Auditing Computer Systems

Slides:



Advertisements
Similar presentations
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Advertisements

ITAuditing Using GAS & CAATs
Accounting Information Systems 9th Edition
Auditing Concepts.
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 10-1 Accounting Information Systems 9 th Edition Marshall.
AUDITING COMPUTER-BASED INFORMATION SYSTEMS
Information Technology Control Day IV Afternoon Sessions.
Auditing Computer-Based Information Systems
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer-Based Information Systems
9 - 1 Computer-Based Information Systems Control.
The Islamic University of Gaza
The Islamic University of Gaza
OMB Circular A-123 – Management’s Responsibility for Internal Control Policy Applicability Sources of Information Assessment, Documentation and Reporting.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
THE AUDITING OF INFORMATION SYSTEMS
Internal Control Concepts A Guide for Deans, Directors, and Department Chairs.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
Elements of Internal Controls Preventing Fraud, Waste, and Abuse in Urban and Rural Transit Systems.
Internal Auditing and Outsourcing
Auditing Computer-Based Information Systems
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Control and Accounting Information Systems
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
INTERNAL AUDIT vis-à-vis INTERNAL CONTROL
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Auditing Internal Control over Financial Reporting
Introduction to Internal Control Systems
Information Systems Controls Lecture 5 (Chapter 6, 7 & 8)
Chapter 5 Internal Control over Financial Reporting
Considering Internal Control
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
Internal Control in a Financial Statement Audit
9 - 1 ©2003 Prentice Hall Business Publishing, Essentials of Auditing 1/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 9.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 10.
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
Evaluation of Internal Control System
Evaluation of Internal Control System. Learning Objective 1 Contrast management’s need for internal control with the auditor’s need to consider internal.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
College Reviews An Overview Presented by Howard Lutwak, CIA Director of Internal Audit January 2004.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal.
AUDIT IN COMPUTERIZED ENVIRONMENT
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Auditing Internal Control over Financial Reporting Chapter Seven.
Copyright: Internal Auditing: Assurance and Advisory Services, by The Institute of Internal Auditors Research Foundation, 247 Maitland Avenue, Altamonte.
©2012 Prentice Hall Business Publishing, Auditing 14/e, Arens/Elder/Beasley Section 404 Audits of Internal Control and Control Risk Chapter.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Chapter 8-1 Chapter 8 Accounting Information Systems Information Technology Auditing Dr. Hisham madi.
Chapter 3-Auditing Computer-based Information Systems.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
©©2012 Pearson Education, Auditing 14/e, Arens/Elder/Beasley Considering Internal Control Chapter 10.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 10.
© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart1 of 151 C HAPTER 9 Auditing Computer-Based Information Systems.
Risk Management Dr. Clive Vlieland-Boddy. Managements Responsibilities Strategy – Hopefully sustainable! Control – Hopefully maximising profits! Risk.
Auditing Concepts.
Internal Control Principles
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Information Technology Auditing
Presentation transcript:

Auditing Computer Systems Dr. Yan Xiong College of Business CSU Sacramento 9/11/03

Agenda Auditing scope and objectives Information system (IS) audit objectives Study and evaluation of internal control in an AIS Computer audit software

Internal Auditing Standards According to the Institute of Internal Auditors (IIA), the purpose of an internal audit is to evaluate the adequacy and effectiveness of a company’s internal control system. Also, it is to determine the extent to which assigned responsibilities are actually carried out.

Internal Auditing Standards The IIA’s five audit scope standards are: Review the reliability and integrity of operating and financial information and how it is identified, measured, classified, and reported. Determine whether the systems designed to comply with operating and reporting policies, plans, procedures, laws, and regulations are actually being followed.

Internal Auditing Standards Review how assets are safeguarded, and verify the existence of assets as appropriate. Examine company resources to determine how effectively and efficiently they are utilized. Review company operations and programs to determine whether they are being carried out as planned and whether they are meeting their objectives.

Types of Internal Auditing Work What are the three different types of audits commonly performed? Financial audit Information system (IS) audit Operational or management audit

Types of Internal Auditing Work The financial audit examines the reliability and integrity of accounting records (both financial and operating information). The information systems (IS) audit reviews the general and application controls in an AIS to assess its compliance with internal control policies and procedures and its effectiveness in safeguarding assets.

Types of Internal Auditing Work The operational, or management, audit is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives.

An Overview of the Auditing Process All audits follow a similar sequence of activities and may be divided into four stages. Audit planning Collection of audit evidence Evaluation of audit evidence Communication of audit results

An Overview of the Auditing Process Audit Planning Establish scope and objectives Organize audit team Develop knowledge of business operations Review prior audit results Identify risk factors Prepare audit program

An Overview of the Auditing Process Collection of Audit Evidence Observation of operating activities Review of documentation Discussion with employees and questionnaires Physical examination of assets Confirmation through third parties Reperformance of procedures Vouching of source documents Analytical review and sampling

An Overview of the Auditing Process Evaluation of Audit Evidence Assess quality of internal controls Assess reliability of information Assess operating performance Consider need for additional evidence Consider risk factors Consider materiality factors Document audit findings

An Overview of the Auditing Process Communication of Audit Results Formulate audit conclusions Develop recommendations for management Present audit results to management

Operational Audits of an AIS The techniques and procedures used in operational audits are similar to those of IS and financial audits. The basic difference is that the IS audit scope is confined to internal controls, whereas the financial audit scope is limited to IIS output. The operational audit scope encompasses all aspects of IS management.

Operational Audits of an AIS Operational audit objectives include evaluating effectiveness, efficiency, and goal achievement. What are some evidence collection activities? reviewing operating policies and documentation confirming procedures with management and operating personnel

Operational Audits of an AIS observing operating functions and activities examining financial and operating plans and reports testing the accuracy of operating information testing controls

Agenda Auditing scope and objectives Information system (IS) audit objectives Study and evaluation of internal control in an AIS Computer audit software

IS Audits Purpose of AIS audit: review and evaluate internal controls that protect system When performing IS audit, auditors ascertain that certain objectives met

Audit Objectives Security provisions protect computer equipment, programs, communications, and data from unauthorized access, modification, or destruction Program development and acquisition performed in accordance with management’s general and specific authorization

Audit Objectives Program modifications have authorization and approval of management Processing of transactions, files, reports, and other computer records accurate and complete

Audit Objectives Source data that is inaccurate or improperly authorized identified and handled according to prescribed managerial policies Computer data files are accurate, complete, and confidential

Audit Objectives #6 Data Files #5 Source Data #1 Overall Security Enter #4 Processing Source Data #2 Program Development Process #3 Program Modification Output Programs

Risk-Based Audit Approach provides auditors with clear understanding of errors and irregularities that can occur and related risks and exposures Provides basis for developing recommendations to management on how AIS control system should be improved

Risk-Based Audit Four-step approach Determine threats facing AIS Identify control procedures that should be in place to minimize each threat Evaluate existing control procedures Determine weaknesses

Agenda Auditing scope and objectives Information system (IS) audit objectives Study and evaluation of internal control in an AIS Computer audit software

Audit Framework #5 Source Data #6 Data Files #1 Overall Security Types of Errors / Fraud Enter Control Procedures Audit Procedures: System Review Source Data #2 Program Development Audit Procedures: Tests of Controls Process #3 Program Modification Compensating Controls Output Programs #4 Processing

Overall Security Security errors and fraud: theft of or accidental / intentional damage to hardware and files loss, theft, or unauthorized access to programs, data files; or disclosure of confidential data unauthorized modification or use of programs and data files

Overall Security Control procedures: develop information security and protection plan - restrict physical and logical access encrypt data / protect against viruses implement firewalls institute data transmission controls, and prevent and recover from system failures or disasters

Overall Security Systems review audit procedures: inspect computer sites interview personnel review policies and procedures examine access logs, insurance policies, and disaster recovery plan

Overall Security Tests of control audit procedures: observing procedures verifying controls are in place and work as intended investigating errors or problems to ensure they were handled correctly examining any test previously performed

Overall Security Compensating controls: sound personnel policies effective user controls segregation of incompatible duties

Program Development Types of errors and fraud: inadvertent programming errors unauthorized program code

Program Development Control procedures: management authorizes and approves programming specifications user approves of programming specifications thorough testing of new programs and user acceptance testing complete systems documentation

Program Development Systems review audit procedures: independent review of development process systems review of development policies, authorization, and approval procedure documentation standards program testing and test approval procedures

Program Development Tests of control audit procedures: interview users about involvement verify user sign-off at milestone points review test specifications, data, and results

Program Development Compensating controls: strong processing controls independent processing of test data by auditor

Program Modification Types of errors and fraud: inadvertent programming errors unauthorized program code These are the same as in audit program development.

Program Modification Control procedures: listing of program components that are to be modified, and management authorization and approval of programming modifications user approval of program changes specifications thorough testing of program changes, including user acceptance test

Program Modification Systems review audit procedures: reviewing program modification policies, standards, and procedures reviewing documentation standards for program modification, program modification testing, and test approval procedures discussing systems development procedures with management

Program Modification Tests of control audit procedures: interviewing users about involvement in systems design and implementation reviewing minutes of development team meetings for evidence of involvement verifying management and user sign-off at milestone points in the development process reviewing test specifications, data, and results

Program Modification Compensating controls: strong processing controls independent processing of test data by auditor These are the same as in audit program development.

Processing Controls Types of errors and fraud: Control procedures: intentional or unintentional report inaccuracies Control procedures: proper use of internal and external file labels Systems review audit procedures: observe computer operations and data control functions

Processing Controls Tests of control audit procedures: evaluation of adequacy and completeness of data editing controls Compensating controls: strong user controls

Source Data Controls Types of errors and fraud: Control procedures: inadequate source data Control procedures: user authorization of source data input Systems review audit procedures: reviewing documentation for source data control standards

Source Data Controls Tests of control audit procedures: examination of samples of accounting source data for proper authorization Compensating controls: strong processing controls

Data File Controls Types of errors and fraud: unauthorized modification or disclosure of stored data Control procedures: concurrent update controls Systems review audit procedures: examination of disaster recovery plan

Data File Controls Tests of control audit procedures: observing and evaluating file library operations Compensating controls: effective computer security controls

Agenda Auditing scope and objectives Information system (IS) audit objectives Study and evaluation of internal control in an AIS Computer audit software

Computer Software Computer audit software (CAS) or generalized audit software (GAS), written for auditors CAS is computer program that, based on the auditor’s specifications, generates programs performing audit functions

Types of CAS Integrated Test Facilities Embedded Audit Modules (EAM) Audit Hooks Snapshot SCARF Audit Control Language (ACL)

Usage of Computer Software The auditor’s first step is to decide on audit objectives, learn about the files to be audited, design the audit reports, and determine how to produce them. This information is recorded on specification sheets and entered into the system via a data entry program.

Usage of Computer Software This program creates specification records that the CAS uses to produce one or more auditing programs. The auditing programs process the sources files and perform the auditing operations needed to produce the specified audit reports.

General Functions of Computer Audit Software reformatting file manipulation calculation data selection data analysis file processing statistics report generation

Topics Discussed Auditing scope and objectives Information system (IS) audit objectives Study and evaluation of internal control in an AIS Computer audit software