ABSTRACT

This chapter covers the assessment of IT systems in order to determine the sources of evidentiary data appropriate for analysis as well as the techniques the auditor may use in order to obtain, extract, and if necessary, transform such data to facilitate analysis.