Computerized Systems: Risks, Controls, and Opportunities

Slides:



Advertisements
Similar presentations
Module 3: Business Information Systems
Advertisements

Presented to the Tallahassee ISACA Chapter
ITAuditing Using GAS & CAATs
Auditing Concepts.
Information Technology Control Day IV Afternoon Sessions.
Auditing Computer-Based Information Systems
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
Auditing Computer-Based Information Systems
9 - 1 Computer-Based Information Systems Control.
The Islamic University of Gaza
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star.
THE AUDITING OF INFORMATION SYSTEMS
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
1 Output Controls Ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. Exposures of this sort can cause serious.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Processing Integrity and Availability Controls
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Impact of Information Technology on the Audit.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
1 Rittenberg/Schwieger/Johnstone Auditing: A Business Risk Approach Sixth Edition Chapter 7 Performing an Integrated Audit Copyright © 2008 Thomson South-Western,
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Auditing Computerized Information Systems
Today’s Lecture application controls audit methodology.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Chapter 5 Internal Control over Financial Reporting
Auditing Complex EDP Systems
Implications of Information Technology for the Audit Process
Internal Control Over Financial Reporting
1 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 12 Designing Systems Interfaces, Controls, and Security.
Copyright © 2007 Pearson Education Canada 1 Chapter 13: Audit of the Sales and Collection Cycle: Tests of Controls.
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
S4: Understanding the IT environment of the entity.
 2001 Prentice Hall Business Publishing, Accounting Information Systems, 8/E, Bodnar/Hopwood Chapter 10 Electronic Data Processing Systems.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
SESSION 14 INFORMATION SYSTEMS SECURITY AND CONTROL.
Today’s Lecture Covers
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
AUDIT IN COMPUTERIZED ENVIRONMENT
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 8-1 Chapter Eight Audit Sampling: An Overview and Application.
APA – Fundamentals of Payroll Chapter 2 – Payroll Systems March 10, 2012.
Hall, Accounting Information Systems, 7e ©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
The Impact of Information Technology on the Audit Process
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Fundamentals of Information Systems, Sixth Edition Chapter 1 Part A An Introduction to Information Systems in Organizations.
Chapter 8-1 Chapter 8 Accounting Information Systems Information Technology Auditing Dr. Hisham madi.
Chapter 3-Auditing Computer-based Information Systems.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Auditing Concepts.
Chapter 08 Consideration of
INFORMATION SYSTEMS SECURITY AND CONTROL.
Electronic Data Processing Systems Chapter 6.
Controlling Computer-Based Information Systems, Part II
Processing Integrity and Availability Controls
The Impact of Information Technology on the Audit Process
Computer-Based Processing: Developing an Audit Assessment Approach
The Impact of Information Technology on the Audit Process
INFORMATION SYSTEMS SECURITY and CONTROL
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Computerized Systems: Risks, Controls, and Opportunities Rittenberg/Schwieger/Johnstone Auditing: A Business Risk Approach Sixth Edition Chapter 8 Computerized Systems: Risks, Controls, and Opportunities Copyright © 2008 Thomson South-Western, a part of the Thomson Corporation. Thomson, the Star logo, and South-Western are trademarks used herein under license.

Overview of Computerized Accounting Systems Most computer systems are highly integrated and networked The computing environment includes hardware, software, telecommunications, data, and people The auditor needs to understand this environment including the risks involved: (see chart on next slide)

Overview of Computerized Accounting Systems Data is intercepted, modified, deleted or replaced with fraudulent data Data ports provide access to hackers, denial of service attacks or unauthorized access Data Communications Unauthorized access, manipulation of data, addition of unauthorized data Data Files Fraudulent programming, incorrect data processing, processing fraudulent data Computer Programs Sabotage, natural disaster, viruses, anything that impairs operations Computer Operations Risks Computer Processing Area

Key Computer Software Operating systems Communications Application programs Access control

Interconnected Systems: Virtual Private Networks (VPNs) Embraces all communications: Fiber-optic to wireless e-business (business to business) E-Commerce (business to consumer) Auctions (consumer to consumer) Intranets (within business) Personal digital assistant Application and database processing This type of computerized environment is evolving as the "new economy" demands anytime, anywhere service

Risks with VPNs The open nature of a VPN creates risks that both internal and external auditors need to assess Unauthorized penetration into the organization's system Loss of messages in transmission Interception and either destruction, modification, or copy of information transmitted over the network Denial of service attacks designed to overload and shut the company's system down Loss of processing

General & Application Controls On larger, more complex audits, the client's computing systems may present major business risks that need to be evaluated Dividing controls as either general or application controls helps the auditor organize his/her evaluation of the client's computing systems General Controls - pervasive data processing control procedures that affect all computerized applications Planning and controlling data processing Controlling applications development Controlling access Maintaining hardware Controlling electronic communications Application Controls - controls related to a particular program

Risk Analysis at the General Control Level The auditor usually starts with general controls in evaluating control weaknesses Good controls built into a particular application are unlikely to offset weaknesses that affect all aspects of processing Risks at the general level include: Unauthorized use of applications or access of data Company may develop the wrong programs negatively impacting operations Telecommunications systems may not safeguard the system from intruders The wrong data may be processed or wrong files updated Unauthorized personnel may steal or modify company programs or data Hardware may not be secured against attacks or natural disaster Users may inadvertently cause errors in programs or data

Planning & Controlling the Data Processing Function Fundamental concepts an auditor should consider when in evaluating the organization and control of the data processing: Authorization for all transactions should originate outside the data processing department Users are responsible for authorization, review, and testing of all application developments and changes in computer programs Access to data is provided only to authorized users Data processing department is responsible for all custodial functions associated with data, data files, software, and related documentation Users, along with data processing, are responsible for the adequacy of application controls built into the system Management should periodically evaluate the information systems function for efficiency, integrity, security, and consistency with organizational objectives Internal audit staff should periodically audit applications and operations

Planning & Controlling the Data Processing Function Segregation of Duties Within Data Processing Data processing personnel should not have access to programs or data except when authorized to make changes, and those changes follow authorized procedures Users should review and test all significant computer program changes Program Development Every organization should have a process to determine that the right applications are acquired, installed and accomplish their objectives

Planning & Controlling the Data Processing Function (continued) Program Changes Only authorized changes are made to computer applications All authorized changes are made to computer applications All changes are tested, reviewed, and documented before implementation Only the authorized version of the computer program is run Controlling Access to Equipment, Data, and Programs Access to data is limited to those with a need to know Ability to change, modify, delete data is restricted to authorized persons Control system has ability to identify potential users as authorized or unauthorized Security department actively monitors attempts to compromise the system

Planning & Controlling the Data Processing Function (continued) Authentication System to verify that users are authorized to access data Three primary methods used to authenticate users: Something they know, such as a password Something they possess, such as a card with a magnetic strip Something about themselves, such as a fingerprint or other type of physical identification Business Continuity Security and backup plans for both physical assets and media Minimum elements in a backup and recovery Standardized procedures for backup and disaster recovery Plans for reconstruction Period review and testing of plans and procedures

Planning & Controlling the Data Processing Function (continued) Data Transmission Controls To ensure the completeness and correctness of data transmitted Controls that should minimize loss or alteration of data: Encryption Callback Echo check Bit reconciliation Feedback Private lines Application Controls Designed into and around the computer program to ensure processing objectives are attained Often referred to as input, processing, and output control procedures

Planning & Controlling the Data Processing Function (continued) Batch Controls Input control; used to ensure all items submitted are actually processed Types of batch controls typically calculated: Record count Financial total Hash totals Reconciles batch totals for items entered with same batch totals calculated by the system

Planning & Controlling the Data Processing Function (continued) Input Controls To ensure transactions are fully and accurately captured, and properly recorded Includes use of Prenumbered documents Unique transaction identifier established by the computer Batch control and batch control totals Procedures to limit access to transactions Formation of an audit trail Computerized input validation procedures Self-checking digits Use of stored data to minimize data input On-screen input verification techniques (edit tests)

Planning & Controlling the Data Processing Function (continued) On-Line Processing Controls Onscreen validation techniques used to verify data input: Stored data used to minimize data input Screen layout logically follows order in which data is gathered Edit errors noted automatically so data can be immediately corrected Authorization for input noted and verified Unique identifiers automatically added to the transaction

Planning & Controlling the Data Processing Function (continued) Processing Controls Designed to ensure The correct program is used for processing All transactions are processed The correct transactions update files Output Controls All data is completely processed Output is distributed only to authorized recipients

Overview of Computer Controls Risk Assessment Understanding the control structure Testing the effectiveness of controls Documentary evidence of controls Monitoring controls

Discuss Gaining an Understanding of the Control Structure The process of assessing control risk in a computerized environment: Identify important accounting applications and extent of computerization within those applications Develop understanding of general controls to determine how those controls may affect integrity of important applications Develop understanding of the flow of transactions in important accounting applications; identify and document control procedures Develop preliminary assessment of control risk for the application If preliminary control risk assessed below high, develop approach to determine effectiveness of controls in operation Update assessment of control risk based on understanding of application design and testing of controls in operation

Testing the Effectiveness of Controls The auditor must decide on the most efficient way to test controls Some test general controls as a whole, because these affect all accounting applications Others test general controls only as they affect important applications Documentary Evidence of Controls Some controls provide documentary evidence of their operation That evidence serves as a basis for developing audit procedures to test the controls Examples: Batch control totals Exception reports Computer logs of transactions

Monitoring Controls Examples of monitoring controls found in most computerized systems: Computer logs of reports of attempted illegal access Reports of approved program changes Internal audit reports of program changes Reports of unusual activities Internal audit reports on the effectiveness of access controls Reports on production discrepancies

Electronic Commerce E-Commerce involves communication through the Internet; it can be used to link trading partners Companies involved in E-Commerce need the following controls: Firewalls to intercept unwanted traffic and protect the website and server Encryption of transmissions Monitoring reports Electronic transmission protocols that identify lost or missing data Denial of service software to identify attacks Integrated systems Website security Systems security and backup

Electronic Data Interchange (EDI) Exchange of business documents between economic trading partners, computer to computer, in standard format The auditor should review components necessary to a successful EDI system: Formal trading partner agreement specifying each party’s responsibilities Bar coding Formal contract with the Value-Added Network Formal communication system that specifies standard communication format Formal communication process Need for automated control structure Need to identify authorized electronic signatures

Electronic Data Interchange (continued) EDI has the potential to create two new types of risks that ought to be evaluated as part of every audit: Economic interdependence Objective of EDI is to enlist large number of partners into a wide communications network to support business With increased partners, there is increase in level of interdependence of suppliers and customers The failure of one partner may adversely affect the other trading partners Total systems dependence EDI increases reliance on computerized systems Should these systems fail, substantial losses will likely be realized The auditor should determine whether the client has controls in place to monitor these risks and take effective action when needed

Electronic Data Interchange: Application Controls Application controls must be built into EDI to ensure accurate accounting Key controls in an EDI system include: Control over authorized signatures Access controls Segregation of duties Syntactic edit checks Traditional edit checks Formal protocol for communication acknowledgement between partners Logging of transactions (audit trail)

What is computer auditing? Many of the concepts applicable to manual systems hold for computerized systems The auditor will want to: Gain assurance that the processes and computer programs are working correctly Trace transactions through the processing system to determine that transactions have been correctly processed Select transactions for more detailed testing and analysis Computerized audit techniques commonly used include Integrated test facility Tagging and tracing (tracing transactions through the system) Generalized audit software

An Integrated Test Facility: Testing Correctness of Processing A test data approach that involves developing and submitting fictitious transactions to be processed by computer applications Test data are developed to determine whether Control procedures built into the applications are functioning effectively The computer application is processing transactions correctly All transaction and master files are fully and correctly updated The test data approach only examines those controls built into the computer application It does not test whether the company has adequate controls to prevent submission of unauthorized or incorrect data

Tagging and Testing: Tracing Transactions through the System A transaction is selected at the input stage and is electronically "marked" The transaction is then electronically tracked through processing This allows the auditor to determine whether the transaction has been properly recorded and that the correct files have been updated Advantages: Works concurrently with client's processing of regular transactions Flexible: auditor is able to select transactions to "mark" Can be used to track transactions through distributed processing networks

What is generalized audit software (GAS)? Designed to read existing computer files and perform function such as: Footing a file Selecting a sample - either statistically or judgmentally Extracting, sorting, and summarizing data Obtaining file statistics Evaluating statistical sample results Perform analytical procedures Finding how many transactions or population items meet specified criteria Checking for gaps in processing sequences Checking for duplicates Performing arithmetic calculations Analyzing data for file validity Analyzing data files for unusual patterns

Generalized Audit Software (continued) The most widely used of all computerized audit techniques Allows auditors to perform a variety of procedures including: Analyzing files Selecting transactions based on logical identifiers Scanning accounts for unusual entries Selecting statistical samples Projecting errors based on samples Performing basic and advanced numerical analysis Creating reports

Audit Approaches for E-Commerce Audit of entity using E-Commerce follows basic audit approach; auditor must understand business processes, important applications, control environment, and risks Risk analysis Risks in common with traditional information systems: Unauthorized access Unauthorized changes to programs or data files Misstatements caused by processing or logic errors Lack of physical security

Audit Approaches for E-Commerce (continued) Risks unique to E-Commerce systems Security of system and protection against penetration by outsiders Integrity of processing may be threatened by many different sources Integrity of data communications Trading partner agreements Systems interdependencies Paperless systems coupled with "soft" controls

Audit Approaches for E-Commerce (Continued) Process and Control Audit Audits of E-Commerce will focus on tests of controls and processes Auditor develops understanding of controls and approach to determine that controls are working effectively Tagging and Tracing Tagging is more complicated than process identified earlier in chapter Auditor must work with IT to develop logic Generalized Audit Software Use of GAS may be reduced in some areas such as confirmations Other areas, like inventory, will continue to use GAS