O'Reilly logo

IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition by Kevin Wheeler, Mike Schiller, Chris Davis

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 13Auditing Applications

Each application is unique, whether it supports financial or operational functions, and therefore each has its own unique set of control requirements. It is impossible to document specific control requirements that will be applicable to every application. However, in this chapter, we will describe some general control guidelines that should be pertinent to any application regardless of its function, programming language, and technology platform. The following topics are discussed in this chapter:

• Essential components of application audits

• How to drill down into possible issues with frameworks and key concepts

• Detailed steps for auditing applications, including the following:

• Input controls

• Interface controls ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required