Documente Academic
Documente Profesional
Documente Cultură
11. Objective of subject Students will understand various information systems controls and
auditing techniques. It covers the management control framework
and application control framework
1
Bidang pengajian meliputi: Pengenalan audit sistem
informasi, Pengendalian audit sistem informasi, Kawalan dan
audit pengurusan sumber data, kawalan dan audit pengurusan
sekuriti, Kawalan dan audit pengurusan operasi, Kawalan
dan audit pengurusan kepastian kualiti, Kawalan dan audit
boundri, Kawalan dan audit input, Kawalan dan audit
komunikasi, Kawalan dan audit pemprosesan, Kawalan dan
audit pangkalan data, Kawalan dan audit output, Perisian
audit.
13. Learning Outcomes By the end of the subject, students should be able to:
• Identify and appraise the need for control and audit of
computer based information systems.
• Describe the basic steps to be undertaken in the conduct of
information systems audit
• Identify major threats to information function and
• Design, implement, operate and maintain controls that reduce
losses from these threats to an acceptable level.
2
2. Conducting an Information Systems Audit ;
Nature of controls, Dealing with complexity, Audit 3
Risks, Types of Audit Procedures, Overview of
Steps in Audit, Audit Around or through the
computer
3
11. Database Controls and Audit;
Access controls, integrity controls, application
software controls, concurrency controls, file 2
handling controls, audit trail controls and exitence
controls.
4
Reference Books 1. Information Technology Controls
(Global Technology Audit Guide 1),
The Institute of Internal Auditors Inc.
(Paperback - Mar 1, 2005)
2. Core Concepts of IT Auditing by
Hunton, James E., Stephanie Bryant,
Wiley, 2004.
3. Auditing EDP Systems (Second
Edition), Donald A. Watne, Petter B.
B. Turny, Prentice.
4. Information Systems Control and
Audit, Ron A. Weber (Oct 29, 1998)
5. Computer Security Management,
Karen, A. Forcht, 1994.
6. Project Management: Principles and
Practices, Spinner, M. P., Prentice-
Hall, 1997
7. Inroads to Software Quality, Jarvis, A.
and Vern, C. Prentice Hall, 1997.
8. Basic Computer Security, Deborah
Russell, O’Reilly and Associates,
1991.