Information Technology Control and AuditCRC Press, 2016 M04 19 - 776 pages The new edition of a bestseller, Information Technology Control and Audit, Fourth Edition provides a comprehensive and up-to-date overview of IT governance, controls, auditing applications, systems development, and operations. Aligned to and supporting the Control Objectives for Information and Related Technology (COBIT), it examines emerging trend |
Contents
Why Are Controls and Audit Important? | 3 |
Chapter 2 The Legal Environment and Its Impact on Information Technology | 21 |
Their Role in Information Technology | 49 |
Chapter 4 Audit Process in an Information Technology Environment | 77 |
Chapter 5 Auditing IT Using ComputerAssisted Audit Tools and Techniques | 103 |
Chapter 6 Managing IT Audit | 133 |
Chapter 7 IT Auditing in the New Millennium | 159 |
Chapter 8 IT Governance | 187 |
Chapter 9 Strategy and Standards | 207 |
Chapter 10 Risk Management | 225 |
Chapter 11 Process and Quality Management | 251 |
Chapter 12 Financial Management | 273 |
Chapter 13 IT Project Management | 301 |
Other editions - View all
Common terms and phrases
accounting analysis application application software architecture areas assurance Audit and Control automated change management Cloud Computing COBIT communication company’s computer forensics Computer Security computer system Control Objectives corporate Corporate Executive Board costs database defined determine devices disaster recovery documentation e-commerce effective electronic encryption end users ensure enterprise Enterprise Risk Management environment evaluation example exhibit federal firewall function groups hardware identify impact implementation information security Information Systems Audit Information Technology infrastructure integrity Internal Auditors internal controls Internet intranet involved ISACA issues maintenance management process measures monitoring NIST notebooks Processor operating system organization organization’s organizational outsourcing performance personnel policies procedures professional project management requirements responsible risk management server service desk specific standards strategy supplier techniques testing today’s transactions unauthorized Website