Lecture 5.
Lecture 5.
Objectives of IT Audit
➢ To safeguard organization’s assets.
➢ To ensure data integrity.
➢ To ensure overall objectives of the organization are met.
Benefits of IT Audits
1. Improved Performance: An IT audit can help identify inefficiencies and areas for
improvement within an organization's information technology infrastructure. By
identifying these issues, organizations can take steps to improve their overall
performance. In some cases, this may involve implementing new technologies or
processes.
2. Maintained Safety: One of the most important functions of an IT audit is to ensure that
an organization's information systems are secure. By identifying potential security
vulnerabilities, audits can help organizations take steps to mitigate the risks posed by
these threats.
3. Monitors Potential Threats: In addition to identifying existing security vulnerabilities, IT
audits can also help organizations monitor for potential threats. By staying up-to-date
on the latest risks and trends, businesses can be better prepared to defend against
future attacks.
4. Improved Compliance: IT audits can also help organizations ensure compliance with
relevant laws, regulations, and industry standards. By identifying noncompliant areas,
businesses can take steps to mitigate the risks posed by these vulnerabilities.
Once the data has been collected, it will be analyzed to identify any issues or concerns.
❖ Stage 4: Reporting:
The auditor needs to prepare a report detailing their findings and recommendations.
The report should include a description of the audit scope, methodology, findings, and
recommendations for improvement.
❖ Stage 5: Follow-Up:
The auditor needs to follow up with the organization to ensure that their
recommendations have been implemented.
❖ Risk Assessment
An effective IT audit should have the ability to perform risk assessments.
This involves identifying potential risks and evaluating their impact on the organization.
There are a variety of methods that can be used to perform a risk assessment, including
interviews, document review, and observation.
Usually, a combination of these methods is used to get the most accurate picture
possible. It is important to note that risk assessments are not static. They should be
conducted on a regular basis to ensure that the organization is aware of new risks as
they emerge.
❖ Compliance Review
An effective IT audit should have the ability to review compliance.
This involves ensuring that an organization's information systems are in compliance with
relevant laws, regulations, and industry standards.
There are a variety of compliance risks that need to be considered, including data
privacy, security, and access control. By identifying these risks, organizations can take
steps to mitigate the impact of noncompliance. It can be especially important to
conduct a review of compliance when an organization is implementing new
technologies or processes.
❖ Identification of Inefficiencies
An effective IT audit should have the ability to identify inefficiencies.
This involves assessing an organization's information technology infrastructure and
identifying areas where improvements can be made. Inefficiencies can lead to a variety
of problems, including increased costs, reduced productivity, and decreased security.
By identifying these issues early on, organizations can take steps to mitigate the impact
of these problems. Some examples of these inefficiencies include duplicate data,
unnecessary processes, and outdated technology.
• System and Applications: This audit focuses on the system and applications in an
organization. It verifies that the system and all applications are efficient, appropriate,
reliable, up-to-date, and secure on all levels.
• Information Processing Facilities: It verifies that all processes are working efficiently,
accurately, and timely, in both normal, and rather disruptive conditions.
• System Development: This audit verifies that the under-development system is aligned
with the organization’s objectives. It also makes that the system is made per the
generally accepted standards for systems development.
• Management of IT and Enterprise Architecture: It ensures that IT management is
structured and the information processing environment is
efficient and controlled.
IT Auditor
✓ An IT auditor is an unbiased observer who makes sure that all the IT controls are
appropriate and effective.
An IT auditor is responsible for developing, implementing, testing, and evaluating the IT audit
review procedures.
➢ Audit techniques are methods used by the auditor to collect evidence for
examination.
IT Audit Techniques
All auditing is broken down into four audit techniques:
➢ Inquiry (talking to people).
➢ Observation (observing processes).
➢ Inspection (looking over paperwork or system configurations).
➢ Re-performance (re-performing a process).
❖ Inquiry
Inquiry is the process of gathering information directly from an individual who is familiar with
the subject matter or control being tested. Inquiry may be written (i.e. email) or oral (i.e.
interview).
❖ Observation
Observation is the process or procedure of observing processes take place or witnessing
physical items in place and operating as described. These might also be considered
walkthroughs.
❖ Inspection
Inspection is the examination of documentation that serves of evidence that a control is in
place. Inspection often times involves gathering populations and creating samples for testing,
but can also overlap with observations (e.g. inspecting fire suppression inspection records while
observing that the fire suppression system is in place)
❖ Re-Performance
Re-performance is independently recreating a process to verify that it is operating effectively.
Re-performance may also include recreating a process in tandem with an observation to
observe an otherwise automated process.
Re-performance offers the highest level of assurance that a process is in place and operating
effectively.