1 Output Controls Ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. Exposures of this sort can cause serious.

Slides:



Advertisements
Similar presentations
Chapter 6 Computer Assisted Audit Tools and Techniques
Advertisements

Presented to the Tallahassee ISACA Chapter
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
ITAuditing Using GAS & CAATs
General Ledger and Reporting System
Auditing Concepts.
Information Technology Control Day IV Afternoon Sessions.
Auditing Computer-Based Information Systems
Auditing Computer Systems
The Islamic University of Gaza
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
Chapter 14 System Controls. A Quote “The factory of the future will have only two employees, a man and a dog. The man will be there to feed the dog. The.
Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star.
THE AUDITING OF INFORMATION SYSTEMS
Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star.
Concurrent Auditing Techniques
Processing Integrity and Availability Controls
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Impact of Information Technology on the Audit.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Controlling Computer-Based Information Systems, Part II
Chapter 13 Auditing Information Technology
Hall, Accounting Information Systems, 7e ©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Chapter 7: Computer-Assisted Audit Techniques [CAATs]
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Information Systems Auditing and Assurance
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Today’s Lecture application controls audit methodology.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
The Islamic University of Gaza
Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing.
Auditing Internal Control over Financial Reporting
Auditing Complex EDP Systems
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
Implications of Information Technology for the Audit Process
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
S4: Understanding the IT environment of the entity.
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Auditing the Revenue Cycle. Learning Objectives After studying this chapter, you should: Understand the operational tasks associated with the revenue.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal.
Today’s Lecture Covers
AUDIT IN COMPUTERIZED ENVIRONMENT
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 13 – 1 Chapter 13 Auditing Information Technology.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Hall, Accounting Information Systems, 7e ©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Chapter 7: Computer-Assisted Audit Techniques [CAATs]
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
The Impact of Information Technology on the Audit Process
Auditing Of Information Systems Systems Analysis And Design © Systems Analysis And Design © V. Rajaraman OBJECTIVES  Ensure computer based financial and.
Auditing Concepts.
Chapter 11 Designing Inputs, Outputs, and Controls.
Auditing Information Technology
Controlling Computer-Based Information Systems, Part II
APPLICATION RISK AND CONTROLS
Processing Integrity and Availability Controls
Managing the IT Function
The Impact of Information Technology on the Audit Process
Defining Internal Control
The Impact of Information Technology on the Audit Process
Purchases and Cash Disbursements Procedures
Systems Design Chapter 6.
INFORMATION SYSTEMS SECURITY and CONTROL
CHAPTER 15 AUDITING EDP SYSTEMS.
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Presentation transcript:

1 Output Controls Ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. Exposures of this sort can cause serious disruptions to operations and may result in financial losses to a firm. For example, if the checks produced by a firm’s cash disbursements system are lost, misdirected, or destroyed, trade accounts and other bills may go unpaid.

2 Controlling Batch Systems Output See Figure 6-12 for an illustration Each stage in this process is a point of potential exposure where the output could be reviewed, stolen, copied, or misdirected.

3 Output Spooling Output from different applications are directed to disk rather than printer directly to avoid bottleneck; Later, when printer resources become available, the output files are printed. Exposure: a computer criminal may use this opportunity to perform any of the unauthorized acts listed in page 232. Auditors should be aware of these exposures and ensure that proper access control is in place to protect output files.

4 Print Program Controls aims to deal with two types of exposures –production of unauthorized copies of output (this can be controlled if output documents are pre-numbered, otherwise, supervision is needed) –employee browsing of sensitive data (can use multipart paper with the top copy colored black to prevent the print from being read)

5 Bursting When output reports are removed from the printer, they go to the bursting stage to have their pages separated and collated. The primary control is supervision.

6 Waste Computer output waste represents a potential exposure. Passing sensitive output through a paper shredder is one possible solution.

7 Controlling Real-Time Systems Output Real-time systems direct their output to the user’s computer screen, terminal, or printer. The primary threat to real-time output is the interception, disruption, destruction, or corruption of the output message as it passes along the communication link.

8 Controlling Real-Time Systems Output Two types of exposures: –exposures from equipment failure Solutions: Parity/ECC (e.g., Hamming code) –exposures from subversive acts, where by a computer criminal intercepts the output message transmitted between the sender and the receiver Solution: encryption/decryption

9 Testing Computer Application Controls Designed to provide information about the accuracy and completeness of an application’s processes Two general approaches: –black box approach: do not rely on detailed knowledge of application’s internal logic –white box approach: relies on in-depth understanding of internal logic of application being tested

10 Black Box Approach Seek to understand functional characteristics of application by analyzing flowcharts and interviewing knowledgeable personnel in client’s organization Auditors tests application by reconciling production input transactions processed by the application with output results Output results are analyzed to verify application’s compliance with its functional requirements

11 White Box Approach These techniques use small number of specially created test transactions to verify specific aspects of application’s logic and controls Some common types of tests of controls: –authenticity tests: verify that an individual, a programmed procedure, or a message attempting to access a system is authentic –accuracy tests: ensure that system processes only data values that conform to specified tolerances, e.g., range tests, field tests, and limit tests

12 White Box Approach (cont) Some common types of tests of controls: –completeness tests: identify missing data within a single record and entire records missing from a batch, e.g., field tests, record sequence tests, hash totals, and control totals. –redundancy test: determine that an application processes each record only once –access test: ensure that application prevents authorized users from unauthorized access to data

13 White Box Approach (cont) Some common types of tests of controls: –audit trail test: ensure that application creates an adequate audit trail (this includes evidence that application records all transactions in a transaction log) –rounding error tests: verify the correctness of rounding procedures (Salami fraud: takes its name from the analogy of slicing a large salami into many thin pieces; each victim assumes one of the small pieces and is unaware of being defrauded. See Software testing from Wikipedia in relevant links

14 Test Data Method Used to establish application integrity by processing specially prepared sets of input data through production applications that are under review The results of each test are compared to predetermined expectations to obtain an objective evaluation of application logic See Figures 6-16 and 6-17

15 Creating Test Data When creating test data, auditors must prepare a complete set of both valid and invalid transactions. If test data are incomplete, auditors might fail to examine critical branches of application logic and error-checking routines Test transactions should test every possible input error, logical process, and irregularity

16 Tracing Walk through application’s logic See page 241 for an example

17 Integrated Test Facility (ITF) An automatic technique that enables auditor to test an application’s logic and controls during normal operation ITF is one or more audit modules designed into the application during system development ITF audit modules are designed to discriminate between ITF transactions and routine production data. See Figure 6-19 on page 243