Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- IT & Security Audit Standards And Guidelines
- IT Audit and Assurance Standards – ISACA
- S1 Audit Charter
- S2 Independence
- S3 Professional Ethics And Standards
- S4 Professional – Competence
- S5 Planning
- S6 Performance of Audit Work
- S7 Reporting
- S8 Follow-up Activities
- S9 Irregularities and Illegal Acts
- S10 IT Governance
- S11 Use of Risk Assessment in Audit Planning
- S12 Audit Materiality
- S13 Using the Work of Other Experts
- S14 Audit Evidence
- S15 IT Controls
- S16 E-commerce
- IT Audit and Assurance Guidelines – ISACA
- G1 Using the Work of Other Experts
- G2 Audit Evidence Requirement
- G3 Use of Computer Assisted Audit Techniques (CAATs)
- G4 Outsourcing of IS Activities to Other Organisations
- G5 Audit Charter
- G6 Materiality Concepts for Auditing Information Systems
- G7 Due Professional Care
- G8 Audit Documentation
- G9 Audit Considerations for Irregularities and Illegal Acts
- G10 Audit Sampling
- G11 Effect of Pervasive IS Controls
- G12 Organisational Relationship and Independence
- G13 Use of Risk Assessment in Audit Planning
- G14 Application Systems Review (Withdrawn 14 January 2013)
- G15 Audit Planning
- G16 Effect of Third Parties on an Enterprise’s IT Controls (Withdrawn 14 January 2013)
- G17 Effect of Nonaudit Role on the IT Audit and Assurance Professional’s Independence
- G18 IT Governance (Withdrawn 14 January 2013)
- Irregularities and Illegal Acts (Withdrawn 1 September 2008)
- G20 Reporting
- G21 Enterprise Resource Planning (ERP) Systems Review (Withdrawn 14 January 2013)
- G22 Business-to-consumer (B2C) E-commerce Review (Withdrawn 14 January 2013)
- G23 System Development Life Cycle (SDLC) Review Reviews (Withdrawn 14 January 2013)
- G24 Internet Banking (Withdrawn 14 January 2013)
- G25 Review of Virtual Private Networks (Withdrawn 14 January 2013)
- G26 Business Process Reengineering (BPR) Project Reviews (Withdrawn 14 January 2013)
- G27 Mobile Computing (Withdrawn 14 January 2013)
- G28 Computer Forensics (Withdrawn 14 January 2013)
- G29 Post-implementation Review (Withdrawn 14 January 2013)
- G30 Competence
- G31 Privacy (Withdrawn 14 January 2013)
- G32 Business Continuity Plan (BCP) Review from IT Perspective, 2005 (Withdrawn 14 January 2013)
- G33 General Considerations on the Use of the Internet (Withdrawn 14 January 2013)
- G34 Responsibility, Authority and Accountability
- G35 Follow-up Activities
- G36 Biometric Controls (Withdrawn 14 January 2013)
- G37 Configuration Management Process (Withdrawn 14 January 2013)
- G38 Access Controls (Withdrawn 14 January 2013)
- G39 IT Organisation
- G40 Review of Security Management Practices
- G41 Return on Security Investment (ROSI)
- G42 Continuous Assurance
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement