Reader small image

You're reading from  CISA – Certified Information Systems Auditor Study Guide - Second Edition

Product typeBook
Published inJun 2023
PublisherPackt
ISBN-139781803248158
Edition2nd Edition
Right arrow
Author (1)
Hemang Doshi
Hemang Doshi
author image
Hemang Doshi

Hemang Doshi has more than 15 years of experience in the field of system audit, IT risk and compliance, internal audit, risk management, information security audit, third-party risk management, and operational risk management. He has authored several books for certification such as CISA, CRISC, CISM, DISA, and enterprise risk management.
Read more about Hemang Doshi

Right arrow

Audit Planning

This Book Comes with Free Online Content

With this book, you get unlimited access to web-based CISA exam prep tools which include practice questions, flashcards, exam tips, and more.

Figure 1.1: CISA Online Practice Resources Dashboard

Figure 1.1: CISA online practice resources dashboard

To unlock the content, you’ll need to create an account using your unique sign-up code provided with this book. Refer to the Instructions for Unlocking the Online Content section in the Preface on how to do that.

Accessing the Online Content

If you’ve already created your account using those instructions, visit packt.link/cisastudyguidewebsite or scan the following QR code to quickly open the website.

Figure 1.2: QR Code to access CISA Online Practice Resources Main Page

Figure 1.2: QR Code to access CISA online practice resources main page

Once there, click the Login link in the top-right corner of the page to access the content using your credentials.

An Information Systems (IS) audit examines the management controls in...

The Contents of an Audit Charter

An internal audit is an independent activity and should ideally be reported to a board-level committee. In most organizations, the internal audit function reports to the audit committee of the board. This helps to protect the independence of the audit function. Audit reporting may be biased in the absence of an independent audit function.

The independence of the audit function is further ensured through a management-approved audit charter.

The following figure shows the features of an audit charter:

Figure 1.3: Features of an audit charter

Figure 1.3: Features of an audit charter

The CISA candidate should note the following features of the audit charter:

  • An audit charter is a formal document defining the internal audit’s objective, authority, and responsibility. The audit charter covers the entire scope of audit activities. An audit charter must be approved by senior management.
  • An audit charter should not be changed too often as it defines...

Audit Planning

CISA aspirants should understand the following important terms before reading about the different aspects of audit planning:

  • Audit universe: An inventory of all the functions/processes/units under the organization.
  • Qualitative risk assessment: In a qualitative risk assessment, risk is assessed using qualitative parameters such as high, medium, and low.
  • Quantitative risk assessment: In a quantitative risk assessment, risk is assessed using numerical parameters and is quantified; for example, for a 50% chance of failure, the amount at risk is 1000 $.
  • Risk factors: Factors that have an impact on risk. The presence of such factors increases the risk, whereas their absence decreases the risk.

All the preceding elements are important prerequisites for the design of a structured audit plan. Next, you will explore the benefits of a structured and well-designed audit plan.

Benefits of Audit Planning

Audit planning is the initial stage of the audit...

Business Process Applications and Controls

Working knowledge of the business environment and business objectives is required to plan a risk-based audit. The IS auditor should have a sufficient understanding of the overall architecture and the technical specifications of the various applications used by the organization and the risks associated with them.

In understanding the issues and current risks facing the business, the IS auditor should focus on areas that are most meaningful to management. To effectively audit business application systems, an IS auditor is required to gain a thorough understanding of the system under the scope of the audit.

The following are some of the widely used applications in business processes. The CISA candidate should be aware of the risks associated with each of them.

E-Commerce

Start with understanding how e-commerce works:

  • Single-tier architecture runs on a single computer, that is, a client-based application.
  • Two-tier architecture...

Types of Controls

An internal control is a process used to safeguard the assets of an organization. Assets can include systems, data, people, hardware, or the reputation of the organization. Internal controls help in achieving the objectives of the organization by mitigating various risks.

Internal controls are implemented through policies, procedures, practices, and organizational structures to address risks. Internal controls provide reasonable assurance to management about the achievement of business objectives. Through internal controls, risk events are prevented or detected and corrected.

Top management is responsible for implementing a culture that supports efficient and effective internal control processes.

Effective controls in an organization can be categorized into preventive, detective, deterrent, and corrective as shown in the following figure:

Figure 1.5: Types of effective controls in an organization

Figure 1.5: Types of effective controls in an organization

You will now explore these control...

Risk-Based Audit Planning

CISA aspirants are expected to understand the following aspects of risk-based audit planning:

  • What is risk?
  • Vulnerabilities and threats
  • Inherent risk and residual risk
  • The advantages of risk-based audit planning
  • Audit risk
  • The steps of the risk-based audit approach
  • The steps of risk assessment
  • The four methodologies for risk treatment

What Is Risk?

You will now explore some of the widely accepted definitions of risk.

Most of the CISA questions are framed around risk. Therefore, CISA candidates should have a thorough understanding of the term risk, which has multiple definitions/formulas. If you look carefully, every definition speaks either directly or indirectly about two terms: probability and impact.

Some of the more commonly used definitions of risk are presented here:

  • COSO ERM defines risk as “potential events that may impact the entity.”
  • The Oxford English Dictionary defines...

Types of Audits and Assessments

CISA candidates are expected to have a basic understanding of the various types of audits that can be performed, internally or externally, and the basic audit procedures associated with each of them. These are as follows:

Summary

In this chapter, you explored various audit processes, standards, guidelines, practices, and techniques that an IS auditor is expected to use during audit assignments. You learned about risk-based audit planning and its advantages. The most important benefit of audit planning is that it helps the auditor focus on high-risk areas. You explored the major risks associated with business applications.

The important topics covered in this chapter were as follows:

  • The audit department’s activities are influenced by the audit charter. The approved audit charter is the basis on which the chief audit officer carries out audit processes. The audit charter should ideally be approved by top management.
  • The identification of high-risk areas within the audit scope is the first step in the audit procedure. Audit planning can be done in accordance with the findings regarding the risk-prone areas.
  • Preventive controls are designed to prevent omissions, errors, or negative...

Chapter Review Questions

Before you move on to Chapter 2, Audit Execution, it is recommended that you solve the practice questions from this chapter first. These chapter review questions have been carefully crafted to reinforce the knowledge you have gained throughout this chapter. By engaging with these questions, you will solidify your understanding of key topics, identify areas that require further study, and build your confidence before moving on to new concepts in the next chapter.

Note

A few of the questions may not be directly related to the topics in the chapter. They aim to test your general understanding of information systems concepts instead.

The following image shows an example of the practice questions interface.

Figure 1.9: CISA practice questions interface

Figure 1.9: CISA practice questions interface

To access the end-of-chapter questions from this chapter, follow these steps:

  1. Open your web browser and go to https://packt.link/dkrqI. You will see the following screen...
lock icon
The rest of the chapter is locked
You have been reading a chapter from
CISA – Certified Information Systems Auditor Study Guide - Second Edition
Published in: Jun 2023Publisher: PacktISBN-13: 9781803248158
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime

Author (1)

author image
Hemang Doshi

Hemang Doshi has more than 15 years of experience in the field of system audit, IT risk and compliance, internal audit, risk management, information security audit, third-party risk management, and operational risk management. He has authored several books for certification such as CISA, CRISC, CISM, DISA, and enterprise risk management.
Read more about Hemang Doshi

Type of Audit

Description

IS audit

An IS audit is conducted to evaluate and determine whether an information system and any related infrastructure are adequately safeguarded and protected to maintain confidentiality, integrity, and availability.

Compliance audit

A compliance audit is conducted to evaluate and determine whether specific regulatory requirements are being complied with.

Financial audit

A financial audit is conducted to evaluate and determine the accuracy of financial reporting.

...