© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.

Slides:



Advertisements
Similar presentations
The payroll cycle Learning objectives
Advertisements

OPERATING EFFECTIVELY AT WESD. What is Internal Control? A process designed to provide reasonable assurance the organizations objectives are achieved.
Bodnar/Hopwood AIS 7th Ed1 Chapter 5 u TRANSACTION PROCESSING AND INTERNAL CONTROL PROCESS.
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Control and Accounting Information Systems
Chapter  2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Applications for Financial Accounting by David Willis, slides prepared by Kaye Watson 1 INCOMPLETE.
Auditing Concepts.
Internal Control.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
The Islamic University of Gaza
Chapter 14 System Controls. A Quote “The factory of the future will have only two employees, a man and a dog. The man will be there to feed the dog. The.
Internal Control Concepts A Guide for Deans, Directors, and Department Chairs.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Overview of IS Auditing n Need for control and Audit of Computers –Org cost of data loss –cost of incorrect decision –Value of hardware, software, personnel.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Copyright  2003 McGraw-Hill Australia Pty Ltd PPTs t/a Auditing and Assurance Services in Australia by Gay & Simnett Slides prepared by Roger Simnett.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham & D. Anandarajah. Slides prepared by Kaye Watson.
13-1 Copyright  2006 McGraw-Hill Australia Pty Ltd PPTs t/a Introductory Accounting 2r, by David Willis By Kaye Watson Chapter 13 – Petty Cash Learning.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
Chapter 8 Understanding and assessing internal control
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
Overview of Systems Audit
Evolving IT Framework Standards (Compliance and IT)
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Update from Business Week Number of Net Fraud Complaints – 2002 – 48,252 – 2004 – 207,449.
Copyright  2003 McGraw-Hill Australia Pty Ltd PPTs t/a Auditing and Assurance Services in Australia by Gay & Simnett Slides prepared by Roger Simnett.
DEVELOPING A RISK ANALYSIS. What is a risk analysis? A Risk analysis is concerned with identifying the risks that an organisation is exposed to, identifying.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
Information System Security and Control
Chapter 5 Internal Control over Financial Reporting
Internal Control in a Financial Statement Audit
Internal Control Over Financial Reporting
8-1 Copyright  2006 McGraw-Hill Australia Pty Ltd Revised PPTs t/a Auditing and Assurance Services in Australia 3e by Grant Gay and Roger Simnett Slides.
15-1 Copyright  2006 McGraw-Hill Australia Pty Ltd PPTs t/a Introductory Accounting 2r, by David Willis By Kaye Watson Chapter 15 – Depreciation, Disposal.
Chapter 7 Control and AIS. Threats to AIS Natural disasters –DSM flood (p. 249) Political disasters –Terrorism Cyber crime (as opposed to general terrorism)
1-1 Copyright  2007 McGraw-Hill Australia Pty Ltd PPTs t/a Accounting: A Framework for Decision Making 2e, by Jackling, Raar, Williams & Wines Slides.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
Information Systems Security Operational Control for Information Security.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
Evaluation of Internal Control System
9-1 Copyright  2006 McGraw-Hill Australia Pty Ltd Revised PPTs t/a Auditing and Assurance Services in Australia 3e by Grant Gay and Roger Simnett Slides.
College Reviews An Overview Presented by Howard Lutwak, CIA Director of Internal Audit January 2004.
Learning Objectives Understand the Business – LO1 Distinguish among service, merchandising, and manufacturing operations. – LO2 Explain common principles.
Viewing Information Systems Security. The basic objectives of Information Security are the same as the basic objectives of EDP auditing. They are: 1.To.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Auditing Internal Control Studies & Risk Assessment Chapter 9 Internal Control Studies & Risk Assessment Chapter 9.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
Learning Objectives LO5 Document an accounting system to identify key controls and weaknesses in order to assess control risk. LO6 Write key control tests.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
1. F1 Section D: Specific functions of accounting & internal financial control D1. Accounting & finance functions within business D3. Internal financial.
1 Aswathy V S Sr.DAG, O/o AG Lucknow. Internal control is the overall control environment established by management of an enterprise FFor effective.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervathamand D. Anandarajah. Slides prepared by Kaye.
Risk Management Dr. Clive Vlieland-Boddy. Managements Responsibilities Strategy – Hopefully sustainable! Control – Hopefully maximising profits! Risk.
Information Systems Security
Auditing Concepts.
Internal Control Principles
Internal Control.
The Impact of Information Technology on the Audit Process
Computer-Based Processing: Developing an Audit Assessment Approach
The Impact of Information Technology on the Audit Process
Presentation transcript:

© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye Watson. 6-1 chapter 6 Accounting information systems and security Learning objectives –To be aware of the threats to computer accounting. –To learn the controls for computer accounting. –To understand the security requirements to be incorporated in system design. –To learn about maintaining system integrity.

© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye Watson. 6-2 key terms access control audit trail check digit computer fraud computer hacking data validation echo checks embezzlement fraud hash total information system controls internal control lapping misappropriation parity checks risk sabotage virus worm

© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye Watson. 6-3 Threats (or risks) to computer accounting Fraudulent manipulation –(e.g. manipulation of input data, data theft) Sabotage Viruses and worms Fraud –(e.g. transaction fraud) Lapping Computer fraud –(e.g. data entry fraud, program fraud, operations fraud, database management fraud) Computer hacking

© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye Watson. 6-4 System security - internal controls in computer accounting Accounting controls: –put in place to safeguard records of the organisation Administrative controls: –policies and procedures for all personnel to enhance operational efficiency

© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye Watson. 6-5 System security - internal controls in computer accounting Controls by function: –preventive controls –detective controls –corrective controls Controls by scope: –general controls –application controls

© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye Watson. 6-6 Control activities Administrative procedures management establishes to meet internal control objectives: –authorisation of transactions –segregation of duties –adequate documentation and recording –control of assets and records –checks on performance

© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye Watson. 6-7 Risk assessment Risk assessments are necessary to form disaster recovery plans and mitigate the majority of risks Steps in risk assessment: 1.identify potential risk and estimate potential losses 2.identify possible controls and their costs 3.determine the cost-benefit effectiveness

© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye Watson. 6-8 Security and integrity of information Access to systems: –limited to authorised and responsible personnel Security of data: –ensure software is properly safeguarded against unauthorised access Security backups Audit trail: –allowing any transaction to be traced from source to final destination