IT Auditing and its Standards
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 83 | Weekly Hits: ⮙3

Review Papers | Computer Science & Engineering | India | Volume 9 Issue 10, October 2020

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Information Systems Audit is the process of collecting and evaluating evidence to determine whether a computer system has been designed to maintain data integrity, safeguard assets, allows organizational goals to be achieved effectively and uses the resources efficiently. The IT Auditor should see that not only adequate internal controls exist in the system but they also wok effectively to ensure results and achieve objectives. Internal controls should be commensurate with the risk assessed so as to reduce the impact of identified risks to acceptable levels. IT Auditors need to evaluate the adequacy of internal controls in computer systems to mitigate the risk of loss due to errors, fraud and other acts and disasters or incidents that cause the system to be unavailable

Keywords: IT Auditing, Information System, data integrity, risk assessment, System Availability

Edition: Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

Share this Article

How to Cite this Article?

Dr D S Kushwaha, Ankur Singh, "IT Auditing and its Standards", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SR201019113635, Volume 9 Issue 10, October 2020, 1251 - 1256

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'Information System'

Downloads: 83 | Weekly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Share this Article

Downloads: 100 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1167 - 1170

Secured Location Based Bus Route Locator Application for Android Mobiles

Dayanand G Savakar, Ravi Hosur

Share this Article

Downloads: 103 | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 2062 - 2064

Potential, Pitfalls and Challenges in Development of ICT in Education

Anil Kumar Pandey

Share this Article

Downloads: 104 | Weekly Hits: ⮙4 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1536 - 1540

Enterprise Software Management Systems by Using Security Metrics

Bhanudas S. Panchabhai, A. N. Patil

Share this Article

Downloads: 104 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2241 - 2244

Backup Anomaly Identification with R and Hadoop

Ravindra Phule, Madhav Ingle

Share this Article

Similar Articles with Keyword 'data integrity'

Downloads: 83 | Weekly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Share this Article

Downloads: 100 | Weekly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article

Downloads: 103 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this Article

Downloads: 104 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1989 - 1992

Privacy-Preservation and Public Auditing for Cloud Data - A Survey

S Archana, Ananthi J

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2467 - 2469

Literature Review on: Secure Sharing of Data for Dynamic Groups in Cloud

Shazadi Fatima Rizvi, A. N. Jaiswal

Share this Article

Similar Articles with Keyword 'risk assessment'

Downloads: 83 | Weekly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Share this Article

Downloads: 129 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 991 - 996

Study on the Fundamentals of Machine Learning Approach

Zeinab Samdaliri

Share this Article

Downloads: 137 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 406 - 412

Assessment and Mitigation of Risks Involved in Electronics Payment Systems

Tanvir Tahir, Kamar Abbas

Share this Article

Similar Articles with Keyword 'System Availability'

Downloads: 83 | Weekly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1251 - 1256

IT Auditing and its Standards

Dr D S Kushwaha, Ankur Singh

Share this Article

Downloads: 106 | Weekly Hits: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1320 - 1324

Optimization of Data Storage and Fault Tolerance Strategies in Cloud Computing

Dr. C. Vijay Kumar

Share this Article



Top