Vous voulez voir cette page en français ? Cliquez ici.


or
Sign in to turn on 1-Click ordering.
or
Amazon Prime Free Trial required. Sign up when you check out. Learn More
More Buying Choices
Have one to sell? Sell yours here
Tell the Publisher!
I'd like to read this book on Kindle

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Auditing Information Systems [Hardcover]

Jack J. Champlain
4.0 out of 5 stars  See all reviews (1 customer review)
List Price: CDN$ 151.99
Price: CDN$ 121.59 & FREE Shipping. Details
You Save: CDN$ 30.40 (20%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 1 left in stock (more on the way).
Ships from and sold by Amazon.ca. Gift-wrap available.
Want it delivered Thursday, September 25? Choose One-Day Shipping at checkout.
Save Up to 90% on Textbooks
Hit the books in Amazon.ca's Textbook Store and save up to 90% on used textbooks and 35% on new textbooks. Learn more.
Join Amazon Student in Canada


Book Description

Feb. 24 2003 0471281174 978-0471281177 2
Have you been asked to perform an information systems audit and don't know where to start? Examine a company's hardware, software, and data organization and processing methods to ensure quality control and security with this easy, practical guide to auditing computer systems--the tools necessary to implement an effective IS audit. In nontechnical language and following the format of an IS audit program, you'll gain insight into new types of security certifications (e.g., TruSecure, CAP SysTrust, CPA WebTrust) as well as the importance of physical security controls, adequate insurance, and digital surveillance systems.

Order your copy today!


Product Details


Product Description

From the Inside Flap

Increasingly, auditors, information security professionals, managers, and audit committees are being called upon to assess the risks and evaluate the controls over computer information systems in all types of organizations. However, many of these stakeholders are unfamiliar with the techniques they can use to efficiently and effectively determine whether information systems are adequately protected. Auditing Information Systems, Second Edition presents an easy, practical guide to auditing information systems that can be applied to all computing environments.

With the Second Edition of this popular resource, auditors will be able to examine an organization’s hardware, software, data protection, and processing methods to ensure that adequate controls and security are in place. Little in the way of prerequisite technical know-how is required. Author Jack Champlain begins by explaining the basics of any computer system–the central processing unit, operating system, and application system–giving every auditor the tools needed to begin an audit. This is followed by a step-by-step approach for conducting information systems audits, detailing specific procedures that auditors can readily apply to their own organizations. The Second Edition devotes special attention to the issues of most concern to information managers today. It provides over 80 case studies that demonstrate how concepts can be applied in real-world situations. Chapter topics include:

  • Information systems audit approach (physical, logical, environmental security)
  • Security certifications such as SAS 70, TruSecure, CPA SysTrust, and WebTrust
  • Computer forensics
  • E-commerce and Internet security (including encryption and cryptography)
  • Information privacy laws and regulations
  • Information systems project management controls
  • New technologies and future risks

As networks and enterprise resource planning (ERP) systems bring resources together, and as increasing privacy violations and international political volatility threaten more organizations, information systems integrity becomes more important than ever. Auditing Information Systems, Second Edition empowers auditors, information security professionals, managers, and audit committees to effectively gauge the adequacy and effectiveness of information systems controls.

From the Back Cover

The tools, guidelines, and procedures that IS auditors need

Auditing Information Systems, Second Edition, explains clearly how to audit the controls and security over all types of information systems environments. The concepts and techniques in the book enable auditors, information security professionals, managers, and audit committee members of every knowledge and skill level to truly understand whether or not their computing systems are safe. The book provides a detailed examination of contemporary auditing issues such as:

  • Information systems audit approach (physical, logical, environmental security)
  • Security certifications such as SAS 70, TruSecure, SysTrust, and WebTrust
  • Computer forensics
  • E-Commerce and Internet security (including encryption and cryptography)
  • Information privacy laws and regulations
  • Information systems project management controls
  • New technologies and future risks

Auditing Information Systems, Second Edition gives auditing professionals the tools they need to get their job done right. It is a must-have reference for any auditor’s library.


Inside This Book (Learn More)
First Sentence
Before performing an audit of a computing system or assessing the adequacy of an audit that was performed on a computing system, there are a few basics that one must understand about how a computing system functions. Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Sell a Digital Version of This Book in the Kindle Store

If you are a publisher or author and hold the digital rights to a book, you can sell a digital version of it in our Kindle Store. Learn more

Customer Reviews

5 star
0
3 star
0
2 star
0
1 star
0
4.0 out of 5 stars
4.0 out of 5 stars
Most helpful customer reviews
4.0 out of 5 stars Good introduction and overview of IS audit April 4 2004
By Ed
Format:Hardcover
This is a readable and current introduction to information systems auditing from a qualified and experienced IS auditor.
The book consists of three parts. Part One introduces core information systems concepts and is aimed at readers without much background in IS; Part Two introduces IS audit itself, and Part Three discusses some additional concepts and issues, such as control self-assessment and the human factor. Case studies are extensively used throughout the book to illustrate concepts, approaches and procedures discussed in the text.
While the author is writing from a US perspective and has US work experience, references to British, Canadian, and Australian standards, qualifications and practices are included. One of the good characteristics of this book is its readability and easy flow of information, unlike many other works in this field.
I haven't given this book five stars because in my opinion its coverage of "information systems" is somewhat limited compared with the coverage of "auditing". So if you are looking for a detailed technical volume on information systems auditing, look elsewhere; this book gives a well-rounded non-technical introduction to information systems auditing and does it well.
Edgar Danielyan, CISSP
Published author, editor and instructor
[...]
Was this review helpful to you?
Most Helpful Customer Reviews on Amazon.com (beta)
Amazon.com: 3.0 out of 5 stars  3 reviews
10 of 10 people found the following review helpful
4.0 out of 5 stars Good introduction and overview of IS audit April 4 2004
By Ed - Published on Amazon.com
Format:Hardcover
This is a readable and current introduction to information systems auditing from a qualified and experienced IS auditor.

The book consists of three parts. Part One introduces core information systems concepts and is aimed at readers without much background in IS; Part Two introduces IS audit itself, and Part Three discusses some additional concepts and issues, such as control self-assessment and the human factor. Case studies are extensively used throughout the book to illustrate concepts, approaches and procedures discussed in the text.

While the author is writing from a US perspective and has US work experience, references to British, Canadian, and Australian standards, qualifications and practices are included. One of the good characteristics of this book is its readability and easy flow of information, unlike many other works in this field.

I haven't given this book five stars because in my opinion its coverage of "information systems" is somewhat limited compared with the coverage of "auditing". So if you are looking for a detailed technical volume on information systems auditing, look elsewhere; this book gives a well-rounded non-technical introduction to information systems auditing and does it well.
2 of 2 people found the following review helpful
3.0 out of 5 stars Baby steps laid! June 21 2008
By Ho Kheong Tan - Published on Amazon.com
Format:Hardcover|Verified Purchase
An organised and easy to read book.
Champlain has written the book such that it meets the needs of 2 classes of readers; an auditor who has no experience in auditing an information system and someone who is familiar with information systems and is interested to know and understand the auditing process in their areas.
The book is organised into 3 sections: Core Concepts, Standard information system audit approach and Contemporary information systems auditing concept.

In Core Concepts, Champlain introduced the auditor to the basic architecture of information systems and how information systems are generally organised and structured.

In Standard information system audit approach, Champlain lead the auditor through the common areas that an auditor should cover to assess the adequacy of the information systems' controls to prevent unauthorised access and accidental or intentional destruction of programs. Champlain provides explanation on why these areas should be evaluated and helps readers working with information systems understand the rationale for the audit approach. Champlain shared with the readers numerous examples on control weaknesses over physical and logical accesses. However, I found the section on assessing the financial stability of vendor organisation could be further improved.

In Contemporary Information Systems auditing concept, Champlain introduced the reader to the control self-assessment and the 6 internal audit frameworks; COSO, CoCo, Cobit, SAC, eSAC and SASs 55/78/94. The concept and various approaches for Control Self Assessment for IS was introduced. In the chapter on cryptography, Champlain highlighted that encryption, hashing and digital signatures support a secure electronic message and are essential for the electronic commerce transactions.

Champlain provided a brief introduction to computer forensics and other contemporary computer challenges such as computer assisted audit techniques, computer viruses, software piracy and internet security. As part of professional enhancement, Champlain provided the reader with a list of available professional associations that provide and confer professional accreditations. In the final chapter, Champlain shared with the readers a methodology for Information System Project Management.

As an introductory to information system audit, this book earns high marks. However, if you are experienced information system auditors, this book is useful only as a refresher on some of the common information system controls.
1 of 1 people found the following review helpful
2.0 out of 5 stars Audit support June 5 2009
By Viken Derderian - Published on Amazon.com
Format:Hardcover
5 years ago I was asked to help internal auditors with a helpful audit program, so I decided to do some research and purchased this book over the internet.
I am not a professional reviewer, I lack the tactfulness to state my feelings about a book without offending at least the author. Well, here it is in a single statement - do not buy this book! -
It is too expensive for a new auditor and too basic for a seasoned auditor who should know about most of the points made in the book.
First chapter the author felt the urge to explain computers and used the term CPU, a box containing hardware. The original 1946 EDVAC may have been called a CPU. The author continues ..."there are thousands of them" what a joke. and if you keep reading how he explains memory you will start laughing uncontrollably " the more memory you have the more applications you can run" .
There are some good points made and planty of case studies but I ended up using articles I found on the internet for a great audit program based on BS7799.
I would recommend, reading books about ISO 2700x for creating great audits.
Search Customer Reviews
Only search this product's reviews

Look for similar items by category


Feedback