IT-Revision, IT-Audit und IT-Compliance

2019 ◽  
Author(s):  
Aleksandra Sowa ◽  
Peter Duscha ◽  
Sebastian Schreiber
Keyword(s):  
Author(s):  
Aleksandra Sowa ◽  
Peter Duscha ◽  
Sebastian Schreiber
Keyword(s):  

Queue ◽  
2006 ◽  
Vol 4 (7) ◽  
pp. 38-43 ◽  
Author(s):  
Tracy Ragan
Keyword(s):  

2020 ◽  
Vol 10 (09) ◽  
pp. 20-22
Author(s):  
D. Schoppe
Keyword(s):  

Für Banken gibt es eine wachsende Anzahl von Rechtsgrundlagen, d. h. Gesetze, Verordnungen, Direktiven und Rundschreiben, die sie im Tagesgeschäft beachten müssen. Gerade die Bedeutung von einem angemessenen Schutz vor IT-Sicherheitsrisiken nimmt zu. EU-weite Programme wie beispielsweise TIBER-EU oder der Nachweis der KRITIS- Anforderungen sollen das bestehende Sicherheitsniveau weiter verbessern. Als ganzheitlichen Ansatz für eine kontinuierliche Evaluierung der Sicherheit von Technologie wie Organisation gleichermaßen empfiehlt sich die Einführung und der Betrieb eines Informationssicherheitsmanagement-Systems.


2019 ◽  
Vol 14 (1) ◽  
pp. 15-34 ◽  
Author(s):  
Lorraine Lee ◽  
Rebecca Sawyer

ABSTRACT The verification of Information Technology (IT) controls is a core responsibility of IT auditors. This case places the student in the role of an IT auditor assigned to test the operating effectiveness of a specific IT general control: user access management. In addition to learning about IT controls, the case introduces several Excel functions such as VLOOKUP, MATCH, INDEX, and various text functions. The student documents the results of the IT controls tests by completing a testing matrix and writing a memo. General controls, user access management, and Excel applications are all topics taught in Accounting Information Systems (AIS) and Audit courses. As such, instructors can use this case at the undergraduate or graduate level in an IT Audit, Accounting Information Systems, or Audit class.


2018 ◽  
Vol 5 (1) ◽  
pp. 119-127
Author(s):  
Lala Nilawati

Abstrak Teknologi informasi (TI) menjadi bagian penting dalam menentukan keberhasilan perusahaan. TI memberikan kesempatan untuk mendapatkan keunggulan kompetitif dan menawarkan perlengkapan untuk meningkatkan produktifitas. PT Triexpi Properti Advisindo merupakan Perusahaan Konsultan dibidang properti, yang sudah menerapkan penggunaan teknologi informasi untuk pengelolaan data sistem informasi penyewaan properti yang berbasis web. Untuk memaksimal penggunaan teknologi informasi di perusahaan ini, maka akan dibutuhkan kegiatan audit IT. Audit TI yang dilakukan pada penelitian ini akan difokuskan untuk melakukan evaluasi terhadap rancangan database pada sistem informasi penyewaan properti pada PT Triexpi Properti Advisindo. Kegiatan audit TI ini bertujuan untuk evaluasi pengelolaan data pada sistem informasi penyewaan dengan menggunakan Domain Delivery & Support (DS)-DS11, yang membahas tentang bagaimana mengelola data secara efektif, yaitu dengan melakukan identifikasi kebutuhan data menggunakan kerangka kerja Cobit 4.1. Kemudian akan digunakan model maturity untuk mengontrol proses-proses TI, dengan menggunakan metode penilaian/scoring. Dengan adanya audit pada sistem informasi ini, diharapkan dapat menunjang semua kegiatan perusahaan dan memberikan informasi yang dibutuhkan baik oleh karyawan maupun Direktur dalam menentukan pengambilan keputusan. Kata Kunci: Audit TI, COBIT 4.1., Domain Delivery & Support (DS) - DS11 Abstract Information technology (IT) becomes an important part in determining the success of the company. IT provides an opportunity to gain competitive advantage and offer equipment to increase productivity. PT Triexpi Properti Advisindo is a property consultant company, which has applied the use of information technology for data management of web based property rental information system. To maximize the use of information technology in this company, it will require IT audit activities. IT audit conducted in this research will be focused to evaluate the database design on property information rental system at PT Triexpi Properti Advisindo. This IT audit activity aims to evaluate the management of data on rental information systems using Domain Delivery & Support (DS) - DS11, which discusses how to effectively manage data by identifying data needs using Cobit 4.1. Then the maturity model will be used to control the IT processes, using the scoring method. With the audit on this information system, is expected to support all the activities of the company and provide information needed both by employees and Directors in determining decision making. Keywords: Audit TI, COBIT 4.1., Domain Delivery & Support (DS) - DS11.


2013 ◽  
Vol 10 (2) ◽  
pp. 703-724 ◽  
Author(s):  
Taerim Lee ◽  
Hun Kim ◽  
Kyung-Hyune Rhee ◽  
Uk Shin

Recently, as IT Compliance becomes more diverse, companies have to take a great amount of effort to comply with it and prepare countermeasures. Especially, E-Discovery is also one of the most notable compliances for IT and law. In order to minimize the time and cost for E-Discovery, many service systems and solutions using the state-of-the-art technology have been competitively developed. Among them, Cloud Computing is one of the most exclusive skills as a computing infrastructure for E-Discovery Service. Unfortunately, these products actually do not cover all kinds of E-Discovery works and have many drawbacks as well as considerable limitations. This paper, therefore, proposes a new type of E-Discovery Service Structure based on Cloud Computing called EDaaS(E-Discovery as a Service) to make the best usage of its advantages and overcome the limitations of the existing E-Discovery solutions. EDaaS enables E-Discovery participants to smoothly collaborate by removing constraints on working places and minimizing the number of direct contact with target systems. What those who want to use the EDaaS need is only a network device for using the Internet. Moreover, EDaaS can help to reduce the waste of time and human resources because no specific software to install on every target system is needed and the relatively exact time of completion can be obtained from it according to the amount of data for the manpower control. As a result of it, EDaaS can solve the litigant?s cost problem.


2015 ◽  
Vol 2015 (2) ◽  
pp. 116-122
Author(s):  
Михаил Рытов ◽  
Mikhail Rytov ◽  
Павел Ковалев ◽  
Pavel Kovalev

The article considers one way of using the fuzzy cognitive modeling. In this case, this method is used for IT-audit andidentifying all necessary measures that can help the user to verify the need for the introduction of an enterprise portal.


2014 ◽  
pp. 129-148
Author(s):  
Stephen D. Gantz
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document