AUDITING INFORMATION TECHNOLOGY USING COMPUTER ASSISTED AUDIT TOOLS AND TECHNIQUES.

Slides:



Advertisements
Similar presentations
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Advertisements

ITAuditing Using GAS & CAATs
Auditing Computer-Based Information Systems
Auditing Computer Systems
The Islamic University of Gaza
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 7-1 Chapter 7 CHAPTER 7 THE EFFECT OF INFORMATION TECHNOLOGY ON THE AUDIT.
S17: Field work. Session Objectives  To explain the manner in which field audit is carried out.  To explain the nature of evidence and the different.
10/25/2001Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
Chapter 6 Database Design
Database Management: Getting Data Together Chapter 14.
Computer Assisted Audit Techniques
4-1 McGraw-Hill/Irwin ©2002 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 4 Materiality and Risk.
Pertemuan 7-8 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Chapter 9 Database Design
6 Chapter 6 Database Design Hachim Haddouti. 6 2 Hachim Haddouti and Rob & Coronel, Ch6 In this chapter, you will learn: That successful database design.
Chapter 13 Auditing Information Technology
CAATs John Tyrpak Steve Sheller Philip Andrews Ginger Bean.
1 Performance Auditing  In IT Environment  Evidence Gathering & Analysis Techniques  Computer Assisted Techniques  Use of IDEA.
Auditing & Assurance Services, 6e
10/5/1999Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
Learning Objectives LO1 Distinguish between management and auditor’s responsibilities regarding an auditee organization’s internal controls. LO2 Explain.
Auditing Computerized Information Systems
USE OF IT TOOLS IN AUDITING THE NIK REPUBLIC OF POLAND Wiesław Karliński economic adviser Department of Budget & Finance
SAMPLING DALAM PENGUJIAN PENGENDALIAN. AU defines audit sampling as the application of an audit procedure to less than 100% of the items within.
Announcements Homework 1 Due 9/15 Project: Step 1 Due 9/17 Reading for Wednesday –2.6 – 2.8.
Chapter 3 Engagement Planning ACCT-4080 Chapter 3.
Considering Internal Control
IST 210 Database Design Process IST 210 Todd S. Bacastow January 2005.
1 Introduction to Database Systems. 2 Database and Database System / A database is a shared collection of logically related data designed to meet the.
1 Chapter 9 Database Design. 2 2 In this chapter, you will learn: That successful database design must reflect the information system of which the database.
Week 4 Lecture Part 3 of 3 Database Design Samuel ConnSamuel Conn, Faculty Suggestions for using the Lecture Slides.
7-Oct-15 System Auditing. AUDITING Auditing is a systematic process of objectively obtaining and evaluating evidence regarding assertions about economic.
QUALITY OF EVIDENCE FRCC Compliance Workshop September/October 2008.
Chapter 8 Audit Sampling: An Overview and Application to Tests of Controls McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights.
Information System Development Courses Figure: ISD Course Structure.
System Integrity and Validity 1 Running Head: System Integrity and Validity System Integrity and Validity University of Phoenix Date:
S4: Understanding the IT environment of the entity.
Methodology - Conceptual Database Design. 2 Design Methodology u Structured approach that uses procedures, techniques, tools, and documentation aids to.
Evaluation of Internal Control System. Learning Objective 1 Contrast management’s need for internal control with the auditor’s need to consider internal.
Audit Sampling: An Overview and Application to Tests of Controls
Audit Sampling: An Overview and Application to Tests of Controls
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Pertemuan 3-4 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Using Computer Assisted Audit Tools and Techniques (CAATTs)
AUDIT IN COMPUTERIZED ENVIRONMENT
1 Topic# 7 – Auditing with Technology Readings, Chapter 10 A – COMPUTERIZED AUDIT TOOLS –Electronic Spreadsheets –Automated Working Papers –Generalized.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 8-1 Chapter Eight Audit Sampling: An Overview and Application.
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 13 – 1 Chapter 13 Auditing Information Technology.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
Audit Evidence Process
Nexia International Audit Conference Paris 2011 The IFAC Guide and the Auditor of the Future George S Dakis Nexia ASR Melbourne, Australia.
©2012 Prentice Hall Business Publishing, Auditing 14/e, Arens/Elder/Beasley Section 404 Audits of Internal Control and Control Risk Chapter.
Chapter 8-1 Chapter 8 Accounting Information Systems Information Technology Auditing Dr. Hisham madi.
Forensic and Investigative Accounting Chapter 13 Computer Forensics: A Brief Introduction © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago,
IST 210 Database Design Process IST 210, Section 1 Todd S. Bacastow January 2004.
©©2012 Pearson Education, Auditing 14/e, Arens/Elder/Beasley Considering Internal Control Chapter 10.
Audit Sampling: An Overview and Application
Audit Sampling: An Overview and Application to Tests of Controls
Audit Sampling: An Overview and Application to Tests of Controls
Auditing Information Technology
BASIC AUDITING CONCEPTS: MATERIALITY, RISK ASSESSMENT, AND EVIDENCE
STATISTICAL TOOLS FOR AUDITING
Chapter 6 Database Design
Auditing & Investigations I
Week Thirteen – Continuous Auditing/CAATs and QA/QC
Week Thirteen – CAATs & Continuous Auditing
Audit Execution Session 5.
Chapter 2 Database Environment Pearson Education © 2014.
AUDIT TESTS.
What is an Internal Quality Audit? What is an Internal Quality Audit?
Presentation transcript:

AUDITING INFORMATION TECHNOLOGY USING COMPUTER ASSISTED AUDIT TOOLS AND TECHNIQUES

AUDIT CYCLE

Auditor Productivity Tools Planning and tracking the annual audit schedule Documentation and presentations Communication and data transfer Resource management Data management

Using CAATs in Audit Process Used to evaluate the integrity of an application, determine compliance with procedures, and continuously monitor processing result. Examples –Audit Command Language (ACL) –Interactive Data Extraction and Analysis (IDEA)

TECHNICAL SKILLS AND TOOLS Generalized Audit Software Application Testing Designing Tests of Controls Data Analysis Compliance Testing Continuous Monitoring Application Controls Audit Functions Sampling

Generalized Audit Software Analyze and compare files Select specific records for examination Conduct random samples Validate calculations Prepare confirmation letters Analyze aging of transaction files

Application Testing Submitting a set of test data that will produce known results if the application functions properly Developing independent programs to reperform the logic of the application Evaluating the results of the application

Application Controls Spreadsheet Controls –Analysis –Source of data –Design review –Documentation –Verification of logic –Extent of training –Extent of audit –Support commitment

Application Controls Database Controls –Referential integrity –Transaction integrity –Entity integrity –Value constraints –Concurrent update protection –Backup and recovery protection –Testing protection

Audit Functions Items of Audit Interest Audit Mathematics Data Analysis System Validation

Sampling Types of sampling –Judgmental sampling –Statistical sampling Applied technique if any change to the characteristics or attributes of the population under review: –Random attribute sampling –Variable sampling techniques

Computer Forensics Methods and Techniques The IT auditor can work in the field of computer forensics or work side by side with a computer forensics specialist, supplying insight into a particular system or network. Computer forensic specialists gather evidence against the individual who has committed a crime in several ways.