Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Audit through the computer: - The auditor’s role in systems development should be

-uses the computer to check adequacy of system limited to an independent review of systems
controls, data and output development activities
-evaluates how audit strategy is affected by an - Auditors should review the policies, procedures,
organization’s use of IT standards and documentation
-auditors need specialized skills to - Audited on the process by which software is selected.
 Determine how the audit will be affected by IT. Did management approve of it? Do they have a
 Assess and evaluate IT controls strategic IT plan
 Design and perform both tests of IT controls
and substantive tests 3. Program modifications have management’s
authorization and approval.
Information systems (Internal Control) - Auditing applications program and system software
-This audit reviews the control of and AIS to assess changes:
compliance with internal control policies and  When a program change is submitted for
procedures and the effectiveness of safeguarding assets approval, a list of all required updates should be
compiled and approved by management and
Information Systems Audit program users.
Objectives  During systems review, auditors gain an
1. Security provisions protect computer equipment understanding of the change process by
programs, communications , and data from discussing it with management and user
unauthorized access, modification or destruction. personnel
*Framework for auditing computer security  An important part of an auditor’s tests of
 Types of security errors and fraud found in controls is to verify that program changes were
companies: hardware or software damage, identified , listed, approved, tested and
theft, loss or unauthorized information documented
disclosure, interruption of crucial business  To test for unauthorized program changes ,
activities. auditors can use a source code comparison
 Control procedures to minimize security errors program
and fraud: security protection plan, restrictions Two additional techniques to detect unauthorized
on physical and logical access, password program changes:
protection, antivirus software, disaster recovery 1. The reprocessing technique also uses a verified copy
plan, backup and recovery, fault tolerant of the source code. On a surprise basis, the auditor
design. uses the program to reprocess data and compare that
 Systems review audit procedures: these include output with the company’s data.
inspecting sites, interviewing people, reviewing 2. Parallel simulation is similar to reprocessing except
policies and procedures, examining access logs, that the auditor writes a program instead of saving a
disaster recovery plans. verified copy of the source code. The auditor’s results
 Test of controls – audit procedures, testing the are compared with the company’s results and any
controls: observe site access procedures, differences are investigated
process for backing up files, password process,
firewalls, uninterruptible power supplies, 4. Processing transactions, files , reports and other
preventative maintenance, data transmission computer records is accurate and complete
controls - The focus is the processing of transactions, files and
 Compensating controls- do these exist if the related computer records to update files and databases
controls are weak? Do you have sound and to generate reports
personnel policies? Effective user controls? Options to test processing controls:
Segregation of incompatible duties? a.) Processing test data
- One way to test a program is to process a hypothetical
2. Program development and acquisition are series of valid and invalid transactions
performed in accordance with management’s general - The following resources are helpful when preparing
and specific authorization test data:
- A listing of actual transactions
- The test transactions the programmer used to test the - If an auditor suspects that a particular application
program program contains unauthorized code or serious errors ,
- A test data generator program, which automatically then a detailed analysis of the program logic may be
prepares a test data based on program specifications necessary.

b.) Concurrent audit techniques - There are software that :


- The auditor uses concurrent audit techniques to  Create automatic flowcharts
continually monitor the system and collect audit  Create automated decision tables
evidence while live data are processed during regular  Scan for occurrences of variables or
operating hours. characters
- Concurrent audit techniques use embedded audit  Map for unexecuted code
modules , which are segments of program code that  Trace program steps
perform audit functions. These report results to the  Key: there is a lot of software to help
auditors auditors
Auditors normally use five concurrent audit techniques: - Does the system detect erroneous input?
1.) Integrated test facility (ITF) - Does it properly correct input errors?
 Small set of fictitious record in the master - Are there examples of improper distribution or
file and the auditor will compare processing disclosure of output
with the expected result to verify that the Disadvantages of processing test transactions:
system and controls are operating - The auditor must spend considerable time
effectively. It involves creation of dummy developing an understanding of the system and
entity in the application system & to audit preparing an adequate set of test transactions
the processing of test data entered in - Care must be taken to ensure that test data do
dummy entity. not corrupt (affect) the company’s files and
databases
2.) Snapshot technique
 examines the way the transactions are 5. Source data that are inaccurate or improperly
processed. Selected transactions are authorized are identified and handled according to
marked with special code that triggers prescribed managerial policies.
snapshot process. Audit module records the - Auditors use an input controls matrix. The matrix
transactions before & after processing. shows the control procedures applied to each field of an
input record
3.) System control audit review file (SCARF)- - The internal controls that prevent, detect and correct
 It involves embedding audit software inaccurate or unauthorized data
module within host application to provide - Authorization: Are there tests to prevent , detect and
continuous monitoring of transactions. correct *Flawed information? Are the transactions
SCARF is like snapshot with data collection complete?
capability. - Do other controls compensate?

4.) Audit Hooks 6. Computer data files are accurate, complete and
 It is used to flag the suspicious transactions. confidential
Auditor is informed of questionable - Concerns with the accuracy, integrity and security of
transactions as they occur via real time data stored in machine-readable files
notification. - Are they protected against unauthorized modification
destruction or disclosure of data
5.) Continuous and Intermittent Simulation (CIS)-
embeds an audit module in a database Computer Software Audit
management system (DBMS). The CIS module - A number of computer programs, called computer
examines all transactions that update the audit software (CAS) or generalized audit software
database using criteria similar to those of (GAS) , have been written especially for auditors
SCARF. - General Audit Software is software designed to read,
process and write data with the help of functions
c.) Analyzing program logic performing specific audit routines and with self-made
macros. It is a tool in applying Computer Assisted thereby detecting and facilitating correction of
Auditing Techniques Functions of generalized audit any errors prior to shipment
software include importing computerized data;  Cash receipts are processed more quickly,
thereafter other functions can be applied. improving cash flow.
 Reports and performance measures are
Two of the most popular software
timelier, enhancing management’s ability to
1. Audit Control Language is a data
monitor and improve efficiency and
interrogation tool used by auditors to view,
explore, and analyze data efficiently and effectiveness.
cost effectively. ACL enables auditors to Internal control in revenue cycle
access data in diverse formats and on
various types of storage devices. 1. Authorization
2. IDEA ( Interactive Data Extraction and 2. Supervision
Analysis) is a Generalized Audit Software. It 3. Segregation of duties
is able to import a wide range of different 4. Access control
types of data files. During the import a 5. Independent verification
IDEA file and its field statistics are created. 6. Accounting records

 The primary purpose of CAS is to assist Computer-based accounting systems


the auditor in reviewing and retrieving
information in computer files. CBAS technology can be viewed as a continuum with
 CAS cannot replace the auditor’s two extremes:
judgment or free the auditor from other 1. Automation – use technology to improve
phases of the audit.
efficiency and effectiveness
2. Reengineering- use technology to restructure
Audit on Revenue Cycle
business processes and firm organization
Information Processing Procedures
Levels of Automating and Reengineering Ordering
Many organizations have replaced their accounting info
1. Computer generates PR
systems with an integrated Enterprise Resource
Purchases manually generates PO
Planning (ERP) system.
2. Computer generates PO (no PR needed)
ERP key improvements are as follows: PO not sent until manually reviewed
3. Computer-generated PO is automatically sent
 Real-time order entry detects errors, such as
without manual review
missing data, as the order is being entered, and
4. Electronic Data Interchange (EDI)
when it is easiest to correct those errors.
Computer-to -computer communication
 Credit approval decisions can be made at the
without PO
time the customer places the order. If special
approval is required, the credit manager is Audit on Purchases and Disbursements Cycle
notified by e-mail or IM and can immediately
Expenditure Cycle Data Base
make that decision.
 Inventory records are more accurate and  Master files
timely, enabling sales order entry staff to - supplier
provide customers accurate information about -accounts payable
expected delivery dates. -merchandise inventory
 The warehouse shipping departments can  Transaction and Open Document Files
better plan activities to minimize the time - purchase order file
required to fill customer orders - open purchase order file
 The system compares data that the shipping - supplier’s invoice file
department entered with the sales order file, -open vouchers file
- cash disbursement file
 Other Files
- supplier reference and history file
-buyer file
-accounts payable detail file

Computer-based Purchases

 A Data Processing department performs routine


accounting tasks
 Purchasing – a computer program identifies
inventory requirements
 The following methods are used for authorizing
and ordering inventories
- the system prepares POs and sends them to
Purchases for review, signing and distributing
-the system distributes POs directly to the
vendors and internal users, bypassing Purchases
-the system uses electronic data interchange
(EDI) and electronically places the order
without POs

Computer-Based Cash Disbursements

 Tasks performed automatically by the computer


- the system scans for vouchers currently due
-prints checks for these vouchers
-records these checks in the check register
-batch totals are prepared for the general
ledger update procedure

General Internal controls


 Organization control
- segregation of duties
 Documentation
 Asset accountability controls
 Management practices
 Data center operations control
 Authorization controls
 Access controls

You might also like