0% found this document useful (0 votes)
44 views20 pages

Information System Audit Process

The document outlines the role and skills required for Information System (IS) auditors, emphasizing the importance of risk assessment and various auditing approaches. It discusses the risk-based approach to auditing, highlighting its benefits in identifying vulnerabilities and improving decision-making. Additionally, it covers different types of IS audits and the standards set by ISACA for effective IT audit and assurance management.

Uploaded by

lawrencechikopa1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views20 pages

Information System Audit Process

The document outlines the role and skills required for Information System (IS) auditors, emphasizing the importance of risk assessment and various auditing approaches. It discusses the risk-based approach to auditing, highlighting its benefits in identifying vulnerabilities and improving decision-making. Additionally, it covers different types of IS audits and the standards set by ISACA for effective IT audit and assurance management.

Uploaded by

lawrencechikopa1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

SYS A- 320

I NFORMATION S YSTEM
A UDIT
L E C T U R E 2: T he process of Audi ti n g
Information Systems

C o urse Lecturer:
C h i kondi Chisanga Funsani
(Mrs)
LE S S O N OUTCOMES

a. Role of IS Auditor
b. Describe the skills required for an IS audit process
c. Approaches to auditing process
d. Discus the Risk based approach to IS Auditing
e. Explain why an auditor should always also consider
risks involved in an organization when conducting an IS
audit
3
f. Types of information system audit
ROLE OF IS AUDITOR
 An Information System (IS) auditor plays a crucial role in
evaluating the effectiveness and efficiency of an
organization's information systems, related processes and
controls. Their responsibilities include:
 Assessing IS risks and controls.
 Evaluating IS governance and management practices.
 Examining IS compliance with legal and regulatory requirements.
 Conducting IT audits and security reviews.
 Providing independent and objective opinions on the IS controls
and systems.
 Recommending improvements to enhance the organization's IS
practices and security posture.
ROLE OF IS AUDITOR CONT’

 The ultimate goal of an IS auditor is to ensure


the confidentiality, integrity, and availability of
an organization's information and its systems,
and to support the organization in achieving its
objectives.
SKILLS REQUIRED FOR AN IS AUDIT
PROCESS
 An Information System (IS) auditor requires a range
of technical, business and interpersonal skills to
perform their role effectively. Some of the key skills
required for an IS auditor include:
 Technical knowledge: Understanding of
information systems, networks, databases,
security and programming.

 Auditing skills: Knowledge of auditing


principles, methodologies, and techniques, as well
as experience in conducting IT audits.

 Risk assessment: Ability to identify, assess, and


prioritize information systems risks
SKILLS REQUIRED FOR AN IS AUDIT
PROCESS CONT’
 Compliance knowledge: Familiarity with laws,
regulations, and standards related to information security
and privacy.

 Problem-solving skills: Ability to analyze complex


systems and processes, and identify potential areas of
weakness

 Communication skills: Ability to clearly and effectively


communicate audit findings, recommendations, and
action plans to stakeholders.
SKILLS REQUIRED FOR AN IS AUDIT
PROCESS CONT’

 Project management skills: Ability to manage


multiple projects and deliver high-quality results within
tight timelines.

 Adaptability: Ability to keep up with changes in


technology, regulations, and industry standards.

 In summary, an IS auditor should have a strong technical


background, combined with good communication and
interpersonal skills, as well as a commitment to
continuous learning and improvement.
APPROACHES TO INFORMATION SYSTEM (IS)
AUDIT

 There are several approaches to Information System (IS)


auditing, including:
 Compliance-based approach: This approach focuses on
evaluating the compliance of IS systems and processes with
legal, regulatory, and organizational requirements.
 The goal is to ensure that IS is operating in accordance

with established standards and policies.

 Control-based approach: This approach focuses on


evaluating the design and effectiveness of IS controls, such
as access controls, data backup and recovery, and disaster
recovery plans.
 The goal is to ensure that the IS environment is secure

and that the confidentiality, integrity, and availability of


data are protected.
APPROACHES TO INFORMATION SYSTEM
AUDIT CONT’
 Risk-based approach: This approach prioritizes IS
auditing efforts based on the level of risk associated with
specific IS systems, processes, and data.
 The goal is to ensure that auditing efforts are focused
on areas that pose the greatest risk to the organization.

 Performance-based approach: This approach focuses


on evaluating the performance of IS systems and
processes.
 The goal is to identify areas for improvement and
ensure that IS is contributing effectively to the
organization's goals and objectives.
APPROACHES TO INFORMATION SYSTEM
AUDIT CONT’
 Process-based approach: This approach focuses on
evaluating the end-to-end processes that are supported
by IS, such as procurement, financial reporting, or
human resources.
 The goal is to ensure that IS is integrated with and
supporting key business processes.

 Each approach has its own strengths and weaknesses,


and the choice of approach will depend on the specific
requirements of the IS audit and the goals of the
organization.

 In practice, a combination of approaches is often used to


achieve a comprehensive assessment of the IS
environment.
RISK BASED APPROACH TO IS AUDITING
 The risk-based approach to Information System (IS)
auditing involves prioritizing auditing efforts based on the
level of risk associated with specific IS systems, processes,
and data.

 This approach takes into account the potential impact to the


organization if a control failure or security breach were to
occur.

 In a risk-based IS audit, auditors assess the level of risk


associated with different aspects of the IS environment and
prioritize their audit efforts accordingly.

 This may include evaluating the sensitivity of data, the


criticality of systems and processes, and the potential
consequences of a control failure or security breach.
THE BENEFITS OF A RISK-BASED IS AUDIT
INCLUDE:
 Helps to identify potential areas of weakness or vulnerabilities in the
organization's systems and processes.
 Improved focus: By focusing audit efforts on higher risk areas, auditors
can ensure that they are addressing the most critical issues first.
 Increased efficiency: By avoiding low-risk areas, auditors can complete
their work more quickly and cost-effectively.
 Improved decision making: By understanding the level of risk associated
with different aspects of the IS environment, auditors can make more
informed recommendations for improvements.
 Better risk management: By identifying and prioritizing risks, auditors
can help organizations to manage risk more effectively and ensure that the
IS environment is secure and control risks are minimized.
THE BENEFITS OF A RISK-BASED IS AUDIT
CONT’
 By evaluating the risk of a particular process or
system, the auditor can ensure that appropriate
controls are in place to mitigate those risks, and
that any vulnerabilities are addressed.

 This approach helps to promote accountability,


transparency and confidence in the organization's
systems and processes, and ultimately, its financial
reporting.
ISACA IT AUDIT AND ASSURANCE
STANDARDS AND GUIDE LINES
 ISACA (Information Systems Audit and Control
Association) is a globally recognized professional association
for individuals and organizations involved in information
security, assurance, risk management, and governance.

 ISACA provides a framework of standards and guidelines


for IT audit and assurance professionals to follow.

 The most commonly used ISACA standards and guidelines


for IT audit and assurance include:
 COBIT (Control Objectives for Information and related
Technology):
 A framework for IT governance and management that provides a
comprehensive set of best practices for the management of IT
processes and technologies.
TYPES OF INFORMATION SYSTEM AUDIT
 There are several types of information system (IS)
audits, including:
 Compliance Audit: Evaluates the adherence of IS to legal
and regulatory requirements, policies and standards.

 Operational Audit: Examines the efficiency and


effectiveness of IS operations and their contribution to the
organization's goals.

 Security Audit: Assesses the security of IS systems, data,


and networks, to identify vulnerabilities and ensure the
protection of sensitive information.
TYPES OF INFORMATION SYSTEM AUDIT
 Financial Audit: Verifies the accuracy and reliability of IS-
generated financial information and ensures compliance
with accounting standards.

 Performance Audit: Measures the performance of IS


systems and processes and makes recommendations for
improvement.

 Disaster Recovery Audit: Evaluates the organization's


disaster recovery plans and procedures to ensure that they
are effective and capable of restoring systems and data in
the event of a disaster.

 IT Governance Audit: Assesses the alignment of IS with


the organization's goals and objectives, and the effectiveness
of its IT governance(controla) processes
ISACA IT AUDIT AND ASSURANCE
STANDARDS AND GUIDE LINES
 IT Assurance Framework (ITAF): A guide for conducting
IT audits, which provides a systematic approach to the audit
process, including planning, execution, and reporting.

 Val IT: A framework for managing the value of IT


investments that provides guidance on aligning IT
investments with business objectives and ensuring the
delivery of expected benefits.

 Risk IT: A framework for IT risk management that


provides a systematic approach to managing risk in the IT
environment and aligning IT risk management with overall
enterprise risk management.

 By adhering to these standards and guidelines, IT audit and


assurance professionals can ensure the quality of their work and
provide valuable insight and recommendations to their
organizations.
MANAGEMENT OF AUDITING
FUNCTION
 ISACA IT Audit and Assurance Standards and
Guidelines provide a framework for the management
of the auditing function within an organization.

 These standards and guidelines provide direction on


how to effectively plan, execute, and report on IT
audits, as well as how to manage the overall IT audit
and assurance program.

 To effectively manage the auditing function, the


following steps can be taken, with reference to ISACA
standards and guidelines:
END OF LECTURE 1

THANK YOU!

23
R E F E R E N C E S & F U RT H E R R E A D I N G
⚫ Cascarino, R.E., 2007. Auditor's guide to information
systems auditing. John Wiley & Sons.
⚫ Champlain, J.J., 2003. Auditing information systems. John
Wiley & Sons.
⚫ Hunton, J.E., Bryant, S.M., and Bangranoff, N.A..2004. Core
Concepts of Information Technology Auditing. John Wiley
and Sons.
⚫ Weber, R.A.1998. Information Systems Control and
Auditing, Prentice Hall

24

You might also like