preview

Different Types Of Different Risks In An IT Audition

Better Essays

Other Risks. There are different types of risks in an IT setup which are supported by segregation of duties outlines and formats. Audit risk is a risk that the auditor will issue an unqualified opinion. Being a major aspect prone to fraud, audit risk entails material error can be hardly identified and can go undetected during an information financial audit report. The audit risk however has different classifications. Inherent risk- The risk that an error exists that could be material or significant when combined with other errors encountered during the audit, assuming that there are no related compensating controls. Inherent risk can also be categorized as the susceptibility to a material misstatement in the …show more content…

Overall audit risk- the combination of individual categories of audit risks assessed for each specific control objective. An objective in formulating the audit approach is to limit the audit risk in the area under scrutiny so the overall audit risk is at a sufficiently low level at the completion of the examination. Another objective is to assess and control those risks to achieve the desired level of assurance as efficiently as possible.
As much as this risks are prone to attacking the system; control risk assessment must be backed up by control testing results.
Suitable Control Mechanisms
For more efficient and effective audit procedures, they are different control mechanisms that can be applied in order to minimize risk: Mitigation is the most commonly used mechanism that involves fixing the flaw or in a way providing a set of ways to compensate and control the impact that is associated therein. The most common is installing system patches at any point a vulnerability has been discovered. Under mitigation, ensuring compliance can be applied by ensuring compliance with relevant bodies and rules, logical access can be tailor-made so as to clearly target areas with the most risk and those areas where change can be made and easily implemented. The use of monitoring counters is the hardware-assisted technique usually that adds the least amount of performance overhead while minimizing the requirement to patch the kernel. It in turn offers a way to

Get Access