DOI:
https://doi.org/10.38017/2390058X.78Keywords:
systems audit, risk analysis, computer vulnerability, computer threats, internal control computer.Abstract
The problem has become evident is the application of a methodology for auditing processes in organizations, each of the standards and the authors describe generally how to apply auditing processes, each with its own standard. Therefore the research aims to propose a simple and clear methodology for implementing the IT audit process and systems. The methodology shows each of the phases or stages and activities to be carried out, based on the methodologies raised by several authors who raise three stages and provide general aspects of audit concepts and methodology and computer audit systems in practice, but it remains unclear activities and how to perform each. Therefore it has proposed a new audit methodology applied to computing and systems in small companies in order to establish the stages and activities to be developed in the audit process and can be applied in different scenarios and adjusted to the regulations. This methodology has already been tested by undergraduate and graduate students in the city of Pasto and has archieved good results concluding that it is a viable so it can be applied to have the basic knowledge of auditing and the standard to be applied option.
Downloads
References
J. A. Echenique, Auditoría en Informática. México D.C., Editorial Mc Graw Híll, 2001, p. 158.
M. G. Piattini, Auditoría informática. Un enfoque práctico, México, Alfamega-RA-MMA, 2001, p. 660.
A. Tamayo Alzate, Sistemas de Información. Editorial Universidad Nacional, 1998. [En línea]. Disponible en: https://repositorio.unal.edu.co/bitstream/handle/unal/60213/9589322409.pdf?sequence=1
J. D. Pinilla Forero, Auditoría Informática. Un enfoque operacional. Editorial Ecoe 1992, p. 252.
C. Muñoz Razo, Auditoría en sistemas computacionales. México D.C., Editorial Pearson, 2002, p. 818. [En línea]. Disponible en: https://cdryst.files.wordpress.com/2009/10/aussist.pdf
Objetivos de Control para Tecnologías de la Información y Relacionadas COBIT 4.1, Asociación para la Auditoría y Control de Sistemas de Información ISACA, 3701 Algonquin Road, Suite 1010 Rolling Meadows, IL 60008 EE.UU, 2007, p. 209. [En línea]. Disponible en: https://biblioteca.info.unlp.edu.ar/uploads/docs/cobit.pdf
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2017 Ciencia, Innovación y Tecnología
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.