Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

Slides:



Advertisements
Similar presentations
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
Advertisements

Auditing Concepts.
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 10-1 Accounting Information Systems 9 th Edition Marshall.
Auditing Computer-Based Information Systems
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
Auditing Computer-Based Information Systems
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
MODERN AUDITING 7th Edition
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
THE AUDITING OF INFORMATION SYSTEMS
Chapter 9 The Study of Internal Control and Assessment of Control Risk
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Auditing A Risk-Based Approach To Conducting A Quality Audit
Internal Control in a Financial Statement Audit
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Impact of Information Technology on the Audit.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 12-1 Chapter Twelve Auditing the Human Resource Management Process.
Information Systems Auditing and Assurance
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Today’s Lecture application controls audit methodology.
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Overview of Systems Audit
The Islamic University of Gaza
Auditing Internal Control over Financial Reporting
Auditing Complex EDP Systems
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
Implications of Information Technology for the Audit Process
Internal Control in a Financial Statement Audit
Copyright © 2007 Pearson Education Canada 1 Chapter 13: Audit of the Sales and Collection Cycle: Tests of Controls.
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
Evaluation of Internal Control System
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
S4: Understanding the IT environment of the entity.
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Fundamentals I: Accounting Information Systems McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 6 Internal Control in a Financial Statement Audit Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
AUDIT IN COMPUTERIZED ENVIRONMENT
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 6-1 Chapter Six Internal Control in a Financial Statement Audit.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 7-1 Chapter Seven Auditing Internal Control over Financial Reporting.
Auditing Internal Control Studies & Risk Assessment Chapter 9 Internal Control Studies & Risk Assessment Chapter 9.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Auditing Internal Control over Financial Reporting Chapter Seven.
MODERN AUDITING 7th Edition Developed by: Gregory K. Lowry, MBA, CPA Saint Paul’s College John Wiley & Sons, Inc. William C. Boynton California Polytechnic.
Audit Evidence Process
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
The Impact of Information Technology on the Audit Process
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Auditing the Human Resource Management Process Chapter Twelve.
Chapter 3-Auditing Computer-based Information Systems.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
Chapter 12 Auditing the Human Resource Management Process Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Internal Control Chapter 7. McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, Inc., All Rights Reserved. 7-2 Summary of Internal Control Definition.
8 INTERNAL CONTROL. Definition Duty  mgt (CEO)  Board  Internal auditor  Employee  External person.
H-1 McGraw-Hill/Irwin ©2005 by the McGraw-Hill Companies, Inc. All rights reserved. Module H Information Systems Auditing "To err is human, but to really.
Modern Auditing: Assurance Services and the Integrity of Financial Reporting, 8th Edition William C. Boynton California Polytechnic State University at.
Auditing Concepts.
Internal Control in a Financial Statement Audit
PLANNING, MATERIALITY AND ASSESSING THE RISK OF MISSTATEMENT
Modern Auditing: Assurance Services and the Integrity of Financial Reporting, 8th Edition William C. Boynton California Polytechnic State University at.
The Impact of Information Technology on the Audit Process
Defining Internal Control
The Impact of Information Technology on the Audit Process
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education. Auditing & Assurance Services, 6e

Module H Auditing and Information Technology "To err is human, but to really foul things up you need a computer.“ --Paul Ehrlich, American biologist, author, and technology commentator “A common mistake people make with trying to design something completely foolproof is to underestimate the ingenuity of complete fools.” --Douglas Adams, author of The Hitchhiker’s Guide to the Galaxy Mod H-2

Module H Objectives 1.Identify how the use of a automated transaction processing system impacts the audit examination. 2.Provide examples of general controls and understand how these controls relate to transaction processing in an accounting information system. 3.Provide examples of automated application controls and understand how these controls relate to transaction processing in an accounting information system. 4.Describe how the audit team assesses control risk in a IT environment. 5.Identify how audit teams perform tests of controls in a IT environment. 6.Describe the characteristics and control issues associated with end-user and other computing environments. 7.Define and describe computer fraud and the controls that can be used to prevent it. Mod H-3

Major Topics I.Background II.General Controls III.Automated Application Controls IV.Tests of Computer Controls V.End-Use Computing and Other Mod H-4

Issues Introduced in a IT environment 1.Input errors 2.Systematic vs. random processing errors 3.Lack of an audit trail 4.Inappropriate access to computer files and programs 5.Reduced human involvement in processing transactions Mod H-5

Impact of Automated Transaction Processing on the Evaluation of I/C PhaseEffect(s) UnderstandingUnderstand and document controls related to automated processing of transactions AssessmentConsider controls related to automated processing of transactions in preliminary assessment of control risk TestingIdentify, test, and evaluate degree of compliance of controls related to automated processing of transactions Mod H-6

Types of Computer Controls General Controls – Relate to all applications of an accounting information system (pervasive) – Deficiencies will affect processing of various types of transactions Automated Application Controls – Relate to specific business activities – Directly address management assertions Mod H-7

Major Topics I.Background II.General Controls III.Automated Application Controls IV.Tests of Computer Controls V.End-Use Computing and Other Mod H-8

Categories of General Controls 1.Program development controls 2.Program change controls 3.Computer operations controls 4.Access to programs and data controls Mod H-9

Program Development Controls Acquisition and development of new programs is properly authorized and conducted with organization policies Appropriate users participate in process Programs and software are tested and validated prior to use Programs and software have appropriate documentation Mod H-10

Systems Development Life Cycle Identify Requirements Feasibility Analysis Determine System Specifications Develop Programs Design Procedures System Analysis Maintenance/ System Auditing Daily Operations Conversion/ Implementation Employee Training Mod H-11

Program Change Controls Modifications to existing programs are properly authorized and conducted with entity policies Appropriate users participate in process Programs are tested and validated prior to use Programs have appropriate documentation Additional controls related to “emergency” change requests and migrating new programs into operations Mod H-12

Computer Operations Controls Relate to processing of transactions and backup and recovery of data Processing environments –Batch processing: Similar transactions collected and processed simultaneously –Real-time processing: Transactions processed as they occur without delay Mod H-13

Examples of Computer Operations Controls Methods of resolving processing failures Separation of duties –Systems analysts –Programmers –Computer operators Files and data –Labels to ensure use of appropriate file –Storage in remote, protected locations (disaster recovery) –Grandfather-father-son Mod H-14

Access to Programs and Data Controls Relate to restricting use of programs and data to authorized users Examples –Passwords –Automatic terminal logoff –Review access rights and compare to usage (through logs) –Report and communicate security breaches Mod H-15

General Controls and Assertions AssertionExplanationExamples AccuracyEnsure accuracy of data and testing computer programs prior to implementation Hardware controls Program development controls Program change controls Computer operations controls OccurrenceRestricting inappropriate access reduces probability of fictitious transactions Computer operations controls Access to programs and data controls Mod H-16

Major Topics I.Background II.General Controls III.Automated Application Controls (I-P-O) IV.Tests of Computer Controls V.End-Use Computing and Other Mod H-17

Input Controls Provide reasonable assurance that input is properly authorized and accurately entered for processing –All transactions input –Transactions input once and only once –Transactions input accurately Mod H-18

Summary of Input Controls Mod H-19

Summary of Input Controls (Continued) Input accurate All transactions entered Transactions entered only once Sequence tests X Limit and reasonableness tests X Error correction and resubmission X Mod H-20

Processing Controls Provide reasonable assurance that –Transactions are processed accurately –All transactions are processed –Transactions are processed once and only once Examples –Test processing accuracy of programs –File and operator controls –Run-to-run totals –Control total reports –Limit and reasonableness tests –Error correction and resubmission Mod H-21

Output Controls Provide reasonable assurance that –Output reflects accurate processing –Only authorized persons receive output or have access to files generated from processing Examples –Review of output for reasonableness –Control total reports –Master file changes –Output distribution limited to appropriate person(s) Mod H-22

Major Topics I.Background II.General Controls III.Automated Application Controls IV.Tests of Computer Controls V.End-Use Computing and Other Mod H-23

Forming an Assessment of Control Risk 1.Identify specific types of misstatement that could occur 2.Identify points where misstatements could occur 3.Identify control procedures designed to prevent or detect misstatements –General controls and automated application controls 4.Evaluate design of control procedures –Are tests of controls cost-effective? Mod H-24

Testing Computer Controls Testing controls –Inquiry –Observation –Inspect documentary evidence –Reperformance (including test data) Evaluating computer processing and programs –Test processing of actual transactions –Test processing of simulated transactions Mod H-25

Test Data Test data: Simulated transactions containing known errors to test the client’s controls Only one type of each kind of transaction error needs to be tested. Mod H-26 Auditors’ Manual Processing Client System Processing Compare

Major Topics I.Background II.General Controls III.Automated Application Controls IV.Tests of Computer Controls V.End-Use Computing and Other Mod H-27

End-User Environments Control issues –Lack of separation of duties –Lack of physical security –Lack of documentation and testing –Limited computer knowledge of personnel Implications –Limit concentration of functions and increase supervision –Access to program and data controls are critical Mod H-28

Computer Abuse/Fraud Use of computer technology by perpetrator to achieve gains at the expense of a victim Controls –Preventative: Stop fraud from entering system –Detective: Identify fraud when it enters system –Damage-limiting: Reduce monetary impacts of fraud and control to specified levels Mod H-29