LEADER 05600nam 2200745Ia 450 001 9910820071803321 005 20200520144314.0 010 $a1-119-20372-4 010 $a1-118-23907-5 010 $a1-280-58854-3 010 $a9786613618375 010 $a1-118-22584-8 035 $a(CKB)2670000000148575 035 $a(EBL)818101 035 $a(OCoLC)777374796 035 $a(SSID)ssj0000614149 035 $a(PQKBManifestationID)11931533 035 $a(PQKBTitleCode)TC0000614149 035 $a(PQKBWorkID)10587960 035 $a(PQKB)11544133 035 $a(Au-PeEL)EBL818101 035 $a(CaPaEBR)ebr10534006 035 $a(CaONFJC)MIL361837 035 $a(OCoLC)785782707 035 $a(CaSebORM)9781118147610 035 $a(MiAaPQ)EBC818101 035 $a(EXLCZ)992670000000148575 100 $a20111012d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAuditor's guide to IT auditing$b[electronic resource] /$fRichard E. Cascarino 205 $a2nd ed. 210 $aHoboken, N.J. $cWiley$dc2012 215 $a1 online resource (456 p.) 225 0 $aWiley corporate F&A series 300 $aRev. ed. of: Auditor's guide to information systems auditing. 300 $aIncludes index. 311 $a1-118-14761-8 320 $aIncludes bibliographical references and index. 327 $aAuditor's Guide to IT Auditing; Contents; Preface; PART I: IT AUDIT PROCESS; Chapter 1: Technology and Audit; Technology and Audit; Batch and Online Systems; Electronic Data Interchange; Electronic Business; Cloud Computing; Chapter 2: IT Audit Function Knowledge; Information Technology Auditing; What Is Management?; Management Process; Understanding the Organization's Business; Establishing the Needs; Identifying Key Activities; Establish Performance Objectives; Decide the Control Strategies; Implement and Monitor the Controls; Executive Management's Responsibility and Corporate Governance 327 $aAudit RoleConceptual Foundation; Professionalism within the IT Auditing Function; Relationship of Internal IT Audit to the External Auditor; Relationship of IT Audit to Other Company Audit Activities; Audit Charter; Charter Content; Outsourcing the IT Audit Activity; Regulation, Control, and Standards; Chapter 3: IT Risk and Fundamental Auditing Concepts; Computer Risks and Exposures; Effect of Risk; Audit and Risk; Audit Evidence; Conducting an IT Risk-Assessment Process; NIST SP 800 30 Framework; ISO 27005; The "Cascarino Cube"; Reliability of Audit Evidence; Audit Evidence Procedures 327 $aResponsibilities for Fraud Detection and PreventionNotes; Chapter 4: Standards and Guidelines for IT Auditing; IIA Standards; Code of Ethics; Advisory; Aids; Standards for the Professional Performance of Internal Auditing; ISACA Standards; ISACA Code of Ethics; COSO: Internal Control Standards; BS 7799 and ISO 17799: IT Security; NIST; BSI Baselines; Note; Chapter 5: Internal Controls Concepts Knowledge; Internal Controls; Cost/Benefit Considerations; Internal Control Objectives; Types of Internal Controls; Systems of Internal Control; Elements of Internal Control 327 $aManual and Automated SystemsControl Procedures; Application Controls; Control Objectives and Risks; General Control Objectives; Data and Transactions Objectives; Program Control Objectives; Corporate IT Governance; COSO and Information Technology; Governance Frameworks; Notes; Chapter 6: Risk Management of the IT Function; Nature of Risk; Risk-Analysis Software; Auditing in General; Elements of Risk Analysis; Defining the Audit Universe; Computer System Threats; Risk Management; Notes; Chapter 7: Audit Planning Process; Benefits of an Audit Plan; Structure of the Plan; Types of Audit 327 $aChapter 8: Audit ManagementPlanning; Audit Mission; IT Audit Mission; Organization of the Function; Staffing; IT Audit as a Support Function; Planning; Business Information Systems; Integrated IT Auditor versus Integrated IT Audit; Auditees as Part of the Audit Team; Application Audit Tools; Advanced Systems; Specialist Auditor; IT Audit Quality Assurance; Chapter 9: Audit Evidence Process; Audit Evidence; Audit Evidence Procedures; Criteria for Success; Statistical Sampling; Why Sample?; Judgmental (or Non-Statistical) Sampling; Statistical Approach; Sampling Risk; Assessing Sampling Risk 327 $aPlanning a Sampling Application 330 $aStep-by-step guide to successful implementation and control of IT systems-including the Cloud Many auditors are unfamiliar with the techniques they need to know to efficiently and effectively determine whether information systems are adequately protected. Now in a Second Edition, Auditor's Guide to IT Auditing presents an easy, practical guide for auditors that can be applied to all computing environments.Follows the approach used by the Information System Audit and Control Association's model curriculum, making this book a practical approach to IS auditingServ 410 0$aWiley Corporate F&A 606 $aElectronic data processing$xAuditing 606 $aAuditing 615 0$aElectronic data processing$xAuditing. 615 0$aAuditing. 676 $a658/.0558 686 $aBUS003000$2bisacsh 700 $aCascarino$b Richard$01659325 701 $aCascarino$b Richard$01659325 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910820071803321 996 $aAuditor's guide to IT auditing$94013911 997 $aUNINA