Science, Technology, Engineering and Mathematics.
Open Access

THE ROLE OF IT AUDITING IN DATA SECURITY FOCUSING ON RISK IDENTIFICATION, STRENGTHENING INTERNAL CONTROLS, AND COMPLIANCE WITH SECURITY POLICIES

Download as PDF

Volume 2, Issue 1, Pp 1-5, 2025

DOI: https://doi.org/10.61784/asat3007

Author(s)

Indy Misya Rumata Situmorang, Kania Jasmine Azzahra, Iskandar Muda*

Affiliation(s)

Universitas Sumatera Utara, Medan, Indonesia.

Corresponding Author

Iskandar Muda

ABSTRACT

In an increasingly digital era, data security has become one of the top priorities for organizations. Information Technology (IT) auditing plays a crucial role in ensuring that the information systems and data managed by companies are protected from potentially harmful threats. This paper aims to explore the role of IT auditing in enhancing data security, focusing on risk identification, strengthening internal controls, and compliance with security policies. Through a qualitative approach, this research collects data from interviews with audit professionals and case studies from several organizations. The results indicate that IT auditing not only helps identify weaknesses in security systems but also provides recommendations that can enhance data protection effectiveness. Additionally, IT auditing contributes to raising awareness of the importance of data security throughout the organization. The conclusion emphasizes that the routine implementation of IT auditing is a strategic step necessary to maintain the integrity and confidentiality of information in an increasingly complex business environment. This abstract provides a brief summary of the objectives, methodology, results, and conclusions of the research regarding the role of IT auditing in data security. 

KEYWORDS

IT audit; Data security; Risk management; Internal controls; Compliance; Vulnerabilities; Information protection; Information systems; Data breach

CITE THIS PAPER

Indy Misya Rumata Situmorang, Kania Jasmine Azzahra, Iskandar Muda. The role of it auditing in data security focusing on risk identification, strengthening internal controls, and compliance with security policies. Journal of Trends in Applied Science and Advanced Technologies. 2025, 2(1): 1-5. DOI: https://doi.org/10.61784/asat3007.

REFERENCES

[1] Shulha, O, Yanenkova, I, Kuzub, M, et al. Modeling Regarding Detection of Cyber Threats Features In Banks Activities. Journal of Management Information & Decision Sciences, 2022, 25(25): 1-8.

[2] Demirkan, S, Demirkan, I, McKee, A. Blockchain technology in the future of business cyber security and accounting. Journal of Management Analytics, 2020, 7(2): 189-208.

[3] Lois, P, Drogalas, G, Karagiorgos, A, Tsikalakis, K. Internal audits in the digital era: opportunities risks and challenges. EuroMed Journal of Business, 2020, 15(2): 205-217.

[4] AlGhamdi, S, Win, K T, Vlahu-Gjorgievska, E. Information security governance challenges and critical success factors: Systematic review. Computers & security, 2020, 99, 102030.

[5] Yang, P, Xiong, N, Ren, J. Data security and privacy protection for cloud storage: A survey. Ieee Access, 2020, 8, 131723-131740.

[6] Wylde, V, Rawindaran, N, Lawrence, J, et al. Cybersecurity, data privacy and blockchain: A review. SN computer science, 2022, 3(2): 127.

[7] Bandari, V. Enterprise data security measures: a comparative review of effectiveness and risks across different industries and organization types. International Journal of Business Intelligence and Big Data Analytics, 2023, 6(1): 1-11.

[8] Duggineni, S. Impact of controls on data integrity and information systems. Science and Technology, 2023, 13(2): 29-35.

All published work is licensed under a Creative Commons Attribution 4.0 International License. sitemap
Copyright © 2017 - 2025 Science, Technology, Engineering and Mathematics.   All Rights Reserved.