Is Auditing Procedure Evaluation of Management Controls over Encryption Methodologies
ثبت نشده
چکیده
The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply specifically to IS auditing. One of the goals of the Information Systems Audit and Control Association (ISACA) is to advance globally applicable standards to meet its vision. The development and dissemination of the IS Auditing Standards are a cornerstone of the ISACA professional contribution to the audit community. The framework for the IS Auditing Standards provides multiple levels of guidance: Standards define mandatory requirements for IS auditing and reporting. They inform: – IS auditors of the minimum level of acceptable performance required to meet the professional responsibilities set out in the ISACA Code of Professional Ethics – Management and other interested parties of the profession’s expectations concerning the work of practitioners – Holders of the Certified Information Systems Auditor (CISA) designation of requirements. Failure to comply with these standards may result in an investigation into the CISA holder’s conduct by the ISACA Board of Directors or appropriate ISACA committee and, ultimately, in disciplinary action. Guidelines provide guidance in applying IS Auditing Standards. The IS auditor should consider them in determining how to achieve implementation of the standards, use professional judgement in their application and be prepared to justify any departure. The objective of the IS Auditing Guidelines is to provide further information on how to comply with the IS Auditing Standards. Procedures provide examples of procedures an IS auditor might follow in an audit engagement. The procedure documents provide information on how to meet the standards when performing IS auditing work, but do not set requirements. The objective of the IS Auditing Procedures is to provide further information on how to comply with the IS Auditing Standards.
منابع مشابه
Using Internal Auditing in E-Banks and E-Credit Financial Institutes
Internal audit is a process affected by an entity ‘s board of directors, management and other personnel, designed to provide reasonable assurance regarding the achievement of objectives relating to operations, reporting and compliance. This definition reflects certain fundamental concepts. Internal control is: • Geared to achievement of objectives in one or more categories operations, reporti...
متن کاملFuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملIdentify the components of optimal supervision over the auditors in Iranian capital market
Proper supervision over the auditors is one of the ways to gain investorschr('39') trust in the capital market. This study aim to identify the components of optimal supervision over the auditors of companies in Iranian capital market. This study examines the issue of auditor oversight as one of the most important challenges of the auditing profession. The method used in this study is the phenom...
متن کاملAchieving Fine-grained Access Control and Integrity Auditing in Cloud Storage ⋆
Attributes based encryption (ABE) can achieve flexible and scalable access control and gurantee the confidentiality of the data stored in the cloud. However, important issues such as efficient user revocation and fine-grained access control are not straightforward, which constrain the adoption of ABE in cloud storage systems.Our proposed scheme realizes fine-grained read and write access contro...
متن کاملSolving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing
Existing cloud storage systems receive the data in its plain form and perform conventional (server-side) deduplication mechanisms. However, disclosing the data to the cloud can potentially threaten the security and privacy of users, which is of utmost importance for a real-world cloud storage. This can be solved by secure deduplication mechanisms which enables the user to encrypt the data on th...
متن کامل