Vous êtes sur la page 1sur 2

Copyright © 2005 Information Systems Audit and Control Association. All rights reserved. www.isaca.org.

Information Technology Control


and Audit, 2nd Edition
By Frederick Gallegos, Sandra Senft, D.P. Manson and C. Gonzales
Reviewed by Vishnu Kanhere, Ph.D., CISA, CISM, CFE, FCA

T
his book is the effort of four authors with nearly 75 Part III addresses auditing, IT acquisition and implementation.
years of combined experience in information systems The software acquisition process and the associated risks are
audit, control and security. Therefore, this textbook discussed in detail and presented through flow charts. There is
is a compendium of various aspects of IT control and also a presentation on the different phases of the system
audit experience. implementation process. Chapter 11 provides an overview of
The book is an introductory reference to the subject matter risks and controls associated with application systems and
of IT auditing and embraces the process of audit, the legal maintenance.
framework of IT auditing, and security. The book also Chapter 12 provides interesting reading on change
addresses auditing IT acquisition and implementation as well management and the issues governing it.
as the auditing of IT operations in stand-alone and global The focus of part IV is on the IT operations environment
environments. In addressing these issues, the book’s main and encompasses global activities supported by wide area
concern is organizational security and financial integrity. network (WAN) architectures. Risk management is addressed
The book is very useful for beginners as well as in detail in chapter 15.
practitioners who intend to make IS audit their profession. Part V provides insight into the emerging issues in IT audit.
It is spread over six parts and 21 chapters with several It focuses on the legal environment, its impact on information
appendices included in the sixth part of the book. reviews and the important role IT auditors will play in the
Part I addresses the foundation issues for IT audit and control. future.
Chapter 1 introduces readers to the rationale for controls and Chapter 19 covers IT security and privacy issues. An array
audit and explores the interface between IT and audit. of tools and malware are cogently presented. Intranet and
A detailed chapter on the audit process explains audit extranet security issues are also discussed.
standards and regulations set out by a number of governments The last chapter is on IT auditing. The scope of the chapter
and standard-setting bodies, such as the Institute of Internal includes career planning and development, quality audit
Auditors (IIA), Information Systems Audit and Control evaluation, and benchmarking (best practices). A career path
Association (ISACA), and the National Institute of Standards for IT auditors within an audit organization, tracing the path
and Technology (NIST), a division of the US Department from audit trainee to partner level, is visually presented. An IT
of Commerce. auditor model curriculum is also presented.
Special attention is given to financial auditing and Chapter 21 provides insights into IT auditing in the new
Generally Accepted Accounting Principles (GAAP). Part I also millennium. It addresses the important issues of management,
offers flowcharts and exhibits that lay the foundation for training, education and development for auditors. One exhibit
discussion in later sections. provides sample undergraduate course topics and has a futuristic
Part II addresses auditing, IT planning and organization and outlook. It includes topics such as computer forensics,
examines IT governance and controls. The section starts with a encryption, cryptography and biometrics, human factors in
discussion of Control Objectives for Information and related systems design, IS integrity, confidentiality, and availability.
Technology (COBIT) and uses the COBIT framework. The book is well written and presented. Its practical
Part II provides a lucid understanding of IT governance. implementation in the country of origin of the authors
It also emphasizes guarding against overaudit, excessive (USA) should provide resiliency to IT security in the
controls or security beyond the need. As the authors state, emerging cyberworld.
audit, control and security should not exceed the level of risk
or potential loss the organization may face.

INFORMATION SYSTEMS CONTROL JOURNAL, VOLUME 4, 2005


Vishnu Kanhere, Ph.D., CISA, CISM, CFE, FCA
is an instructor at several management institutes, government
academies and corporate training programs. He is a continuing
professional education resource professional and peer reviewer
for the Institute of Chartered Accountants of India. His
specialties include direct and indirect taxes, internal auditing,
accounting, financial management and project planning, fraud
review and information systems security. Kanhere is a member
of the Sectional Committee LTD 38 on Information Security
Management Systems of the Bureau of Indian Standards, and
the ISACA Publications Committee.

Information Systems Control Journal, formerly the IS Audit & Control Journal, is published by the Information Systems Audit and Control Association, Inc.. Membership in the association, a voluntary
organization of persons interested in information systems (IS) auditing, control and security, entitles one to receive an annual subscription to the Information Systems Control Journal.

Opinions expressed in the Information Systems Control Journal represent the views of the authors and advertisers. They may differ from policies and official statements of the Information Systems Audit
and Control Association and/or the IT Governance Institute® and their committees, and from opinions endorsed by authors' employers, or the editors of this Journal. Information Systems Control Journal
does not attest to the originality of authors' content.

© Copyright 2005 by Information Systems Audit and Control Association Inc., formerly the EDP Auditors Association. All rights reserved. ISCATM Information Systems Control AssociationTM

Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the
association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St., Salem, Mass. 01970, to photocopy articles
owned by the Information Systems Audit and Control Association Inc., for a flat fee of US $2.50 per article plus 25¢ per page. Send payment to the CCC stating the ISSN (1526-7407), date, volume,
and first and last page number of each article. Copying for other than personal use or internal reference, or of articles or columns not owned by the association without express permission of the
association or the copyright owner is expressly prohibited.

www.isaca.org

INFORMATION SYSTEMS CONTROL JOURNAL, VOLUME4, 2005

Vous aimerez peut-être aussi