GBPP ST-RK-1.00-014-003/R- GARIS-GARIS BESAR PROGRAM PENGAJARAN PROGRAM STUDI: S1 SISTEM INFORMASI Semester : 7 Berlaku mulai: Gasal/2010 JUDUL MATA KULIAH NOMOR KODE / SKS PRASYARAT DESKRIPSI SINGKAT MANFAAT MATA KULIAH TUJUAN INSTRUKSIONAL UMUM DAFTAR PUSTAKA PROSENTASE PENILAIAN : : : : : : AUDIT TEKNOLOGI INFORMASI 410103095 / 3 SKS Mata kuliah ini memberikan konsep audit TI yang hasilnya dapat memberikan perbaikan bagi organisasi. Setelah mengikuti mata kuliah ini, mahasiswa dapat memahami konsep dan dasar audit TI yang hasilnya dapat memberikan perbaikan bagi organisasi. : Wajib: 1. Senft, Sandra; Gallegos, Frederick., 2009. Information Technology Control and Audit. Third edition. Auerbach Publications 2. Davis, Chris., 2007. IT Auditing : using control to protect information assets. McGraw-Hill : UTS : 30 % UAS : 30 % TUGAS : tugas = 30%, quiz = 10% Halaman 1 dari 7 PERT TUJUAN INSTRUKSIONAL KE UMUM 1 Presents the IT environment today and discusses why issues involving IT control and audit are so important. It briefly discusses what IT auditing involves and the development of guidance by a number of organizations worldwide to deal with IT control and auditability issues. Information integrity, reliability, and validity are extremely important in today’s competitive business world 2 POKOK SUB POKOK BAHASAN BAHASAN A Foundation for 1. Information Technology IT Audit and Environment: Why Are Control (1) Controls And Audit Important ? 2. Legal Environment and Its Impact on Information Technology METODE - Ceramah - Diskusi - Tanya Jawab ESTIMASI WAKTU - 90’ - 40’ - 20’ A Foundation for 1. Audit and Review: Its IT Audit and Role in Information Control (2) Technology 2. Audit Process in an Information Technology Environment - Ceramah - Diskusi - Tanya Jawab - 90’ - 40’ - 20’ 3 A Foundation for 1. Auditing Information IT Audit and Technology Using Control (3) Computer-Assisted Audit Tools and Techniques - Ceramah - Diskusi - Tanya Jawab - 90’ - 40’ - 20’ 4 A Foundation for 1. Managing IT Audit IT Audit and 2. IT Auditing in the New Control (4) Millennium - Ceramah - Diskusi - Tanya Jawab - 90’ - 40’ - 20’ JENIS EVALUASI SUMBER BELAJAR 1 (h.3 – h.17) 1 (h.21 – h.43) Tugas 1 1 (h.47 – h.68) 1 (h.75 – h.97) 1 (h.101 – h.125) Tugas 2 1 (h.129 – h.149) 1 (h.155 – h.173) Halaman 2 dari 7 PERT TUJUAN INSTRUKSIONAL KE UMUM 5 Describe the standards, frameworks, regulations, and risks that govern the scope of the audit function POKOK BAHASAN Frameworks, Standards, and Regulations Auditing IT Planning and Organization (1) SUB POKOK BAHASAN - Ceramah - Diskusi - Tanya Jawab ESTIMASI WAKTU - 90’ - 40’ - 20’ 1. IT Governance 2. Strategy and Standards - Ceramah - Diskusi - Tanya Jawab - 90’ - 40’ - 20’ 1. Course 1 – 7 2. Quiz - Diskusi - Quiz - 50’ - 100’ 1. 2. 3. 4. COSO CoBIT ITIL ISO METODE 6 Describe the critical issues and best practices in governing and controlling IT resources. Key processes like project management and quality management ensure that investments made in IT deliver on their promised value 7 Course review 8 Describe the critical issues and best practices in governing and controlling IT resources. Key processes like project management and quality management ensure that investments made in IT deliver on their promised value Auditing IT Planning and Organization (2) 1. Risk Management 2. Process and Quality Management - Ceramah - Diskusi - Tanya Jawab - 90’ - 40’ - 20’ 9 Discusses risks and controls in terms of the life cycle of application systems. Specifically,it includes acquiring new systems, implementing new systems, and IT Acquisition and Implementation (1) 1. Software Development and Implementation 2. IT Sourcing - Ceramah - Diskusi - Tanya Jawab - 90’ - 40’ - 20’ JENIS SUMBER EVALUASI BELAJAR Tugas 2 (Chapter 13: Kelompok 1 Frameworks and Standards) Tugas 3 1 (h.181 – h.197) 1 (h. 203 – h.223) Tugas 4 1 (h.227 – h.246) 1 (h.251 – h.268) 1 (h.325 – h.345) 1 (h.351 – h.370) Halaman 3 dari 7 PERT KE TUJUAN INSTRUKSIONAL UMUM applications risks, as well as change management. 10 11 Examines information technology (IT) general controls and managing service delivery. Computer applications operate within this environment and are very dependent on the general controls that protect the IT environment. Service management provides a framework for delivering quality IT services to the organization 12 13 1. Discusses the virtual environment where organizations operate today. The virtual environment is composed of a complex confi guration of clients, servers, and networks to function POKOK BAHASAN SUB POKOK BAHASAN METODE ESTIMASI WAKTU IT Acquisition and Implementation (2) 1. Application Controls and Maintenance 2. Change Management - Ceramah - Diskusi - Tanya Jawab - 90’ - 40’ - 20’ IT Delivery and Support (1) 1. Service Management 2. Security and Service Continuity - Ceramah - Diskusi - Tanya Jawab - 90’ - 40’ - 20’ IT Delivery and Support (2) 1. System Management 2. Operations Management - Ceramah - Diskusi - Tanya Jawab - 90’ - 40’ - 20’ Virtual Environment and Virtual Security 1. Virtual Environment 2. Virtual Security - Ceramah - Diskusi - Tanya Jawab - 90’ - 40’ - 20’ JENIS EVALUASI SUMBER BELAJAR 1 (h.375 – h.394) Tugas 5 Tugas 6 1 (h.399 – h.419) 1 (h.429 – h.446) 1 (h.467 – h.484) 1 (h.489 – h.507) 1 (h.511 – h.526) 1 (h.533 – h.554) 1 (h.559 – h.577) 2 (Chapter 5: Auditing Switches, Halaman 4 dari 7 PERT KE 14 TUJUAN INSTRUKSIONAL UMUM 2. Discussion of the security risks and controls inherent in a virtual environment. Internet security has had signifi cant impacts on businesses worldwide. The emergence of new and more dangerous types of attacks from cybercriminals continues to pose big challenges for businesses and security professionals POKOK BAHASAN Discusses the risks associated E-Commerce with doing business on the Internet and controls that help mitigate these risks. The complex nature of E-Commerce systems means that they are always at risk if they do not monitor internal and external security trends at all times SUB POKOK BAHASAN 1. E-Commerce 2. Quiz METODE ESTIMASI WAKTU - Ceramah - Diskusi - Tanya Jawab - 100’ - 50’ JENIS EVALUASI SUMBER BELAJAR Routers, and Firewalls 2 (Chapter 11: Auditing WLAN and Mobile Devices) Tugas 1 (h.583 – Kelompok 2 h.600) 2 (Chapter 5: Auditing Switches, Routers, and Firewalls Halaman 5 dari 7 Disahkan Oleh: Diperiksa Oleh: Dibuat Oleh: Helmy Widyantara, S.Kom., M.Eng Wakil Ketua I Tutut Wurijanto, M.Kom Kaprodi S1 Sistem Informasi Dra. Sulis Janu Hartati, MT Ketua Tim GBPP Halaman 6 dari 7