Solved

IT audit vs IT security audit

Posted on 2011-09-26
1
365 Views
Last Modified: 2012-05-12
What do generalist IT auditors typically review as opposed to what IT security auditors review. Can you give some examples?
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 17

Accepted Solution

by:
OriNetworks earned 500 total points
ID: 36599013
IT Auditors generally seek out to find that the it operations are operating in a proper and ethical manner. (e.g. procedures are lined out for compliance and that they are being followed. Verify processes are put in place to actively maintain systems, verify licenses are being tracked.) See http://www.isaca.org/Knowledge-Center/Standards/IT-Audit-and-Assurance/Pages/ObjectivesScopeandAuthorityofITAudit.aspx

IT Security Audits can generally focus on the security aspect and it usually more along the lines of vulnerability to the operations of IT systems. Making sure methods are in place to actively defend infrastructure. (e.g. if software patches are up-to-date or the method in monitoring this practice is relaibale and being followed.)
0

Featured Post

Don't Cry: How Liquid Web is Ensuring Security

WannaCry is just the start. Read how Liquid Web is protecting itself and its customers against new threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
Make the most of your online learning experience.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question