Advertisement
opexxx

IT & Security Audit Standards And Guidelines

Sep 27th, 2016
214
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.61 KB | None | 0 0
  1. IT & Security Audit Standards And Guidelines
  2.  
  3. IT Audit and Assurance Standards – ISACA
  4. S1 Audit Charter
  5. S2 Independence
  6. S3 Professional Ethics And Standards
  7. S4 Professional – Competence
  8. S5 Planning
  9. S6 Performance of Audit Work
  10. S7 Reporting
  11. S8 Follow-up Activities
  12. S9 Irregularities and Illegal Acts
  13. S10 IT Governance
  14. S11 Use of Risk Assessment in Audit Planning
  15. S12 Audit Materiality
  16. S13 Using the Work of Other Experts
  17. S14 Audit Evidence
  18. S15 IT Controls
  19. S16 E-commerce
  20.  
  21. IT Audit and Assurance Guidelines – ISACA
  22. G1 Using the Work of Other Experts
  23. G2 Audit Evidence Requirement
  24. G3 Use of Computer Assisted Audit Techniques (CAATs)
  25. G4 Outsourcing of IS Activities to Other Organisations
  26. G5 Audit Charter
  27. G6 Materiality Concepts for Auditing Information Systems
  28. G7 Due Professional Care
  29. G8 Audit Documentation
  30. G9 Audit Considerations for Irregularities and Illegal Acts
  31. G10 Audit Sampling
  32. G11 Effect of Pervasive IS Controls
  33. G12 Organisational Relationship and Independence
  34. G13 Use of Risk Assessment in Audit Planning
  35. G14 Application Systems Review (Withdrawn 14 January 2013)
  36. G15 Audit Planning
  37. G16 Effect of Third Parties on an Enterprise’s IT Controls (Withdrawn 14 January 2013)
  38. G17 Effect of Nonaudit Role on the IT Audit and Assurance Professional’s Independence
  39. G18 IT Governance (Withdrawn 14 January 2013)
  40. Irregularities and Illegal Acts (Withdrawn 1 September 2008)
  41. G20 Reporting
  42. G21 Enterprise Resource Planning (ERP) Systems Review (Withdrawn 14 January 2013)
  43. G22 Business-to-consumer (B2C) E-commerce Review (Withdrawn 14 January 2013)
  44. G23 System Development Life Cycle (SDLC) Review Reviews (Withdrawn 14 January 2013)
  45. G24 Internet Banking (Withdrawn 14 January 2013)
  46. G25 Review of Virtual Private Networks (Withdrawn 14 January 2013)
  47. G26 Business Process Reengineering (BPR) Project Reviews (Withdrawn 14 January 2013)
  48. G27 Mobile Computing (Withdrawn 14 January 2013)
  49. G28 Computer Forensics (Withdrawn 14 January 2013)
  50. G29 Post-implementation Review (Withdrawn 14 January 2013)
  51. G30 Competence
  52. G31 Privacy (Withdrawn 14 January 2013)
  53. G32 Business Continuity Plan (BCP) Review from IT Perspective, 2005 (Withdrawn 14 January 2013)
  54. G33 General Considerations on the Use of the Internet (Withdrawn 14 January 2013)
  55. G34 Responsibility, Authority and Accountability
  56. G35 Follow-up Activities
  57. G36 Biometric Controls (Withdrawn 14 January 2013)
  58. G37 Configuration Management Process (Withdrawn 14 January 2013)
  59. G38 Access Controls (Withdrawn 14 January 2013)
  60. G39 IT Organisation
  61. G40 Review of Security Management Practices
  62. G41 Return on Security Investment (ROSI)
  63. G42 Continuous Assurance
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement