Module 2: Audit Planning and Business Process Flashcards
A ________ is an interrelated set of __ ____ activities or events that result in the delivery of a specific product or service to a customer.
Business Process; Cross Functionals
What are the responsibilities of business process owner?
- Identify Requirements
- Approval of Process Design
- Should be of high level in the organization in order to be able to assign resources.
- Managing Process Performance
The role of the IS internal audit function should be established in?
The audit charter
Who approves of the audit charter?
BOD and Audit Committee or Senior Management
What is the difference between the audit charter and the engagement letter?
Audit Charter - whole scope of audit activities
Engagement Letter - specific audit exercise
___ ___ ___ ___should be drawn up for the year based on the organization’s direction in terms of technology and related risk that needs to be addressed
a detailed staff training plan
The Audit Charter should include these 4?
- Purpose
- Authority
- Responsibility
- Accountability
What can the board approve?
- Charter
- Risk Based Plan
- IS Budget and Resource Plan
- Appointment and Removal of Chief Audit Executive
- Wage of Chief Audit Executive
Can IS auditors subordinate their judgement on audit matters to other?
No.
the engagement can be completed in accordance with applicable IT audit and assurance standards and, where required, other industry standards or applicable laws and regulations that will result in a
professional opinion or conclusion
Reasonable Expectation
maintain high standards of conduct and character, and they will refrain from engaging in acts that may discredit themselves or the profession
Due Professional Care
a collective term that refers
to the knowledge, skills, and
other competencies required
of internal auditors to effectively carry out their professional responsibilities
Proficiency
What should professionals do to maintain compentence in their line of work
through continuing professional education and training
Considers audit Issues that will be covered during the year
Short Term Audit Planning
Considers risk related issues that will incur change in the IT Environment
Long Term audit planning
List of all processes that may be considered for Audit
Audit Universe
Risks can be rated as?
High
Medium
Low
The evaluation of risk should be ideally based on the inputs of?
The business process owners
Analysis of short-term and long-term issues should occur
At least annually
The review of the analysis results should be done by
Audit Senior Managment/ Audit Committe or BOD
Steps of Perform Audit Planning
- Understand organization
- Understand Audit Objectives and Org Governance Structure
- Understanding changes in the business environment of the auditee
- Review prior work papers
- Identify Contents
- Risk Analysis
- Set Audit Scope and Objectives
- Develop Audit Approach
- Assign personnel
- Adress Engagement Logistics
What are the two considerations regarding laws and regulations on IS audit planning?
- Legal Requirements placed on Audit or IS Audit
- Legal Requirements placed on the auditee (PICAA, GDPR)
What are the differences between single, two, and three tier architecture of e-commerce?
Single Tier - Client Based application running on a single computer
Two Tier- Has a client and a server
Three Tier - Has a presentation layer (GUI), application layer (Functionality), and data layer (Database)
play a key role in most ecommerce
systems, maintaining data for website pages
accumulating customer information and storing clickstream data for analyzing website usage
Databases
Persistent customer data should not be stored in?
Web Servers or servers connected to the internet
E-Commerce Risk: Potential consumers are concerned about providing unknown vendors with personal information for a number of reasons.
Confidentiality
E-Commerce Risk: Data in transit and in storage could be susceptible to unauthorized alteration or deletaion
Integrity
E-Commerce Risk: allows customers to have data 24/7 hence losses can be acquired when it is down
Availability
E-Commerce Risk: requires that the parties prove their identities before executing the transaction
Authentication
E-Commerce Risk: a manner of ensuring that the transacting parties cannot deny that the transaction was completed
Non-repudiation