Audit of Computer Systems

An assessment of an information system to provide recommendations and advice to improve system performance and security. It is done by an IS auditor. Objectives of the audit are:

  • To improve the quality of the information system.
  • Prevent failure.
  • Speed up the process.
  • Improve cost performance.
  • Increase efficiency.
  • Reduce risk and enhance system security.
  • Standardization.

Responsibility and Authority of the System Auditor:

  • Should firmly maintain professional ethics.
  • Should be aware of the ethical demands on themselves.
  • Should meet internal and external trust by performing an accurate and sincere system audit.
  • Must maintain confidentiality of the information provided to them.
  • May demand data and material from the division being audited.
  • May also demand a report on the implementation of improvements to an audit division as suggested by them.

Factors Audited by IS Auditor:

  • Audit of response time: Actual response time compared with the desired response time.
  • Audit of broken links: Findings of broken or unavailable links on the website.
  • Database Audit: Checking the database integrity and availability.
  • Network Audit: Checking the vulnerability and configuration of the network.
  • Transaction Audit: Process to find who made changes, what changes were made, and whether the changes were authorized.
  • Audit of Computer Security: Reviewing physical and logical security measures.
  • Audit of Application: Assessment of manual and programmed internal controls of the information system.

Some Important Terms

  • Visual Audit Pro – A software that audits activities like logging on/off, and collects information about software and hardware.
  • E-Z Audit -A software that gives information on RAM capacity, network card name, network connect speed, MAC address and TCP/IP information.
  • IDEA(Interactive Data Extraction and Analysis) – Used to import information from the database to be audited for further analysis by the auditor.
  • Audit Trail – A log of changes made in data, settings and related changes.

Risk Assessment – Evaluating threats and vulnerabilities of IS. two methods are there for analysing the risks:

  • Quantitative Risk Analysis – Gives an idea about the amount of risks involved with an event.
  • Qualitative Risk Analysis – Gives the degree of risk associated with the institution’s system, networks and information assets.

Disaster Recovery Plan

  • Disaster – Earthquakes, floods, fires and terrorist attacks can severely damage an organisation’s computing infrastructure.
  • Disaster Recovery Plan – A document containing procedures for emergency response, extended backup operations and recovery.

Techniques applied for contingency situations are:

  • In-house backup – The process of storing data backups within the organization
  • Alternate Storage Area – Store one copy of all AIS files and databases at an alternative site.
  • The Disaster Recovery Toolkit – A highly valuable collection of items and documents for ensuring business continuity in disaster.

Contigency Events

Necessary Recovery Action

Loss of Data

Identify the appropriate recovery plan, The location of required recovery files.

Loss of Software

Identify the type of software and location where backup copies are maintained.

Loss of Communication

Identify alternate communication facility, Estimate recovery time.

Loss of hardware

Identify any alternate substitute for the equipment. Estimate replacement cost of hardware.

Loss of Personnel

Identify substitutes for each personnel, if alternates are not available then obtain them from an outside source.

Loss of Facility

Identify all necessary hardware, software, data, and personnel required for normal functioning at the alternative location

Contingency Planning Steps:

  • Develop the plan.
  • Test the plan.
  • Maintain the plan.

System Analysis and Design Interview Topics for Freshers

System Analysis is the “what” before the “how” in system design. It provides the essential roadmap for crafting a system that is both effective and efficient in solving the intended problem. “Imagine you’re building a dream house. You wouldn’t start hammering nails without a detailed blueprint, right?”The same goes for software development.”

System analysis is the blueprint, while system design translates it into the actual system.

Important Topics for System Analysis and Design Guide

  • Information System(IS)
  • Characteristics(Properties) of a System Analysis
  • Classification of System Analysis
  • Distributed Systems
  • System Analysis and Design
  • System Analyst
  • System Development Life Cycle(SDLC)
  • Documentation of Systems
  • System Requirements Specification(SRS)
  • Fact Finding Techniques or Information Gathering Techniques
  • Modular and Structured Design
  • Form Design
  • Report Design
  • Process Modeling or Data Flow Diagram (DFD)
  • CASE Tools – Computer-Aided Software Engineering Tools
  • Implementation of Systems
  • Maintenance of Systems
  • Audit of Computer Systems
  • Viruses
  • Concurrent Audit
  • Different Kinds of Information Systems

Similar Reads

1. Information System(IS)

Information systems are integral to system design, shaping the architecture, data management, user interaction, and development process....

2. Characteristics(Properties) of a System Analysis

Properties of a system analysis are:...

3. Classification of System Analysis

Classification of system analysis is as follows:...

4. Distributed Systems

Distributed Systems: Data, Process and Interface components are distributed to multiple locations in computer networks....

5. System Analysis and Design

System Analysis – This involves studying the requirements of either the existing system or a new system in order to design an effective system. System Design – Involves the process of creating a well-structured system with careful consideration of objectives and requirements....

6. System Analyst

A System Analyst is an individual responsible for analyzing requirements and designing information systems....

7. System Development Life Cycle(SDLC)

SDLC, or Software Development Life Cycle, is a common set of steps for system development used by many organizations....

8. Documentation of Systems

Documentation – It is the process of communicating about the system....

9. System Requirements Specification(SRS)

it is a set of complete and precisely stated properties along with the constraints of the system that the software must satisfy....

10. Fact Finding Techniques or Information Gathering Techniques

Techniques used for collecting data related to the existing system to learn the function of the existing system. Various fact-finding techniques are:...

11. Modular and Structured Design

Design – it bridges the gap between specifications and coding. Some of the properties of design are Verifiability, Traceability, Completeness, Consistency, Efficiency, and Simplicity....

12. Form Design

Forms are used for collecting data from users. Form design refers to the process of creating intuitive and user-friendly forms....

13. Report Design

Reports are used for presenting and summarizing data in a structured format. Report design refers to the process of creating clear, organized, and user-friendly layouts for displaying information....

14. Process Modeling or Data Flow Diagram (DFD)

Graphical representation of the function and process, which capture, manipulate, store and distribute data between components within a system....

15. CASE Tools – Computer-Aided Software Engineering Tools

All software that supports managerial, technical, or administrative aspects of any part of the software development process is termed as CASE tools....

16. Implementation of Systems

It involves coding, testing, creating necessary hardware, and providing training to end-users....

17. Maintenance of Systems

Monitoring, evaluating, and modifying the information system to make necessary desirable changes. Maintenance activity has four key stages:...

18. Audit of Computer Systems

An assessment of an information system to provide recommendations and advice to improve system performance and security. It is done by an IS auditor. Objectives of the audit are:...

19. Viruses

One of the biggest security threats to computer systems can cause irreparable damage to certain systems. Anti-virus measures for protecting against viruses include:...

20. Concurrent Audit

Data is audited while the transaction is in progress. It helps in finding missing audit trails and is also used in monitoring largely integrated and automated systems....

21. Different Kinds of Information Systems

Management Information System (MIS)...