THE ROLE OF IT AUDITING IN DATA SECURITY FOCUSING ON RISK IDENTIFICATION, STRENGTHENING INTERNAL CONTROLS, AND COMPLIANCE WITH SECURITY POLICIES
Volume 2, Issue 1, Pp 1-5, 2025
DOI: https://doi.org/10.61784/asat3007
Author(s)
Indy Misya Rumata Situmorang, Kania Jasmine Azzahra, Iskandar Muda*
Affiliation(s)
Universitas Sumatera Utara, Medan, Indonesia.
Corresponding Author
Iskandar Muda
ABSTRACT
In an increasingly digital era, data security has become one of the top priorities for organizations. Information Technology (IT) auditing plays a crucial role in ensuring that the information systems and data managed by companies are protected from potentially harmful threats. This paper aims to explore the role of IT auditing in enhancing data security, focusing on risk identification, strengthening internal controls, and compliance with security policies. Through a qualitative approach, this research collects data from interviews with audit professionals and case studies from several organizations. The results indicate that IT auditing not only helps identify weaknesses in security systems but also provides recommendations that can enhance data protection effectiveness. Additionally, IT auditing contributes to raising awareness of the importance of data security throughout the organization. The conclusion emphasizes that the routine implementation of IT auditing is a strategic step necessary to maintain the integrity and confidentiality of information in an increasingly complex business environment. This abstract provides a brief summary of the objectives, methodology, results, and conclusions of the research regarding the role of IT auditing in data security.
KEYWORDS
IT audit; Data security; Risk management; Internal controls; Compliance; Vulnerabilities; Information protection; Information systems; Data breach
CITE THIS PAPER
Indy Misya Rumata Situmorang, Kania Jasmine Azzahra, Iskandar Muda. The role of it auditing in data security focusing on risk identification, strengthening internal controls, and compliance with security policies. Journal of Trends in Applied Science and Advanced Technologies. 2025, 2(1): 1-5. DOI: https://doi.org/10.61784/asat3007.
REFERENCES
[1] Shulha, O, Yanenkova, I, Kuzub, M, et al. Modeling Regarding Detection of Cyber Threats Features In Banks Activities. Journal of Management Information & Decision Sciences, 2022, 25(25): 1-8.
[2] Demirkan, S, Demirkan, I, McKee, A. Blockchain technology in the future of business cyber security and accounting. Journal of Management Analytics, 2020, 7(2): 189-208.
[3] Lois, P, Drogalas, G, Karagiorgos, A, Tsikalakis, K. Internal audits in the digital era: opportunities risks and challenges. EuroMed Journal of Business, 2020, 15(2): 205-217.
[4] AlGhamdi, S, Win, K T, Vlahu-Gjorgievska, E. Information security governance challenges and critical success factors: Systematic review. Computers & security, 2020, 99, 102030.
[5] Yang, P, Xiong, N, Ren, J. Data security and privacy protection for cloud storage: A survey. Ieee Access, 2020, 8, 131723-131740.
[6] Wylde, V, Rawindaran, N, Lawrence, J, et al. Cybersecurity, data privacy and blockchain: A review. SN computer science, 2022, 3(2): 127.
[7] Bandari, V. Enterprise data security measures: a comparative review of effectiveness and risks across different industries and organization types. International Journal of Business Intelligence and Big Data Analytics, 2023, 6(1): 1-11.
[8] Duggineni, S. Impact of controls on data integrity and information systems. Science and Technology, 2023, 13(2): 29-35.