preview

Audit System Audit Dit

Decent Essays

0.4 Method
In [2], IT audit constitutes of an exam- ination of the controls within IT infras- tructure. The review obtained from the evaluation gives information regard- ing certain aspects such as safeguard- ing assets, maintain data integrity and e ective operation in order to achieve the companys goals. The evaluation can be performed in conjunction with nancial statement audit, internal au- dit. The purpose of IT audit di ers from nancial statement audit, because the latter is adhering to standard ac- counting practices, while IT audit eval- uates the systems internal control de- sign and e ectiveness. This may in- clude eciency and security protocols, development processes. The main ob- jective is to assure protection of the …show more content…

The review report should be dated as of the completion of the au- ditor's inquiry and procedures. In [4], a computer security audit is a man- ual or systematic measurable techni- cal assessment of a system or appli- cation. - Federal or State Regulators
- Certi ed accountants, CISA. Federal
OTS, OCC, DOJ, etc. - Corporate In- ternal Auditors - Certi cated accoun- tants, CISA. - Corporate Security Sta
- Security managers, CISSP, CISM. -
IT Sta - subject matter experts, over- sight support. An appropriate way of looking IT General (which covers all information systems operation) . At the top of the triangle are IT policies de ning the overall enterprise IT orga- nization. Moving down the hierarchi- cally are general controls for IT stan- dards, organization of the IT function, and physical and environmental con- trols. The next level down groups two of the technical-level general controls: systems software controls and systems development controls and at the base of the triangle are the application-based controls. 0.5 Experiment
In [5], there is a lot of auditing en- hancement in Microsoft Windows Server
2008 R2, but also in Windows 7. These enhancements improve the level of de- tail in security auditing logs and sim- plify the deployment and management of auditing policies. Among the en- hancements there are: - Global Object
Access Auditing. The administrators of Windows Server 2008 R2 and Win- dows 7, can de ne SACLs (system ac- cess control

Get Access