Solved

IT audit vs IT security audit

Posted on 2011-09-26
1
354 Views
Last Modified: 2012-05-12
What do generalist IT auditors typically review as opposed to what IT security auditors review. Can you give some examples?
0
Comment
Question by:pma111
1 Comment
 
LVL 17

Accepted Solution

by:
OriNetworks earned 500 total points
ID: 36599013
IT Auditors generally seek out to find that the it operations are operating in a proper and ethical manner. (e.g. procedures are lined out for compliance and that they are being followed. Verify processes are put in place to actively maintain systems, verify licenses are being tracked.) See http://www.isaca.org/Knowledge-Center/Standards/IT-Audit-and-Assurance/Pages/ObjectivesScopeandAuthorityofITAudit.aspx

IT Security Audits can generally focus on the security aspect and it usually more along the lines of vulnerability to the operations of IT systems. Making sure methods are in place to actively defend infrastructure. (e.g. if software patches are up-to-date or the method in monitoring this practice is relaibale and being followed.)
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Rate limit for DNS queries 7 75
SHA2 certs for IIS AND Java? 2 91
Admin account lockout 10 39
Bandwidth issues? 5 30
This article outlines the process to identify and resolve account lockout in an Active Directory environment.
As a business owner, there are many things that keep you up at night. Profit margins, employee retention, human resource protocols, whether your product or service will remain competitive. When you own or manage a technology company that operates la…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question