Overview of Auditing

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

CHAPTER 15 –AUDITING IT CONTROLS PART 1: SARBANES-OXLEY & IT GOVERNANCE

Overview of Auditing  AICPA issues Statements on Auditing Standards


(SASs) to provide specific guidance.
External audit- is an independent attestation performed  1972- the year when the first SAS was issued by
by an expert called an auditor. AICPA
 It is performed by CPA who works for public  SASs- are regarded as the authoritative
firms that are independent of the client org. pronouncement because every member of the
being audited. profession must follow their recommendations
 This is often referred to as financial audit. or be able to show why SAS is not applicable in
Audit objective: a given situation.
 To ensure always that financial statements are  Individual Auditor – has the burden of justifying
fairly represented. departures from SASs.
Securities Exchange Commission (SEC) - requires that all
the publicly traded companies must be subject to Structures of an Audit
financial audit annually.  Conducting an audit – is a systematic and logical
 CPAs conducting this audit represent the process that consists of 3 conceptual phases:
interests of the outsiders: stockholders, 1. Audit Planning
creditors, government agencies and general 2. Tests of Controls
public. 3. Substantive Testing
 CPA’s role is to evaluate evidence thus render  IT Audit – It involves specialized procedures that
opinion. are directed to those aspect of the client’s
 Independence is a key concept in the auditing system where technology plays a material role
process. and thus injects an added degree of complexity
 External auditors follow strict rules that have into an audit.
been defined by SEC, Financial Accounting  IT Auditing – constitute a substantial
Standards Board (FASB), American Institute of component of the overall financial audit.
Certified Public Accountants (AICPA) and the 1. Audit Planning
federal law Sarbanes Oxley Act of 2002 (SOX Act  What should be done
of 2002) .  What document should be review
 Public Company Accounting Oversight (PCAOB)  It is first phase of the audit.
– It was established by the congress and has  The auditor’s objective at this point is to obtain
greater extent than FASB. sufficient information about the firm to plan the
 SEC has the final authority over financial other phases of the audit.
auditing.
 The auditor attempts to understand the org.’s
policy, practice, and structure. He also identifies
Financial Audit Components
the financially significant applications and
 The product of the attestation function is a attempts to identify and understand the
formal written report that expresses an opinion controls over the transaction that are processed
as to whether the FS are in conformity with by these apps.
GAAP.
 The techniques for gathering evidence at this
 Auditors are guided in their professional
phase are: (AIRO)
responsibility by (GAAS) 10 Generally Accepted
1. Administering questionnaires
Auditing Standards. (P.644)
2. Interviewing management
Auditing Standards
3. Reviewing systems documentation
 It is divided into 3 classes:
4. Observing day to day activities
1. General Qualification standard
2. Tests of Controls
2. Field work standards
 It is the 2nd phase of audit.
3. Reporting Standards
 The objective of this phase is to determine
 Although GAAS establishes framework for
whether adequate internal controls are in place
prescribing auditor performance, it is not
and functioning properly.
sufficiently detailed to provide meaningful
 Computer aided audit tools and techniques
guidance in specific circumstances.
(CAATTs) – are specialized audit computer
techniques used in evidence gathering.
CHAPTER 15 –AUDITING IT CONTROLS PART 1: SARBANES-OXLEY & IT GOVERNANCE

 The auditor assesses the quality of internal that are in fact, materially misstated because of
control by assigning a level of control risk. undetected errors or irregularities or both.
3. Substantive Testing  Errors – are unintentional mistakes.
 Auditors get samples.  Irregularities – are intentional
 The third phase of the audit process focuses on misrepresentations associated w/the
gathering evidence pertaining to financial data. commission of fraud, such as misappropriation
 It involves detailed investigation of specific of physical asset or attempts to deceive FS
account balances and transactions through users.
Substantive test. Audit Risk Components
 Substantive tests tend to be physical, labor  The auditor’s objective is to achieve a level
intensive activities ex. Counting cash. of audit risk that is acceptable to the
auditor.
Management Assertions  The auditor estimates the acceptable audit
 Management assertions are claims made by risk based on EX ANTE VALUE of the
management regarding the content of their components of the audit risk model: 3 (ICD)
issued financial statements. 1. Inherent risk
 Implicitly management asserts that their 2. Control risk
account balances and underlying transactions 3. Detection risk
are free from material errors and complete, 1. Inherent Risk (IR) – associated with the unique
valid and accurate. characteristics of the business or industry of the
 Through substantive procedures auditors gather client. (Higher risks)
evidence to test the validity of management  Auditors cannot reduce the level of
assertions w/c fall in the general categories inherent risk.
below: 2. Control Risk (CR) – is the likelihood that the
1. Assertions about classes of transactions and control structure is flawed because of controls are
events of the period under audit: 5 (OCACC) either absent or inadequate to prevent or detect
 Occurrence errors in the account.
 Completeness  Auditors assess the level of control risk by
 Accuracy performing test of internal controls.
 Cutoff 3. Detection Risk (DR) – is the risks that the auditors
 Classification are willing to take that errors not detected or
2. Assertions about account balances at the prevented by the control structure will also go
year-end: 4 (CREV) undetected by the auditor as he or she performs
 Completeness substantive tests.
 Rights and obligations  Planned Detection Risk – predetermined by
 Existence the auditor as an acceptable level of
 Valuation and allocation detection risk which influences the level of
3. Assertions about presentation and disclosure: substantive test that they must perform.
4 (COCA)  The more reliable the internal controls, the
 Classification and Understandability more planned detection risk the auditor can
 Occurrence & Rights and Obligation assume and less substantive testing is
 Completeness required.
 Accuracy and Valuation
 The auditors develop audit objectives and Audit Risk Model
design audit procedures to gather evidence  Auditors used the audit risk component in the
corroborates (attests/support) or refutes audit risk model to determine the scope, nature
management assertions. and timing of substantive test.
 AR = IR x CR x DR
Audit Risks  The stronger the internal control structure, as
 Audit Risk – it is the probability that the auditor determined through test of controls, the lower
will render unqualified (clean) opinion on FS the control risk the lower the less substantive
test the auditor must perform.
CHAPTER 15 –AUDITING IT CONTROLS PART 1: SARBANES-OXLEY & IT GOVERNANCE

Audit Report  Application Control – It ensures validity,


 Audit Report – it is the report submitted by the completeness and accuracy of financial
auditor to the board of directors upon the transactions. These controls are designed to be
completion of the audit. application specific.
 Audit reports include an opinion on the fair  IT General Controls/General Computer
presentation of the FS and opinion on the Controls/Information Technology Control – are
quality of the internal controls over financial so named because they are not application
reporting. specific, but rather apply to all systems. They
include control over IT governance, IT
Overview of SOX Sections 302 and 404 infrastructure, network and operating system
 SOX of 2002 established corporate governance security, database access, application
regulations and standards for public companies acquisition and development, and program
registered w/SEC. changes.
 Section 302 and 404 focuses concentrate on  Although General controls do not control
internal control and audit responsibility. specific transactions, they have an effect on the
Section 302 transaction integrity.
 Section 302 – It requires the corporate  General controls are needed to support the
management including the Chief Executive environment in which application control
Officer (CEO), to certify financial and other function and both are needed to ensure
information contained in the organization’s accurate financial reporting.
quarterly and annual reports.
 This section also requires the corporate Audit Implications of Section 302 and 404
management to certify the internal controls  Prior to SOX, The audit primarily consists of
over financial reporting. substantive test.
 Certifying officers – are required to have  SOX expand the role of the external mandating
designed internal controls or to have caused that they attest the quality of internal controls.
such controls to be designed and to provide  PCAOB Standard no. 5 – specifically requires
reasonable assurance as to the reliability of the auditors to understand transaction flows
financial reporting process. They must also including controls pertaining to how
disclose material changes in the company’s transactions are initiated, authorized, recorded
internal control that have occurred in the most and reported.
recent fiscal year.  Compliance to Section 404 – requires
Section 404 management to provide the external auditors
 Section 404 – requires the management of with documented evidence of the functioning of
public companies to assess the effectiveness of controls related to selected material accounts in
their organization’s internal control over its report in control effectiveness.
financial reporting process.  SOX places responsibility on auditors to detect
 Under this section of the act, the management fraudulent activity and emphasize the
is required to providea an annual report importance of controls designed to prevent or
addressing to the following: (P.650) detect fraud that could lead to material
 COSO (Committee of the Sponsoring misstatement of financial statements.
Organization of the Treadway Commission) –
According to SEC, it is the recommended Computer Fraud
control framework. It was also endorsed by  Fraud – denotes a false representation of a
PCAOB auditing standard no. 5 to be used for material fact made by one party to another w/
control assessment. the intent to deceive and induce the other party
Relationship between It controls and Financial Reporting to justifiably rely on the fact to his / her
 COSO model identifies 2 broad groupings of IT detriment.
Controls:  In business environment, Fraud – It is an
1. Application Controls intentional deception, misappropriation of
2. General Controls company’s asset or manipulation of company’s
CHAPTER 15 –AUDITING IT CONTROLS PART 1: SARBANES-OXLEY & IT GOVERNANCE

financial data to the advantage of the  Hackers – their motive is not to


perpetrator. defraud for financial gain instead
 Computer fraud includes: they are challenge of breaking
1. Theft, misuse, or misappropriation of assets into the system rather than theft
by altering computer readable records and files. of assets. They have caused
2. Theft, misuse, or misappropriation of assets intensive damage and loss to
by altering the logic of computer software. organization by destroying and
3. Theft or illegal use of computer readable corrupting corporate data.
information.  Computer Criminals – motivated
4. Theft, corruption, illegal copying or by financial gain in committing
intentional destruction of computer software fraud.
5. Theft, misuse, or misappropriation of  2. Data Processing - It include mathematical
computer hardware. algorithm used for production scheduling
 Each stage in the General for accounting application, statistical techniques for sales
information model – forecasting and posting and summarizing
1. Data collection procedures used for accounting applications.
2. Data processing  Data processing fraud fall into two
3. Database management classes:
4. Information generation 1. Program Fraud
**are potential areas of risk for certain types of 2. Operations Fraud
computer fraud.  Program Fraud – It includes the ff. techniques
 1. Data Collection – first operational stage in the (1) creating illegal programs that can access
information system. It is the most important data files to alter, delete, or insert values into
stage in the system. accounting records.
 Data Collection is the most common (2) Destroying and corrupting program’s logic
access point for perpetrating computer using a computer virus.
fraud. (3) Altering the program logic to cause the
 Fraud of this type requires no computer application to process data incorrectly.
skills or little on the part of the  Salami Fraud – a form of program fraud that
fraudster. involves modifying the rounding logic of the
 Control Objective: To ensure that the program so that it no longer adds the one cent
event entering the system are valid, randomly. Instead the modified program,
complete and free from material errors. always adds the plus cent to the perpetrator’s
 Network Systems – It expose the account but it stills add the minus cent
organization to transaction fraud from randomly.
remote location.  Operations Fraud – It is misuse or theft of the
 There are 3 fraud techniques: firm’s computer resources. It often involves
1. Masquerading using the computer to conduct personal
2. Piggybacking business.
3. Hacking  3. Database Management
 Masquerading -It involves a perpetrator  Database is the physical repository for
gaining access to the system from the financial and non-financial data.
remote site by pretending to be an  Database Management Fraud – includes
authorized user. Usually requires first altering, deleting, corrupting,
gaining authorized access to password. destroying or stealing organizations
 Piggybacking – It is a technique in which data. Usually done by disgruntled
the perpetrator at the remote site taps employees
in to the telecommunication lines and  Access to database files – is essential
latches on to an authorized user who is element of Database management
logging into the system. fraud.
 Hacking – may involve piggybacking or
masquerading techniques.
CHAPTER 15 –AUDITING IT CONTROLS PART 1: SARBANES-OXLEY & IT GOVERNANCE

 Logic Bomb- destructive routine that monitoring database usage, and


erases the files that the program planning future expansions.
accesses.  Separating the DBA from Systems
 4. Information Generation – It is the process of development
compiling, arranging, formatting and presenting 3.) Separating New Systems Development from
information to users. Maintenance
 A common form of computer fraud at  Inadequate Documentation
the information generation stage is to  Reasons for Poor documentation
steal, misdirect or misuse computer 1. Documenting is not as interesting as
output. designing, testing and implementing
 Scavenging – It is a one low tech but them.
effective technique that involves 2. Job Security
searching through the trash of the  Program Fraud
computer center for discarded output.
 Solution Paper Shredding
 Eavesdropping – It is another form of
fraud that involves listening to output
transmissions over telecommunication
lines.
 PCAOB Auditing Standards No.5 –
emphasizes that management and
auditors used a risk based approach
rather than one size fits all approach to
the design and assessment of controls.
IT Governance Controls
 It is a broad concept relating to the decision
rights and accountability for encouraging
desirable behaviour in the use of IT.
Organizational Structure Controls
 Operational tasks should be separated to :
1. Segregate all the task of transaction
authorization from transaction processing.
2. Segregate record keeping from asset custody.
3. Divide transaction processing tasks among
individuals so that fraud will require collusion
between two or more individuals.
 Consolidation of activities is the tendency of IT
environment.
 Two generic models :
1. Centralized Model
2. Distributed Model
Segregation of Duties within the Centralized Firm
1.) Separating systems development from Computer
Operations
2.) Separating the Database Administrator from other
functions
 Database Administrator (DBA) is
responsible for a number of critical
tasks pertaining to database security
including creating the database schema,
creating user views(Subschema),
assigning access to authority to users,

You might also like