Skip to Main Content
Understanding and Conducting Information Systems Auditing + Website
book

Understanding and Conducting Information Systems Auditing + Website

by Veena Hingarh, Arif Ahmed
March 2013
Beginner content levelBeginner
304 pages
8h 26m
English
Wiley
Content preview from Understanding and Conducting Information Systems Auditing + Website

Chapter Three

Software Security Issues

IN THIS CHAPTER WE will learn about major software security issues that an information systems auditor should be concerned about. At the end of the chapter, we will be in a position to recognize the software security aspects that we need to include in our audit plan.

OVERVIEW OF TYPES OF SOFTWARE

In the course of an audit, the information systems auditor is likely to come across various types of software. In the following section, we have identified the common types of software most likely to be present in an auditee environment and the minimum control features that each of those software types should have.

System Software

System software is a set of instructions that perform the central control function for the computer system. It directs the way the computer responds to a program request and interfaces with other devices. When we switch on our laptop, the machine executes a series of commands before starting to load the operating system. Those commands form a part of the system software. Despite our installing different operating systems on our laptop, the series of commands it executes before commencing loading of the operating software remains the same. It is the system software that directs the laptop to the hard disk, DVD drive, USB drive, or network location to search for the operating software. In cases of complex systems, like large servers, the system software defines the borders of performance of the hardware.

Integrity of system ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management, 2nd Edition

Information Security Management, 2nd Edition

Michael Workman
Auditing IT Infrastructures for Compliance, 3rd Edition

Auditing IT Infrastructures for Compliance, 3rd Edition

Robert Johnson, Marty Weiss, Michael G. Solomon

Publisher Resources

ISBN: 9781118343777Purchase book