A COMPREHENSIVE REVIEW OF IT AUDIT METHODOLOGIES IN THE AGE OF QUANTUM COMPUTING

Author:
Ololade Gilbert Fakeyede, Evelyn Chinedu Okeleke, Patrick Azuka Okeleke, Olubukola Rhoda Adaramodu

Doi: 10.26480/jtin.02.2023.85.92

This is an open access article distributed under the Creative Commons Attribution License CC BY 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited

The emergence of quantum computing presents a profound challenge and opportunity for information technology (IT) audit methodologies and IT security. Quantum computing’s potential to break classical encryption methods and its promise of exponential computational power necessitate a proactive response. This comprehensive review explores the fundamentals of quantum computing, the vulnerabilities of classical encryption, the transition to quantum-safe encryption, and the role of IT auditors in navigating this quantum landscape. Additionally, we address emerging quantum technologies, ethical considerations, and the interplay between quantum computing and IT security. To thrive in the quantum era, organisations are advised to plan for quantum-safe transitions, invest in quantum-resistant cryptography, monitor evolving regulations, develop quantum-ready workforces, integrate Quantum Key Distribution (QKD), and adopt a long-term security strategy. Adapting IT audit methodologies to the quantum era requires a multidisciplinary approach, and the recommendations provided here aim to guide organisations in securing their digital assets in this transformative quantum-empowered future.

Pages 85-92
Year 2023
Issue 2
Volume 3