Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.

Slides:



Advertisements
Similar presentations
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
Advertisements

Presented to the Tallahassee ISACA Chapter
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Software Quality Assurance Plan
General Ledger and Reporting System
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 10-1 Accounting Information Systems 9 th Edition Marshall.
Information Technology Control Day IV Afternoon Sessions.
Auditing Computer-Based Information Systems
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
Auditing Computer-Based Information Systems
9 - 1 Computer-Based Information Systems Control.
The Islamic University of Gaza
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
Chapter 14 System Controls. A Quote “The factory of the future will have only two employees, a man and a dog. The man will be there to feed the dog. The.
IS Security Control & Management. Overview n Why worry? n Sources, frequency and severity of problems n Risks to computerized vs. manual systems n Purpose.
Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star.
THE AUDITING OF INFORMATION SYSTEMS
Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star.
1 Output Controls Ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. Exposures of this sort can cause serious.
Processing Integrity and Availability Controls
Computer Security: Principles and Practice
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Impact of Information Technology on the Audit.
General Ledger and Reporting System
Chapter 13 Auditing Information Technology
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Chapter 12/2 Audit Software Techniques
Chapter 12 The Impact of Information Technology on the Audit Process
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Auditing Computerized Information Systems
Today’s Lecture application controls audit methodology.
Chapter 22 Systems Design, Implementation, and Operation Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 22-1.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
The Islamic University of Gaza
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Implications of Information Technology for the Audit Process
Chapter 7 Control and AIS. Threats to AIS Natural disasters –DSM flood (p. 249) Political disasters –Terrorism Cyber crime (as opposed to general terrorism)
Information Systems Security Operational Control for Information Security.
Auditing Information Systems (AIS)
Internal Control & EDP “ Man is a tool using animal” –Thomas Carlyle, 1836 “A tool is but an extension of a man’s hand. He that invents a machine augments.
I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.
THE STUDY & EVALUATION OF INTERNAL CONTROL. Definition Professional Standards Data-Oriented  Small, simple systems  Weaker controls System-Oriented.
 2001 Prentice Hall Business Publishing, Accounting Information Systems, 8/E, Bodnar/Hopwood Chapter 10 Electronic Data Processing Systems.
SESSION 14 INFORMATION SYSTEMS SECURITY AND CONTROL.
Today’s Lecture Covers
AUDIT IN COMPUTERIZED ENVIRONMENT
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 13 – 1 Chapter 13 Auditing Information Technology.
Auditing Data Management Systems Chapter 3 with added info.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
This Lecture Covers Roles of –Management –IT Personnel –Users –Internal Auditors –External Auditors.
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
The Impact of Information Technology on the Audit Process
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
Chapter 3-Auditing Computer-based Information Systems.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Electronic Data Processing Systems Chapter 6.
Auditing Information Technology
Processing Integrity and Availability Controls
The Impact of Information Technology on the Audit Process
The Impact of Information Technology on the Audit Process
Purchases and Cash Disbursements Procedures
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting

Design-Phase Audit Review documentation (system design and users’ manuals) for completeness Assess the adequacy of security Review the cost/benefit analysis prepared during planning. Is is reasonable? Appraise the appropriateness of applications Test compliance with described design procedures

Design-Phase Audits--continued Compare actual costs and benefits to estimates Compare operations to stated objectives by emphasizing: –Timeliness and comprehensiveness of output –Effectiveness of edit and logic checks –Demand for EDP, operating efficiency –Fulfillment of user’s need, adequate personnel

Planning for Computer Audits The materiality of EDP: how often and important to audit EDP operation? The hardware configuration: will determine what type of procedures and generalized audit software to be used Coordinating with computer personnel: for access and uses of computers Note: Auditor must refrain from actually participating in the design of computer system

The Preliminary Survey Security control: limits access to sensitive equipment and data Safeguard control: protects computers Physical document control: pre-numbered forms and protection of records and data Design specification control: are the system properly designed to meet the objectives?

Preliminary Survey--continued Risk exposure control: –Continuous monitoring: periodic testing and review reports on usage, turnaround, service –System risk: system failure, programming error, unauthorized alteration –Maintenance control: adequately maintained? Systems software control: are echo checks, run-to-run totals, “read-only” control enacted?

Preliminary Survey--continued Procedural control: do operations follow procedures manual? Application control: –Input: to ensure the database is complete, accurate, and authorized –Processing:to ensure correct processing and detection of all errors –Output: authorized access to computer report

Input Controls in an EDP Environment Authorization: –internal check for users and qualification –review and approval of input documents Edit checks: –alphabetic vs numeric, field size, field sign, check digit, and logic check Data conversion: –record count compared to batch totals –limit checks and exception reports

Processing Controls in an EDP Environment Totals: compare input total to processing total Correct processing: –Verify file ID or label before processing –Use program boundary protection to restrict file access during runs Access: review operator log, recovery journal Hardware: check parity of binary data and insert overflow checks on memory capacity Edit: match input codes to master files

Preliminary Survey--continued Personnel control: separation of persons handling input, processing, output, documentation. Rotation and required vacation for operators. Efficiency and effectiveness of system: –Are expectations being met? –Does scheduling follow a priority policy? –Is computer configuration adequate?

Preliminary Survey--continued Contingency plan: is there a formal plan for access to alternate computer facilities? Special risks in: – data privacy, network failure, data omission and errors, other legal implications –Image processing: intentional altering, destroying, counterfeiting –Service center:control over input and output

–Electronic Data Interchange (EDI): linked systems of suppliers, manufacturers, creditors and other parties. Paperless and timely. Auditors must evaluate access, transaction controls, data integrity, and auditability. – Virus: Frequency of incidents: 4 per year in The cost to recover from an average incident involving 3-4 computers is $1,200. With 1000 computers, annual cost could reach $176,853.

The Audit Program Control review and evaluation Tests of controls. Test of data –Use of generalized audit software –Computer audit techniques: test data, parallel simulation, controlled processing, ITF, tagging, mapping and program analysis

Computer Audit Techniques Test data: only checks certain expected controls Parallel simulation: auditor creates own software to simulate actual processing. Processing logic may not be comparable. Controlled processing or reprocessing: less expensive, input data may still be faulty Integrated Test Facility (ITF): dummy data are processed with live data. Problem is reversing the bogus data. Tagging or tracing: test data are tagged to avoid contamination. Insufficient tagging may miss major logic points. Tagged data maybe detected by auditee. Mapping and program analysis: identify logical paths of a program or detailed analysis of process code. Slow and costly.

Innovative Means of Evaluating Database Systems Difficult to back up, the normal grandfather-father-son tapes do not exist Tagging and tracing is complicated by joint use of a single file among several users Requires creative attitudes of “trying to beat the system,” i.e., trying to discover if means are available to gain unauthorized access or to make inappropriate changes in data files.