The necessity to adapt the audit to the new technology reality, having in the first plan the advantages generate by these technologies and the risks of the environments, has double impact: the information technology is subject and object of the audit. The authors propose to identify the vulnerabilities regarding the information systems security and to elaborate different forms to eliminate the threats.