Auditing 81.3550 Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.

Slides:



Advertisements
Similar presentations
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
Advertisements

Computer Fraud Chapter 5.
ITAuditing Using GAS & CAATs
Overview of IS Controls, Auditing, and Security Fall 2005.
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 10-1 Accounting Information Systems 9 th Edition Marshall.
Database Management System MIS 520 – Database Theory Fall 2001 (Day) Lecture 13.
Information Technology Control Day IV Afternoon Sessions.
Auditing Computer-Based Information Systems
Chapter 3 with added info
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
Auditing Computer-Based Information Systems
9 - 1 Computer-Based Information Systems Control.
The Islamic University of Gaza
Chapter 10: Auditing the Expenditure Cycle
4/15: Security & Controls in IS Systems Vulnerabilities Controls: what to use to guard against vulnerabilities –General controls –Application controls.
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
Chapter 14 System Controls. A Quote “The factory of the future will have only two employees, a man and a dog. The man will be there to feed the dog. The.
THE AUDITING OF INFORMATION SYSTEMS
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
1 Output Controls Ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. Exposures of this sort can cause serious.
Computer Assisted Audit Techniques
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Impact of Information Technology on the Audit.
Chapter 13 Auditing Information Technology
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Information Systems Auditing and Assurance
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Today’s Lecture application controls audit methodology.
Auditors: Why do they ask all those questions? LGC Resource April 2015 Penny Austin, Assistant Director – IS Local Government Audit.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
The Islamic University of Gaza
Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Chapter 5 Internal Control over Financial Reporting
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Auditing Complex EDP Systems
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
Implications of Information Technology for the Audit Process
Copyright © 2007 Pearson Education Canada 1 Chapter 13: Audit of the Sales and Collection Cycle: Tests of Controls.
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
S4: Understanding the IT environment of the entity.
 2003 Pearson Education Canada Inc. CHAPTER 22 Auditing Automated Information Systems: Special Topics.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal.
Today’s Lecture Covers
Controls design Controls are “the plan of organization and all the methods and measures to safeguard its assets, check the accuracy and reliability of.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
AUDIT IN COMPUTERIZED ENVIRONMENT
Viewing Information Systems Security. The basic objectives of Information Security are the same as the basic objectives of EDP auditing. They are: 1.To.
Auditing Internal Control Studies & Risk Assessment Chapter 9 Internal Control Studies & Risk Assessment Chapter 9.
Auditing Data Management Systems Chapter 3 with added info.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
This Lecture Covers Roles of –Management –IT Personnel –Users –Internal Auditors –External Auditors.
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
The Impact of Information Technology on the Audit Process
Chapter 3-Auditing Computer-based Information Systems.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
Managing the IT Function
The Impact of Information Technology on the Audit Process
Computer-Based Processing: Developing an Audit Assessment Approach
The Impact of Information Technology on the Audit Process
CHAPTER 15 AUDITING EDP SYSTEMS.
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22

Highlights

Auditing and Computer Systems As client computing facilities become more sophisticated, “paperless” accounting systems evolve wherein little “hard copy” documentation is produced Evidence forms may differ slightly but the basic procedures and objects are often similar. As client computing facilities become more sophisticated, “paperless” accounting systems evolve wherein little “hard copy” documentation is produced Evidence forms may differ slightly but the basic procedures and objects are often similar.

Challenges of Sophisticated Computer Systems - audit trails, documentation may only exist on disk (no printed copies) - program errors may exist that cause uniform transaction errors - in some circumstances, controls may have to make up for a lack of adequate segregation of duties - detecting unauthorized access may be difficult - audit trails, documentation may only exist on disk (no printed copies) - program errors may exist that cause uniform transaction errors - in some circumstances, controls may have to make up for a lack of adequate segregation of duties - detecting unauthorized access may be difficult

electronic method of sending documents between companies no “paper trail” for the auditor to follow increased emphasis on front-end controls security becomes key element in controlling system electronic method of sending documents between companies no “paper trail” for the auditor to follow increased emphasis on front-end controls security becomes key element in controlling system Challenges of Sophisticated Computer Systems

Electronic Fund Transfers (EFT) also referred to as electronic commerce, or e-commerce greatly increased through “internet shopping” direct payment systems, e.g. payroll, remove the paper trail once relied upon by auditors also referred to as electronic commerce, or e-commerce greatly increased through “internet shopping” direct payment systems, e.g. payroll, remove the paper trail once relied upon by auditors

Data Communications Risks and Control Procedures As part of the audit equation need to assess computer control systems in place Starting point obtaining clients computer system documentation, diagrams, policies and procedures

loss of confidential information, through corporate espionage or “hackers” -create multiple levels of passwords; change regularly data intercepted during data communication -encrypt (scramble) information during transmission loss of confidential information, through corporate espionage or “hackers” -create multiple levels of passwords; change regularly data intercepted during data communication -encrypt (scramble) information during transmission Data Communications Risks and Control Procedures

inappropriate access to information via the Internet - use of firewalls - physically separate homepage equipment and software from other systems viruses invading systems - same as above - use current anti-virus software inappropriate access to information via the Internet - use of firewalls - physically separate homepage equipment and software from other systems viruses invading systems - same as above - use current anti-virus software Data Communications Risks and Control Procedures

Organization should have a well planned disaster recovery plan Should include regular offsite storage of prior data Organization should have a well planned disaster recovery plan Should include regular offsite storage of prior data Data Communications Risks and Control Procedures

Disaster Recovery Process Basics 1.Management commitment to disaster recovery planning. 2.Ranking of business processes: What will happen if process x fails? 3.Identifying minimum resources required to restore vital operations. 1.Management commitment to disaster recovery planning. 2.Ranking of business processes: What will happen if process x fails? 3.Identifying minimum resources required to restore vital operations.

Disaster Recovery Process Basics 4.Prepare a data centre plan and a user plan. 5.Test the plan, to discover any shortcomings in the plan before disaster strikes. 4.Prepare a data centre plan and a user plan. 5.Test the plan, to discover any shortcomings in the plan before disaster strikes.

Categories of Controls in an EDP Environment GENERAL CONTROLS relate to all parts of the EDP system. APPLICATION CONTROLS relate to one specific use of the system payroll system expenditure system revenue system revenue system

Categories of General Controls 1. plan of organization Separate duties in EDP systems as discussed in chapter 9.

2. systems development and documentation controls each system should have documented, authorized specifications any system changes should be author- ized and documented 2. systems development and documentation controls each system should have documented, authorized specifications any system changes should be author- ized and documented Categories of General Controls

3. hardware controls Categories of General Controls -diagnostic routines - hardware or software that checks the system’s internal operations and devices -boundary protection - ensures that simultaneous jobs do not interfere with one another -periodic maintenance - hardware should be examined periodically by qualified technicians

4. controls over access to equipment, programs, and data files – limited on need basis Categories of General Controls ACCESS TO: program documentation data files & programs computer hardware

1. Responsibility for control 2. Information system meets needs of entity 3. Efficient implementation of information systems 4.Efficient and effective maintenance of information systems 5.Effective and efficient development and acquisition of information systems 6.Present and future requirements of users can be met 7.Efficient and effective use of resources within information systems processing 1. Responsibility for control 2. Information system meets needs of entity 3. Efficient implementation of information systems 4.Efficient and effective maintenance of information systems 5.Effective and efficient development and acquisition of information systems 6.Present and future requirements of users can be met 7.Efficient and effective use of resources within information systems processing Objectives of General Controls

8.Complete, accurate and timely processing of authorized information systems 9.Appropriate segregation of incompatible functions 10.All access to information and information systems is authorized 11.Hardware facilities are physically protected from unauthorized access, loss or damage 12. Recovery and resumption of information systems processing 13.Maintenance and recovery of critical user activities 8.Complete, accurate and timely processing of authorized information systems 9.Appropriate segregation of incompatible functions 10.All access to information and information systems is authorized 11.Hardware facilities are physically protected from unauthorized access, loss or damage 12. Recovery and resumption of information systems processing 13.Maintenance and recovery of critical user activities Objectives of General Controls

Physical Access Controls Visitor identification Security guards Security systems Locked areas

3 Basic categories: Application Controls input processing output

Input Controls input data should be authorized & approved the system should edit the input data & prevent errors Examples include: validity checks, field checks, reasonableness check, record counts etc. input data should be authorized & approved the system should edit the input data & prevent errors Examples include: validity checks, field checks, reasonableness check, record counts etc.

Processing Controls assure that data entered into the system are processed, processed only once, and processed accurately

Examples control, batch, or proof total - a total of a numerical field for all the records of a batch that normally would be added (example: wages expense) logic test - ensures against illogical combina tions of information (example: a salaried em- ployee does not report hours worked) Examples control, batch, or proof total - a total of a numerical field for all the records of a batch that normally would be added (example: wages expense) logic test - ensures against illogical combina tions of information (example: a salaried em- ployee does not report hours worked) Processing Controls

Output Controls assure that data generated by the system are valid, accurate, complete, and distributed to authorized persons in appropriate quantities

1. Design application controls with regard to: - segregation of incompatible functions - security - development - processing of information systems 2. Information provided by the systems is: - complete - accurate - authorized 3. Existence of adequate management trails 1. Design application controls with regard to: - segregation of incompatible functions - security - development - processing of information systems 2. Information provided by the systems is: - complete - accurate - authorized 3. Existence of adequate management trails Objectives of Application Controls

general approaches There are two general approaches to auditing EDP systems: 1. Auditing “around” the computer involves extensive testing of the inputs and outputs of the EDP system and little or no testing of processing or computer hardware. This approach involves no tests of the computer programs and no auditor use of the computer.

1. Auditing “around” the computer depends on a visible, traceable, hard copy audit trail made of manually prepared and computer- prepared documents. 1. Auditing “around” the computer depends on a visible, traceable, hard copy audit trail made of manually prepared and computer- prepared documents. general approaches There are two general approaches to auditing EDP systems:

2. Auditing with use of the computer involves extensive testing of computer hardware and software. general approaches There are two general approaches to auditing EDP systems:

1. Test data involves auditor preparation of a series of fictitious transactions; many of those transactions will contain intentional errors. The auditor examines the results and determines whether the errors were detected by the client’s system. 1. Test data involves auditor preparation of a series of fictitious transactions; many of those transactions will contain intentional errors. The auditor examines the results and determines whether the errors were detected by the client’s system. Techniques for auditing with use of the computer

What are the shortcomings of the use of test data? - possibility of accidental integration of fictitious and actual data - preparation of test data that examines all aspects of the application is difficult - the auditor must make sure that the program being tested is the one actually used in routine processing - possibility of accidental integration of fictitious and actual data - preparation of test data that examines all aspects of the application is difficult - the auditor must make sure that the program being tested is the one actually used in routine processing

2. Parallel simulation techniques for auditing with use of the computer -the auditor writes a computer program that replicates part of the client’s system -the auditor’s program is used to process actual client data - the results from the auditor’s program and that of the client’s routine processing are compared

Auditing Software Generalized audit software involves the use of auditor programs, client data, and auditor hardware. The primary advantage of GAS is that the client data can be down-loaded into the auditor’s system and manipulated in a variety of ways. Generalized audit software involves the use of auditor programs, client data, and auditor hardware. The primary advantage of GAS is that the client data can be down-loaded into the auditor’s system and manipulated in a variety of ways.

Common Audit Software Functions - verifying extensions and footings - examining records - comparing data on separate files - summarizing or re-sequencing data and performing analyses - comparing data obtained through other audit procedures with company records - selecting audit samples - printing confirmation requests - verifying extensions and footings - examining records - comparing data on separate files - summarizing or re-sequencing data and performing analyses - comparing data obtained through other audit procedures with company records - selecting audit samples - printing confirmation requests