Chapter 4 Information System Audit Requirements Information System

  • Slides: 17
Download presentation
Chapter 4: Information System Audit Requirements Information System Audit : © South-Asian Management Technologies

Chapter 4: Information System Audit Requirements Information System Audit : © South-Asian Management Technologies Foundation

Risk Factors • The risk factors inherent in business operations include the following: *

Risk Factors • The risk factors inherent in business operations include the following: * Access Risk * Business Disruption Risk * Credit Risk * Customer Service Risk * Data Integrity Risk * Misstatement Risk * Physical Harm Risk * Fraud Risk * Legal And Regulatory Risk Information System Audit : © South-Asian Management Technologies Foundation

Risk analysis and Exposure • A Risk is the likelihood that the organisation would

Risk analysis and Exposure • A Risk is the likelihood that the organisation would face a vulnerability being exploited or a threat becoming harmful • A Threat is an action, event or condition where there is a compromise in the system, its quality and ability to inflict harm to the organisation. • Attack is a set of actions designed to compromise confidentiality, integrity, availability or any other desired feature of an information system. Information System Audit : © South-Asian Management Technologies Foundation

Risk and Exposures • Vulnerability is the weakness in the system safeguards that exposes

Risk and Exposures • Vulnerability is the weakness in the system safeguards that exposes the system to threats. • An Exposure is the extent of loss the organisation has to face when a risk materialises. • Likelihood of the threat occurring is the estimation of the probability that the threat will succeed in achieving an undesirable event. Information System Audit : © South-Asian Management Technologies Foundation

Information System Control Objectives Information System Audit : © South-Asian Management Technologies Foundation

Information System Control Objectives Information System Audit : © South-Asian Management Technologies Foundation

Information System Control Objectives • Safeguarding information systems assets • Compliance with corporate policies,

Information System Control Objectives • Safeguarding information systems assets • Compliance with corporate policies, regulatory and legal requirements • Assuring system reliability • Maintaining data integrity • Assuring system security • Assuring system availability Information System Audit : © South-Asian Management Technologies Foundation

Information System Control Objectives • Maintaining system controllability • Assuring system maintainability • Assuring

Information System Control Objectives • Maintaining system controllability • Assuring system maintainability • Assuring system usabilityensuring system effectiveness • Maintaining system economy and efficiency • Maintaining system quality Information System Audit : © South-Asian Management Technologies Foundation

Information System Audit Objectives • Adequacy and effectiveness of internal controls. • Efficient and

Information System Audit Objectives • Adequacy and effectiveness of internal controls. • Efficient and effective allocation of resources • Provide assurance that computer-related assets are safeguarded. • Ensure that information is accurate, available on request, and reliable. • Provide reasonable assurance that all errors, omissions, and irregularities are prevented, detected, corrected, and reported. • Review the systems to ensure compliance to policies, procedures and standards. Information System Audit : © South-Asian Management Technologies Foundation

Information System Audit Objectives • Ensure legal requirements are complied with, audit trails are

Information System Audit Objectives • Ensure legal requirements are complied with, audit trails are incorporated, documentation is completed and systems data integrity and security is maintained. • To identify and recognize the potential of computer related fraud, embezzlement, misappropriations and thefts. • Ensure that the management takes corrective and preventive actions when required Information System Audit : © South-Asian Management Technologies Foundation

Information Systems Abuse • • • Destruction of assets Theft of assets Modification of

Information Systems Abuse • • • Destruction of assets Theft of assets Modification of assets Privacy violations Disruption of operations Unauthorised use of assets Information System Audit : © South-Asian Management Technologies Foundation

Steps to Asset Safeguarding • Compiling functional IT asset list - Missioncritical functions •

Steps to Asset Safeguarding • Compiling functional IT asset list - Missioncritical functions • Detailing the IT systems identified • Asset protection • Assigning of probabilities Information System Audit : © South-Asian Management Technologies Foundation

Evidence Collection during Audit • Reviewing the organizational structure, documentation, standards, and practices. •

Evidence Collection during Audit • Reviewing the organizational structure, documentation, standards, and practices. • Interviewing appropriate personnel • Observing processing and operations. • Using audit documentation techniques • Applying analytical review procedures and sampling techniques. • Using software tools to analyse logs and audit trails Information System Audit : © South-Asian Management Technologies Foundation

Evidence Collection during Audit • • Physical Examination Confirmation Documentation Observation Inquiry Processing accuracy

Evidence Collection during Audit • • Physical Examination Confirmation Documentation Observation Inquiry Processing accuracy Screen shots Log Files • Testing Software Results • Analytical Procedures • Audit Trails Information System Audit : © South-Asian Management Technologies Foundation

Audit Trails • • Audit trails are records of an activity that can be

Audit Trails • • Audit trails are records of an activity that can be used to reconstruct the performance of the activity. Ensure audit trail when: – Access is granted to a sensitive information asset. – Network services are accessed. – Override system controls are used – Unsuccessful attempts are made to access sensitive information or use network services. Information System Audit : © South-Asian Management Technologies Foundation

Audit Trails • To include in the audit trail as much of the following

Audit Trails • To include in the audit trail as much of the following as is practical: – User identification – Functions, resources and information used or changed – Date and time stamp (including time zone) ; – Work-station address and network connectivity path – Specific transaction or program executed. Information System Audit : © South-Asian Management Technologies Foundation

Audit Trails • To provide an additional real time alarm for on-line capabilities: –

Audit Trails • To provide an additional real time alarm for on-line capabilities: – Access attempts that violate the access control rules – Attempts to access functions or information not authorized – Concurrent log-on attempts – Security profile changes Information System Audit : © South-Asian Management Technologies Foundation

System Logs • • • Control Total Verification Transaction logs Operator logs • System

System Logs • • • Control Total Verification Transaction logs Operator logs • System starting and finishing time • System errors and corrective action taken • Confirmation of the correct handling of data files and computer output • Name of the person making the log entry. • Operator’s logs should be compared against operating procedures. • Fault logging Information System Audit : © South-Asian Management Technologies Foundation