1. INTRODUCTION
1.1 The advent of Information Technology has changed the way we work in many
ways, and audit is no exception. The now almost ubiquitous Computer, though
undoubtedly one of the most effective business tools, has also brought with it
vulnerabilities of the automated business environment. The pen and paper of manual
transactions have made way for the online data entry of computerized applications; the
locks and keys of filing cabinets have been replaced by passwords and identification
codes that restrict access to electronic files. Each new vulnerability needs to be
controlled; assessing the adequacy of each control requires new methods of auditing.