Lect 7
Lect 7
INFORMATION TECHNOLOGY
STRATEGY AND GOVERNANCE
Risk Management
Policies and Procedures
Contents
IT Risk and Internal Controls
Security
Policies and Procedures
Disaster recovery, security and quality Influencing behaviour through charge-out rules
Secure passwords.
Prior to developing mitigating strategies, it is important to determine the organizations ‘risks appetite’
Risk appetite is the level of risk that an organization is prepared to accept in pursuit of its objectives,
before action is deemed necessary to reduce the risk.
This can then facilitate prioritizing, evaluating, and implementing appropriate risk-reducing controls.
Because elimination of all risk is impossible, organizations should consider using the least cost
approach and implement the most appropriate controls to decrease risk to an acceptable level,
with minimal adverse impact on the organization’s resources and objectives.
Develop Response Plans
◦ The role of information technology (IT) audit and control has become a
critical mechanism for ensuring the integrity of information systems (IS)
and the reporting of organization finances to avoid and hopefully
prevent future financial loss.
Evaluate the reliability of data from
IT systems which have an impact
on the financial statements.
IT Audit
Objectives
Evaluate effectiveness of IT
controls to ensure systems are
functioning as intended.
Ascertain whether IT
Ascertain whether IT
systems are
systems provide
adequately
reliable information.
protected.
Ascertain whether IT
Evaluate the risk of
systems are managed
data tampering
to achieve their
and/or data loss.
intended benefits.
IT Audit and Controls
◦ IT auditing is an integral part of the audit function because it supports the auditor's judgment on
the quality of the information processed by computer systems. Initially, auditors with IT audit
skills are viewed as the technological resource for the audit staff.
◦ There are many types of audit needs within IT auditing, such as organizational IT audits
(management control over IT), technical IT audits (infrastructure, data centers, data
communication), application IT audit (business/financial/operational),
development/implementation IT audits (specification/ requirements, design, development, and
post-implementation phases), and compliance IT audits involving national or international
standards.
◦ The IT auditor's role has evolved to provide assurance that adequate and appropriate controls
are in place. Of course, the responsibility for ensuring that adequate internal controls are in
place rests with the management.
Audit Process
◦ The audit process includes the following steps or phases:
◦ 1. Planning
◦ 2. Definition of audit objectives and scope.
◦ 3. Evidence collection and evaluation.
◦ 4. Documentation and reporting.
Principles of Auditing
Integrity, Responsibility of
Skills and
objectivity and Confidentiality work performed
competence
Independece others
Accounting
Documentation Planning Audit evidence system and
internal control
Audit
Audit report
conclusions
Security
◦ This policy describes how entities establish effective security planning and can
embed security into risk management practices. Security planning can be used
to identify and manage risks and assist decision-making by:
a.applying appropriate controls effectively and consistently (as part of the entity's existing
risk management arrangements)
b.adapting to change while safeguarding the delivery of business and services
c.improving resilience to threats, vulnerabilities and challenges
d.driving protective security performance improvements.
◦
Security Risk
A security risk is something that could result in the compromise, loss, unavailability or damage to
information or assets, or cause harm to people. Security risk is the effect of uncertainty on objectives
and is often measured in terms of its likelihood and consequences. The causes are generally people,
systems, processes, procedures, crime, attacks or natural events. An:
Entities are encouraged to consider where security risks intersect with other risks including fraud,
privacy and business continuity. Entities are encouraged to treat risk holistically across its operations.
For example, there may be opportunities to treat multiple risks with one mitigation control.
Successfully managing entity security risks and
Security
protecting people, information and assets requires Planning
an understanding of what needs protecting, what
the threat is and how assets will be protected. Approach
Security planning is designing, implementing,
monitoring, reviewing and continually improving
practices for security risk management.