EVOLVING THE IT AUDIT
Abstract
The article deals with contemporary issues with regard to carry out audit monitoring and to create an effective IT audit plan for the organization. Modern technologies are becoming an integral part of any organization’s activities, therefore the main priority for internal audit is to perform IT risk assessment and management control in consulting. Therefore, IT environment programs and computer operations as a part of the IT infrastructure have to be appreciated by auditors.
Monitoring of IT infrastructure will afford auditors to expose infrastructure vulnerability. The basis for assessing infrastructure vulnerability that affects internal organization structure is formed by the monitoring system of IT hardware, software, network and data components. Systems and networks connected to the Internet are exposed to threats that do not exist for self-contained systems and networks. When thorough understanding of the IT environment has been achieved, the executive auditor and the internal audit group can perform the risk assessment and develop the audit plan.
Key words: audit, IT audit, IT infrastructure, risk, audit plan evolving.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Олексій Скіцько, Анастасія Вавіленкова
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).