THE AUDITING OF INFORMATION SYSTEMS

Slides:



Advertisements
Similar presentations
Overview of IS Controls, Auditing, and Security Fall 2005.
Advertisements

General Ledger and Reporting System
Accounting Information Systems 9th Edition
Auditing Concepts.
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 10-1 Accounting Information Systems 9 th Edition Marshall.
AUDITING COMPUTER-BASED INFORMATION SYSTEMS
Information Technology Control Day IV Afternoon Sessions.
Auditing Computer-Based Information Systems
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
Auditing Computer-Based Information Systems
The Islamic University of Gaza
The Islamic University of Gaza
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Demand for Audit and Other Assurance Services Chapter 1.
The Demand for Audit and Other Assurance Services Chapter 1.
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
1 Output Controls Ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. Exposures of this sort can cause serious.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Auditing Computer-Based Information Systems
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Today’s Lecture application controls audit methodology.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
TO ENSURE  THE EFFICIENT & EFFECTIVE DEVELOPMENT / MAINTENANCE OF IT SYSTEMS  PROPER IMPLEMENTATION OF IT SYSTEMS  PROTECTION OF DATA AND PROGRAMS.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Auditing Internal Control over Financial Reporting
Chapter Three IT Risks and Controls.
Chapter 5 Internal Control over Financial Reporting
Considering Internal Control
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
Internal Control in a Financial Statement Audit
1 - 1 ©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder The Demand for Audit and Other Assurance Services Chapter 1.
1 Chapter Three IT Risks and Controls. 2 The Risk Management Process Identify IT Risks Assess IT Risks Identify IT Controls Document IT Controls Monitor.
Information Systems Security Operational Control for Information Security.
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
Evaluation of Internal Control System
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
S4: Understanding the IT environment of the entity.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
College Reviews An Overview Presented by Howard Lutwak, CIA Director of Internal Audit January 2004.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal.
Today’s Lecture Covers
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 7-1 Chapter Seven Auditing Internal Control over Financial Reporting.
MBA 664 Database Management Dave Salisbury ( )
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Auditing Internal Control over Financial Reporting Chapter Seven.
©2010 Prentice Hall Business Publishing, Auditing 13/e, Arens/Elder/Beasley The Demand for Audit and Other Assurance Services Chapter 1.
Chapter 3-Auditing Computer-based Information Systems.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Auditing Concepts.
The Demand for Audit and Other Assurance Services
The Demand for Audit and Other Assurance Services
Processing Integrity and Availability Controls
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

THE AUDITING OF INFORMATION SYSTEMS Lecture Outline 11 THE AUDITING OF INFORMATION SYSTEMS

What is auditing? “Auditing is a systematic process of objectively obtaining and evaluating evidence regarding assertions about economic actions and events to ascertain the degree of correspondence between those assertions and established criteria and communicating the results to interested users” American Accounting Association

Two types of auditors External auditor: The primary mission of the external auditors is to provide an independent opinion on the organization's financial statements, annually. They are from outside the organization.

Two types of auditors Internal auditor: works inside an organization Have a broader mandate: Is the organization fulfilling its mission? Review the reliability and integrity of operating and financial information Are org systems intended to comply with policies, plans and regulations being followed? How are assets safeguarded? Is operational efficiency being promoted?

Internal Controls of An Organization AN INTERNAL CONTROL: Any policy, procedure, process, or practice designed to provide reasonable assurance that an organization’s objectives will be achieved.  Specifically to ensure:     assets are safeguarded against theft & misuse     operations are efficient and effective     financial reporting is reliable and complete     compliance with applicable laws & regulations     

Mandate of an Internal Auditor The main job of an internal auditor is to assess and report on the existence and proper functioning of internal controls in an organization Some of these controls relate to an organization’s information systems

Information System Controls Controls are implemented to counteract risks General (overall) controls, e.g. passwords, virus protection software, restricted physical access, backups of data files Controls for a specific system: input controls, data storage controls, processing controls, [output controls] Also: system development controls, system acquisition controls, system modification controls

Communicating Audit Results THE NATURE OF AUDITING Planning An overview of the auditing process All audits follow a similar sequence of activities and may be divided into four stages: Planning Collecting evidence Evaluating evidence Communicating audit results Collecting Evidence Evaluating Evidence Communicating Audit Results

THE NATURE OF AUDITING At all stages of the audit, findings and conclusions are carefully documented in working papers. Documentation is critical at the evaluation stage, when final conclusions must be reached and supported.

INFORMATION SYSTEMS AUDIT The purpose of an information systems audit is to review and evaluate the internal controls that are part of the information system, that are intended to protect the system.

IS COMPONENTS AND AUDIT OBJECTIVES Objective 1: Overall Security Objective 5: Source Data Source Data Data Entry Objective 2: Program Development and Acquisition Source Data Programs Files Processing Output Objective 3: Program Modification Objective 6: Data Files Objective 4: Computer Processing

Making Sense of This There are six areas of risk in an organization’s information systems as identified here: 1.Overall (General) 2. System development, acquisition and 3. modification 4. The working of the programs in the system (processing) 5. The capture and input of data into the system (source data) 6. The storage of data that has been input (data files)

For each area of risk (1 to 6) A.What are some actual risks (e.g., possible error or fraud)? B. What are some controls to counteract these risks? C. What might an internal auditor do, specifically, to assess each such control, and how would s/he do it?

OBJECTIVE 1: OVERALL SECURITY 1A General Risks: Break-in to facilities where computer is housed and destruction of data Theft of data as it is transmitted Virus infection of system Computer breakdown

OBJECTIVE 1: OVERALL SECURITY Evaluate General Controls 1 B Control procedures to minimize general risks: Developing an information security/protection plan. Restricting physical and logical access. Encrypting data. Protecting against viruses. Implementing firewalls. Instituting data transmission controls. Preventing and recovering from system failures or disasters, including: Designing fault-tolerant systems. Preventive maintenance. Backup and recovery procedures. Disaster recovery plans. Adequate insurance.

OBJECTIVE 1: OVERALL SECURITY 1C1 Audit procedures: Systems review Inspecting computer sites. Interviewing personnel. Reviewing policies and procedures. Examining access logs, insurance policies, and the disaster recovery plan.

OBJECTIVE 1: OVERALL SECURITY 1C2 Audit procedures: Tests of controls Auditors test security controls by: Observing procedures. Verifying that controls are in place and work as intended.

OBJECTIVE 2: Program development and acquisition 2A. Risks: Types of errors and fraud Two things can go wrong in program development: Inadvertent errors due to careless programming or misunderstanding specifications; or Deliberate insertion of unauthorized instructions into the programs.

OBJECTIVE 2: PROGRAM DEVELOPMENT AND ACQUISITION 2B Control procedures: The preceding problems can be controlled by requiring: Management and user authorization and approval Thorough testing Proper documentation Thorough step-by-step documentation in acquisition of canned software systems

OBJECTIVE 2: PROGRAM DEVELOPMENT AND ACQUISITION 2C Audit procedures: Systems review The auditor’s role in systems development should be limited to an independent review of system development activities. To maintain necessary objectivity for performing an independent evaluation, the auditor should not be involved in system development. During the systems review, the auditor should gain an understanding of development procedures and controls therein by discussing them with management, users, and IS personnel.

OBJECTIVE 3: PROGRAM MODIFICATION 3A Risks: Errors and fraud - program change implemented incorrectly - program change introduces new errors into existing system - program change not implemented - program change not documented

OBJECTIVE 3: PROGRAM MODIFICATION 3B Control procedures When a program change is submitted for approval, a list of all required updates should be compiled by management and program users. Changes should be thoroughly tested and documented. During the change process, the developmental version of the program must be kept separate from the production version. When the amended program has received final approval, it should replace the production version.

OBJECTIVE 3: PROGRAM MODIFICATION 3C1 Audit procedures: Tests of controls An important part of these tests is to verify that program changes were identified, listed, approved, tested, and documented.

OBJECTIVE 3: PROGRAM MODIFICATION To test for unauthorized program changes, auditors can use a source code comparison program to compare the current version of the program with the original source code.

OBJECTIVE 3: PROGRAM MODIFICATION - Auditors should observe testing and implementation, review related authorizations, and, if necessary, perform independent tests for each major program change. Auditors should always test programs on a surprise basis to protect against unauthorized changes being inserted after the examination is completed and then removed prior to scheduled audits.

OBJECTIVE 4: COMPUTER PROCESSING 4A Types of errors and fraud During computer processing, the system may: Fail to detect erroneous input. Improperly correct input errors. Process erroneous input. Improperly distribute or disclose output.

OBJECTIVE 4: COMPUTER PROCESSING 4B Control procedures Computer data editing routines. Reconciliation of batch totals. Effective error correction procedures. Effective handling of data input and output by data control personnel. File change listings and summaries prepared for user department review. Maintenance of proper environmental conditions in computer facility.

OBJECTIVE 4: COMPUTER PROCESSING 4C1 Audit Procedures Processing test data Involves testing a program by processing a hypothetical series of valid and invalid transactions. The program should: Process all the valid transactions correctly. Identify and reject the invalid ones. All logic paths should be checked for proper functioning by one or more test transactions, including: Records with missing data. Fields containing unreasonably large amounts. Invalid account numbers or processing codes. Non-numeric data in numeric fields. Records out of sequence.

OBJECTIVE 4: COMPUTER PROCESSING 4C2 The following resources are helpful when preparing test data: A listing of actual transactions. The transactions that the programmer used to test the program. A test data generator program, which automatically prepares test data based on program specifications.

OBJECTIVE 4: COMPUTER PROCESSING 4C3 Although processing test transactions is usually effective, it has the following disadvantages: The auditor must spend considerable time understanding the system and preparing an adequate set of test transactions. Care must be taken to ensure test data do not affect the company’s files and databases.

OBJECTIVE 4: COMPUTER PROCESSING 4C4 Analysis of program logic If an auditor suspects that a particular program contains unauthorized code or serious errors, a detailed analysis of the program logic may be necessary. Done only as a last resort because: It’s time-consuming Requires programming language proficiency

OBJECTIVE 5: SOURCE DATA - Input 5A Types of errors and fraud Inaccurate source data Unauthorized source data

OBJECTIVE 5: SOURCE DATA 5B Control procedures Effective handling of source data [input documents] input by data entry dept personnel User authorization of source data input Logging of the receipt, movement, and disposition of source data input Effective procedures for correcting and resubmitting erroneous data

OBJECTIVE 5: SOURCE DATA 5C Audit Procedures: Auditors should test source data controls on a regular basis, because the strictness with which they are applied may vacillate.

OBJECTIVE 6: DATA FILES 6A1The sixth objective concerns the accuracy, integrity, and security of data stored in machine-readable files (including relational tables in a database) Data storage risks include: Unauthorized modification of data Destruction of data Disclosure of data If file controls are seriously deficient, especially with respect to access or backup and recovery, the auditor should strongly recommend they be rectified.

OBJECTIVE 6: DATA FILES 6A2 Types of errors and fraud Destruction of stored data due to: Inadvertent errors Hardware or software malfunctions Intentional acts of sabotage or vandalism Unauthorized modification or disclosure of stored data

OBJECTIVE 6: DATA FILES 6B Control procedures restrictions on physical access to data files Logical access (access by program) controls using passwords Encryption of highly confidential data Use of virus protection software Maintenance of backup copies of all data files in an off-site location

OBJECTIVE 6: DATA FILES 6C1 Audit procedures: System review Review logical access policies and procedures. Review operating documentation to determine prescribed standards for: Use of file labels and write-protection mechanisms. Use of virus protection software. Use of backup storage. System recovery, including checkpoint and rollback procedures.

OBJECTIVE 6: DATA FILES 6C2 Review systems documentation to examine prescribed procedures for: Use of concurrent update controls and data encryption Control of file conversions Reconciling master file totals with independent control totals Examine disaster recovery plan. Discuss data file control procedures with systems managers and operators.

AUDIT SOFTWARE 6C3 Computer audit software (CAS) or generalized audit software (GAS) are computer programs that have been written especially for auditors. Two of the most popular: Audit Control Language (ACL) IDEA Based on auditor’s specifications, CAS generates programs that perform the audit function. CAS is ideally suited for examination of large data files to identify records needing further audit scrutiny.

Making Sense of This There are six areas of risk in an organization’s information systems as identified here: 1.Overall (General) 2. System development, acquisition and 3. modification 4. The working of the programs in the system (processing) 5. The capture and input of data into the system (source data) 6. The storage of data that has been input (data files)

For each area of risk (1 to 6) A.What are some actual risks (e.g., possible error or fraud)? B. What are some controls to counteract these risks? C. What might an internal auditor do, specifically, to assess each such control, and how would s/he do it?