International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 84

Review Papers | Computer Science & Engineering | India | Volume 9 Issue 10, October 2020

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Information Systems Audit is the process of collecting and evaluating evidence to determine whether a computer system has been designed to maintain data integrity, safeguard assets, allows organizational goals to be achieved effectively and uses the resources efficiently. The IT Auditor should see that not only adequate internal controls exist in the system but they also wok effectively to ensure results and achieve objectives. Internal controls should be commensurate with the risk assessed so as to reduce the impact of identified risks to acceptable levels. IT Auditors need to evaluate the adequacy of internal controls in computer systems to mitigate the risk of loss due to errors, fraud and other acts and disasters or incidents that cause the system to be unavailable

Keywords: IT Auditing, Information System, data integrity, risk assessment, System Availability

Edition: Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

Share this Article

How to Cite this Article?

Dr D S Kushwaha, Ankur Singh, "IT Auditing and its Standards", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SR201019113635, Volume 9 Issue 10, October 2020, 1251 - 1256

Enter Your Email Address


Similar Articles with Keyword 'Information System'

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1167 - 1170

Secured Location Based Bus Route Locator Application for Android Mobiles

Dayanand G Savakar, Ravi Hosur

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 2062 - 2064

Potential, Pitfalls and Challenges in Development of ICT in Education

Anil Kumar Pandey

Share this Article

Similar Articles with Keyword 'data integrity'

Downloads: 100

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this Article

Similar Articles with Keyword 'risk assessment'

Downloads: 129

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 991 - 996

Study on the Fundamentals of Machine Learning Approach

Zeinab Samdaliri

Share this Article

Downloads: 137

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 406 - 412

Assessment and Mitigation of Risks Involved in Electronics Payment Systems

Tanvir Tahir, Kamar Abbas

Share this Article

Similar Articles with Keyword 'IT'

Downloads: 174 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 134 | Weekly Hits: ⮙2 | Monthly Hits: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Similar Articles with Keyword 'Auditing'

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Downloads: 100

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article

Similar Articles with Keyword 'Information'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Similar Articles with Keyword 'System'

Downloads: 174 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Similar Articles with Keyword 'data'

Downloads: 510 | Weekly Hits: ⮙3 | Monthly Hits: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Downloads: 86 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Similar Articles with Keyword 'integrity'

Downloads: 73

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Similar Articles with Keyword 'risk'

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Downloads: 5

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 613 - 616

Categorize & Compare Cloud Automation & Devops Tools

Pardeep Singh Virdi

Share this Article

Similar Articles with Keyword 'assessment'

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2676 - 2680

Effective and Efficient XML Duplicate Detection Using Levenshtein Distance Algorithm

Shital Gaikwad, Nagaraju Bogiri

Share this Article

Downloads: 106

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2451 - 2458

Regenerating Code Based on Public Auditing Scheme with Security Preserving for Cloud Storage

Dr. K. Sundeep Kumar, Anupama P. V

Share this Article
Top