Auditing and EDP CH - 1
Auditing and EDP CH - 1
By
Enyew A. (PhD)
Course contents
2
outsiders
Observations by the auditor
volume of evidence.
Auditors must determine the types and amount
Reporting standards
15
Cont’d……….
The general standards stress the important
personal qualities that the auditor should possess.
other resources;
The effectiveness of performance in relation to the
EDP auditor:
Accountant raised to a Computer System Major or a
CPA (Certified Public Accountants),
CISA (Certified Information Systems Auditor),
CISM (Certified Information Systems Manager),
Networking, Hardware, Software, Information
Assurance, Cryptography
Some one who knows everything an accountant does
plus everything a BS/MS does about Computer System
and Computer Security - Not likely to exist
EDP Audit Scope
25
The scope of an EDP audit often varies, but can involve
any combination of the following:
Organizational - Examines the management control
communications
26
Cont’d………
EDP audit address the risk exposures within IT
systems and assess the controls and integrity of
information systems.
EDP Audit addresses
Are passwords difficult to crack?
Are there access control lists in place on network devices to
control who has access to shared data?
Are there audit logs to record who accesses data?
Are the audit logs reviewed?
Are the security settings for operating systems in accordance
with accepted industry practices?
Cont’d…………
27
Have all unnecessary applications and computer
services been eliminated for each system?
Are these operating systems and commercial
applications patched to current levels?
How is backup media stored? Who has access to
it? Is it up-to-date?
Is there a disaster recovery plan? Have the
participants and stakeholders ever rehearsed the
disaster recovery plan?
Cont’d………
28
data/transactions,
Enable speedy detection if and when such problems
occur, and
Promote effective action
Controls:
Systems authorization techniques
Good development procedures
Internal audit team participation
Appropriate testing of system
GC: Systems maintenance control
39
unauthorized changes
Applications are free from material errors
Program libraries are protected from unauthorized
access
Cont’d………….
40
Controls:
Authorization requirements for program
maintenance
Appropriate documentation of changes
Adequate testing of program changes
Reconciling program version numbers
Review programmer authority table
Test authority table
GC: Computer center security and
control
41
Controls:
Well-planned physical layout
Backup and disaster recovery planning
Review critical application list
GC: Internet & Intranet Control
42
Controls:
Equipment failure: line checks (parity & echo), and
backups
Subversive threats: access controls, encryption of
base records
Authorized trading partners have access only to
approved data
Adequate controls are in place to ensure a
47
had merit.
A detailed analysis of user needs was conducted that
The End!
Thank you!