Auditing information systems / Jack J.Champlain.
- Format:
-
- Author/Creator:
-
- Language:
- English
- Subjects (All):
-
- Physical Description:
- 1 online resource (430 pages)
- Edition:
- 2nd ed.
- Place of Publication:
- Hoboken, NJ : John Wiley, 2003.
- Language Note:
- English
- System Details:
- text file
- Summary:
- Have you been asked to perform an information systems audit and don't know where to start? Examine a company's hardware, software, and data organization and processing methods to ensure quality control and security with this easy, practical guide to auditing computer systems--the tools necessary to implement an effective IS audit. In nontechnical language and following the format of an IS audit program, you'll gain insight into new types of security certifications (e.g., TruSecure, CAP SysTrust, CPA WebTrust) as well as the importance of physical security controls, adequate insurance, and digi
- Contents:
-
- Auditing Information Systems Second Edition; Contents; Preface; Acknowledgments; PART ONE CORE CONECEPTS; Chapter 1 Basics of Computing Systems; Central Processing Unit; Operating System; Application Programs; Database Management Systems; Physical Security Controls; Logical Security Controls; Location of Physical and Logical Security Controls; Notes; Chapter 2 Identifying Computer Systems; Getting Started; Benefits of a Computing Systems Inventory; Risk Assessment; Note; PART TWO STANDARD INFORMATION SYSTEMS AUDIT APPROACH; Chapter 3 Information Systems Audit Program
- Other Benefits of Audit ProgramsInformation Systems Audit Program; Chapter 4 Information Systems Security Policies, Standards, and/or Guidelines; Information Systems Security Policies; Information Systems Security Standards; Information Systems Security Guidelines; Notes; Chapter 5 Auditing Service Organization Applications; Service Auditor Reports; Use of Service Auditor Reports for Internal Audits; Report of Independent Auditors; Description of Relevant Policies and Procedures and Other Information; Control Objectives as Specified by Service Organization Management
- Client Control ConsiderationsAlternatives to SAS 70-Type Audits; Notes; Chapter 6 Assessing the Financial Stability of Vendor Organizations, Examining Vendor Organization Contracts, and Examining Accounting Treatment of Computer Equipment and Software; Assessing Financial Stability of Vendor Organizations; Examining Vendor Organization Contracts; Examining Accounting Treatment of Computer Hardware and Software; Notes; Chapter 7 Physical Security; Physical Locks; Security Guards; Video Surveillance Cameras; General Emergency and Detection Controls; Heating, Ventilation, and Cooling Systems
- Insurance CoveragePeriodic Backups; Emergency Power and Uninterruptible Power Supply Systems; Business Resumption Programs; Key Aspects of an Information Systems Business Resumption Program; Backup System Security Administrator; Notes; Chapter 8 Logical Security; Logical Security Design; Bringing a New System to Life; User IDs and Passwords; Remote Access Controls; System Security Administration; Wire Transfer Fraud; Notes; Chapter 9 Information Systems Operations; Computer Operations; Business Operations; Efficiency and Effectiveness of Information Systems in Business Operations
- PART THREE CONTEMPORARY INFORMATION SYSTEMS AUDITING CONCEPTSChapter 10 Control Self-Assessment and an Application in an Information Systems Environment; Definition and Overview; History; Keys to a Successful Program; Internal Control Frameworks; COSO; CoCo; Cadbury; COBIT; SAC and eSAC; SASs 55/78/94; Additional Keys to a Successful Program; Various Approaches; Benefits of a Successful Program; Notes; Chapter 11 Encryption and Cryptography; Terminology; Goal of Cryptographic Controls; Encryption; Hashing; Digital Signatures and Digital Certificates; Key Management
- Political Aspects of Cryptography
- Notes:
-
- Description based upon print version of record.
- Includes bibliographical references (p. 403-404) and index.
- ISBN:
-
- 9786610367825
- 9781280367823
- 1280367822
- 9780471466291
- 0471466298
- OCLC:
- 827740093
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.