Computer-Based Processing: Developing an Audit Assessment Approach

Slides:



Advertisements
Similar presentations
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
Advertisements

Auditing Computer-Based Information Systems
9 - 1 Computer-Based Information Systems Control.
Nature of IT Based Systems
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Chapter Two Information Technologies: Concepts and Management.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Overview of IS Auditing n Need for control and Audit of Computers –Org cost of data loss –cost of incorrect decision –Value of hardware, software, personnel.
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Impact of Information Technology on the Audit.
Controlling Computer-Based Information Systems, Part II
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Computerized Systems: Risks, Controls, and Opportunities
Chapter 22 Systems Design, Implementation, and Operation Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 22-1.
The Office Procedures and Technology
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Overview of Systems Audit
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.
Implications of Information Technology for the Audit Process
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 1 Information Systems in Business.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
 2001 Prentice Hall Business Publishing, Accounting Information Systems, 8/E, Bodnar/Hopwood Chapter 10 Electronic Data Processing Systems.
SESSION 14 INFORMATION SYSTEMS SECURITY AND CONTROL.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 10 Case Study: Conducting an Information Systems Audit.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Component 3-Terminology in Healthcare and Public Health Settings Unit 16-Definitions and Concepts in the EHR This material was developed by The University.
Chapter 11 Management Control of Information Technology.
INTRODUCTION to MIS 12/24/20151 Introduction To MIS Component Overview.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
8-1 Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter 17: Information Management in Treasury Outline: Basics of E-Commerce EDI Infrastructure Treasury Management Systems (TMSes) Other Issues in Treasury.
The Impact of Information Technology on the Audit Process
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Securing Information Systems
What Is Enterprise Computing?
Information Systems Security
Accounting Information Systems: An Overview
Review of IT General Controls
Auditing Concepts.
Chapter 08 Consideration of
INFORMATION SYSTEMS SECURITY AND CONTROL.
Electronic Data Processing Systems Chapter 6.
Discovering Computers 2010: Living in a Digital World Chapter 14
Electronic Commerce Systems
Controlling Computer-Based Information Systems, Part II
Chapter 17 Risks, Security and Disaster Recovery
APPLICATION RISK AND CONTROLS
Processing Integrity and Availability Controls
Computer Control & Audit
Part I: Purchases and Cash Disbursements Procedures
ICT meeting Business needs
The Impact of Information Technology on the Audit Process
The Impact of Information Technology on the Audit Process
Purchases and Cash Disbursements Procedures
Systems Design Chapter 6.
County HIPAA Review All Rights Reserved 2002.
INFORMATION SYSTEMS SECURITY and CONTROL
CHAPTER 15 AUDITING EDP SYSTEMS.
Information Systems Security and Control
Chapter 5 Computer Security
Presentation transcript:

Computer-Based Processing: Developing an Audit Assessment Approach Chapter 6 Computer-Based Processing: Developing an Audit Assessment Approach

Introduction Overview of computerized accounting systems Client/server systems Mass storage Mass communication Software

Client/Server Systems Client portion of the system Risks that come with the client portion of the system

Mass Storage Paperless information systems Risks Advantages

Mass Communication Communications Technology Global Networks

Software Telecommunications Operating systems Application programs Access control software Database management system Financial reporting on the Web

The Virtual Private Network Demands of the “new economy” Firewalls Web server and back-office computing structures

Risks with VPN Unauthorized penetration Loss of messages Interception and either destruction, modification, or copying Denial-of-service attacks Loss of processing

General & Application Controls Pervasive computer controls General controls Application controls

General Control Concepts Planning and controlling data processing Controlling applications development Controlling access Maintaining hardware Controlling electronic communications

Risk Analysis @ General Control Level Unauthorized users. Wrong programs. Telecommunication systems. Processing of wrong data. Unauthorized personnel. Securing of physical computer environment. User errors.

Planning & Controlling the Data Processing Function Segregation of duties within data Processing. Adequate Documentation--A Key Control.

Controlling Applications Development & Program Changes

Controlling Access to Equipment, Data, & Programs Access controls Authentication Security and Backup Hardware controls Telecommunication controls Data transmission

Application Control Procedures Approaches to Processing Transactions Batch processing applications Online processing Database Management Systems

Application Control Procedures Audit trail provisions Input control procedures Input & validation control procedures Batch control procedures Self-checking digits Stored data references On-screen input verification

Control Risk Assessment Process Understanding the control structure Testing the effectiveness of procedures documenting evidence of controls monitoring controls testing controls

Electronic Data Interchange and Electronic Commerce EDI •Value-added network (VAN) •Economic interdependence •Total systems dependence •Risks and control considerations •Application controls