Types of CAATs Session 3.

Slides:



Advertisements
Similar presentations
Presented to the Tallahassee ISACA Chapter
Advertisements

ITAuditing Using GAS & CAATs
Auditing Computer-Based Information Systems
Chapter 3 with added info
Auditing Computer-Based Information Systems
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 7-1 Chapter 7 CHAPTER 7 THE EFFECT OF INFORMATION TECHNOLOGY ON THE AUDIT.
Purchases & Cash Disbursements Transactions By David N. Ricchiute
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star.
Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star.
1 Output Controls Ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. Exposures of this sort can cause serious.
Computer Assisted Audit Techniques
Pertemuan 7-8 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Concurrent Auditing Techniques
AUDITING INFORMATION TECHNOLOGY USING COMPUTER ASSISTED AUDIT TOOLS AND TECHNIQUES.
Advanced Accounting Information Systems
Accounting Information Systems, 1st Edition
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Impact of Information Technology on the Audit.
Chapter 13 Auditing Information Technology
1 Performance Auditing  In IT Environment  Evidence Gathering & Analysis Techniques  Computer Assisted Techniques  Use of IDEA.
Hall, Accounting Information Systems, 7e ©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Chapter 9.4 & 11.4 Paper F8 Audit and Assurance (International) ations/student_accountant/archive/sa_aug09_byrn.
Chapter 12/2 Audit Software Techniques
Auditing Systems Development, Acquisition and Maintenance
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Auditing Computerized Information Systems
Presentation By: R.T.I. JAIPUR
Today’s Lecture application controls audit methodology.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
The Islamic University of Gaza
Update from Business Week Number of Net Fraud Complaints – 2002 – 48,252 – 2004 – 207,449.
Auditing Complex EDP Systems
Implications of Information Technology for the Audit Process
© EZ-R Stats, LLC Duplicate Payments Slide 1 Auditing for Duplicate Payments A better way … Presentation of
Copyright © 2007 Pearson Education Canada 1 Chapter 13: Audit of the Sales and Collection Cycle: Tests of Controls.
Auditing Information Systems (AIS)
© EZ-R Stats, LLC Duplicate Payments Slide 1 Auditing for Duplicate Payments A better way … Web CAAT.
Using Computer Assisted Audit Tools and Techniques (CAATTs)
AUDIT IN COMPUTERIZED ENVIRONMENT
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 13 – 1 Chapter 13 Auditing Information Technology.
Auditing Data Management Systems Chapter 3 with added info.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
Audit Evidence Process
Auditing of CBIS Chapter Ten. IIA Vs. AICPA IIA Audit Scope –Reliability and integrity –Complies with operating parameters –Review IC to safeguard assets.
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
The Impact of Information Technology on the Audit Process
Auditing Of Information Systems Systems Analysis And Design © Systems Analysis And Design © V. Rajaraman OBJECTIVES  Ensure computer based financial and.
Chapter 3-Auditing Computer-based Information Systems.
Software Testing Strategies for building test group
Auditing Information Technology
Revenue and Collection Cycle
Modern Auditing: Assurance Services and the Integrity of Financial Reporting, 8th Edition William C. Boynton California Polytechnic State University at.
Auditing & Investigations I
The Impact of Information Technology on the Audit Process
Batch Processing Application Audit
Week Thirteen – Continuous Auditing/CAATs and QA/QC
Week Thirteen – CAATs & Continuous Auditing
The Impact of Information Technology on the Audit Process
Data Migration Assurance
CHAPTER 15 AUDITING EDP SYSTEMS.
Data Access Session 7.
Audit Execution Session 5.
Data Analysis Tools Session 10.
Data Selection Session 9.
Role of CAATs Session 2.
INTERNAL CONTROLS AND THE ASSESSMENT OF CONTROL RISK
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Information Technology Auditing
Tools and Techniques for the Auditor: Fieldwork
Presentation transcript:

Types of CAATs Session 3

CAATs for program validation CAATs for data analysis Categories of CAATs CAATs for program validation Verification of different processes in programs CAATs for data analysis Ignore programs used to generate data; focus exclusively on data

Program vs. Data Analysis CAATs Program validation tools generally only for compliance and financial audits Data analysis tools for performance and investigative audits also Use of program-oriented CAATs requires higher level of technical expertise (Level 3 expert IT auditors) May not be feasible for many SAIs

CAATs for Program Analysis Tools for examining data flows Tools for verifying data and file integrity Embedded Audit Modules Other Tools

Examining Data Flows Snapshot Tracing Freeze a program at a given point, and check on processing and transaction values E.g. debug facility Tracing Complete audit trail tracing transactions through processing of program code Useful for highlighting errors Requires knowledge of programming

Examining Data Flows (Contd.) Mapping Monitoring program execution for statistical information Used for highlighting redundant / fraudulent code

Verifying data and file integrity Parallel simulation Test Data Generators and Integrated Test Facilities

Parallel simulation Independently create routines to simulate/ re-perform parts of application program Useful for checking accuracy of calculations Programming and system knowledge required

Test data generators and Integrated Test Facilities Generation of fictitious test data for testing application controls Test data generators are independent software programs; while Integrated Test Facility is a part of the application program Test results to be removed from system / reports Difficult to create all possible combinations of test data

Embedded Audit Modules Used to extract data meeting auditor-specified criteria into a separate file Volatile data can also be captured Needs to be integrated into the auditee IT system SCARF System Control Audit Review File Extracting transactions falling outside auditor-determined reasonable limits SARF (Sample Audit Review File)

Program library analysis Code comparison Other Tools Source code review Review of sections of source code Program library analysis Review changes to program software Code comparison Compare production version of code with master copy User log analysis Identify unauthorised entry attempts and password violation

CAATs for Data Analysis Predominant approach followed by auditors Totalling Stratification Data mining Sampling Exception Reporting Duplicate Record Checks Ageing Gap Detection Re-performance of calculations

Potential risks from reliance on data analysis Issues Exclusive reliance on data analysis Prior IT Controls Review Verification of integrity of downloaded data Understanding of IT System and Data Knowledge of CAAT Tool Quality Assurance Methodology