Update from Business Week Number of Net Fraud Complaints – 2002 – 48,252 – 2004 – 207,449.

Slides:



Advertisements
Similar presentations
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Advertisements

Control and Accounting Information Systems
Control and Accounting Information Systems
ITAuditing Using GAS & CAATs
Auditing Concepts.
Auditing Computer-Based Information Systems
Auditing Computer Systems
Auditing Computer-Based Information Systems
The Islamic University of Gaza
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Accounting Information Systems Chapter Outlines
Standar Pekerjaan Lapangan: Pemahaman Memadai atas Pengendalian Intern Pertemuan 5.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
Sarbanes-Oxley Project Summary of COSO Framework Presented by Larry Dillehay & Scott Reitan Parkfield Group LLC.
Chapter 13 Auditing Information Technology
Information Systems Controls for System Reliability -Information Security-
INTERNAL CONTROL OVER FINANCIAL REPORTING
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Today’s Lecture application controls audit methodology.
Control and Accounting Information Systems
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
BA 378: Accounting Information Systems Instructor: Dr. James R. Coakley.
The Islamic University of Gaza
Transaction Processing and the Internal Control Process Small Business Information Systems Professor Barry Floyd.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Auditing Internal Control over Financial Reporting
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
Introduction to Internal Control Systems
Chapter 5 Internal Control over Financial Reporting
Considering Internal Control
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 4 – 1 Transaction Processing and the Internal Control.
Auditing Complex EDP Systems
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
NO FRAUD LEFT BEHIND The Effect of New Risk Assessment Auditing Standards on Schools Runyon Kersteen Ouellette.
1 Chapter Three IT Risks and Controls. 2 The Risk Management Process Identify IT Risks Assess IT Risks Identify IT Controls Document IT Controls Monitor.
Chapter 7 Control and AIS. Threats to AIS Natural disasters –DSM flood (p. 249) Political disasters –Terrorism Cyber crime (as opposed to general terrorism)
Internal Controls and Fraud Convery Describe an Internal Controls System and its elements Identify specific Internal Control issues in a NPO Consider.
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
S4: Understanding the IT environment of the entity.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 13 – 1 Chapter 13 Auditing Information Technology.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Auditing Internal Control over Financial Reporting Chapter Seven.
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
Chapter 3-Auditing Computer-based Information Systems.
1 CHAPTER 5 - b INTERNAL CONTROL OVER FINANCIAL REPORTING.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
1. Internal control system
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
8 INTERNAL CONTROL. Definition Duty  mgt (CEO)  Board  Internal auditor  Employee  External person.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Modern Auditing: Assurance Services and the Integrity of Financial Reporting, 8th Edition William C. Boynton California Polytechnic State University at.
Auditing Concepts.
Auditing Information Technology
Controlling Computer-Based Information Systems, Part II
Defining Internal Control
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Update from Business Week Number of Net Fraud Complaints – 2002 – 48,252 – 2004 – 207,449

Update from Business Week Cybertricks Phishing Pharming – viruses attached to s and web sites drop monitoring software onto peoples computers Wi-Phishing – Cybercrooks set up “free” wireless networks. Monitor use and steal passwords and other identify information Typosquatting – Web site addresses similar to real sites (whitehouse.com)

Scope Of Bank Data Theft Grows To 676,000 Customers – largest breach of banking security in the U.S. to date – investigators learned that the bank employees normally conducted 40 to 50 searches of customer bank accounts as a daily part of their jobs. While the ring was in operation, however, they performed up to 500 account searches a day, looking for new data to steal.

Study: Insider revenge often behind cyberattacks (MAY 20, 2005 COMPUTERWORLD) Companies hoping to thwart insider attacks need to have good password, account and configuration management practices in place, as well as the right processes for disabling network access when employees are terminated Investigation of 49 cases of insider attacks – In 92% of the cases, a negative work-related event triggered the insider action

Internal Control

Primary objectives of an AIS Identify and record all valid transactions Properly classify transactions Record transactions at the proper monetary value Record transactions in the proper accounting period Properly present transactions and related disclosures in the financial statements AICPA

AIS Auditing Audit Through the Computer – Review and evaluate internal controls during compliance testing Audit With the Computer – Direct verification of financial statement balances – Part of substantive testing of account balances Audit Around the Computer – Treat AIS as a black box – Enter specific test transactions, determine if output reflects those transactions

IS Auditing Techniques Test data (black box testing) – Both valid and invalid input Determine expected output before processing the input Run the input transaction through the system Compare actual output with expected output Determine the cause of any discrepancy – Good for: Verifying validation controls Verifying computational routines (depreciation calculations)

IS Auditing Techniques Test data (black box testing) – Complications Will not detect fraud by clever programmers How do you reverse the test transactions? Not feasible to test all combinations of logic within a program

IS Auditing Techniques Integrated Test Facility – Create fictitious entities within system for test Run test transactions in conjunction with live data – Must exclude fictitious entities and data from normal output reports (financial statements) – Same technique used in Equity Funding scandal

IS Auditing Techniques Parallel Simulation – Process real data through test programs As opposed to processing test data through real programs – Compare regular output with simulated output – Very useful when evaluating changes or upgrades to a system Need to ensure that upgrades did not negatively affect existing routines

IS Auditing Techniques Embedded Audit Routines – modify computer programs for audit purposes – Snapshot Status of the system at a given point in time Take a snapshot of database before transaction, process the transaction, then take snapshot of database after. – Trace Detailed audit trail Requires in-depth knowledge of computer program – Desk Check Manually process transaction through program logic (as provided in flowchart or program listing)

Internal Control Time to put it all together

Internal Control Process Control Environment Bridge, Mike and Ian Moss. “COSO back in the limelight”

Control Environment Integrity and ethical values – Ethics and corporate culture Commitment to competence Management philosophy and operating style Responsibility and commensurate authority Human resources – Adequate supervision – Job rotation and forced vacations – Dual control

Internal Control Process Risk Assessment Bridge, Mike and Ian Moss. “COSO back in the limelight”

Apply Risk Assessment Framework What is threat? What is likelihood that threat will occur? What is potential damage from threat? What controls can be used to minimize damage? What is the cost of implementing the control?

Internal Control Process Control Activities Bridge, Mike and Ian Moss. “COSO back in the limelight”

Control Activities Constraints imposed on a user or a system to secure systems against risks. Types – Prevent – Detect – Correct General vs IT specific

Segregation of Systems Duties Systems Administration Network Management Security Management Change Management Systems Analysis Programming/Develop ment Test and Validation Computer Operations Data Control

Internal Control Process Information and Communication Bridge, Mike and Ian Moss. “COSO back in the limelight”

Information and Communication Need to understand: – How transactions are initiated – How data are captured in machine-readable form (or converted from source documents into machine-readable form) – How computer files are accessed and updated – How data are processed – How information is reported to internal and external users

Internal Control Process Monitoring Bridge, Mike and Ian Moss. “COSO back in the limelight”

Monitoring Effective Supervision Responsibility Accounting Monitor System Activities – Review computer and network security – Detect illegal entry – Test for weaknesses and vulnerabilities – Monitor for viruses, spyware, span, pop-ups, etc. Track purchased software

In-Class Exercise Problem 36, pg 477

Final Project Project 3