Documente Academic
Documente Profesional
Documente Cultură
AUDIT PROCEDURES
1. Review the organization’s policies for separating incompatible functions and
ensure that they promote reasonable security.
2. Review the users’ permitted log-on times.
3. Verify that all users are required to have passwords.
4. Verify that the current version of antiviral software is installed on the server and
that upgrades regularly downloaded to workstations.
5. Select a sample of security violation cases and evaluate their disposition to
assess the effectiveness of the security group.
REFERENCES
1. Hall, J. A. (2011). Accounting Information Systems (7th ed.). Cengage Learning.
2. Sadasdas
3. sadasd
IT6
AUDIT PROCEDURES
6. Review the organization’s policies for separating incompatible functions and
ensure that they promote reasonable security.
7. Review the users’ permitted log-on times.
8. Verify that all users are required to have passwords.
9. Verify that the current version of antiviral software is installed on the server and
that upgrades regularly downloaded to workstations.
10. Select a sample of security violation cases and evaluate their disposition to
assess the effectiveness of the security group.
REFERENCES
4. SASD
5. ASDAS
6. SDASDASD
IT6
AUDIT PROCEDURES
11. Review the organization’s policies for separating incompatible functions and
ensure that they promote reasonable security.
12. Review the users’ permitted log-on times.
13. Verify that all users are required to have passwords.
14. Verify that the current version of antiviral software is installed on the server and
that upgrades regularly downloaded to workstations.
15. Select a sample of security violation cases and evaluate their disposition to
assess the effectiveness of the security group.
REFERENCES
7. SASD
8. ASDAS
9. SDASDASD
IT6
AUDIT PROCEDURES
16. Review the organization’s policies for separating incompatible functions and
ensure that they promote reasonable security.
17. Review the users’ permitted log-on times.
18. Verify that all users are required to have passwords.
19. Verify that the current version of antiviral software is installed on the server and
that upgrades regularly downloaded to workstations.
20. Select a sample of security violation cases and evaluate their disposition to
assess the effectiveness of the security group.
REFERENCES
10. SASD
11. ASDAS
12. SDASDASD
IT6
AUDIT PROCEDURES
21. Review the organization’s policies for separating incompatible functions and
ensure that they promote reasonable security.
22. Review the users’ permitted log-on times.
23. Verify that all users are required to have passwords.
24. Verify that the current version of antiviral software is installed on the server and
that upgrades regularly downloaded to workstations.
25. Select a sample of security violation cases and evaluate their disposition to
assess the effectiveness of the security group.
REFERENCES
13. SASD
14. ASDAS
15. SDASDASD
IT6
AUDIT PROCEDURES
26. Review the organization’s policies for separating incompatible functions and
ensure that they promote reasonable security.
27. Review the users’ permitted log-on times.
28. Verify that all users are required to have passwords.
29. Verify that the current version of antiviral software is installed on the server and
that upgrades regularly downloaded to workstations.
30. Select a sample of security violation cases and evaluate their disposition to
assess the effectiveness of the security group.
REFERENCES
16. SASD
17. ASDAS
18. SDASDASD
IT6
AUDIT PROCEDURES
31. Review the organization’s policies for separating incompatible functions and
ensure that they promote reasonable security.
32. Review the users’ permitted log-on times.
33. Verify that all users are required to have passwords.
34. Verify that the current version of antiviral software is installed on the server and
that upgrades regularly downloaded to workstations.
35. Select a sample of security violation cases and evaluate their disposition to
assess the effectiveness of the security group.
REFERENCES
19. SASD
20. ASDAS
21. SDASDASD
IT6
AUDIT PROCEDURES
36. Review the organization’s policies for separating incompatible functions and
ensure that they promote reasonable security.
37. Review the users’ permitted log-on times.
38. Verify that all users are required to have passwords.
39. Verify that the current version of antiviral software is installed on the server and
that upgrades regularly downloaded to workstations.
40. Select a sample of security violation cases and evaluate their disposition to
assess the effectiveness of the security group.
REFERENCES
22. SASD
23. ASDAS
24. SDASDASD
IT6
AUDIT PROCEDURES
41. Review the organization’s policies for separating incompatible functions and
ensure that they promote reasonable security.
42. Review the users’ permitted log-on times.
43. Verify that all users are required to have passwords.
44. Verify that the current version of antiviral software is installed on the server and
that upgrades regularly downloaded to workstations.
45. Select a sample of security violation cases and evaluate their disposition to
assess the effectiveness of the security group.
REFERENCES
25. SASD
26. ASDAS
27. SDASDASD