Chapter Four Information Technology and Auditing
Chapter Four Information Technology and Auditing
•C o n t r o l s m a y b e
classified based on the
functionality as
preventive, detective, or
corrective.
Preventive controls
• Prevent errors, omissions, or security
incidents from occurring. Examples include
simple data-entry edits that block alphabetic
characters from being entered into numeric
fields, access controls that protect sensitive
data or system resources from unauthorized
people, and complex and dynamic technical
controls such as antivirus software, firewalls,
and intrusion prevention systems.
Detective controls
10-39
The Risk-Based Audit Approach….
– implementing firewalls
– interviewing personnel
• I T c a n i m p r o v e a c o m p a n y ’s i n t e r n a l
controls; however, it can also affect the
company's overall control risk.
• If IT systems fail, organizations can be
paralyzed by the inability to retrieve
information or by the use of unreliable
information caused by processing errors.
Specific risks to IT systems include the
following