Auditor's Guide to Information Systems Auditing
暫譯: 資訊系統審計師指南
Richard E. Cascarino
- 出版商: Wiley
- 出版日期: 2007-03-23
- 售價: $3,870
- 貴賓價: 9.5 折 $3,677
- 語言: 英文
- 頁數: 512
- 裝訂: Hardcover
- ISBN: 0470009896
- ISBN-13: 9780470009895
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$780$616 -
$399CISSP All-in-One Exam Guide, 3/e
-
$880$695 -
$650$507 -
$550$435 -
$980$774 -
$420$399 -
$780$616 -
$650$507 -
$880$695 -
$520$411 -
$750$593 -
$450$356 -
$680$537 -
$620$490 -
$420$357 -
$690$587 -
$880$695 -
$650$553 -
$1,560$1,326 -
$620$490 -
$750$593 -
$360$284 -
$720$569 -
$380$300
商品描述
Description
Praise for Auditor's Guide to Information Systems
Auditing
"Auditor's Guide to Information Systems Auditing is the most
comprehensive book about auditing that I have ever seen. There is something in
this book for everyone. New auditors will find this book to be their
bible-reading it will enable them to learn what the role of auditors really is
and will convey to them what they must know, understand, and look for when
performing audits. For experiencedauditors, this book will serve as a reality
check to determine whether they are examining the right issues and whether
they are being sufficiently comprehensive in their focus. Richard Cascarino
has done a superb job."
-E. Eugene Schultz, PhD, CISSP, CISM Chief
Technology Officer and Chief Information Security Officer, High Tower
Software
A step-by-step guide tosuccessful implementation
and
control of information systems
More and more, auditors are being called
upon to assess the risks and evaluate the controls over computer information
systems in all types of organizations. However, many auditors are unfamiliar
with the techniques they need to know to efficiently and effectively determine
whether information systems are adequately protected. Auditor's Guide to
Information Systems Auditing presents an easy, practical guide for auditors
that can be applied to all computing environments.
As networks and
enterprise resource planning systems bring resources together, and as
increasing privacy violations threaten more organization, information systems
integrity becomes more important than ever. With a complimentary
student'sversion of the IDEA Data Analysis Software CD, Auditor's Guide to
Information Systems Auditing empowers auditors to effectively gauge the
adequacy and effectiveness of information systems
controls.
Table of Contents
PREFACE.
ABOUT THE CD.
PART I. IS Audit Process.
CHAPTER 1. Technology and Audit.
Technology and Audit.
Batch and On-Line Systems.
CHAPTER 2. IS Audit Function Knowledge.
Information Systems Auditing.
What Is Management?
Management Process.
Understanding the Organization’s Business.
Establishing the Needs.
Identifying Key Activities.
Establish Performance Objectives.
Decide The Control Strategies.
Implement and Monitor the Controls.
Executive Management’s Responsibility and Corporate Governance.
Audit Role.
Conceptual Foundation.
Professionalism within the IS Auditing Function.
Relationship of Internal IS Audit to the External Auditor.
Relationship of IS Audit to Other Company Audit Activities.
Audit Charter.
Charter Content.
Outsourcing the IS Audit Activity.
Regulation, Control, and Standards.
CHAPTER 3. IS Risk and Fundamental Auditing Concepts.
Computer Risks and Exposures.
Effect of Risk.
Audit and Risk.
Audit Evidence.
Reliability of Audit Evidence.
Audit Evidence Procedures.
Responsibilities for Fraud Detection and Prevention.
CHAPTER 4. Standards and Guidelines for IS Auditing.
IIA Standards.
Code of Ethics.
Advisory.
Aids.
Standards for the Professional Performance of Internal Auditing.
ISACA Standards.
ISACA Code of Ethics.
COSO: Internal Control Standards.
BS 7799 and ISO 17799: IT Security.
NIST.
BSI Baselines.
CHAPTER 5. Internal Controls Concepts Knowledge.
Internal Controls.
Cost/Benefit Considerations.
Internal Control Objectives.
Types Of Internal Controls.
Systems of Internal Control.
Elements of Internal Control.
Manual and Automated Systems.
Control Procedures.
Application Controls.
Control Objectives and Risks.
General Control Objectives.
Data and Transactions Objectives.
Program Control Objectives.
Corporate IT Governance.
CHAPTER 6. Risk Management of the IS Function.
Nature of Risk.
Auditing in General.
Elements of Risk Analysis.
Defining the Audit Universe.
Computer System Threats.
Risk Management.
CHAPTER 7. Audit Planning Process.
Benefits of an Audit Plan.
Structure of the Plan.
Types of Audit.
CHAPTER 8. Audit Management.
Planning.
Audit Mission.
IS Audit Mission.
Organization of the Function.
Staffing.
IS Audit as a Support Function.
Planning.
Business Information Systems.
Integrated IS Auditor vs Integrated IS Audit.
Auditees as Part of the Audit Team.
Application Audit Tools.
Advanced Systems.
Specialist Auditor.
IS Audit Quality Assurance.
CHAPTER 9. Audit Evidence Process.
Audit Evidence.
Audit Evidence Procedures.
Criteria for Success.
Statistical Sampling.
Why Sample?
Judgmental (or Non-Statistical) Sampling.
Statistical Approach.
Sampling Risk.
Assessing Sampling Risk.
Planning a Sampling Application.
Calculating Sample Size.
Quantitative Methods.
Project Scheduling Techniques.
Simulations.
Computer Assisted Audit Solutions.
Generalized Audit Software.
Application and Industry-Related Audit Software.
Customized Audit Software.
Information Retrieval Software.
Utilities.
On-Line Inquiry.
Conventional Programming Languages.
Microcomputer-Based Software.
Test Transaction Techniques.
CHAPTER 10. Audit Reporting Follow-up.
Audit Reporting.
Interim Reporting.
Closing Conferences.
Written Reports.
Clear Writing Techniques.
Preparing To Write.
Basic Audit Report.
Executive Summary.
Detailed Findings.
Polishing the Report.
Distributing the Report.
Follow-Up Reporting.
Types of Follow-Up Action.
PART II. Information Systems/Information Technology Governance.
CHAPTER 11. Management.
IS Infrastructures.
Project-Based Functions.
Quality Control.
Operations and Production.
Technical Services.
Performance Measurement and Reporting.
Measurement Implementation.
CHAPTER 12. Strategic Planning.
Strategic Management Process.
Strategic Drivers.
New Audit Revolution.
Leveraging IS.
Business Process Re-Engineering Motivation.
IS as an Enabler of Re-Engineering.
Dangers of Change.
System Models.
Information Resource Management.
Strategic Planning for IS.
Decision Support Systems.
Steering Committees.
Strategic Focus.
Auditing Strategic Planning.
Design the Audit Procedures.
CHAPTER 13. Management Issues.
Privacy.
Copyrights, Trademarks, and Patents.
Ethical Issues.
Corporate Codes of Conduct.
IT Governance.
Sarbanes-Oxley Act.
Housekeeping.
CHAPTER 14. Support Tools and Frameworks.
General Frameworks.
COSO: Internal Control Standards.
Other Standards.
CHAPTER 15. Governance Techniques.
Change Control.
Problem Management.
Auditing Change Control.
Operational Reviews.
Performance Measurement.
ISO 9000 Reviews.
PART III. Systems and Infrastructure Lifecycle Management.
CHAPTER 16. Information Systems Planning.
Stakeholders.
Operations.
Systems Development.
Technical Support.
Other System Users.
Segregation of Duties.
Personnel Practices.
Object-Oriented Systems Analysis.
Enterprise Resource Planning.
CHAPTER 17. Information Management and Usage.
What Are Advanced Systems?
Service Delivery and Management.
CHAPTER 18. Development, Acquisition, and Maintenance of Information Systems.
Programming Computers.
Program Conversions.
System Failures.
Systems Development Exposures.
Systems Development Controls.
Systems Development Life Cycle Control: Control Objectives.
Micro-Based Systems.
CHAPTER 19. Impact of Information Technology on the Business Processes and Solutions.
Impact.
Continuous Monitoring.
Business Process Outsourcing.
E-Business.
CHAPTER 20. Software Development.
Developing a System.
Change Control.
Why Do Systems Fail?
Auditor’s Role in Software Development.
CHAPTER 21. Audit and Control of Purchased Packages.
Information Systems Vendors.
Request For Information.
Requirements Definition.
Request For Proposal.
Installation.
Systems Maintenance.
Systems Maintenance Review.
Outsourcing.
CHAPTER 22. Audit Role in Feasibility Studies and Conversions.
Feasibility Success Factors.
Conversion Success Factors.
CHAPTER 23. Audit and Development of Application Controls.
What Are Systems?
Classifying Systems.
Controlling Systems.
Control Stages.
System Models.
Information Resource Management.
Control Objectives of Business Systems.
General Control Objectives.
CAATS and their Role in Business Systems Auditing.
Common Problems.
Audit Procedures.
CAAT Use in Non-Computerized Areas.
Designing an Appropriate Audit Program.
PART IV. Information Technology Service Delivery and Support.
CHAPTER 24. Technical Infrastructure.
Auditing the Technical Infrastructure.
Computer Operations Controls.
Operations Exposures.
Operations Controls.
Personnel Controls.
Supervisory Controls.
Operations Audits.
CHAPTER 25. Service Center Management.
Continuity Management and Disaster Recovery.
Managing Service Center Change.
PART V. Protection of Information Assets.
CHAPTER 26. Information Assets Security Management.
What Is Information Systems Security?
Control Techniques.
Workstation Security.
Physical Security.
Logical Security.
User Authentication.
Communications Security.
Encryption.
How Encryption Works.
Encryption Weaknesses.
Potential Encryption.
Data Integrity.
Double Public Key Encryption.
Steganography.
Information Security Policy.
CHAPTER 27. Logical Information Technology Security.
Computer Operating Systems.
Tailoring the Operating System.
Auditing the Operating System.
Security.
Criteria.
Security Systems: Resource Access Control Facility.
Auditing RACF.
Access Control Facility 2.
Top Secret.
User Authentication.
Bypass Mechanisms.
CHAPTER 28. Applied Information Technology Security.
Communications and Network Security.
Network Protection.
Hardening the Operating Environment.
Client Server and Other Environments.
Firewalls and Other Protection Resources.
Intrusion Detection Systems.
CHAPTER 29. Physical and Environmental Security.
Control Mechanisms.
Implementing the Controls.
PART VI. Business Continuity and Disaster Recovery.
CHAPTER 30. Protection of the Information Technology Architecture and Assets: Disaster Recovery Planning.
Risk Reassessment.
Disaster—Before and After.
Consequences of Disruption.
Where to Start.
Testing the Plan.
Auditing the Plan.
CHAPTER 31. Insurance.
Self-Insurance.
PART VII. Advanced IS Auditing.
CHAPTER 32. Auditing E-commerce Systems.
E-Commerce and Electronic Data Interchange: What Is It?
Opportunities and Threats.
Risk Factors.
Threat List.
Security Technology.
“Layer” Concept.
Authentication.
Encryption.
Trading Partner Agreements.
Risks and Controls within EDI and E-Commerce.
Nonrepudiation.
E-Commerce and Auditability.
Compliance Auditing.
E-Commerce Audit Approach.
Audit Tools and Techniques.
Auditing Security Control Structures.
Computer Assisted Audit Techniques.
CHAPTER 33. Auditing UNIX/Linux.
History.
Security and Control in a UNIX/Linux System.
Architecture.
UNIX Security.
Services.
Daemons.
Auditing UNIX.
Scrutiny of Logs.
Audit Tools in the Public Domain.
UNIX passwd File.
Auditing UNIX Passwords.
CHAPTER 34. Auditing Windows.
History.
NT and Its Derivatives.
Auditing Windows 23.
Password Protection.
File Sharing.
Security Checklist.
CHAPTER 35. Foiling the System Hackers.
CHAPTER 36. Investigating Information Technology Fraud.
Pre-Incident Preparation.
Detection of Incidents.
Initial Response.
Forensic Backups.
Investigation.
Network Monitoring.
Identity Theft.
APPENDICES.
APPENDIX A Ethics and Standards for the IS Auditor.
ISACA Code of Professional Ethics.
Relationship of Standards to Guidelines and Procedures.
APPENDIX B Audit Program for Application Systems Auditing.
APPENDIX C Logical Access Control Audit Program.
APPENDIX D Audit Program for Auditing UNIX/Linux Environments.
APPENDIX E Audit Program for Auditing Windows XP/2000 Environments.
Index.
商品描述(中文翻譯)
描述
《資訊系統審計師指南》是我見過的最全面的審計書籍。這本書對每個人都有所幫助。新手審計師會發現這本書是他們的聖經,閱讀後將使他們了解審計師的真正角色,並告訴他們在執行審計時必須知道、理解和尋找的內容。對於有經驗的審計師來說,這本書將作為現實檢查,幫助他們確定自己是否在檢查正確的問題,以及是否在專注上足夠全面。理查德·卡斯卡里諾(Richard Cascarino)做得非常出色。
- E. Eugene Schultz, PhD, CISSP, CISM 高塔軟體(High Tower Software)首席技術官及首席資訊安全官
成功實施和控制資訊系統的逐步指南
越來越多的審計師被要求評估風險並評估各類組織中計算機資訊系統的控制。然而,許多審計師對於有效且高效地判斷資訊系統是否得到充分保護所需的技術並不熟悉。《資訊系統審計師指南》提供了一個簡單、實用的指南,適用於所有計算環境。
隨著網絡和企業資源規劃系統將資源整合在一起,並且隨著日益增加的隱私侵犯威脅著更多的組織,資訊系統的完整性變得比以往任何時候都更重要。隨附的學生版IDEA數據分析軟體CD,使《資訊系統審計師指南》能夠幫助審計師有效評估資訊系統控制的充分性和有效性。
目錄
前言
關於CD
第一部分:資訊系統審計過程
第一章:技術與審計
技術與審計
批次與在線系統
第二章:資訊系統審計功能知識
資訊系統審計
什麼是管理?
管理過程
理解組織的業務
確定需求
識別關鍵活動
建立績效目標
決定控制策略
實施和監控控制
高層管理的責任與公司治理
審計角色
概念基礎
資訊系統審計功能中的專業性
內部資訊系統審計與外部審計師的關係
資訊系統審計與其他公司審計活動的關係
審計章程
章程內容
外包資訊系統審計活動
法規、控制與標準
第三章:資訊系統風險與基本審計概念
計算機風險與暴露
風險的影響
審計與風險
審計證據
審計證據的可靠性
審計證據程序
欺詐檢測與預防的責任
第四章:資訊系統審計的標準與指導方針
IIA標準
倫理守則
諮詢
輔助工具
內部審計專業表現的標準
ISACA標準
ISACA倫理守則
COSO:內部控制標準
BS 7799和ISO 17799:IT安全
NIST
BSI基準
第五章:內部控制概念知識
內部控制
成本/效益考量
內部控制目標
內部控制的類型
內部控制系統
內部控制的要素
手動與自動系統
控制程序
應用控制
控制目標與風險
一般控制目標
數據與交易目標
程序控制目標
企業IT治理
第六章:資訊系統功能的風險管理
風險的性質
一般審計
風險分析的要素
定義審計範圍
計算機系統威脅
風險管理
第七章:審計計劃過程
審計計劃的好處
計劃的結構
審計的類型
第八章:審計管理
計劃
審計任務
資訊系統審計任務
功能的組織
人員配置
資訊系統審計作為支持功能
計劃
商業資訊系統
整合的資訊系統審計師與整合的資訊系統審計
被審計者作為審計團隊的一部分
應用審計工具
高級系統
專業審計師
資訊系統審計質量保證
第九章:審計證據過程
審計證據
審計證據程序
成功的標準
統計抽樣
為什麼要抽樣?
判斷性(或非統計)抽樣
統計方法
抽樣風險
評估抽樣風險
計劃抽樣應用
計算樣本大小
定量方法
項目排程技術
模擬
計算機輔助審計解決方案
通用審計軟體
應用及行業相關的審計軟體
定制審計軟體
信息檢索軟體
工具
在線查詢
傳統編程語言
微型計算機基礎的軟體
測試交易技術
第十章:審計報告跟進
審計報告
臨時報告
結束會議
書面報告
清晰寫作技巧
準備寫作
基本審計報告
執行摘要
詳細發現
潤飾報告
分發報告
跟進報告
跟進行動的類型
第二部分:資訊系統/資訊技術治理
第十一章:管理
資訊系統基礎設施
基於項目的功能
質量控制
運營與生產
技術服務
績效測量與報告
測量實施
第十二章:戰略規劃
戰略管理過程
戰略驅動因素
新的審計革命
利用資訊系統
業務流程再造的動機
資訊系統作為再造的促進者
變革的危險
系統模型
資訊資源管理
資訊系統的戰略規劃
決策支持系統
指導委員會
戰略重點
審計戰略規劃
設計審計程序
第十三章:管理問題
隱私
版權、商標和專利
倫理問題
企業行為準則
IT治理
薩班斯-奧克斯利法案
日常管理
第十四章:支持工具與框架
一般框架
COSO:內部控制標準
其他標準
第十五章:治理技術
變更控制
問題管理
審計變更控制
運營審查
績效測量
ISO 9000審查
第三部分:系統與基礎設施生命周期管理
第十六章:資訊系統規劃
利益相關者
運營
系統開發
技術支持
其他系統用戶
職責分離
人員實踐
面向對象的系統分析
企業資源規劃
第十七章:資訊管理與使用
什麼是高級系統?
服務交付與管理
第十八章:資訊系統的開發、獲取與維護
編程計算機
程序轉換
系統故障
系統開發暴露
系統開發控制
系統開發生命周期控制:控制目標
微型基礎系統
第十九章:資訊技術對業務流程和解決方案的影響
影響
持續監控
業務流程外包
電子商務
第二十章:軟體開發
開發系統
變更控制
為什麼系統會失敗?
審計師在軟體開發中的角色
第二十一章:購買包的審計與控制
資訊系統供應商
信息請求
需求定義
提案請求