Index

Abuse

Acceptance testing

Accident

Accountability

Accounting

association

controls

data

entries

principles

unacceptable

Access

controls

control lists

control logs

control software

database

inadequate

logical

physical

role-based

unauthorized

Accuracy

auditing

and completeness

Administration

centralized

data

database

release and versions

security

systems

ACF2

Air conditioning

Analytical

evidence

review

steps

ANSI

Application

audits

audit tools

controls

failures

integrity

portfolio

programs

reviews

software

software security

systems

Approval

Audit program

board

certification

design

digital certificate

project

purchase

run schedules

supervisory

technical review

Assets

access to

at risk

control over

examination of

insurance

inventory of

liquidity of

loss of

register

safeguarding

security of

under control

Audit

charter

committee

compliance

evidence

management

operational

planning

procedures

program

report

scope

software

standards

steps

techniques

testing

tools

trail

Authorization

access

change

checks

levels

payments

requests

transactions

user

Backup

adequate

appropriate

copies

forensic

media

production of

skills

taking

theft of

Batch processing

Binary

Bits

Budget

Business

interruption

objectives

process reengineering

risk

unclear objectives

Cadbury

Capacity planning

Carbon dioxide

Card

credit

identity

laser

locks

punched

smart

Catastrophe

Certification authority

Chain of custody

Change control

Chart

bar

organization

PERT

Gantt

Check

authorization

background

format

lists

points ...

Get Auditor's Guide to IT Auditing, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.