Computer Audit/IT Audit

Computer audits, also known as IT audits, are important because they help organizations protect their information assets, ensure compliance with regulations, and improve the efficiency of their IT operations.

The objective of computer control audits is to determine whether computer controls effectively support the confidentiality, integrity, and availability of information systems. Controls provide reasonable assurance that changes to the statement application are authorized, tested, approved, properly implemented, and documented. General computer controls include controls over the information technology (IT) environment, computer operations, access to programs and data, program development, and program changes.

 The computer auditor has to ensure that the basic control objectives and principles do not change. The manner in which those objectives are achieved, however, does change fundamentally. Specifically, there is a need for greater preventative controls rather than a reliance on the more detective and corrective control mechanisms which would usually be found in manual systems.

IT audits cover a wide range of areas, including data security, network infrastructure, hardware and software assets, IT governance, compliance, and more. Auditing – whether it is internally or by a third party – helps organizations determine that their IT is functioning as effectively as possible.

In addition, while performing data analysis audit shall be conducted for the following activities.

(i) Creation of electronic work papers. ( Work papers are central to the audit process. They provide the principal support for the auditor’s report and aid in the conduct and supervision of the audit.) (ii) Analytical tests (Analytical testing in computer auditing is a method of analyzing data to identify trends and patterns that may indicate issues. It can be used to assess the consistency and reasonableness of IT systems, such as their quality, effectiveness, or efficiency. (iii)Data analysis reports Data analysis is produced by automated tools and techniques that can help set the scope and methodology for audits. It can help identify exceptions and drill down. Data analysis results and conclusions can be reported using visualization techniques. (iv) Fraud detection.  Following are common instances of computer fraud and abuse;

(i) unauthorised disclosure of confidential information.(ii) unavailability of key IT systems, (iii) unauthorised modification/destruction of software.(iv) unauthorised modification/destruction of data

(v) theft of IT hardware and software (vi)  use of IT facilities for personal business.

Key to the performance of audit work is a comprehensive risk-based evaluation which should determine the amount of audit resource required and should also assist in determining an assessment of a satisfactory level of security and control.

Benefits of computer/IT audits:

Benefits of computer/IT audits help identify vulnerabilities and risks to an organization’s IT systems, such as cyberattacks, data breaches, and system failures. They also help ensure that only authorized users can access and use the organization’s information. It also helps the IT systems and data management of an organization comply with laws and regulations. It also ensures that the organization’s database is accurate, updated, and reliable. Further, IT audits help ensure that IT systems and practices are aligned with the organization’s business objectives and identify areas where IT operations can be improved, such as through workflow automation.

Security Considerations related Posts:

What are Cyber Threats of Different types?Control Mechanism for risk concerning Computer networkComputer Audit/IT Audit  
Understanding IS security and IS auditEvaluation Requirement for IT SecurityWhat are Data Security and Privacy?
What is Digital rights management (DRM)?  

Audits related Posts:

ALL THESE 15 TYPES OF BANK AUDITS YOU NEED TO KNOWEMERGENCE OF RISK-BASED INTERNAL AUDITS IN BANKS: THE OBJECTIVES AND SCOPECONCURRENT AUDIT SYSTEM IN BANKS  
STATUTORY AUDIT OF BANKS EXPLAINEDWHAT IS A LONG FORM AUDIT REPORT (LFAR)?HOW THE CREDIT AUDIT IS CONDUCTED IN BANKS?
COMPUTER AUDIT/IT AUDITHOW ARE REVENUE AUDITS CARRIED OUT IN BANKS?FORENSIC AUDIT IN BANKS
LEGAL AUDIT IN BANKSWHAT IS STOCK AUDIT?UNDERSTANDING IS SECURITY AND IS AUDIT
ROLE OF AUDIT AND INSPECTION EXPLAINEDVIEW: RBI INSPECTION OF COMMERCIAL BANKS
Surendra Naik

Share
Published by
Surendra Naik

Recent Posts

Features of a Computerized Accounting System

Accounting is a multifaceted discipline. It caters to the diverse informational needs of stakeholders within…

8 hours ago

What is the meaning of computerized accounting?

As the name says ‘computerised accounting’ is the use of computers, software, and hardware to…

1 day ago

Supreme Court overrules capping of Credit card charges

The Supreme Court today overruled a 2008 decision by the National Consumer Disputes Redressal Commission…

2 days ago

Preparation and Presentation of Financial Statements of Banks

The Bank’s financial statements are prepared under the historical cost convention, on the accrual basis…

3 days ago

Accounting Treatment of Specific Items under accounting policies of banks

The term "accounting treatment" represents the prescribed manner or method in which an accountant records…

3 days ago

Explained: Disclosures Prescribed by RBI under Basel-III

The Basel Committee on Banking Supervision (BCBS) is the primary global standard setter for the…

4 days ago