IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.

Slides:



Advertisements
Similar presentations
Bodnar/Hopwood AIS 7th Ed1 Chapter 5 u TRANSACTION PROCESSING AND INTERNAL CONTROL PROCESS.
Advertisements

Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Accounting Information Systems 9th Edition
Auditing Concepts.
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 10-1 Accounting Information Systems 9 th Edition Marshall.
AUDITING COMPUTER-BASED INFORMATION SYSTEMS
Auditing Computer-Based Information Systems
Internal Control.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
Auditing Computer-Based Information Systems
The Islamic University of Gaza
The Islamic University of Gaza
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Review of Introduction to Auditing
THE AUDITING OF INFORMATION SYSTEMS
Standar Pekerjaan Lapangan: Pemahaman Memadai atas Pengendalian Intern Pertemuan 5.
IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESS
18- 1 © 2006 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 18 Integrated Audits of Internal Control (For Public Companies Under Sarbanes-Oxley.
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Internal Auditing and Outsourcing
Auditing Computer-Based Information Systems
Auditing Internal Control over Financial Reporting
D-1 McGraw-Hill/Irwin ©2005 by the McGraw-Hill Companies, Inc. All rights reserved. Module D Internal, Governmental, and Fraud Audits “I predict that audit.
Auditing Internal Control over Financial Reporting
Chapter 07 Internal Control McGraw-Hill/IrwinCopyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.
INTERNAL CONTROL OVER FINANCIAL REPORTING
Chapter 5 Internal Control over Financial Reporting
Considering Internal Control
Internal Control in a Financial Statement Audit
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
9 - 1 ©2003 Prentice Hall Business Publishing, Essentials of Auditing 1/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 9.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 10.
Learning Objectives LO5 Illustrate how business risk analysis is used to assess the risk of material misstatement at the financial statement level and.
Evaluation of Internal Control System
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
Richard F. Chambers, CIA, CGAP Vice President, IIA Learning Center The Institute of Internal Auditors.
S4: Understanding the IT environment of the entity.
Evaluation of Internal Control System. Learning Objective 1 Contrast management’s need for internal control with the auditor’s need to consider internal.
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
College Reviews An Overview Presented by Howard Lutwak, CIA Director of Internal Audit January 2004.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 7-1 Chapter Seven Auditing Internal Control over Financial Reporting.
BA 427 – Assurance and Attestation Services Lecture 21 Tests of Controls.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Auditing Internal Control over Financial Reporting Chapter Seven.
Copyright © 2007 Pearson Education Canada 1 Chapter 11: Overall Audit Plan and Audit Program.
Auditing of CBIS Chapter Ten. IIA Vs. AICPA IIA Audit Scope –Reliability and integrity –Complies with operating parameters –Review IC to safeguard assets.
©2012 Prentice Hall Business Publishing, Auditing 14/e, Arens/Elder/Beasley Section 404 Audits of Internal Control and Control Risk Chapter.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Chapter 8-1 Chapter 8 Accounting Information Systems Information Technology Auditing Dr. Hisham madi.
Chapter 3-Auditing Computer-based Information Systems.
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Section 404 Audits of Internal Control and Control Risk Chapter 10.
©©2012 Pearson Education, Auditing 14/e, Arens/Elder/Beasley Considering Internal Control Chapter 10.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 10.
© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart1 of 151 C HAPTER 9 Auditing Computer-Based Information Systems.
Section 404 Audits of Internal Control and Control Risk
Auditing Concepts.
Modern Auditing: Assurance Services and the Integrity of Financial Reporting, 8th Edition William C. Boynton California Polytechnic State University at.
Other Assurance Services
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Information Technology Auditing
Presentation transcript:

IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10

Learning Objectives  Scope and objectives of audit work, and major steps in the audit process.  Objectives of an information system audit, and four- step approach necessary for meeting these objectives.  Design a plan for the study and evaluation of internal control in an AIS.  Describe computer audit software, and explain how it is used in the audit of an AIS  Describe the nature and scope of an operational audit. IS 530 : Lecture 102

Auditing  The systematic process of obtaining and evaluating evidence regarding assertions about economic actions and events in order to determine how well they correspond with established criteria IS 530 : Lecture 103

Types of Audits  Financial Examines the reliability and integrity of: o Financial transactions, accounting records, and financial statements.  Information System Reviews the controls of an AIS to assess compliance with: o Internal control policies and procedures and effectiveness in safeguarding assets  Operational Economical and efficient use of resources and the accomplishment of established goals and objectives  Compliance Determines whether entities are complying with: o Applicable laws, regulations, policies, and procedures  Investigative Incidents of possible fraud, misappropriation of assets, waste and abuse, or improper governmental activities. IS 530 : Lecture 104

The Audit Process  Planning  Collecting Evidence  Evaluating Evidence  Communicating Audit Results IS 530 : Lecture 105

Planning the Audit  Why, when, how, whom  Work targeted to area with greatest risk: Inherent o Chance of risk in the absence of controls Control o Risk a misstatement will not be caught by the internal control system Detection o Chance a misstatement will not be caught by auditors or their procedures IS 530 : Lecture 106

Collection Of Audit Evidence Not everything can be examined so samples are collected Observation activities to be audited Review of documentation Gain understanding of process or control Discussions Questionnaires Physical examination Confirmations Testing balances with external 3 rd parties Re-performance Recalculations to test values Vouching Examination of supporting documents Analytical review Examining relationships and trends IS 530 : Lecture 107

Evaluation of Audit Evidence  Does evidence support favorable or unfavorable conclusion?  Materiality How significant is the impact of the evidence?  Reasonable Assurance Some risk remains that the audit conclusion is incorrect. IS 530 : Lecture 108

Communication of Audit Conclusion  Written report summarizing audit findings and recommendations: To management The audit committee The board of directors Other appropriate parties IS 530 : Lecture 109

Risk-Based Audit  Determine the threats (fraud and errors) facing the company. Accidental or intentional abuse and damage to which the system is exposed  Identify the control procedures that prevent, detect, or correct the threats. These are all the controls that management has put into place and that auditors should review and test, to minimize the threats  Evaluate control procedures. A systems review o Are control procedures in place Tests of controls o Are existing controls working  Evaluate control weaknesses to determine their effect on the nature, timing, or extent of auditing procedures. IS 530 : Lecture 1010

Information Systems Audit  Purpose: To review and evaluate the internal controls that protect the system  Objectives: 1. Overall information security 2. Program development and acquisition 3. Program modification 4. Computer processing 5. Source files 6. Data files IS 530 : Lecture 1011

1. Information System Threats  Accidental or intentional damage to system assets  Unauthorized access, disclosure, or modification of data and programs  Theft  Interruption of crucial business activities IS 530 : Lecture 1012

2. Program Development and Acquisition  Inadvertent programming errors due to misunderstanding system specifications or careless programming  Unauthorized instructions deliberately inserted into the programs  Controls: Management and user authorization and approval, thorough testing, and proper documentation IS 530 : Lecture 1013

3. Program Modification  Source Code Comparison Compares current program against source code for any discrepancies  Reprocessing Use of source code to re-run program and compare for discrepancies  Parallel Simulation Auditor-created program is run and used to compare against source code IS 530 : Lecture 1014

4. Computer Processing  System fails to detect: Erroneous input Improper correction of input errors Process erroneous input Improperly distribute or disclose output  Concurrent audit techniques Continuous system monitoring while live data are processed during regular operating hours Using embedded audit modules o Program code segments that perform audit functions, report test results, and store the evidence collected for auditor review IS 530 : Lecture 1015

Types of Concurrent Audits  Integrated Test Facility Uses fictitious inputs  Snapshot Technique Master files before and after update are stored for specially marked transactions  System Control Audit Review File (SCARF) Continuous monitoring and storing of transactions that meet pre-specifications  Audit Hooks Notify auditors of questionable transactions  Continuous and Intermittent Simulation Similar to SCARF for DBMS IS 530 : Lecture 1016

5. Source Data & 6. Data Files  Accuracy  Integrity  Security of data IS 530 : Lecture 1017