SlideShare a Scribd company logo
1 of 14
Download to read offline
AUDIT
AUDIT
TECHNOLOGY
TECHNOLOGY
1
AuditFindingsReport:
Gap analysis
IT Infrastructure Analysis and recommendations
Business Flow Chart – Outline
Data backup Analysis and recommendations
Key User's knowledge and utilization of various software
Softw are License Status and recommendations
Core Software utilization
TIER 1: HIGHLEVEL
~
~
~
TIER 2: LOWLEVELDEEPDIVEAUDIT
~
~
TIER 3:THECAPSTONE
~
~
~
~
~
~
~
TechnologyAudit
Technology Audit (TA) is an eye-opening innovation from Inspace. TA enables organization leaders
understand the present IT utilization levels in their organization or business. In terms of importance,
TA occupies equal status with Accounting Audits conducted in organizations. TA focuses on three
important areas Viz. Business functionality, Ease of Use and Security. It also addresses the three
sensitive areas of information/data availability, confidentiality and integrity. The Audit process follows
a structured 3 tier methodology.
Understanding Vision, Mission and the Business goals of the customer
A high level mapping of the current IT deployment in relation to thebusiness objectives
Observation and plotting of Possible Gaps between the Business objectives and IT deploy-
ment
Detailed study of deployed hardware, software, connectivity, power, security, MIS, and usability
by end users.
Identifying process coverage, data integrity, productivity improvements, reporting frequency
andadequacy, training adequacy, and system availability.
TechnologyAudit
2
Productivity benefits
Security benefits
Cost-saving benefits
Relationship benefits
~
~
~
~
~
~
~
TA SPECTRUM COVERS:
~
~
~
~
~
~
~
~
~
~
~
~
IT security / Vulner ability Analysis
Recommendations pertaining to technology upgrade / downgrade
Training requirements and plan of action
Power Infrastructure Audit
Networking Infrastructure Audit
Server & Backup Infrastructure Audit
Desktop & Laptop Infrastructure Audit
Generation of Asset (Hardware & Software) Document & Physical Outlay
Software Licensing Audit
General Data Security Audit
Infrastructure Maintenance Audit
Core Applications Audit
Internet/Intranet Connectivity Audit
Communication Audit (Data/Voice/Video)
Key Users' Technology Utilization Audit
Technology Audit recommendations sets the direction for organizations to optimize Return of
Investment (ROI) on IT. The success of TA is that it does not recommend investing more on IT;
rather it helps in getting more out of existing IT investments. Technology Audit recommendations
hinge on the following benefits:
Technology Audit 3
POWERAUDIT
The Power Audit is aimed at ensuring the power related equipment and infrastructure pertaining
to IT systems complies with standards, and whether its throughput is in line with the organization's
requirement for power for optimal efficiency and productivity of the IT systems. Since the power
can come from several sources, the scope of the Audit may include Raw Power, UPS
(Online/Offline), UPS/Inverter Batteries, Generators, Inverters, Transformers, Cabling and outlets.
Other power equipment if any may be included based on their need on a case-to-case basis.
The Power Audit follows a structured approach where critical parameters and readings for effect-
ing optimal and sustained throughput across equipments are noted and taken as basic inputs.
Wherever necessary, inputs from people involved in managing power infrastructure are also taken
to ensure that the data gathered is correct and current. Besides, a general inspection of the equip-
ments in terms of the age, environment of the equipments and current process of maintenance is
done.
Based on the data gathered and observed scenarios, the Audit team prepares the Audit report. The
Audit Report is a detailed presentation of the AS-IS scenarios which are represented as facts.
Observed issues and challenges in the existing power set up and the hazards that can impact the IT
system's effective functioning and the resulting effect on business performance is also captured.
The culmination of the Audit is the recommendations for corrective action and course of action
which is based on firm specific require
TechnologyAudit
4
NETWORK INFRASTRUCTUREAUDIT
The Network Audit is a comprehensive audit where all the equipments and devices on the network
come under the purview. The components under the audit, both active and passive, may include
Data Switches, Routers, Hubs, Access Points, Repeaters, Voice Branch Exchanges, Data/Voice
Cabling and I/O outlets. Networking equipment out of conventional audit scope may be included
on a case-to-case basis based on the need of the business and technology environment.
The Audit follows a predefined process where critical performance parameters and metrics for
effecting optimal and sustained performance across devices and equipments are noted and taken
as basic inputs. Wherever necessary, inputs from people involved in managing Network infrastruc-
ture are also taken toensure that the data gathered is correct and current. Besides, a general
inspection of the devices and equip-
ments in terms of the age, environ-
ment of the devices and
equipments, and current process of
maintenance is done.
Based on the data and information
gathered, the Audit team maps the
business process with the existing
network infrastructure to assess fit
and compatibility of the infrastruc-
ture to meet business objectives.
The audit findings are presented in
an Audit Repor t whi ch i s a detai l ed
presentation of the AS-IS scenarios,
observed issues and challenges in
the existing Network. Deficits and
hazards that can impact effective
up-time of networks and systems are clearly identified. The Audit recommendations focuses on
taking corrective action and course of action based on the firm specific requirements and indus-
try's best practises and standards. The Audit recommendation is tightly hinged on improving
network throughput and managing and maintaining high up-time.
5
SERVER & BACKUPINFRASTRUCTUREAUDIT
TechnologyAudit
The Server and Backup Audit aims at ensuring IT system exigency plans are in place to handle
unexpected failures of IT systems. The other objective of the Audit is also to ascertain whether data
retrieval capability and process is in place. The Audit covers the critical IT system units such as
Servers, Racks, Backup devices, Data storage equipment and I/O Cables. Firm specific equipment
other the ones mentioned may be included based on business need and the situation on a
case-to-case basis. Contingency plans such as Disaster Recovery (DR) and / or Business Continuity
(BCP) also come under the purview of the Audit from an Infrastructure backup and readiness
perspective.
The Audit follows a structured process where critical nodes in the system environment for effecting
optimal and sustained performance across devices and equipments are noted and taken as basic
inputs. Wherever necessary,
inputs from people involved in
managing Server and Backup
Infrastructure are also taken to
ensure that the data gathered is
correct and current. Besides, a
general inspection of the devices
and equipments in terms of the
age, environment of the devices
and equipments, and current
process of maintenance is done.
Based on the data and informa-
tion gathered, the Audit team
does a State Analysis of the
infrastructure and maps it to the
business objectives and goals.
The Audit findings are presented
in an Audit Report which is a detailed presentation of the State Analysis, observed issues and
challenges in the existing Server and Backup Infrastructure. Deficits and failure points that can
impact effective up-time of Servers and Back up Infrastructure are also clearly identified. The Audit
recommendations focuses on taking corrective action and course of action based on industry wide
best practises and standards. The Audit helps System Managers and Administrators to effectively
identify and manage failure points and ensure maximised up-time of critical back up devices and
equipment.
The purpose of the Desktop and Laptop Audit is to uncover possible leaks in the desktop and
laptop efficiencies in terms of processing time and usability which can impact overall IT System's
output and people productivity. Organizations where standalone PCs and Laptops are used
without servers benefit from this Audit. Similarly, organizations where the number of end users
working on PCs and laptops are high will certainly need to be audited to ensure effective function-
ing. Other end user equipments, if any, may be included based on their need on a case-to-case
basis.
The Audit follows a well defined process where each PC and laptop in the organization is fully
checked for optimal and sustained performance. Functional parameters of the PCs and laptops are
taken as inputs from people involved in using them. A general inspection of the PCs and laptops in
terms of the age, environment of the devices and equipments, and current process of maintenance
is done.
The data and information gathered
forms the basis of the Audit recom-
mendations. The Audit team does
an AS-IS Analysis of the PC and
laptop environment and maps it to
the productivity and efficiency
objectives and goals of the organi-
zation. The Audit findings are
presented in an Audit Report which
is a detailed presentation of the
AS-IS Analysis, observed issues and
challenges in the existing PC and
laptop setup. Functional deficits
and failure points that can impact
effective up-time of PCs and
laptops are also clearly identified
and noted. The Audit recommen-
dations focuses on taking corrective action and course of action based on industry wide best
practises and standards. This Audit helps System Managers and Administrators to effectively
identify and manage failure points and ensure maximised up-time of PCs and laptops.
TechnologyAudit
6
DESKTOP & LAPTOP INFRASTRUCTURE AUDIT
7
ITASSETASSESSMENTAUDIT
TechnologyAudit
This Audit enables organizations to keep check on the IT Assets that are currently deployed in their
organization. The audit starts with a detailed and exhaustive compilation of all IT and IT related assets
cur rently deployed. The compilation contains equipment details, their physical location, quantity,
associated user, with additional information.
That may be available with the asset
management team. Other pertinent
information about the IT Assets may be
called for by the Audit team and may be
included in the audit on a case-to-case
basis.
To help identify the actual asset placement
in the company, an outlay map diagram is
additionally generated for each location in
the organization. In some cases, a multi-city
outlay may be done depending on the geo
operations of the organization. The IT Asset
outlay depicts the various sections, cabins,
departments, building associated with the
location. Textual legends assist the reader
in gaining accurate information about the
placements. Wherever necessary, inputs
from people involved in managing the
assets are obtained to ensure and validate
that the data and information obtained is
current and correct.
In addition to the IT equipment that is deployed, a software list is generated which captures all the
software packages presently installed in the audited computer systems in the organization. The
detailed list provides information pertaining to the software products and its versions being
currently used. Wherever necessary the asset management team is involved for getting up-to-date
and correct information.
8
SOFTWAREAUDIT
TechnologyAudit
License Audit
The primary focus of this audit is to ensure that the audited organization complies with standards,
policies and legal framework with respect to installing and using software. All software that is
currently being used and installed in the computer systems come under the purview of the Audit.
The software may include Operating Systems, Office Productivity Software, Accounting Software,
ERP Applications and Customized software. Other software may be included in the audit on a
case-to-case basis. Additionally, the audit attempts to highlight the security vulnerabilities due to
usage of unlicensed software, if any. Wherever necessary, people managing the software assets are
involved for getting upto-date and correct data and information.
The data and information gathered forms the basis of the Audit recommendations. The Audit team
analysis the software licenses used and maps it to the legal and security vulnerabilities of the IT
systems. Besides, its impact on business
and governance of the organization is
also analysed. The Audit findings are
presented in an Audit Report where the
observed issues and challenges in the
existing software licenses are detailed.
Security deficits and failure points that
can creep into the system environment
and which can impact smooth opera-
tion of IT systems is also detailed
wherever applicable. The Audit recom-
mendations focuses on taking correc-
tive action and course of action based
on industry wide best practises and
standards. This Audit helps S y s t em
Managers and Administrators, to
effectively manage IT by adhering to
legally approved and secure use of licensed software. Core Applications Audit The objective of this
Audit is to ensure that the key users of IT systems have understood and are proficient with the
applications they are using as part of their daily operations. The audit process begins by listing the
software applications to be audited. To facilitate a structured approach to the audit, the core applica-
tions list is grouped into four types as below:
9
~
~
~
~
Technology Audit 9
~
Audit
Office Productivity Applications – MS Office, Open Office which are used for
general office purposes.
Accounting Applications – Tally etc. which are used for office accounting
purposes.
ERP and Specialized Applications – AutoCAD, CorelDRAW, ERP, customized
software which is used for specialized purposes.
Organization Website – Link check, Enquiry Sheet, Domain Name Renewal and
SEO optimization check.
The first part of the Core Application
Audit is done on the Office Productivity Application
with the Client's key users as Auditees. The
software version details and features are collected
and the users' knowledge level of the application
features and their proficiency is audited. Similarly,
the Accounting Applications, Specialized Applica-
tions and the organization's website is audited.
Where the web site is of importance to the organi-
zation, the website's links, contacts and enquiry
sheet page, domain name, renewal status, etc., are
noted. Besides, a web search on sites such as
Google is carried out to find out the present SEO
optimization levels of the web site. This is done
using relevant keywords.
The data and information gathered forms the basis
of the Audit Report and recommendations. The
Core Applications Audit focuses on taking corrective action and course of action based on industry
wide best practises and standards. This Audit helps Key end users of core applications keep a check
on their knowledge proficiency levels in using application software and also to effectively improve
their productivity and efficiency.
TechnologyAudit
10
GENERAL DATA SECURITYAUDIT
Data Access Control
User Authentication System
DataFolder Structure/Permission
Storage Media Control
Data Leak Protection
Internet / Intranet /Email Security
Firewall Setup
Anti-SPAM Setup /Anti-Virus /Anti-Spyware Setup
Data Protection
Software Patch Management
Vulner ability Assessment
Gener al Assessment (fireprotection,
~
~
~
~
~
~
~
~
~
~
~
~
This is a comprehensive audit that focuses on the security and safety of IT infrastructure deployed
and data associated with it. The audit encompasses both Physical as well as Virtual Data security.
Information with regard to Physical Access & Security, Virtual Data Access control comprising of
the following is recorded:
Any other security related details not mentioned above may be gathered for inclusion in the audit
based on need and on a case-to-case basis. The data and information gathered forms the basis of
the Audit recommendations. The Audit team does
an AS-IS Analysis of the Security environment and
maps it to the organizations business process,
objectives and goals of the organization. The Audit
findings are presented in an Audit Report which is a
detailed presentation of the AS-IS Analysis,
observed issues and challenges in the existing set
up. Deficits and gaps in the security features, and
vulnerability and failure points that can negatively
impact data and IT security are also clearly identified
and noted. The Audit recommendations focuses on
taking corrective action and course of action based on industry wide best practises and standards.
This Audit helps System Managers and Administrators to effectively identify and manage data
leakage and unethical data access vulnerabilities and also ensure maximised security of IT systems.
The Infrastructure maintenance audit is aimed at ensuring that the IT systems are covered appro-
priately in terms of warranties, guarantees, on-call support and AMCs by the respective product
vendors. Further, the audit also checks the Total Cost of Ownership (TCO) of IT Infrastructure in
relation to sustained maintenance. Data and information pertaining to all the hardware and
software deployed is gathered. Wherever necessary, people
involved in managing IT Infrastructure are met to obtain
current and correct data and information. A physical verifica-
tion based on the collected details is carried out on a random
basis to ensure data correctness.
Once the essential information is available, a detailed report on
the observations is made. Based on the existing industry stand-
ards and best practices, a recommendation report is drafted
towards the observations made. The recommendations would
cite the corrective actions and course of action that need to be put in place in order to counter-
balance the existing problems and potential issues identified.
With internet and intranet usage in organizations increasing by the day, it is increasingly impera-
tive to manage these technologies with a view to getting
maximised benefits in terms cost and quality. In this audit,
details pertaining to all connectivity solutions deployed in the
organization come under the purview. The connectivity
solutions may Internet / Intranet connectivity, Virtual Private
Network (VPN), Radio Frequency (RF) and Metro Area Network
(MAN). Other connectivity solutions may be included based on
their need on a case-to-case basis. All necessary and critical
parameters are noted with utmost care. Wherever necessary, the
concerned people who manage these technologies and
solutions are involved for getting up-to-date and correct
information. The Audit Report is a compilation of the collected
data and information. The Report would identify and highlight the existing deficits and anomalies
in deployed solution, if any. Cost and quality implications and impact on business is detailed as
part of the Report. Recommendations are made for corrective action and course of action based
on industry standards and best practices with the objective of improving efficiency and productiv-
ity of the solutions and technologies deployed.
11
INFRASTRUCTUREMAINTENANCEAUDIT
INTERNET/INTRANETCONNECTIVITYAUDIT
TechnologyAudit
T
12
COMMUNICATIONS AUDIT
TECHNOLOGY UTILIZATION AUDIT– QUALITATIVE
echnology Audit
The Communications Audit is aimed at ensuring that the commu-
nication technologies such as Data, Voice and Video deployed
within the organization are cost effective and that it delivers
optimal value for money. During this audit, the billing details of all
IT related communication solutions are taken as inputs. The
communications solutions may include Telephone Landlines,
Mobiles, Internet connections and Videoconferencing. Other
communication solutions may be included in the Audit based on
business need and on a caseto- case basis. The previous expenses
incurred in the past one quarter on communication technologies are audited. Bills and Invoices
pertaining to the same are scrutinized. Wherever necessary the people handling these technologies
and the decision makers for adoption of these communication solutions are also involved for
getting up-to-date and correct information.
The Audit Report is a detailed presentation of the AS-IS situation and the observations. Cost and
utilization anomalies, wherever present, is also highlighted as part of the report. Based on the audit
findings, the audit team presents the recommendations based on a 'best solutions paradigm' with
a clear objective to improve on cost and quality of communications solutions deployed. The recom-
mendations may also include upgrade, downgrade or change of solutions to effect long term
productivity and cost savings for the business.
This is a qualitative audit where a questionnaire is designed, prepared and sent to all the key users
of IT systems in the organization. The questionnaire is used as a medium to gather data and
information pertaining to the technology utilization of each key user. The questionnaire carries
questions that are objective and descriptive. The data gathered is
analysed by the audit team. Besides, the key users are interviewed
on a one-on-one basis so as with the objective to elucidate
information that may be possible to capture through the
questionnaire. The Audit Report is a compilation of the technol-
ogy utilization patterns and habits of the key users. Based on the
findings, the Audit recommendation is made with a view to take
corrective steps, if any, in the way IT systems are used in the
organization thereby create avenues for positive impact on
business operations.
38/96, AH Block, 4th Street, Shanthi Colony, Anna Nagar, Chennai - 600 040. India.
Tel: +91-44-4353 1781 / 4353 1791 Fax: +91-2622 0430 Email: info@inspacetech.com

More Related Content

What's hot

IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubKaushal Trivedi
 
Chapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environmentChapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environmentKugendranMani
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPsJayesh Daga
 
Computer Audit an Introductory
Computer Audit an IntroductoryComputer Audit an Introductory
Computer Audit an IntroductoryMNorazizi HM
 
IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniqu...
IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniqu...IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniqu...
IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniqu...IRJET Journal
 
IRJET- Speech and Hearing
IRJET- Speech and HearingIRJET- Speech and Hearing
IRJET- Speech and HearingIRJET Journal
 
03.1 general control
03.1 general control03.1 general control
03.1 general controlMulyadi Yusuf
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit Sreekanth Narendran
 
Auditing Systems Development
Auditing Systems DevelopmentAuditing Systems Development
Auditing Systems Developmentessbaih
 
Information systems audit and control
Information systems audit and controlInformation systems audit and control
Information systems audit and controlKashif Rana ACCA
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Complianceseanpizzy
 
Audit of it infrastructure
Audit of it infrastructureAudit of it infrastructure
Audit of it infrastructurepramod_kmr73
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITShahzeb Pirzada
 
SYSTEM ANALYSIS AND DESIGN
SYSTEM ANALYSIS AND DESIGNSYSTEM ANALYSIS AND DESIGN
SYSTEM ANALYSIS AND DESIGNVictorJames21
 

What's hot (20)

IT General Controls
IT General ControlsIT General Controls
IT General Controls
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
Chapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environmentChapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environment
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
 
Computer Audit an Introductory
Computer Audit an IntroductoryComputer Audit an Introductory
Computer Audit an Introductory
 
Steps in it audit
Steps in it auditSteps in it audit
Steps in it audit
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniqu...
IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniqu...IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniqu...
IRJET- An Investigation into the Adoption of Computer Assisted Audit Techniqu...
 
IRJET- Speech and Hearing
IRJET- Speech and HearingIRJET- Speech and Hearing
IRJET- Speech and Hearing
 
Security audit
Security auditSecurity audit
Security audit
 
03.1 general control
03.1 general control03.1 general control
03.1 general control
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit
 
Auditing Systems Development
Auditing Systems DevelopmentAuditing Systems Development
Auditing Systems Development
 
Information systems audit and control
Information systems audit and controlInformation systems audit and control
Information systems audit and control
 
3c 2 Information Systems Audit
3c   2   Information Systems Audit3c   2   Information Systems Audit
3c 2 Information Systems Audit
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Compliance
 
Bankauditin it env
Bankauditin it envBankauditin it env
Bankauditin it env
 
Audit of it infrastructure
Audit of it infrastructureAudit of it infrastructure
Audit of it infrastructure
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
 
SYSTEM ANALYSIS AND DESIGN
SYSTEM ANALYSIS AND DESIGNSYSTEM ANALYSIS AND DESIGN
SYSTEM ANALYSIS AND DESIGN
 

Viewers also liked

Network-Security-Audit
Network-Security-AuditNetwork-Security-Audit
Network-Security-AuditYigal Behar
 
Harris Network Audit Pp
Harris Network Audit PpHarris Network Audit Pp
Harris Network Audit Ppwericsmith
 
Inbound.org Technical SEO Audit
Inbound.org Technical SEO AuditInbound.org Technical SEO Audit
Inbound.org Technical SEO AuditSam Mallikarjunan
 
Quick Technical SEO Audit Checklist - Peter Handley Brighton SEO April 2014
Quick Technical SEO Audit Checklist - Peter Handley Brighton SEO April 2014Quick Technical SEO Audit Checklist - Peter Handley Brighton SEO April 2014
Quick Technical SEO Audit Checklist - Peter Handley Brighton SEO April 2014Peter Handley
 
Network Architecture Review Checklist
Network Architecture Review ChecklistNetwork Architecture Review Checklist
Network Architecture Review ChecklistEberly Wilson
 
3. security architecture and models
3. security architecture and models3. security architecture and models
3. security architecture and models7wounders
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+DesignAlfred Ouyang
 
Audit Checklist for Information Systems
Audit Checklist for Information SystemsAudit Checklist for Information Systems
Audit Checklist for Information SystemsAhmad Tariq Bhatti
 
Project audit & review checklist
Project audit & review checklistProject audit & review checklist
Project audit & review checklistRam Srivastava
 

Viewers also liked (11)

Network Audit
Network AuditNetwork Audit
Network Audit
 
Network-Security-Audit
Network-Security-AuditNetwork-Security-Audit
Network-Security-Audit
 
Harris Network Audit Pp
Harris Network Audit PpHarris Network Audit Pp
Harris Network Audit Pp
 
Inbound.org Technical SEO Audit
Inbound.org Technical SEO AuditInbound.org Technical SEO Audit
Inbound.org Technical SEO Audit
 
Quick Technical SEO Audit Checklist - Peter Handley Brighton SEO April 2014
Quick Technical SEO Audit Checklist - Peter Handley Brighton SEO April 2014Quick Technical SEO Audit Checklist - Peter Handley Brighton SEO April 2014
Quick Technical SEO Audit Checklist - Peter Handley Brighton SEO April 2014
 
Network Architecture Review Checklist
Network Architecture Review ChecklistNetwork Architecture Review Checklist
Network Architecture Review Checklist
 
3. security architecture and models
3. security architecture and models3. security architecture and models
3. security architecture and models
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+Design
 
How to do a Project Audit
How to do a Project AuditHow to do a Project Audit
How to do a Project Audit
 
Audit Checklist for Information Systems
Audit Checklist for Information SystemsAudit Checklist for Information Systems
Audit Checklist for Information Systems
 
Project audit & review checklist
Project audit & review checklistProject audit & review checklist
Project audit & review checklist
 

Similar to Technology Audit

Technology audit
Technology auditTechnology audit
Technology auditArish Roy
 
Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security Arish Roy
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.gueste080564
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.renetta
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computingguestc1bca2
 
CIO IT Audit Survival TNS07
CIO IT Audit Survival TNS07CIO IT Audit Survival TNS07
CIO IT Audit Survival TNS07Thomas Danford
 
Business Process Modeling: An Example of Re-engineering the Enterprise
Business Process Modeling: An Example of Re-engineering the EnterpriseBusiness Process Modeling: An Example of Re-engineering the Enterprise
Business Process Modeling: An Example of Re-engineering the EnterpriseMassimo Talia
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docxLynellBull52
 
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS              .docxRunning head AUDITING INFORMATION SYSTEMS PROCESS              .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS .docxjoellemurphey
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxJoshJaro
 
Back Office Conference 02 10 2009
Back Office Conference 02 10 2009Back Office Conference 02 10 2009
Back Office Conference 02 10 2009blnoeide
 
Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkatasunil patro
 
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive ApproachThe 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive ApproachProtected Harbor
 
IRJET- Vendor Management System using Machine Learning
IRJET-  	  Vendor Management System using Machine LearningIRJET-  	  Vendor Management System using Machine Learning
IRJET- Vendor Management System using Machine LearningIRJET Journal
 
A Framework for Dead stock Management System for in-house computer engineerin...
A Framework for Dead stock Management System for in-house computer engineerin...A Framework for Dead stock Management System for in-house computer engineerin...
A Framework for Dead stock Management System for in-house computer engineerin...theijes
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentAdetula Bunmi
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iiiAshish Desai
 
CAAT - Data Analysis and Audit Techniques
CAAT - Data Analysis and Audit TechniquesCAAT - Data Analysis and Audit Techniques
CAAT - Data Analysis and Audit TechniquesSaurabh Rai
 

Similar to Technology Audit (20)

Technology audit
Technology auditTechnology audit
Technology audit
 
Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security
 
Inspace technologies
Inspace technologiesInspace technologies
Inspace technologies
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computing
 
CIO IT Audit Survival TNS07
CIO IT Audit Survival TNS07CIO IT Audit Survival TNS07
CIO IT Audit Survival TNS07
 
Business Process Modeling: An Example of Re-engineering the Enterprise
Business Process Modeling: An Example of Re-engineering the EnterpriseBusiness Process Modeling: An Example of Re-engineering the Enterprise
Business Process Modeling: An Example of Re-engineering the Enterprise
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS              .docxRunning head AUDITING INFORMATION SYSTEMS PROCESS              .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
 
James hall ch 15
James hall ch 15James hall ch 15
James hall ch 15
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptx
 
Back Office Conference 02 10 2009
Back Office Conference 02 10 2009Back Office Conference 02 10 2009
Back Office Conference 02 10 2009
 
Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkata
 
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive ApproachThe 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
 
IRJET- Vendor Management System using Machine Learning
IRJET-  	  Vendor Management System using Machine LearningIRJET-  	  Vendor Management System using Machine Learning
IRJET- Vendor Management System using Machine Learning
 
A Framework for Dead stock Management System for in-house computer engineerin...
A Framework for Dead stock Management System for in-house computer engineerin...A Framework for Dead stock Management System for in-house computer engineerin...
A Framework for Dead stock Management System for in-house computer engineerin...
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
 
CAAT - Data Analysis and Audit Techniques
CAAT - Data Analysis and Audit TechniquesCAAT - Data Analysis and Audit Techniques
CAAT - Data Analysis and Audit Techniques
 

More from Arish Roy

Daughters perfection
Daughters perfectionDaughters perfection
Daughters perfectionArish Roy
 
Newsletter connect - Jan 2017
Newsletter connect - Jan 2017Newsletter connect - Jan 2017
Newsletter connect - Jan 2017Arish Roy
 
Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016Arish Roy
 
Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016Arish Roy
 
Newsletter connect - Sep 2016
Newsletter connect - Sep 2016Newsletter connect - Sep 2016
Newsletter connect - Sep 2016Arish Roy
 
Newsletter Connect - August 2016
Newsletter Connect - August 2016Newsletter Connect - August 2016
Newsletter Connect - August 2016Arish Roy
 
Newsletter connect - July 2016
Newsletter connect - July 2016Newsletter connect - July 2016
Newsletter connect - July 2016Arish Roy
 
Newsletter connect - June 2016
Newsletter connect - June 2016Newsletter connect - June 2016
Newsletter connect - June 2016Arish Roy
 
Newsletter Connect - May
Newsletter Connect - MayNewsletter Connect - May
Newsletter Connect - MayArish Roy
 
Newsletter connect - April 2016
Newsletter connect - April 2016Newsletter connect - April 2016
Newsletter connect - April 2016Arish Roy
 
Newsletter Connect - Mar 2016
Newsletter Connect - Mar 2016Newsletter Connect - Mar 2016
Newsletter Connect - Mar 2016Arish Roy
 
Newsletter connect - Feb 2016
Newsletter connect - Feb 2016Newsletter connect - Feb 2016
Newsletter connect - Feb 2016Arish Roy
 
Newsletter connect - Jan 2016
Newsletter connect  - Jan 2016Newsletter connect  - Jan 2016
Newsletter connect - Jan 2016Arish Roy
 
Newsletter connect - Nov 2015
Newsletter connect  - Nov 2015Newsletter connect  - Nov 2015
Newsletter connect - Nov 2015Arish Roy
 
Newsletter connect - Oct 2015
Newsletter connect - Oct 2015Newsletter connect - Oct 2015
Newsletter connect - Oct 2015Arish Roy
 
Newsletter Connect - Sep 2015
Newsletter Connect  - Sep 2015Newsletter Connect  - Sep 2015
Newsletter Connect - Sep 2015Arish Roy
 
Newsletter Connect - August
Newsletter Connect - AugustNewsletter Connect - August
Newsletter Connect - AugustArish Roy
 
Newsletter connect - July 2015
Newsletter connect - July 2015Newsletter connect - July 2015
Newsletter connect - July 2015Arish Roy
 
Inspace connect - June 2015
Inspace connect - June 2015Inspace connect - June 2015
Inspace connect - June 2015Arish Roy
 
Inspace connect - May 2015
Inspace connect - May 2015Inspace connect - May 2015
Inspace connect - May 2015Arish Roy
 

More from Arish Roy (20)

Daughters perfection
Daughters perfectionDaughters perfection
Daughters perfection
 
Newsletter connect - Jan 2017
Newsletter connect - Jan 2017Newsletter connect - Jan 2017
Newsletter connect - Jan 2017
 
Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016
 
Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016Newsletter Connect - Nov 2016
Newsletter Connect - Nov 2016
 
Newsletter connect - Sep 2016
Newsletter connect - Sep 2016Newsletter connect - Sep 2016
Newsletter connect - Sep 2016
 
Newsletter Connect - August 2016
Newsletter Connect - August 2016Newsletter Connect - August 2016
Newsletter Connect - August 2016
 
Newsletter connect - July 2016
Newsletter connect - July 2016Newsletter connect - July 2016
Newsletter connect - July 2016
 
Newsletter connect - June 2016
Newsletter connect - June 2016Newsletter connect - June 2016
Newsletter connect - June 2016
 
Newsletter Connect - May
Newsletter Connect - MayNewsletter Connect - May
Newsletter Connect - May
 
Newsletter connect - April 2016
Newsletter connect - April 2016Newsletter connect - April 2016
Newsletter connect - April 2016
 
Newsletter Connect - Mar 2016
Newsletter Connect - Mar 2016Newsletter Connect - Mar 2016
Newsletter Connect - Mar 2016
 
Newsletter connect - Feb 2016
Newsletter connect - Feb 2016Newsletter connect - Feb 2016
Newsletter connect - Feb 2016
 
Newsletter connect - Jan 2016
Newsletter connect  - Jan 2016Newsletter connect  - Jan 2016
Newsletter connect - Jan 2016
 
Newsletter connect - Nov 2015
Newsletter connect  - Nov 2015Newsletter connect  - Nov 2015
Newsletter connect - Nov 2015
 
Newsletter connect - Oct 2015
Newsletter connect - Oct 2015Newsletter connect - Oct 2015
Newsletter connect - Oct 2015
 
Newsletter Connect - Sep 2015
Newsletter Connect  - Sep 2015Newsletter Connect  - Sep 2015
Newsletter Connect - Sep 2015
 
Newsletter Connect - August
Newsletter Connect - AugustNewsletter Connect - August
Newsletter Connect - August
 
Newsletter connect - July 2015
Newsletter connect - July 2015Newsletter connect - July 2015
Newsletter connect - July 2015
 
Inspace connect - June 2015
Inspace connect - June 2015Inspace connect - June 2015
Inspace connect - June 2015
 
Inspace connect - May 2015
Inspace connect - May 2015Inspace connect - May 2015
Inspace connect - May 2015
 

Recently uploaded

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Technology Audit

  • 2. 1 AuditFindingsReport: Gap analysis IT Infrastructure Analysis and recommendations Business Flow Chart – Outline Data backup Analysis and recommendations Key User's knowledge and utilization of various software Softw are License Status and recommendations Core Software utilization TIER 1: HIGHLEVEL ~ ~ ~ TIER 2: LOWLEVELDEEPDIVEAUDIT ~ ~ TIER 3:THECAPSTONE ~ ~ ~ ~ ~ ~ ~ TechnologyAudit Technology Audit (TA) is an eye-opening innovation from Inspace. TA enables organization leaders understand the present IT utilization levels in their organization or business. In terms of importance, TA occupies equal status with Accounting Audits conducted in organizations. TA focuses on three important areas Viz. Business functionality, Ease of Use and Security. It also addresses the three sensitive areas of information/data availability, confidentiality and integrity. The Audit process follows a structured 3 tier methodology. Understanding Vision, Mission and the Business goals of the customer A high level mapping of the current IT deployment in relation to thebusiness objectives Observation and plotting of Possible Gaps between the Business objectives and IT deploy- ment Detailed study of deployed hardware, software, connectivity, power, security, MIS, and usability by end users. Identifying process coverage, data integrity, productivity improvements, reporting frequency andadequacy, training adequacy, and system availability.
  • 3. TechnologyAudit 2 Productivity benefits Security benefits Cost-saving benefits Relationship benefits ~ ~ ~ ~ ~ ~ ~ TA SPECTRUM COVERS: ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ IT security / Vulner ability Analysis Recommendations pertaining to technology upgrade / downgrade Training requirements and plan of action Power Infrastructure Audit Networking Infrastructure Audit Server & Backup Infrastructure Audit Desktop & Laptop Infrastructure Audit Generation of Asset (Hardware & Software) Document & Physical Outlay Software Licensing Audit General Data Security Audit Infrastructure Maintenance Audit Core Applications Audit Internet/Intranet Connectivity Audit Communication Audit (Data/Voice/Video) Key Users' Technology Utilization Audit Technology Audit recommendations sets the direction for organizations to optimize Return of Investment (ROI) on IT. The success of TA is that it does not recommend investing more on IT; rather it helps in getting more out of existing IT investments. Technology Audit recommendations hinge on the following benefits:
  • 4. Technology Audit 3 POWERAUDIT The Power Audit is aimed at ensuring the power related equipment and infrastructure pertaining to IT systems complies with standards, and whether its throughput is in line with the organization's requirement for power for optimal efficiency and productivity of the IT systems. Since the power can come from several sources, the scope of the Audit may include Raw Power, UPS (Online/Offline), UPS/Inverter Batteries, Generators, Inverters, Transformers, Cabling and outlets. Other power equipment if any may be included based on their need on a case-to-case basis. The Power Audit follows a structured approach where critical parameters and readings for effect- ing optimal and sustained throughput across equipments are noted and taken as basic inputs. Wherever necessary, inputs from people involved in managing power infrastructure are also taken to ensure that the data gathered is correct and current. Besides, a general inspection of the equip- ments in terms of the age, environment of the equipments and current process of maintenance is done. Based on the data gathered and observed scenarios, the Audit team prepares the Audit report. The Audit Report is a detailed presentation of the AS-IS scenarios which are represented as facts. Observed issues and challenges in the existing power set up and the hazards that can impact the IT system's effective functioning and the resulting effect on business performance is also captured. The culmination of the Audit is the recommendations for corrective action and course of action which is based on firm specific require
  • 5. TechnologyAudit 4 NETWORK INFRASTRUCTUREAUDIT The Network Audit is a comprehensive audit where all the equipments and devices on the network come under the purview. The components under the audit, both active and passive, may include Data Switches, Routers, Hubs, Access Points, Repeaters, Voice Branch Exchanges, Data/Voice Cabling and I/O outlets. Networking equipment out of conventional audit scope may be included on a case-to-case basis based on the need of the business and technology environment. The Audit follows a predefined process where critical performance parameters and metrics for effecting optimal and sustained performance across devices and equipments are noted and taken as basic inputs. Wherever necessary, inputs from people involved in managing Network infrastruc- ture are also taken toensure that the data gathered is correct and current. Besides, a general inspection of the devices and equip- ments in terms of the age, environ- ment of the devices and equipments, and current process of maintenance is done. Based on the data and information gathered, the Audit team maps the business process with the existing network infrastructure to assess fit and compatibility of the infrastruc- ture to meet business objectives. The audit findings are presented in an Audit Repor t whi ch i s a detai l ed presentation of the AS-IS scenarios, observed issues and challenges in the existing Network. Deficits and hazards that can impact effective up-time of networks and systems are clearly identified. The Audit recommendations focuses on taking corrective action and course of action based on the firm specific requirements and indus- try's best practises and standards. The Audit recommendation is tightly hinged on improving network throughput and managing and maintaining high up-time.
  • 6. 5 SERVER & BACKUPINFRASTRUCTUREAUDIT TechnologyAudit The Server and Backup Audit aims at ensuring IT system exigency plans are in place to handle unexpected failures of IT systems. The other objective of the Audit is also to ascertain whether data retrieval capability and process is in place. The Audit covers the critical IT system units such as Servers, Racks, Backup devices, Data storage equipment and I/O Cables. Firm specific equipment other the ones mentioned may be included based on business need and the situation on a case-to-case basis. Contingency plans such as Disaster Recovery (DR) and / or Business Continuity (BCP) also come under the purview of the Audit from an Infrastructure backup and readiness perspective. The Audit follows a structured process where critical nodes in the system environment for effecting optimal and sustained performance across devices and equipments are noted and taken as basic inputs. Wherever necessary, inputs from people involved in managing Server and Backup Infrastructure are also taken to ensure that the data gathered is correct and current. Besides, a general inspection of the devices and equipments in terms of the age, environment of the devices and equipments, and current process of maintenance is done. Based on the data and informa- tion gathered, the Audit team does a State Analysis of the infrastructure and maps it to the business objectives and goals. The Audit findings are presented in an Audit Report which is a detailed presentation of the State Analysis, observed issues and challenges in the existing Server and Backup Infrastructure. Deficits and failure points that can impact effective up-time of Servers and Back up Infrastructure are also clearly identified. The Audit recommendations focuses on taking corrective action and course of action based on industry wide best practises and standards. The Audit helps System Managers and Administrators to effectively identify and manage failure points and ensure maximised up-time of critical back up devices and equipment.
  • 7. The purpose of the Desktop and Laptop Audit is to uncover possible leaks in the desktop and laptop efficiencies in terms of processing time and usability which can impact overall IT System's output and people productivity. Organizations where standalone PCs and Laptops are used without servers benefit from this Audit. Similarly, organizations where the number of end users working on PCs and laptops are high will certainly need to be audited to ensure effective function- ing. Other end user equipments, if any, may be included based on their need on a case-to-case basis. The Audit follows a well defined process where each PC and laptop in the organization is fully checked for optimal and sustained performance. Functional parameters of the PCs and laptops are taken as inputs from people involved in using them. A general inspection of the PCs and laptops in terms of the age, environment of the devices and equipments, and current process of maintenance is done. The data and information gathered forms the basis of the Audit recom- mendations. The Audit team does an AS-IS Analysis of the PC and laptop environment and maps it to the productivity and efficiency objectives and goals of the organi- zation. The Audit findings are presented in an Audit Report which is a detailed presentation of the AS-IS Analysis, observed issues and challenges in the existing PC and laptop setup. Functional deficits and failure points that can impact effective up-time of PCs and laptops are also clearly identified and noted. The Audit recommen- dations focuses on taking corrective action and course of action based on industry wide best practises and standards. This Audit helps System Managers and Administrators to effectively identify and manage failure points and ensure maximised up-time of PCs and laptops. TechnologyAudit 6 DESKTOP & LAPTOP INFRASTRUCTURE AUDIT
  • 8. 7 ITASSETASSESSMENTAUDIT TechnologyAudit This Audit enables organizations to keep check on the IT Assets that are currently deployed in their organization. The audit starts with a detailed and exhaustive compilation of all IT and IT related assets cur rently deployed. The compilation contains equipment details, their physical location, quantity, associated user, with additional information. That may be available with the asset management team. Other pertinent information about the IT Assets may be called for by the Audit team and may be included in the audit on a case-to-case basis. To help identify the actual asset placement in the company, an outlay map diagram is additionally generated for each location in the organization. In some cases, a multi-city outlay may be done depending on the geo operations of the organization. The IT Asset outlay depicts the various sections, cabins, departments, building associated with the location. Textual legends assist the reader in gaining accurate information about the placements. Wherever necessary, inputs from people involved in managing the assets are obtained to ensure and validate that the data and information obtained is current and correct. In addition to the IT equipment that is deployed, a software list is generated which captures all the software packages presently installed in the audited computer systems in the organization. The detailed list provides information pertaining to the software products and its versions being currently used. Wherever necessary the asset management team is involved for getting up-to-date and correct information.
  • 9. 8 SOFTWAREAUDIT TechnologyAudit License Audit The primary focus of this audit is to ensure that the audited organization complies with standards, policies and legal framework with respect to installing and using software. All software that is currently being used and installed in the computer systems come under the purview of the Audit. The software may include Operating Systems, Office Productivity Software, Accounting Software, ERP Applications and Customized software. Other software may be included in the audit on a case-to-case basis. Additionally, the audit attempts to highlight the security vulnerabilities due to usage of unlicensed software, if any. Wherever necessary, people managing the software assets are involved for getting upto-date and correct data and information. The data and information gathered forms the basis of the Audit recommendations. The Audit team analysis the software licenses used and maps it to the legal and security vulnerabilities of the IT systems. Besides, its impact on business and governance of the organization is also analysed. The Audit findings are presented in an Audit Report where the observed issues and challenges in the existing software licenses are detailed. Security deficits and failure points that can creep into the system environment and which can impact smooth opera- tion of IT systems is also detailed wherever applicable. The Audit recom- mendations focuses on taking correc- tive action and course of action based on industry wide best practises and standards. This Audit helps S y s t em Managers and Administrators, to effectively manage IT by adhering to legally approved and secure use of licensed software. Core Applications Audit The objective of this Audit is to ensure that the key users of IT systems have understood and are proficient with the applications they are using as part of their daily operations. The audit process begins by listing the software applications to be audited. To facilitate a structured approach to the audit, the core applica- tions list is grouped into four types as below:
  • 10. 9 ~ ~ ~ ~ Technology Audit 9 ~ Audit Office Productivity Applications – MS Office, Open Office which are used for general office purposes. Accounting Applications – Tally etc. which are used for office accounting purposes. ERP and Specialized Applications – AutoCAD, CorelDRAW, ERP, customized software which is used for specialized purposes. Organization Website – Link check, Enquiry Sheet, Domain Name Renewal and SEO optimization check. The first part of the Core Application Audit is done on the Office Productivity Application with the Client's key users as Auditees. The software version details and features are collected and the users' knowledge level of the application features and their proficiency is audited. Similarly, the Accounting Applications, Specialized Applica- tions and the organization's website is audited. Where the web site is of importance to the organi- zation, the website's links, contacts and enquiry sheet page, domain name, renewal status, etc., are noted. Besides, a web search on sites such as Google is carried out to find out the present SEO optimization levels of the web site. This is done using relevant keywords. The data and information gathered forms the basis of the Audit Report and recommendations. The Core Applications Audit focuses on taking corrective action and course of action based on industry wide best practises and standards. This Audit helps Key end users of core applications keep a check on their knowledge proficiency levels in using application software and also to effectively improve their productivity and efficiency.
  • 11. TechnologyAudit 10 GENERAL DATA SECURITYAUDIT Data Access Control User Authentication System DataFolder Structure/Permission Storage Media Control Data Leak Protection Internet / Intranet /Email Security Firewall Setup Anti-SPAM Setup /Anti-Virus /Anti-Spyware Setup Data Protection Software Patch Management Vulner ability Assessment Gener al Assessment (fireprotection, ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ This is a comprehensive audit that focuses on the security and safety of IT infrastructure deployed and data associated with it. The audit encompasses both Physical as well as Virtual Data security. Information with regard to Physical Access & Security, Virtual Data Access control comprising of the following is recorded: Any other security related details not mentioned above may be gathered for inclusion in the audit based on need and on a case-to-case basis. The data and information gathered forms the basis of the Audit recommendations. The Audit team does an AS-IS Analysis of the Security environment and maps it to the organizations business process, objectives and goals of the organization. The Audit findings are presented in an Audit Report which is a detailed presentation of the AS-IS Analysis, observed issues and challenges in the existing set up. Deficits and gaps in the security features, and vulnerability and failure points that can negatively impact data and IT security are also clearly identified and noted. The Audit recommendations focuses on taking corrective action and course of action based on industry wide best practises and standards. This Audit helps System Managers and Administrators to effectively identify and manage data leakage and unethical data access vulnerabilities and also ensure maximised security of IT systems.
  • 12. The Infrastructure maintenance audit is aimed at ensuring that the IT systems are covered appro- priately in terms of warranties, guarantees, on-call support and AMCs by the respective product vendors. Further, the audit also checks the Total Cost of Ownership (TCO) of IT Infrastructure in relation to sustained maintenance. Data and information pertaining to all the hardware and software deployed is gathered. Wherever necessary, people involved in managing IT Infrastructure are met to obtain current and correct data and information. A physical verifica- tion based on the collected details is carried out on a random basis to ensure data correctness. Once the essential information is available, a detailed report on the observations is made. Based on the existing industry stand- ards and best practices, a recommendation report is drafted towards the observations made. The recommendations would cite the corrective actions and course of action that need to be put in place in order to counter- balance the existing problems and potential issues identified. With internet and intranet usage in organizations increasing by the day, it is increasingly impera- tive to manage these technologies with a view to getting maximised benefits in terms cost and quality. In this audit, details pertaining to all connectivity solutions deployed in the organization come under the purview. The connectivity solutions may Internet / Intranet connectivity, Virtual Private Network (VPN), Radio Frequency (RF) and Metro Area Network (MAN). Other connectivity solutions may be included based on their need on a case-to-case basis. All necessary and critical parameters are noted with utmost care. Wherever necessary, the concerned people who manage these technologies and solutions are involved for getting up-to-date and correct information. The Audit Report is a compilation of the collected data and information. The Report would identify and highlight the existing deficits and anomalies in deployed solution, if any. Cost and quality implications and impact on business is detailed as part of the Report. Recommendations are made for corrective action and course of action based on industry standards and best practices with the objective of improving efficiency and productiv- ity of the solutions and technologies deployed. 11 INFRASTRUCTUREMAINTENANCEAUDIT INTERNET/INTRANETCONNECTIVITYAUDIT TechnologyAudit
  • 13. T 12 COMMUNICATIONS AUDIT TECHNOLOGY UTILIZATION AUDIT– QUALITATIVE echnology Audit The Communications Audit is aimed at ensuring that the commu- nication technologies such as Data, Voice and Video deployed within the organization are cost effective and that it delivers optimal value for money. During this audit, the billing details of all IT related communication solutions are taken as inputs. The communications solutions may include Telephone Landlines, Mobiles, Internet connections and Videoconferencing. Other communication solutions may be included in the Audit based on business need and on a caseto- case basis. The previous expenses incurred in the past one quarter on communication technologies are audited. Bills and Invoices pertaining to the same are scrutinized. Wherever necessary the people handling these technologies and the decision makers for adoption of these communication solutions are also involved for getting up-to-date and correct information. The Audit Report is a detailed presentation of the AS-IS situation and the observations. Cost and utilization anomalies, wherever present, is also highlighted as part of the report. Based on the audit findings, the audit team presents the recommendations based on a 'best solutions paradigm' with a clear objective to improve on cost and quality of communications solutions deployed. The recom- mendations may also include upgrade, downgrade or change of solutions to effect long term productivity and cost savings for the business. This is a qualitative audit where a questionnaire is designed, prepared and sent to all the key users of IT systems in the organization. The questionnaire is used as a medium to gather data and information pertaining to the technology utilization of each key user. The questionnaire carries questions that are objective and descriptive. The data gathered is analysed by the audit team. Besides, the key users are interviewed on a one-on-one basis so as with the objective to elucidate information that may be possible to capture through the questionnaire. The Audit Report is a compilation of the technol- ogy utilization patterns and habits of the key users. Based on the findings, the Audit recommendation is made with a view to take corrective steps, if any, in the way IT systems are used in the organization thereby create avenues for positive impact on business operations.
  • 14. 38/96, AH Block, 4th Street, Shanthi Colony, Anna Nagar, Chennai - 600 040. India. Tel: +91-44-4353 1781 / 4353 1791 Fax: +91-2622 0430 Email: info@inspacetech.com