Nobody downloaded yet

Planning an IT Infrastructure Audit for Compliance - Term Paper Example

Comments (0) Cite this document
Summary
Introduction: Information technology auditing refers to the process of reviewing and evaluating the systems of processing the automated information technology, the non-automated processes of IT, and IT interfaces. It also evaluates the effectiveness and efficiency of IT…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.7% of users find it useful
Planning an IT Infrastructure Audit for Compliance
Read TextPreview

Extract of sample "Planning an IT Infrastructure Audit for Compliance"

Download file to see previous pages With such an evaluation, the company will be able to streamline the inter-company communication effectiveness and departmental communications (Newsom & Haynes, J. 2014. P66). Planning, the IT audit, entails gathering information to formulate an audit plan and to gain insight of the available internal control structure of the IT.
The Planning and IT infrastructure audit is a valuable practice to local and global organizations. The audit planning process directly affects the quality of the outcome. A proper plan ensures that resources are focused on the right areas and that potential problems are identified early. A successful audit first outlines what’s supposed to be achieved as well as what procedures will be followed and the required resources to carry out the procedures. The information to be collected is regulatory statutes, inherent risk assessment, recent financial information, and past audit results. Besides the auditors will require to avail information such as control procedures, equate total risks, control risk assessment, and control environment to gain an understanding of the present internal control structure. With all this prior audit information, auditors will be in a position to formulate a useful audit plan. The audit plan must details the time and cost required to execute IT infrastructure audit. It also needs to show the different areas and activities to be engaged during IT auditing process.
The scope of planning and IT infrastructure audit: Canada Border Services Agency (CBSA) is a Canadian IT organization that manages and controls the IT infrastructure of two government organizations. It also provides auditing and IT security services to various digital organizations in Canada. CBSA performs frequent IT infrastructure audit to appraise how effective and efficient the organization execute it operations and activities.
Goals and objectives of ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Planning an IT Infrastructure Audit for Compliance Term Paper - 1”, n.d.)
Planning an IT Infrastructure Audit for Compliance Term Paper - 1. Retrieved from https://studentshare.org/information-technology/1649219-planning-an-it-infrastructure-audit-for-compliance
(Planning an IT Infrastructure Audit for Compliance Term Paper - 1)
Planning an IT Infrastructure Audit for Compliance Term Paper - 1. https://studentshare.org/information-technology/1649219-planning-an-it-infrastructure-audit-for-compliance.
“Planning an IT Infrastructure Audit for Compliance Term Paper - 1”, n.d. https://studentshare.org/information-technology/1649219-planning-an-it-infrastructure-audit-for-compliance.
  • Cited: 1 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Planning an IT Infrastructure Audit for Compliance

PIMS planning guide: making a strategic audit

.... (2005). Strategic audit : progress and challenges for the UK. London : Strategy Unit. Dixon, A. (n.d.). Business strategy. New Zealand Institute of Chartered Accountants: Wellington, N.Z. Godiwall, Y. (1990). Corporate strategy and functional management. Praege: New York . Heany, D. (1900). PIMS planning guide : making a strategic audit. Cambridge: Strategic Planning Institute. Helpman, E. (2008). Institutions and Economic Performance. Cambridge: Harvard University Press. Hunger, D., & Wheelen, T. (2007). Essentials of strategic management. Upper Saddle River, N.J. : Pearson Prentice Hall. Johnson, G., & Scholes, K. (1999). Exploring corporate strategy. London :...
10 Pages(2500 words)Term Paper

Audit planning

...?Requirement: Describe the key stages involved in planning the Audit for Audit Planning always required smooth and successful transition schedule and it must be carefully analysed and structured (Nicholls and Gardner, 1999). We will complete this audit in several simple stages; buy using these stages our aim will be to better monitor the audit process and provide recommendations for its improvement. Our key steps will be: 1. Establishing priority areas: Here we will identify the critical business processes that need to be audited, such as; bad debts, issue of pre paid expenses and payments owes by other businesses, and...
5 Pages(1250 words)Essay

Network Infrastructure Planning

...? Network Infrastructure Planning Network Infrastructure Planning Permissions are the core component of server security architecture that can be applied to manage the process of authenticating groups, users and computers to have access to files in a network (Bruce & Smith, 2011). Permission software are the most helpful infrastructure to help the fashion-ware company control the operations of the satellite branches at different times of the 24 hours in a day and still share the same resources at the central server at the head office. In a bid to reduce the cost of setting up new systems for each of the satellite branches, the company can opt to use New...
3 Pages(750 words)Research Paper

Network Infrastructure Planning

...? Terminal Services TERMINAL SERVICES Remote desktop applications previously called terminal services is a component of windows thatallows user to access data and applications on a remote computer over a network while using the remote desktop server (RDP). Terminal services are a way Microsoft implements thin client terminal server computing where windows applications are made accessible to a remote client machine. The client can be any computer running any operating system as long as terminal services are made available to the remote client machine. With these services, only the user interface of some application is presented on the client machine. All input from client machine is purposely redirected to the application server... Terminal...
4 Pages(1000 words)Research Paper

Network Infrastructure Planning

...? Network Infrastructure Planning Lecturer: Introduction Microsoft has developed a powerful public cloud that can be used to achieve some computing objectives in various methods. For example. Windows Azure can be used to create web applications whose data is kept in a windows Azure datacenters. The application runs o site while the data that is worked on is stored in windows Azure. Windows azure can be used to build machines which are virtual where development and test runs SharePoint. Windows azure can assist in solving the storage issues since it offers unlimited space that can be used by very many users. One of the key computer features of windows SharePoint is its unique and powerful way of executing...
5 Pages(1250 words)Research Paper

Ethical Issues and Planning the Audit

...Auditing (Ethical Issues and Planning the Audit) Question Ethical Issues The auditor's professional duty is to disclose his findings fully when that knowledge may have an effect on the potential investor or any user of the financial reports in making his decision to take a risk on the company, or a clear assessment of the company's financial performance. The relevant issue here is the integrity of the due diligence study that will be the in the prospectus of the client on their initial public offering in the Australian Stock Exchange. One of the due diligence assurance objectives is an assessment of the internal control of the company for which the auditor prepares an...
4 Pages(1000 words)Essay

Department of Defense (DOD) Information Technology infrastructure Audit

...INFORMATION TECHNOLOGY INFRASTRUCTURE AUDIT: DOD Security Controls for Information Assurance Preventive Controls CompTech Inc. will provide preventive measures of protecting data and information within the Department of defense (DOD). The preventive controls are intended to ensure that attackers of the computer systems within the DOD are prevented from accessing sensitive information and data. This will involve the application of firewalls that will prevent unauthorized access to data. This is aimed at ensuring availability of data and its use by authorized individuals. Detective Controls The directives of the DOD demonstrate that security systems must be able to report any form of intrusion to the...
3 Pages(750 words)Research Paper

Compliance

.... The company can modify the systems to address SOX compliance issue by allocating more resources to information technology systems used in the management, distribution, and warehousing. The increased allocation will enhance improved accuracy in financial reporting. The company can also adopt modern technologies that will help in implementing standard auditing and accounting procedures and methods. The company should train its IT staff and support specialization to boost efficiency. Additionally, WW should secure its databases, minimize network outages, and reduce IT costs. References Lane, D. (2011). The Chief Information Officers Body of Knowledge: People, Process, and Technology. New Jersey: John Wiley...
1 Pages(250 words)Essay

Planning the Audit

...then collected and analyzed. Through this well-coordinated manager-auditor participation; a well-planned risk-based auditing, strategic prompt and audit sensitivity to the strategic risk of fraud was arrived at. Limitations of the research One of the limitations of this research work was lack of a well-fumigated evidence based practice. The students used to present the final findings may have in one way or the other undertaken accounting fraud to present the professional findings (Bowlin 2011). Students are learners hence the research work out to have presented a given amount of misstates. References Bowlin, K. 2011. Risk-based auditing, strategic prompts,...
2 Pages(500 words)Coursework

Audit Planning

...Audit Planning Audit Planning Planning is usually an essential step for any individual or organization in ensuring efficient working in their operations. Auditors are not exempted from the planning exercise. Auditors have to plan prior to their practise to ensure that they lay audit strategies that would enable them perform the auditing efficiently. Planning helps the auditor to identify and devote the necessary attention to areas of importance, identify and resolve time related problems and more importantly organize and manage the audit engagement in an...
2 Pages(500 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Term Paper on topic Planning an IT Infrastructure Audit for Compliance for FREE!

Contact Us