Domain 1- Risk Management Flashcards
Audit Plan
Detailed Risk Assessment
continuous audit approach
Continuous audit allows audit and response to audit issues in a timely manner because audit findings are gathered in near real time.Responsibility for enforcement and monitoring of controls is primarily the responsibility of management.
risk-based audit strategy,
In developing a risk-based audit strategy, it is critical that the risk and vulnerabilities be understood. This will determine the areas to be audited and the extent of coverage.
IS audit charter
ole of the IS audit function.
emerging risk
The implementation of continuous auditing enables a real-time feed of information to management through automated reporting processes so that management may implement corrective actions more quickly.
computer-assisted audit techniques (CAATs)
Using software tools such as computer-assisted audit techniques (CAATs) to analyze transaction data can provide detailed analysis of trends and potential risk, but it is not as effective as continuous auditing, because there may be a time differential between executing the software and analyzing the results.
Risk Analysis Process
- Identify threats
- Potential impacts- including assests and systems
- existing controls
Control self-assessment (CSA)
Control self-assessment (CSA) is predicated on the review of high-risk areas that either need immediate attention or may require a more thorough review at a later date.
Project management
Audits often involve resource management, deliverables, scheduling and deadlines similar to project management good practices.
validity check
A validity check would be the most useful for the verification of passwords because it would verify that the required format has been used
complying with privacy requirements
To ensure that the organization is complying with privacy issues, an IS auditor should address legal and regulatory requirements first. To comply with legal and regulatory requirements, organizations need to adopt the appropriate infrastructure. After understanding the legal and regulatory requirements, an IS auditor should evaluate organizational policies, standards and procedures to determine whether they adequately address the privacy requirements, and then review the adherence to these specific policies, standards and procedures.
source code comparison
When an IS auditor uses a source code comparison to examine source program changes without information from IS personnel, the IS auditor has an objective, independent and relatively complete assurance of program changes because the source code comparison will identify the changes.
Trend/variance detection tools
Trend/variance detection tools look for anomalies in user or system behavior, such as invoices with increasing invoice numbers.
Heuristic scanning tools
Heuristic scanning tools are a type of virus scanning used to indicate possible infected traffic.
lower confidence coefficient
will enable the use of a smaller sample size.