Chapter 1 - Overview of IT Audit
Chapter 1 - Overview of IT Audit
Introduction
The Audit Function
Auditing Computerized Accounting Information Systems
Auditing with the Computer
Auditing in the Information Age
The Audit Function
To
guard against unauthorized program
tampering, a test of length control total
can be performed.
A comparison program can compare
code line-by-line to ensure consistency
between authorized version and version
being used.
Both tests can detect Trojan horse
computer programs.
Surprise Audits and
Surprise Use of
Programs
The Surprise audit approach involves
examining application programs
unexpectedly.
Withthe Surprise use approach, an
auditor visits the computer center
unannounced and requests that
previously obtained authorized
programs be used for the required data
processing.
Review of Systems
Software
Systems software includes 1) operating
system software, 2) utility programs, 3)
program library software, and 4) access
control software.
Auditors should review systems
software documentation.
Systems software can generate incident
reports, which are reports listing events
encountered by the system that are
unusual or interrupt operations.
Continuous Approach