This research report focuses on the information systems that are being utilized by Apple Inc. The report concentrates on the lists of assets of Apple Inc. that is vulnerable to destruction, abuse, error, and system quality issues. It also discusses the risk management techniques adopted by Apple Inc. for ensuring availability, reliability, confidentiality, security of the digital business processes, and integrity. The report evaluates the risk management including risk identification, risk assessment, and risk control for Apple Inc. followed by the Illustration and identification of the general management controls and application controls for Apple Inc. The report concentrates on the audit plan and processes of Apple Inc and the impact of human factors on risk management and security.