Buch, Englisch, 776 Seiten, Format (B × H): 180 mm x 257 mm, Gewicht: 1578 g
Buch, Englisch, 776 Seiten, Format (B × H): 180 mm x 257 mm, Gewicht: 1578 g
ISBN: 978-1-4398-9320-3
Verlag: AUERBACH PUBN
The new edition of a bestseller, Information Technology Control and Audit, Fourth Edition provides a comprehensive and up-to-date overview of IT governance, controls, auditing applications, systems development, and operations. Aligned to and supporting the Control Objectives for Information and Related Technology (COBIT), it examines emerging trends and defines recent advances in technology that impact IT controls and audits—including cloud computing, web-based applications, and server virtualization.
Filled with exercises, review questions, section summaries, and references for further reading, this updated and revised edition promotes the mastery of the concepts and practical implementation of controls needed to manage information technology resources effectively well into the future. Illustrating the complete IT audit process, the text:
Considers the legal environment and its impact on the IT field—including IT crime issues and protection against fraud
Explains how to determine risk management objectives
Covers IT project management and describes the auditor’s role in the process
Examines advanced topics such as virtual infrastructure security, enterprise resource planning, web application risks and controls, and cloud and mobile computing security
Includes review questions, multiple-choice questions with answers, exercises, and resources for further reading in each chapter
This resource-rich text includes appendices with IT audit cases, professional standards, sample audit programs, bibliography of selected publications for IT auditors, and a glossary. It also considers IT auditor career development and planning and explains how to establish a career development plan. Mapping the requirements for information systems auditor certification, this text is an ideal resource for those preparing for the Certified Information Systems Auditor (CISA) and Certified in the Governance of Enterprise IT (CGEIT) exams.
Instructor's guide and PowerPoint® slides available upon qualified course adoption.
Zielgruppe
Undergraduate and graduate students in MIS and business; information security management staff and consultants; financial auditors.
Autoren/Hrsg.
Fachgebiete
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsinformatik, SAP, IT-Management
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein EDV: Zertifizierung
- Wirtschaftswissenschaften Betriebswirtschaft Management Qualitätsmanagement, Qualitätssicherung (QS), Total Quality Management (TQM)
Weitere Infos & Material
A FOUNDATION FOR IT AUDIT AND CONTROLInformation Technology Environment: Why Are Controls and Audit Important?IT Today and TomorrowInformation Integrity, Reliability, and Validity: Importance in Today’s GlobalBusiness EnvironmentControl and Audit: A Global ConcernE-Commerce and Electronic Funds TransferFuture of Electronic Payment SystemsLegal Issues Impacting ITFederal Financial Integrity LegislationFederal Security LegislationPrivacy on the Information SuperhighwayPrivacy Legislation and the Federal Government Privacy ActSecurity, Privacy, and AuditConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther ReadingThe Legal Environment and Its Impact on Information TechnologyIT Crime IssuesProtection against Computer FraudComputer Fraud and Abuse ActComputer Abuse Amendments ActRemedies and EffectivenessLegislation Providing for Civil and Criminal PenaltiesComputer Security Act of 1987Homeland Security Act of 2002Privacy on the Information SuperhighwayNational Strategy for Securing CyberspaceMethods That Provide for Protection of InformationWeb Copyright LawPrivacy Legislation and the Federal Government Privacy ActConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther ReadingOther Internet Sites
Audit and Review: Their Role in Information TechnologyThe Situation and the ProblemAudit StandardsImportance of Audit IndependencePast and Current Accounting and Auditing PronouncementsAICPA Pronouncements: From the Beginning to NowOther StandardsFinancial AuditingGenerally Accepted Accounting PrinciplesGenerally Accepted Auditing StandardsIT Auditing: What Is It?Need for IT Audit FunctionAuditors Have Standards of PracticeAuditors Must Have IndependenceHigh Ethical StandardsAuditor: Knowledge, Skills, and AbilitiesBroadest ExperiencesSupplemental SkillsTrial and ErrorRole of the IT AuditorTypes of Auditors and Their Duties, Functions, and ResponsibilitiesLegal ImplicationsConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther Reading
Audit Process in an Information Technology EnvironmentAudit UniverseRisk AssessmentAudit PlanDeveloping an Audit ScheduleAudit BudgetObjective and ContextUsing the Plan to Identify ProblemsAudit ProcessPreliminary ReviewPreliminary Evaluation of Internal ControlsDesign Audit ProceduresFieldwork and Implementing Audit MethodologyValidation of Work PerformedSubstantive TestingDocumenting ResultsCommunication StrategyConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther ReadingAuditing IT Using Computer-Assisted Audit Tools and TechniquesAuditor Productivity ToolsUsing Computer-Assisted Audit Tools in the Audit ProcessFlowcharting TechniquesFlowcharting as an Analysis ToolAppropriateness of Flowcharting TechniquesComputer-Assisted Audit Tools and Techniques for Application ReviewsComputer-Assisted Audit Tools and Techniques for Operational ReviewsWeb Analysis ToolsWeb Analysis Software as an Audit ToolComputer ForensicsConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther ReadingManaging IT AuditIT Auditor Career Development and PlanningEstablishing a Career Development PlanEvaluating IT Audit QualityTerms of AssessmentIT Audit and Auditor Assessment FormCriteria for Assessing the AuditCriteria for Assessing the AuditorApplying the ConceptEvaluation of IT Audit PerformanceWhat Is a Best Practice?ConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther ReadingIT Auditing in the New MillenniumIT Auditing TrendsNew Dimension: Information AssuranceIT Audit: The ProfessionA Common Body of KnowledgeCertificationContinuing EducationA Code of Ethics and Professional StandardsEducational CurriculaNew Trends in Developing IT Auditors and EducationCareer Opportunities in the Twenty-First CenturyPublic AccountingPrivate IndustryManagement ConsultingGovernmentRole of the IT Auditor in IT GovernanceIT Auditor as CounselorIT Auditor as Partner of Senior ManagementEducating the Next Generation on IT Audit and Control OpportunitiesConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther ReadingAUDITING IT PLANNING AND ORGANIZATIONIT GovernanceIT ProcessesEnterprise Risk ManagementRegulatory Compliance and Internal ControlsPerformance MeasurementMetrics and ManagementMetric ReportingIndependent AssuranceParticipation in IT Audit PlanningControl FrameworkConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther ReadingStrategy and StandardsIT ProcessesStrategic PlanningIT Steering CommitteePortfolio ManagementDemand ManagementProject InitiationTechnical ReviewArchitecture and StandardsConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther ReadingRisk ManagementIT ProcessesTechnology Risk ManagementAn Example of Standards: Technology Risk ManagementRegulationsWhere Does Technology Risk Management Belong?IT Insurance RiskHow to Determine IT Insurance CoverageAvailable GuidanceConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther Reading
Process and Quality ManagementIT ProcessesRoles and ResponsibilitiesSeparation of DutiesResource ManagementManaging QualityQuality Management StandardsHow Maturity Correlates to QualityIT Process FrameworkAuditing Policies and ProceduresConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther ReadingFinancial ManagementIT ProcessesFinancial Management FrameworkInvestment Approval ProcessProject PricingRealizing the Benefits from IT InvestmentsFinancial PlanningIdentify and Allocate CostsDetermining Charging MethodStructure of U.S. GuidanceIT Asset Management ConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther Reading
IT ACQUISITION AND IMPLEMENTATIONIT Project ManagementIT ProcessesProject Management Body of KnowledgeAuditor’s Role in the Project Management ProcessExample of Project Management Checkpoints and Tools in a Telecom ProjectConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther ReadingSoftware Development and ImplementationIT ProcessesApproaches to Software DevelopmentSoftware Development ProcessPrototypes and Rapid Application DevelopmentEnd-User DevelopmentTraditional Information Software DevelopmentSystem Implementation ProcessHelp Desk and Production Support Training and ReadinessAuditor’s Role in the Development ProcessRisk AssessmentAudit PlanSoftware Development Controls ReviewSoftware Development Life CycleConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther Reading
IT SourcingIT ProcessesSourcing StrategySoftware Acquisition ProcessPrototypes and Rapid Application DevelopmentThe Requirements DocumentOff-the-Shelf SolutionsPurchased PackageContracted DevelopmentOutsourcing a System from Another OrganizationRequest for InformationRequest for BidRequest for ProposalEvaluating ProposalsProcurement and Supplier ManagementIT Contract IssuesStrategic Sourcing and Supplier ManagementAuditing Software AcquisitionsPrototypesOther Resources for Help and AssistanceConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther Reading
Application Controls and MaintenanceIT ProcessesApplication RisksElectronic Data Interchange Application RisksApplication ControlsWeb-Based Application, Risks, and ControlsDocumentation RequirementsApplication Software Life CycleApplication MaintenanceCorrective MaintenanceAdaptive MaintenancePerfective MaintenanceConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther Reading
Change ManagementIT ProcessesChange ManagementImportance of Change ControlChange ControlChange Management SystemChange Request ProcessImpact AssessmentControls over ChangesEmergency Change ProcessRevisions to Documentation and ProceduresAuthorized MaintenanceSoftware Release PolicySoftware Distribution ProcessChange Management ToolsChange Management ProceduresConfiguration ManagementOrganizational Change ManagementOrganizational Culture DefinedAudit InvolvementConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther Reading
IT DELIVERY AND SUPPORTService ManagementIT ProcessesInformation Technology Infrastructure LibraryImplementing IT Service ManagementReview Services and RequirementsDefine IT ServicesService-Level AgreementsService Design and PricingProcesses to Engage ServicesRoles and ResponsibilitiesOngoing Service ManagementService Management of Third PartiesEvolution of StandardsConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther ReadingService Desk and Problem ManagementIT ProcessesTrainingService DeskIncident and Problem ManagementCase Example: Acme Computing Services BusinessConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther Reading
Security and Service ContinuityIT ProcessesInformation Systems SecuritySecurity Threats and RisksSecurity StandardsInformation Security ControlsInformation Custodian ResponsibilitiesUser ResponsibilitiesThird-Party ResponsibilitiesInformation Classification DesignationsContingency and Disaster Recovery PlanningWritten Disaster Recovery PlanMission Statement for Disaster Recovery PlanDisaster Recovery Plan Tests and DrillConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther Reading
System ManagementIT ProcessesSystems SoftwareSystems MaintenanceDatabase TechnologyDatabase Management Systems RecoveryCapacity ManagementServer VirtualizationConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther Reading
Operations ManagementIT ProcessesOperational MaturityOperating Policy and ProceduresData Files and Program ControlsPhysical Security and Access ControlsEnvironmental ControlsOutput ControlsData Communications ControlsData Center ReviewsSoftware and Data Security ControlsPhysical and Environmental Controls ManagementData Access ManagementPolicy and Procedures DocumentationData and Software Backup ManagementOther Management ControlsEnd-User ComputingConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther ReadingTools for Network MonitoringThe Internet, Intranet, and Extranet
ADVANCED TOPICSVirtual EnvironmentVirtual EnvironmentCloud ComputingMobile ComputingIT Operations Issues in Network InstallationTypes of WANsElements of WANsConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther Reading
Virtual Infrastructure Security and RisksInformation Flows in the Current MarketplaceInterconnected Systems and E-CommerceBattleground: The InternetToolsExploiting the TCP/IP HolesRecommendation to IT Auditors, Security, and IT ProfessionalsIntranet/Extranet SecurityWireless TechnologyIdentity TheftConclusionsReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther ReadingInternet ReferencesVirtual Application Security and RisksE-Commerce Application Security as a Strategic and Structural ProblemInformation Security Management SystemsA Planning and Control Approach to E-Commerce Security ManagementWeb Application RisksInternet SecurityCase Example: GMA Business Overview and ProfileMobile Computing SecurityConclusionReview QuestionsMultiple-Choice QuestionsExercisesAnswers to Multiple-Choice QuestionsFurther Reading
Enterprise Resource PlanningERP SolutionsBenefits of ERP SolutionsKey Risks of ERP SolutionsImplementing ERP SystemsERP Data Warehouse
Appendices:Information Technology Audit CasesBibliography of Selected Publications for Information Technology AuditorsProfessional Standards That Apply to Information Technology (Audit, Security, and Privacy Issues)GlossarySample Audit ProgramsIndex