Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

CHAPTER 1 Generally Accepted Auditing Standards

External (Financial) Audit – is an independent General Standards


attestation performed by an expert – the auditor – 1. The auditor must have adequate training and
who expresses an opinion regarding the proficiency
presentation of financial statements. 2. The auditor must have independence of
mental attitude
Attest Service – performed by CPAs who work 3. The auditor must exercise due professional
for public accounting firms that are independent care in the performance of the audit and the
of the client organization being audited. preparation of the report.
-an engagement in which a practitioner is
engaged to issue, or does issue, a written
communication, that expresses a conclusion Standards of Field Work
about the reliability of a written assertion that is 1. Audit work must be adequately planned
the responsibility of the other party. 2. The auditor must gain a sufficient
understanding of the internal control structure
Advisory Service – professional services offered 3. The auditor must obtain sufficient, competent
by public accounting firms to improve their client evidence
organizations’ operational efficiency and
effectiveness. Reporting Standards
1. The auditor must state in the report whether
Internal Audit – independent appraisal function financial statements were prepared in accordance
established within the organization to examine with generally accepted accounting principles.
and evaluate its activities as a service to the 2. The report must identify those circumstances
organization. in which generally accepted accounting principles
were not applied.
External Audit vs Internal Audit 3. The report must identify any items that do not
-Independent (CPA) -Auditor (CIA, CISA) have adequate informative disclosures
-SEC/S-OX/AICPA -Employee of 4. The report shall contain an expression of the
organization auditor’s opinion on the financial statements as a
-SEC-publicly traded -Optional – mgt whole.
requirements
-Financial Audit -Broader (operational Management Assertions
audit) 1. Existence/Occurrence – affirms that all
-Interests of outsiders -Interests of assets and equities contained in the balance
organization sheet exist and that all transactions in the income
Standards, guidance, certification governed by: statement actually occurred.
-PICPA, FRSC, BOA -IIA and ISACA 2. Completeness – declares that no material
delegated by SEC assets, equities, or transactions have been
omitted from the financial statements.
Fraud Audit – objective: investigate anomalies 3. Rights and Obligations – maintains that
and gather evidence of fraud that may lead to assets appearing on the balance sheet are owned
criminal conviction. by the entity and that the liabilities reported are
Certification: Certified Fraud Examiner (CFE) obligations
Governed by: Association of Certified Fraud 4. Valuation or Allocation – assets and equities
Examiners (ACFE) are valued in accordance with GAAP and that
allocated amounts such as depreciation expense
Role of Audit Committee are calculated on a systematic and rational basis
-Selected from Board of Directors, usually 3
members Audit Risk – probability that the auditor will
-Outsiders (S-OX) render an unqualified opinion on financial
-Fiduciary responsibility to shareholders statements that are in fact, materially misstated.
-Serve as independent check and balance system Acceptable Audit Risk is estimated based
-Interact with internal auditors on the ex ante value of the components of
-Hire, set fees, and interact with external auditors the audit risk model.
-Resolve conflicts of GAAP between external
auditors and management AR = IR x CR x DR
Components of Audit Risk Model Sec 404 – Management is responsible for
Inherent Risk – probability that material establishing and maintaining internal control
misstatements have occurred structure and procedures
Control Risk – probability that the internal Sec 302 – Financial executives must disclose
controls will fail to detect material misstatements deficiencies in internal control and fraud (material
Detection Risk – probability that audit or not)
procedures will fail to detect material
misstatements Modifying Principles that guide designers
and auditors of internal control system
IT Audit – focuses on the computer based 1. Management Responsibility –
aspects of an organization’s information system establishment and maintenance of a system of
and modern systems employ significant level of internal control is management responsibility
technology. 2. Reasonable Assurance – that 4 broad
objectives of internal control (spem) are met
-CoBA, benefits > costs
3. Methods of Data Processing – 4 broad
Structure of an IT Audit/IT Environment objectives of internal control (spem) are achieved
1. Audit Planning – first step in IT Audit. regardless of methods of data processing
Includes: 4. Limitations
-Review of organization’s policies, practices and -Possibility of Error
structures -Possibility of Circumvention
-Review general controls and application controls -Management Override
-Plan test of controls and substantive testing -Changing conditions
procedure
Exposure – absence or weakness of a control
2. Test of Controls – determine whether Risk – potential threat to compromise use or
adequate internal controls are in place and value of organizational assets
functioning properly
Includes: PDC Model
-Perform test of controls Prevention Control – 1st line of defense in the
-Evaluate test results control structure
-Determine degree of reliance on controls -passive techniques designed to reduce the
frequency of occurrence of undesirable events
3. Substantive Testing Phase – detailed
investigation of specific amount balances and Detective Control – 2nd line of defense.
transactions -devices, techniques, and procedures designed to
Includes: identify and expose undesirable events that elude
-Perform substantive tests preventive controls
-Evaluate results and issue auditor’s report
CAATTs – Computer Assisted Audit Tools and Corrective Controls – actions taken to reverse
Techniques the effect of detective errors, actually fix the
problems
Internal Control – policies, practices,
procedures designed to: COSO Framework: IC Five Components
-safeguard assets 1. Control Environment – foundation. Sets the
-promote efficiency tone for the organization and influences the
-ensure accuracy and reliability control awareness of its management and its
-measure compliance with policies employees.
2. Risk Assessment – identify, analyze and
COSO – Committee on Sponsoring Organizations manage risks relevant to financial reporting.
-developed a management perspective model for 3. Information and Communication – auditors
internal controls over a number of years which is obtain sufficient knowledge of Information
widely adopted System to understand
4. Monitoring – process by which the internal
Sarbanes-Oxley Act – 2002 control design and operation are assessed.
EAM – Embedded Audit Modules
COA – Continuous Online Auditing
5. Control Activities – policies and procedures
used to ensure that appropriate actions are taken Data Processing – management of the
to deal with the organization’s identified risks. computer resources used to perform the day-to-
Computer/IT Controls – General and day processing of transactions. 3 organizational
Application functions: data conversion, computer operations
Physical Controls and data library

General – apply to all systems Data Conversion – transcribes transaction data


Application – designed to application-specific. from hard-copy source documents into computer
Objective: ensure validity, accuracy and input
completeness financial transactions
Computer Operations – processing by the
Physical Controls – relates primarily to human central computer of the electronic files produces
activities employed in accounting systems. Types in data conversion
of Physical Controls:
Data Library – room adjacent to computer
Transaction Authorization – ensure that all center that provides safe storage for the off-line
material transactions processed by the data files.
information system are valid and in accordance
with management’s objectives System Development – responsible for
General Authority – granted to operations analyzing user needs for designing new systems
personnel to perform day-to-day activity to satisfy those needs

Segregation of Duties – Authorization is System Maintenance – making changes to


separate from processing; Asset Custody program logic to accommodate shifts in user
separate from record-keeping needs over time

Supervision – small companies’ compensation Participants:


for absence of segregation of duties IS Professionals – gather facts about the user’s
problem, analyze the facts and formulate a
Accounting Records – source documents, solution
journals and ledgers End Users – those for whom the system is built
Audit Trail – enables the auditor to trace Stakeholders – individuals in/outside the firm
any transaction through all phases of who have an interest in the system
processing Auditors

Access Control – ensure that only authorized Segregation of Incompatible IT Functions


personnel have access to company’s assets
Separating Systems Development and
Independent Verification – independent Operations Activities – Systems Development
checks of the accounting systems to identify and Maintenance Professionals should create
errors and misinterpretations systems for user and should have no involvement
in entering data or running applications.
CHAPTER 2 Operations staff should run these systems and
have involvement in their design
IT Governance – relatively new subset of
corporate governance that focuses on the Separating DBA from other functions – DBA
management and assessment of strategic IT is organizationally independent of operations,
Sources systems development and maintenance.

Centralized Data Processing – all data Segregate Systems Analysis from


processing is performed by one or more large Programming
computers housed at a central site that serves Inadequate Documentation – control problem
users throughout the organization which is considered a chronic problem because it
is not interesting to do and may threaten job
Database Administrator (DBA) – responsible security
for security and integrity of the database
Program Fraud – involves making unauthorized User Services – help desk, technical support,
changes to program modules for the purpose of FAQs
committing an illegal act. Standard Setting Body – establishing central
guideline
Personnel Review – evaluate technical credentials
Salami Slicing – division of a fraud into series of of systems professionals
small illegal actions because it is difficult to
perform all at once Computer Center:
Trapdoors – fraud wherein the programmer Physical Location - should be away from human
writes code into the program that allows him to made and natural hazards
work around any or all controls in the system and Construction – ideally: single story building,
thus makes it easy to commit fraud underground utilities, windowless and air filtration
system
Segregate System Development from Access – limited to operators and other
Maintenance employees who work there. Physical controls:
Better Documentation Standards locked doors, cameras. Manual: access log of
Deters Fraud visitors
Air Conditioning – amount of heat must be
Segregate Data Library from Operations even
For Physical Security of Offline Data Files Fire Suppression – Fire is the most serious
threat
Fire Alarm
Real Time Data Processing – involves Automatic Fire Extinguishing System
continual input, process and output of data. Data Manual Fire Extinguishers
must be processed in same time data is received Power Supply – uninterrupted, clean power
Batch Data Processing – involves collecting
Fault Tolerance – ability of the system to
and storing a number of related transactions
continue operation when part of the system fails
before processing them simultaneously
because of hardware failure, application program
Distributed Data Processing (DDP) – data error or operator error
processing model that involves recognizing the RAID – Redundant Arrays of Independent
central IT function into small IT units that are Disks – parallel disks that contain
placed under the control of end users redundant elements of data applications
Uninterruptible Power Supplies – backup
Risks Associated with DDP power
Inefficient Use of Resources – mismanagement of
Disaster Recovery Plan (DRP) –
resources by end-sures
comprehensive statement of all actions to be
Destruction of Audit Trails
taken before, during, and after a disaster, along
Inadequate Segregation of Duties
with documented, tested procedures that will
Hiring Qualified Professionals – difficult to attract
ensure the continuity of operations.
qualifies professionals
Lack of Standards – every end user has their own
Second Site Backup
standard
Mutual Aid Pact – agreement between two or
more organizations (with compatible computer
Advantages of DDP
facilities) to aid each other with data processing
Cost Reductions – application complexity reduced
needs in event of a disaster
Improved Cost Control Responsibility
Empty Shell (cold site) – buys or leases a
Improved User Satisfaction – increased morale
building that will serve as a data center
and productivity
Recovery Operations Center (hot site) – fully
Backup Flexibility – excess capacity for DRP
equipped backup data center
Internally Provided Backup – company built its
Controlling the DDP Environment
own remote mirrored data center
Central Systems Development - testing and
Operating System Back up – back up of
implementation of Commercial Software and
operating system
Hardware
Application Backup – create copies of current
versions of critical applications
Backup Data Files – databases should be Urban Legends – myth, folklore
copied daily to CDs, etc Hoax Virus Warnings – warning a recipient of a
Backup Documentation – system non-existing virus threat
documentation for critical applications should be Flaming – writers attacks another participant
backed up and stored off site along with the overly harsh
applications Malicious Attachments – viruses
Backup Supplies and Source Documents –
create back up inventories if supplies and source Malicious Objects Risk
documents used in processing critical Virus – malware that when executed infects
transactions other programs
Testing the DRP – most neglected aspect of Worm – malware that replicate itself to spread to
contingency planning other computers or programs
Logic Bomb – triggered by some event at a
System Wide Controls certain date or time
Password Control – tool designed to allow Trapdoor
helpdesk staff to reset user password Trojan Horse – disguised as a legitimated
Reusable Password – same password for all software
One time password – password valid for only
one transaction

Email Risks
Spoofing – forgery of an email header so that
the message appears to have originated from
someone other than the actual source
Spamming – sent to thousands of users
Chain Letters – letters convincing users to pass
them on another user

You might also like