Information System Data

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

CONTENTS 1. Introduction on IS Audit 1.1. Introduction 1.2. Audit Objectives 2. Audit in Computerized Environment 2.1.

Understanding of Computerized Environment 2.2. Accounting Information Systems in Computerized Environment 2.3. Impact of IT on Economics of Auditing 2.4. Concept of Security 2.5. IS Management 2.6. Availability of Information Systems 2.7. Access Control 2.8. Database Management 2.9. Application Controls and their Functioning 2.10. Evaluation of Business Risks 2.11. Conversion Audit 3. Audit Organization and Management 3.1. Organization Strategy 3.1.1. Hiring The Right People 3.1.2. Improving Audit Processes

3.1.3.
Focusing on Collaboration 3.2. IS Audit as Review of Management 4. Risk Based Audit Framework 4.1. Introduction to the Risk based Audit Framework (RBAF) 4.1.1. What is an RBAF 4.1.2. Why do we need RBAF? 4.1.3. Development and Implementation of the RBAF 4.1.4. Planning and Preparing an RBAF 4.2. Components of an RBAF 4.2.1. Introduction 4.2.2. Roles Responsibilities and Relationships

4.2.3. Program Profile 4.2.4. Risk Assessment and Management Summary 4.2.5. Program Monitoring and Recipient Auditing 4.2.6. Internal Auditing 4.2.7. Reporting Strategies 4.3. RBAF/ RMAF Integration 5. Audit Standards 5.1. Code of Professional Ethics 5.2. IS Auditing Standards 5.3. IS Auditing Guidelines 6. Use of Computer Assisted Audit Techniques (CAAT) 6.1. Background 6.2. Planning 6.3. Performance of Audit Work 6.4. CAATs Documentation 6.5. Reporting

You might also like