Chapter 1 - Introduction To Information System Audit
Chapter 1 - Introduction To Information System Audit
Chapter 1 - Introduction To Information System Audit
1.1. Introduction
Definitions:
Auditing
Auditing is a systematic process by which a competent, independent person objectively obtains
and evaluates evidence regarding assertions about an economic entity or event for the purpose of
forming an opinion about and reporting on the degree to which the assertion conforms to an
identified set of standards
Information systems audit is a process to collect and evaluate evidence to determine whether the
information systems safeguard assets, maintain data integrity, achieve organizational goals
effectively and consume resources efficiently
An IT audit can be defined as any audit that encompasses review and evaluation of automated
information processing systems, related non-automated processes and the interfaces among
them.
An information system (IS) audit or information technology (IT) audit is an examination of the controls
within an entity's Information technology infrastructure. Information technology (IT) auditing examines
processes, IT assets, and controls at multiple levels within an organization to determine the extent to
which the organization adheres to applicable standards or requirements. These reviews may be performed
in conjunction with a financial statement audit, internal audit, or other form of attestation engagement.
IS auditing considers all the potential hazards and controls in information systems. It focuses on issues
like operations, data, integrity, software applications, security, privacy, budgets and expenditures, cost
control, and productivity. The Goals is to ensure;
a) Safeguarding IS assets: The Information systems assets of the organization must be protected by a
system of internal controls. It includes protection of hardware, software, facilities, people, data,
technology, system documentation and supplies.
IS assets includes;
1. Data; Data objects in their widest sense, i.e., external and internal, structured and non-structured,
graphics, sound, system documentation etc.
2. Application Systems; Application system is understood to be the sum of manual and
programmed procedures.
3. Technology; Technology covers hardware, operating systems, database management systems,
networking, multimedia, etc.
4. Facilities; Resources to house and support information systems, supplies etc.
5. People; Staff skills, awareness and productivity to plan, organize, acquire, deliver, support and
monitor information systems and services.
b). Ensuring Data Integrity: Data integrity includes the safeguarding of the information against
unauthorized addition, deletion, modification or alteration. Ensures that the following attributes of
data or information are maintained.
1) Effectiveness - deals with information being relevant and pertinent to the business process as
well as being delivered in a timely, correct, consistent and usable manner.
Guidelines are available to assist auditors in their jobs, such as those from Information Systems Audit
and Control Association (ISACA)
Categories
There are three basic kinds of IS Audits that may be performed:
1) General Controls Review: A review of the controls which govern the development, operation,
maintenance, and security of application systems in a particular environment. This type of audit
might involve reviewing a data center, an operating system, a security software tool, or processes and
procedures (such as the procedure for controlling production program changes), etc.
2) Application Controls Review: A review of controls for a specific application system. This would
involve an examination of the controls over the input, processing, and output of system data. Data
communications issues, program and data security, system change control, and data quality issues are
also considered.
3) System Development Review: A review of the development of a new application system. This
involves an evaluation of the development process as well as the product. Consideration is also given
to the general controls over a new application, particularly if a new operating environment or
technical platform will be used.
Types
Common types of IS Audit Includes;
a) System Audits: A system audit is an audit of the controls designed and implemented into the system
to ensure the integrity of the data processed by the system and maintain the proper functionality of
system processes.
b) Application Audits: The audit of an information system application is an audits of the controls
placed over an enterprise information system which are usually designed to ensure the Effectiveness,
Efficiency, Confidentiality, Availability, Reliability, and Compliance of information and processing
in an enterprise IT environment.
c) Compliance Audits: Compliance audits provide management with tool for the internal review of
compliance in their operating units. The audit program one or many compliance areas. Each area may
be applicable to a particular operating unit, depending on its activities, funding, regulatory
administrative rules, or any other pre-defined criterion.
d) Security Audits: Security audits are aimed to provide comprehensive and cost-effective network
vulnerability assessments by disclosing number of vulnerability tests, provide detailed and
comprehensive report on weaknesses found, and depending on the classification of the system as to
“mission critical”, suggest remedies, solutions, and preventive measures to reduce or eliminate
vulnerabilities. The audit will also provide program(s) to update the list of vulnerability and perform
testing on an ongoing basis.
e) Performance Audits: Performance audits entail an objective and systematic examination of
evidence to provide an independent assessment of the performance and management of a program
against objective criteria as well as assessments that provide a prospective focus or that synthesize
information on best practices or cross-cutting issues.
Risk factors inherent in business operations include the following nine examples:
a) Access risk, referring to the risk of an unauthorized user securing access to information assets.
b) Business disruption risk, or the risk of non-availability of services from information systems
resources.
c) Credit risk, such as the failure of a counterparty honoring their payment obligation.
d) Customer service risk, referring to the risk of customers being deprived of services.
e) Data integrity risk, or the risk of a possible compromise of data integrity that may arise for
various reasons,including unauthorized access.
f) Financial/external report misstatement risk, referring to the risk that reports prepared by the
entity contain misstatements and errors.
g) Fraud risk, referring to the risk of losses arising out of fraud committed using information
systems resources.
h) Legal and regulatory risk, referring to risk of noncompliance to legal and regulatory requirements
and consequences thereof.
i) Physical harm risk, referring to the risk of suffering from bodily harm.
The auditor needs to understand how control failure in information systems can lead to a vulnerable
environment. In order to successfully conduct risk analysis, there is need to understand the concepts of
threats, vulnerabilities, exposure, likelihood, and attack in an information system.
In order to ensure that security of information systems is preserved, the entity needs to ensure that usage
of information systems assets and related processes, whether computerized or manual, is governed by an
internal control system.
Controls objectives will be discussed in chapter 3