Information technology audit: Difference between revisions

Content deleted Content added
m Reverted edits by 103.157.94.172 (talk) to last version by Brifyjek
Tags: Rollback Mobile edit Mobile web edit
 
(551 intermediate revisions by more than 100 users not shown)
Line 1:
{{Short description|Examination of an information system}}
An '''[[Information technology|Information technology]] audit''' (or '''IT audit''') is a review of the controls within an entity's technology [[infrastructure]]. These reviews are typically performed in conjunction with a [[Financial audit|financial statement audit]], [[internal audit]] review, or other form of attestation engagement.
FormerlyAn called'''information antechnology [[Electronicaudit''', dataor processing]]'''information (EDP)systems audit''', an IT audit is thean processexamination of collectingthe andmanagement evaluatingcontrols evidence ofwithin an organization's [[ManagementInformation informationtechnology]] systems|information(IT) system[[IT infrastructure|infrastructure]], practices, and operationsbusiness applications. EvaluationThe evaluation of the evidence ensuresobtained whetherdetermines if the organization's information systemsystems safeguardsare safeguarding assets, maintainsmaintaining [[Data integrity|data integrity]], and is operating effectively and efficiently to achieve the organization's goals or objectives. These reviews may be performed in conjunction with a [[Financial audit|financial statement audit]], [[internal audit]], or other form of attestation engagement.
 
IT audits are also known as '''automated data processing audits''' ('''ADP audits''') and '''computer audits'''. They were formerly called '''electronic data processing audits''' ('''EDP audits''').
An IT audit is also known as an EDP Audit, an Information Systems Audit, and a computer audit.
 
== Purpose ==
An IT audit is different from a [[Financial audit|financial statement audit]]. While a financial audit's purpose is to evaluate whether the financial statements present fairly, in all material respects, an entity's financial position, results
of operations, and cash flows in conformity to [[standard accounting practices]], the purposes of an IT audit is to evaluate the system's internal control design and effectiveness. This includes, but is not limited to, efficiency and security protocols, development processes, and IT governance or oversight.
Installing controls are necessary but not sufficient to provide adequate security. People responsible for security must consider if the controls are installed as intended, if they are effective, or if any breach in security has occurred and if so, what actions can be done to prevent future breaches. These inquiries must be answered by independent and unbiased observers. These observers are performing the task of information systems auditing. In an Information Systems (IS) environment, an audit is an examination of information systems, their inputs, outputs, and processing.
<ref name="Rainer, R. Kelly 2011">Rainer, R. Kelly, and Casey G. Cegielski. Introduction to information systems. 3rd ed. Hoboken, N.J.: Wiley, 2011. Print.</ref>
 
As technology continues to advance and become more prevalent in our lives and in businesses, along comes an increase of IT threats and disruptions. These impact every industry and come in different forms such as data breaches, external threats, and operational issues. These risks and need for high levels of assurance increase the need for IT audits to check businesses IT system performances and to lower the probability and impact of technology threats and disruptions.<ref>{{Cite journal |last=Stoel |first=M. Dale |last2=Havelka |first2=Douglas |date=2020-02-18 |title=Information Technology Audit Quality: An Investigation of the Impact of Individual and Organizational Factors |url=https://doi.org/10.2308/isys-18-043 |journal=Journal of Information Systems |volume=35 |issue=1 |pages=135–154 |doi=10.2308/isys-18-043 |issn=0888-7985|url-access=subscription |doi-access=free }}</ref>
An IT audit is similar to a financial statement audit in that the study and evaluation of the basic elements of internal control are the same. However, the purpose of a financial statement audit is to determine whether an organization's [[Financial statements|financial statements]] and financial condition are presented fairly in accordance with [[generally accepted accounting principles]] (GAAP). The purpose of an IT audit is to review and evaluate an organization's information system's availability, confidentiality, and integrity by answering questions such as:
 
The primary functions of an IT audit are to evaluate the systems that are in place to guard an organization's information. Specifically, information technology audits are used to evaluate the organization's ability to protect its information assets and to properly dispense information to authorized parties.<ref>{{Cite book|last=Gantz|first=Stephen D.|title=The basics of IT audit : purposes, processes, and practical information|publisher=Syngress, an imprint of Elsevier|year=2014}}</ref> The IT audit aims to evaluate the following:
* Will the organization's computer systems be available for the business at all times when required? (Availability)
* Will the information in the systems be disclosed only to authorized users? (Confidentiality)
* Will the information provided by the system always be accurate, reliable, and timely? (Integrity)
 
Will the organization's computer systems be available for the business at all times when required? (known as availability)
== Types of IT Audits ==
Will the information in the systems be disclosed only to authorized users? (known as security and confidentiality)
Will the information provided by the system always be accurate, reliable, and timely? (measures the integrity)
In this way, the audit hopes to assess the risk to the company's valuable asset (its information) and establish methods of minimizing those risks.
 
More specifically, organizations should look into three major requirements: confidentiality, integrity, and availability to label their needs for security and trust in their IT systems.
* Computerized Systems and Applications: an audit to verify that systems and applications are appropriate to the entity's needs, is efficient, and adequately controlled to ensure valid, reliable, timely, and secure input, processing, and output at all levels of a system's activity.
 
* Confidentiality: The purpose is to keep private information restricted from unauthorized users.
* Information Processing Facilities: an audit to verify that the processing facility is controlled to ensure timely, accurate, and efficient processing of applications under normal and potentially disruptive conditions.
* Integrity: The purpose is to guarantee that information be changed in an authorized manner
* Availability: The purpose is to ensure that only authorized users have access to specific information
 
These three requirements should be emphasized in every industry and every organization with an IT environment but each requirements and controls to support them will vary.<ref>{{Cite book |url=https://www.nap.edu/read/1581/chapter/4 |title=Read "Computers at Risk: Safe Computing in the Information Age" at NAP.edu |language=en}}</ref>
* Systems Development: an audit to verify that the systems under development meets the objectives of the organization, and ensures the systems are developed in accordance with generally accepted standards for [[Systems development life cycle|systems development]].
 
==Classification of IT audits==
* Management of IT and Enterprise Architecture: an audit to verify that IT management has developed an organizational structure and procedures to ensure a controlled and efficient environment for [[information processing]].
Various [[School (discipline)|authorities]] have created differing [[Taxonomy (general)|taxonomies]] to distinguish the various types of IT audits. Goodman & Lawless state that there are three specific systematic approaches to carry out an IT audit:<ref name="GoodmanGoodman1994">{{cite book|author1=Richard A. Goodman|author2=Michael W. Lawless|title=Technology and strategy: conceptual models and diagnostics|url=https://archive.org/details/technologystrate0000good|url-access=registration|access-date=May 9, 2010|year=1994|publisher=Oxford University Press US|ISBN=978-0-19-507949-4}}</ref>
:* <span style="color:#484848;">'''Technological innovation process audit'''</span>. This audit constructs a risk profile for existing and new projects. The audit will assess the length and depth of the company's experience in its chosen technologies, as well as its presence in relevant markets, the organization of each project, and the structure of the portion of the industry that deals with this project or product, organization and industry structure.
:* <span style="color:#484848;">'''Innovative comparison audit'''</span>. This audit is an analysis of the innovative abilities of the company being audited, in comparison to its competitors. This requires examination of company's research and development facilities, as well as its track record in actually producing new products.
:* <span style="color:#484848;">'''Technological position audit'''</span>: This audit reviews the technologies that the business currently has and that it needs to add. Technologies are characterized as being either "base", "key", "pacing" or "emerging".
 
Others describe the spectrum of IT audits with five categories of audits:
* Client/Server, [[Telecommunications]], Intranets, and Extranets: an audit to verify that controls are in place on the client (computer receiving services), server, and on the [[computer network|network]] connecting the clients and servers.
:* <span style="color:#494949;">'''Systems and Applications'''</span>: An audit to verify that systems and applications are appropriate, are efficient, and are adequately controlled to ensure valid, reliable, timely, and secure input, processing, and output at all levels of a system's activity. System and process assurance audits form a subtype, focussing on business process-centric business IT systems. Such audits have the objective to assist financial auditors.<ref>K. Julisch et al., [http://soadecisions.org/download/ComplianceByDesign-AAM.pdf Compliance by Design – Bridging the Chasm between Auditors and IT Architects]. Computers & Security, Elsevier. Volume 30, Issue 6-7, Sep.-Oct. 2011.</ref>
 
:* <span style="color:#494949;">'''Information Processing Facilities'''</span>: An audit to verify that the processing facility is controlled to ensure timely, accurate, and efficient processing of applications under normal and potentially disruptive conditions.
== IT audit process ==
:* <span style="color:#494949;">'''Systems Development'''</span>: An audit to verify that the systems under development meet the objectives of the organization, and to ensure that the systems are developed in accordance with generally accepted standards for [[Systems development life cycle|systems development]].
:* <span style="color:#494949;">'''Management of IT and Enterprise Architecture'''</span>: An audit to verify that IT management has developed an organizational structure and procedures to ensure a controlled and efficient environment for [[Business information processing|information processing]].
:* <span style="color:#494949;">'''Client/Server, Telecommunications, Intranets, and Extranets'''</span>: An audit to verify that [[telecommunications]] controls are in place on the client (computer receiving services), server, and on the [[computer network|network]] connecting the clients and servers.
And some lump all IT audits as being one of only two type: "'''general control review'''" audits or "'''application control review'''" audits.
 
A number{{who|date=May 2019}} of IT audit professionals from the [[Information Assurance]] realm consider there to be three fundamental types of [[wikt:control|control]]s regardless of the type of audit to be performed, especially in the IT realm. Many frameworks and standards try to break controls into different disciplines or arenas, terming them “Security Controls“, ”Access Controls“, “IA Controls” in an effort to define the types of controls involved. At a more fundamental level, these controls can be shown to consist of three types of fundamental controls: Protective/Preventative Controls, Detective Controls and Reactive/Corrective Controls.
{{main|Information Technology Audit Process}}
 
In an IS, there are two types of auditors and audits: internal and external. IS auditing is usually a part of accounting internal auditing, and is frequently performed by corporate internal auditors. An external auditor reviews the findings of the internal audit as well as the inputs, processing and outputs of information systems. The external audit of information systems is primarily conducted by certified Information System auditors, such as CISA, certified by ISACA, Information System Audit and Control Association, USA, Information System Auditor (ISA) certified by ICAI (Institute of Chartered Accountants of India), and other certified by reputed organization for IS audit. Delete --> (''frequently a part of the overall external auditing performed by a Certified Public Accountant (CPA) firm.<ref name="Rainer, R. Kelly 2011"/>''
The following are the basic steps in performing the [[Information Technology Audit Process]]:
)
IS auditing considers all the potential hazards and controls in information systems. It focuses on issues like operations, data, integrity, software applications, security, privacy, budgets and expenditures, cost control, and productivity. Guidelines are available to assist auditors in their jobs, such as those from Information Systems Audit and Control Association.<ref name="Rainer, R. Kelly 2011"/>
 
==History of IT auditing==
# Planning the audit
{{Main|History of information technology auditing}}
# Evaluation of internal controls
# Audit procedures
# Completing the audit
 
The concept of IT auditing was formed in the mid-1960s. Since that time, IT auditing has gone through numerous changes, largely due to advances in technology and the incorporation of technology into business.
== History of IT auditing ==
{{main|history of information technology auditing}}
 
Currently, there are many IT-dependent companies that rely on information technology in order to operate their business e.g. telecommunication or banking company. For the other types of business, IT plays the big part of company including the applying of workflow instead of using the paper request form, using the application control instead of manual control which is more reliable or implementing the ERP application to facilitate the organization by using only one application. According to these, the importance of IT audit is constantly increased. One of the most important roles of the IT audit is to audit over the critical system in order to support the financial audit or to support the specific regulations announced e.g. SOX.
The concept of IT auditing was formed in the mid-1960's and has gone through numerous changes due to advances in technology and the incorporation of technology into business.
 
== ITEmerging audit topicsissues ==
There are also new audits being imposed by various standard boards which are required to be performed, depending upon the audited organization, which will affect IT and ensure that IT departments are performing certain functions and controls appropriately to be considered compliant. Examples of such audits are [[SSAE 16]], [[ISAE 3402]], and [[ISO27001:2013]].
 
=== RegulationsWeb and legislation related to ITpresence audits ===
The extension of the corporate IT presence beyond the corporate firewall (e.g. the adoption of [[social media]] by the enterprise along with the proliferation of cloud-based tools like [[social media management system]]s) has elevated the importance of incorporating [[web presence#web presence audit|web presence audit]]s into the IT/IS audit. The purposes of these audits include ensuring the company is taking the necessary steps to:
Several information technology audit regulations have been introduced in the past few years. These include the Gramm Leach Bliley Act, the Sarbanes-Oxley Act, and the Health Insurance Portability and Accountability Act(HIPAA).
* rein in use of unauthorized tools (e.g. "shadow IT")
* minimize damage to reputation
* maintain regulatory compliance
* prevent information leakage
* mitigate third-party risk
* minimize governance risk<ref>{{cite web|last1=Juergens|first1=Michael|title=Social Media Risks Create an Expanded Role for Internal Audit|url=http://deloitte.wsj.com/riskandcompliance/2013/08/06/social-media-risks-create-an-expanded-role-for-internal-audit/|website=Wall Street Journal|access-date=10 August 2015}}</ref><ref>{{cite web|title=Social Media Audit/Assurance Program|url=http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Social-Media-Audit-Assurance-Program.aspx|website=ISACA|publisher=ISACA|access-date=10 August 2015}}</ref>
 
The use of departmental or user developed tools has been a controversial topic in the past. However, with the widespread availability of data analytics tools, dashboards, and statistical packages users no longer need to stand in line waiting for IT resources to fulfill seemingly endless requests for reports. The task of IT is to work with business groups to make authorized access and reporting as straightforward as possible. To use a simple example, users should not have to do their own data matching so that pure relational tables are linked in a meaningful way. IT needs to make non-normalized, data warehouse type files available to users so that their analysis work is simplified. For example, some organizations will refresh a warehouse periodically and create easy to use "flat' tables which can be easily uploaded by a package such as Tableau and used to create dashboards.
* [[COBIT]]
* [[HIPAA]]
* [[Gramm-Leach-Bliley Act]] (GLBA)
* [[Sarbanes-Oxley Act]]
* Companies with Sarbanes-Oxley certification delays and material weaknesses caused by IT issues
** [[Captaris Inc.]] - material weakness and filing delay due to inadequate internal controls and related IT controls per SOX requirements
** [[Cray Inc.]] - numerous material weaknesses in internal control over financial reporting, specifically, inadequate review of third-party contracts and lack of software application controls and documentation
 
=== Enterprise communications audits ===
=== Security ===
The rise of VOIP networks and issues like BYOD and the increasing capabilities of modern enterprise telephony systems causes increased risk of critical telephony infrastructure being misconfigured, leaving the enterprise open to the possibility of communications fraud or reduced system stability. Banks, financial institutions, and contact centers typically set up policies to be enforced across their communications systems. The task of auditing that the communications systems are in compliance with the policy falls on specialized telecom auditors. These audits ensure that the company's communication systems:
{{main|Auditing information security}}
* adhere to stated policy
* follow policies designed to minimize the risk of hacking or phreaking
* maintain regulatory compliance
* prevent or minimize toll fraud
* mitigate third-party risk
* minimize governance risk<ref>{{cite web|last1=Lingo|first1=Steve|title=A Communications Audit: The First Step on the Way to Unified Communications|url=http://blog.xo.com/communications/unified-communications/a-communications-audit-the-first-step-on-the-way-to-unified-communications/|website=The XO Blog|access-date=17 Jan 2016}}</ref><ref>{{Cite web|url = https://www.1st-comms.com/telephone-system-audit-service/|title = Telephone System Audit Service|website = 1st Communications Services|publisher = 1st Communications Services|access-date = 2018-12-14|archive-date = 2019-04-01|archive-url = https://web.archive.org/web/20190401192012/https://www.1st-comms.com/telephone-system-audit-service/|url-status = dead}}</ref>
 
Enterprise communications audits are also called voice audits,<ref>{{Cite web|title = Voice Audit|url = http://www.securelogix.com/voice-audit.html|website = www.securelogix.com|access-date = 2016-01-20}}</ref> but the term is increasingly deprecated as communications infrastructure increasingly becomes data-oriented and data-dependent. The term "telephony audit"<ref>{{Cite web|url = http://www.eurotelecom.ro/files/IP_Telephony_Design_and_Audit_Guidelines_June_2003.pdf|title = IP Telephony Design and Audit Guidelines|website = www.eurotelecom.ro|archive-url = https://web.archive.org/web/20140327014516/http://www.eurotelecom.ro/files/IP_Telephony_Design_and_Audit_Guidelines_June_2003.pdf|archive-date = 2014-03-27|url-status = dead}}</ref> is also deprecated because modern communications infrastructure, especially when dealing with customers, is omni-channel, where interaction takes place across multiple channels, not just over the telephone.<ref>{{Cite web|title = What is omnichannel? - Definition from WhatIs.com|url = http://searchcio.techtarget.com/definition/omnichannel|website = SearchCIO|access-date = 2016-01-20|language = en-US}}</ref>
[[Auditing information security]] is a vital part of any IT audit. Within the broad scope of auditing information security we find topics such as [[Auditing Information Security#Auditing Data Centers|data centers]], [[Auditing Information Security#Auditing Networks|networks]] and [[Auditing Information Security#Auditing application security|application security]]. Auditing information security covers topics from auditing the physical security of data centers to auditing the logical security of databases and highlights key components to look for and different methods used for auditing these areas. It is important to remember that in this ever expanding technical realm these things are always changing and as such IT auditors must continue to expand their knowledge and understanding of systems and the systems environment to help verify and ensure information security.
One of the key issues that plagues enterprise communication audits is the lack of industry-defined or government-approved standards. IT audits are built on the basis of adherence to standards and policies published by organizations such as [[National Institute of Standards and Technology|NIST]] and [[Payment Card Industry Security Standards Council|PCI]], but the absence of such standards for enterprise communications audits means that these audits have to be based an organization's internal standards and policies, rather than industry standards. As a result, enterprise communications audits are still manually done, with random sampling checks. Policy Audit Automation tools for enterprise communications have only recently become available.
 
=== Ethical Dilemmas in IT Audits ===
== Emerging Issues ==
The Use of Artificial Intelligence (AI) in IT audits is growing rapidly, with 30% of all corporate audits to be conducted using AI by 2025 as reported by the World Economic forum from 2015. AI in IT audits raises many ethical issues.<ref name=":0">{{Cite journal |last=Munoko |first=Ivy |last2=Brown-Liburd |first2=Helen L. |last3=Vasarhelyi |first3=Miklos |date=2020-11-01 |title=The Ethical Implications of Using Artificial Intelligence in Auditing |url=https://doi.org/10.1007/s10551-019-04407-1 |journal=Journal of Business Ethics |language=en |volume=167 |issue=2 |pages=209–234 |doi=10.1007/s10551-019-04407-1 |issn=1573-0697|url-access=subscription }}</ref>
Technology changes rapidly and so do the issues IT auditors must face. From biometric retinal scans to protecting physical security to transmitting data from a cell phone, this issue is truly limited only to one’s imagination.
 
# The use of Artificial Intelligence causes unintended biases in results <br/>An issue that AI faces in completing IT audits for corporations is that unintended biases can occur as the AI filters through data. AI does not have a human element or the ability to understand different situations in which certain data is expected or not expected. AI only understands the data in which it has seen before and therefore is unable to evolve given each unique situation. This causes unintended biases and therefore unintended consequences if the AI systems are given too much trust and not carefully monitored by the human eye. As a result ethical, legal and economic issues arise.<ref name=":0" />
# Technology replacing the role of humans <br/>Big 4 firms have invested significant amounts of money in emerging technologies in the IT audit space. AI is now being used in assurance practices performing tasks such as “auditing and accounting procedures such as review of general ledgers, tax compliance, preparing work-papers, data analytics, expense compliance, fraud detection, and decision-making.” <ref name=":0" /> This essentially replaces the need for auditors and relegates those who work in assurance to roles as “overseers” of the technology.<br/>However, firms still need auditors to perform analysis on the AI results of the IT audit. Auditors who do not understand the algorithms being utilized in the audit can allow mistakes to be made by these imperfect programs. Thus auditors with extensive tech backgrounds and degrees in technology are highly coveted by firms utilizing AI to perform audits.
 
== Effect of IT Audit on Companies and Financial Audits ==
Globalization in combination with the growth in information technology systems has caused companies to shift to an increasingly digitized working environment. Advantages provided by these systems include a reduction in working time, the ability to test large amounts of data, reduce audit risk, and provide more flexible and complete analytical information. With an increase in time, auditors are able to implement additional audit tests, leading to a great improvement in the audit process overall. The use of computer-assisted audit techniques (CAATs) have allowed companies to examine larger samples of data and more thorough reviews of all transactions, allowing the auditor to test and better understand any issues within the data.<ref>{{Cite journal |last=Elefterie |first=Liana |date=2016 |title=The Impact of Information Technology on the Audit Process |journal=Economics, Management, and Financial Markets |volume=11 |pages=303–309}}</ref>
 
The use of IT systems in audits has transformed the way auditors accomplish important audit functions such as the management of databases, risk assurance and controls, and even governance and compliance. In addition, IT audit systems improve the operational efficiency and aid in decision making that would otherwise be left to hand-held calculations. IT systems help to eliminate the human error in audits and while it does not fully solve the issue, IT systems have proven to be helpful in audits done by the Big 4 and small firms alike. These systems have greatly reduced the margin of error on audits and provide a better insight into the data being analyzed.
 
As a result of the increased use of IT systems in audits, authoritative bodies such as the American Institute of Certified Public Accountants (AICPA) and the Information Systems Audit Control Association (ISACA) have established guidance on how to properly use IT systems to perform audits.<ref>{{Cite journal |last=Yang |first=David C. |last2=Guan |first2=Liming |date=2004-01-01 |title=The evolution of IT auditing and internal control standards in financial statement audits: The case of the United States |url=https://doi.org/10.1108/02686900410530547 |journal=Managerial Auditing Journal |volume=19 |issue=4 |pages=544–555 |doi=10.1108/02686900410530547 |issn=0268-6902|url-access=subscription }}</ref> Auditors must now adhere to the established guidelines when utilizing IT systems in audits.
 
== Benefits of Utilizing IT systems on Financial Audits ==
The use of IT systems and AI techniques on financial audits is starting to show huge benefits for leading accounting firms. In a study done by one of the Big 4 accounting firms, it is expected that the use of IT Systems and AI techniques will generate an increase of $6.6 trillion in revenue<ref name=":0"/> as a result of the increase in productivity. As a result, leading auditing firms are making enormous investments with the goal of increasing productivity and therefore revenue through the development or outsourcing of IT systems and AI techniques to assist in financial audits.
 
PwC, one of the biggest auditing firms in the world, has narrowed down three different types of IT systems and AI techniques that firms can develop and implement to achieve increased revenue and productivity. The first system is by created in a way that technology systems that play a supplemental role in the human auditors decision-making. This allows the human auditor to retain autonomy over decisions and use the technology to support and enhance their ability to perform accurate work, ultimately saving the firm in productivity costs. Next, PwC states that systems with problem solving abilities are imperative to producing the most accurate results. PwC recognizes the increased margin for error due to unintended biases, and thus the need for creating systems that are able to adapt to different scenarios. This type of system requires decision making to be shared between the human auditor and the IT system to produce the maximum output by allowing the system to take over the computing work that could not be one by a human auditor alone. Finally, PwC recognizes that there are scenarios where technology needs to have the autonomy of decision making and act independently. This allows human auditors to focus on more important tasks while the technology takes care of time consuming tasks that do not require human time.<ref name=":0"/>
 
The utilization of IT systems and AI techniques on financial audits extend past the goal of reaching maximized productivity and increased revenue. Firms who utilize these systems to assist in the completion of audits are able to identify pieces of data that may constitute fraud with higher efficiency and accuracy. For example, systems such as drones have been approved by all four of the big 4 <ref name=":0"/> to assist in obtaining more accurate inventory calculations, meanwhile voice and facial recognition is adding firms in fraud cases.<ref name=":0"/>
 
== See also ==
* [[Electronic data processing]]
 
=== Computer forensics ===
* [[Computer forensics]]
* [[Data analysis (information technology)|Data analysis]]
 
==See also==
*[[IT audit resources]]
*[[Famous IT Auditors & Experts]]
*[[Information technology audit - operations]]
=== Operations ===
* [[Helpdesk and incident reporting auditing]]
*[[Backup systems and recovery]]
* [[Change management auditing]]
* [[SoftwareDisaster developmentrecovery lifeand cycle]]business continuity auditing]]
* [[ISAE 3402]]
*[[Helpdesk and incident reporting auditing]]
 
*[[SAS 70]]
===Miscellaneous===
*[[Disaster recovery and business continuity auditing]]
* [[XBRL assurance]]
*[[Evaluating the qualifications of IT personnel for the purposes of an audit]]
 
=== Irregularities and illegal acts ===
=== '''Auditing systems, applications and networks''' ===
* AICPA Standard: [[SAS 99]] Consideration of Fraud in a Financial Statement Audit
*[[Operating system audit]]
* [[Computer fraud case studies]]
*[[Mainframe audit]]
*[[Database audit]]
*[[Enterprise Resource Planning audit]]
*[[Systems applications products audit]]
===Computer Forensics===
*[[Computer forensics]]
*[[Data analysis (information technology)|Data analysis]]
 
===Fraud= References ==
{{reflist}}
*[[Computer fraud case studies]]
*[[SAS 99]]
 
==External links==
[[Category:Information technology audit]]
* [http://www.networkmagazineindia.com/200312/securedview01.shtml A career as Information Systems Auditor] {{Webarchive|url=https://web.archive.org/web/20070712082522/http://www.networkmagazineindia.com/200312/securedview01.shtml |date=2007-07-12 }}, by Avinash Kadam (Network Magazine)
* [https://web.archive.org/web/20101106051757/http://www.ffiec.gov/ffiecinfobase/booklets/audit/audit.pdf Federal Financial Institutions Examination Council] (FFIEC)
* [https://web.archive.org/web/20130610150803/http://www.auditware.co.uk/content/76/The-need-for-CAATs The need for CAAT Technology]
* [http://www.opensecurityarchitecture.org Open Security Architecture- Controls and patterns to secure IT systems]
* [http://www.aicpa.org/ American Institute of Certified Public Accountants] (AICPA)
* [https://web.archive.org/web/20141022043004/http://www.itil-officialsite.com/home/home.asp IT Services Library] (ITIL)
 
{{DEFAULTSORT:Information Technology Audit}}
[[nl:IT audit]]
[[Category:Information technology audit| ]]
[[Category:Data processing]]
[[Category:Regulation of technologies]]