Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

DATA ANALYTICS

MODULE 9
● Identification of areas where poor data
Data analytics is an important tool for an IS auditor. quality exists
Through the use of technology, an IS auditor can ● Performance of risk assessment at the
select and analyze full data sets to continuously planning phase of an audit
audit or monitor key organizational data for
abnormalities or variances that can be used to PROCESS IN DATA ANALYTICS IN AUDIT
identify and evaluate organizational risk and
1. Setting the scope - determining audit/review
compliance with control and regulatory requirements.
objectives; defining data needs, sources and
reliability
DATA ANALYTICS - This is the starting point, all of the procedures
should be related to the scope.
2. Identifying and obtaining the data -
Data analytics is the science of fusing
requesting data from responsible sources,
heterogeneous data from various sources, drawing
testing a sample of data, extracting the data
relations and causalities among them, making
for use
predictions to gain insights, and supporting
- We need to identify where will we get the data
decision-making
(external or internal sources).
- Data science and data analytics are often being
3. Validating the data - determining if the data
interchanged.
are sufficient and reliable to perform audit
- However, the two topics are distinct from each
tests by:
other.
○ Validating balances independent of the
- Data science covers tasks related to finding
data set extracted
patterns in large data sets, training machine
○ Reconciling detailed data to report control
learning models, and deploying AI application.
totals
- Data analytics on the other hand is one of the
○ Validating numeric, character and date
tasks that resides under data science umbrella.
fields
- Specialization of data science focuses on
○ Verifying the time period of the data set
querying, interpreting, and visualizing data sets
(i.e., meets scope and purpose)
which are basically the procedures performed by
○ Verifying that all necessary fields in
IS auditors when analyzing evidences.
scoping are actually included in the
acquired data set
DATA ANALYTICS IN AUDIT
- In this process, we are going to apply the
- Data analytics is data-driven and relies with the learnings from the previous module with
availability of data. regards to the standards of the audit
- For big company with voluminous data, the evidences.
usage of data analytics greatly help the IS - You must ensure that the data you obtained
auditors during audit fieldwork. from the second process is sufficient and
- The IS auditor may set goals and parameters reliable.
that are within the IS auditors’ threshold and 4. Executing the tests - running scripts and
materiality level or even those that may be performing other analytical tests
considered red flags for checking. 5. Documenting the results - recording the
- Hence, the data analytics may be used in: testing purpose, data sources and conclusions
reached
● Determination of the operational - All procedures performed and the purpose
effectiveness of the current control should be included as well in your
environment documentation in the working paper.
● Determination of the effectiveness of 6. Reviewing the results - ensuring that the
antifraud procedures and controls testing procedures have been adequately
● Identification of business process errors performed and reviewed by a qualified person
● Identification of business process - This is the supervisory process in the audit
improvements and inefficiencies in the control review because after the procedures are
environment performed, of course in the audit, still someone
● Identification of exceptions or unusual is going to review your work.
business rules 7. Retaining the results - maintaining important
● Identification of fraud test elements, such as:

MARIA BERNISE DIMZON • ELEINA BEA BERNARDO 1


Module 9: Data Analytics

○ Program files - CAATs are capable of executing a variety of


○ Scripts automated compliance tests and substantive
○ Macros/automated command tests tests that would be nearly impossible to perform
○ Data files manually due to the volume of transactions.
- You must just be familiarized with the steps - These specialized tools may include multifunction
but Sir Jordan would not include this process audit utilities which can analyze logs, perform
in your exams in the quiz 4 and the finals. variability tests, or verify specific implementation
of compliance in a system configuration
Data analytics can be effective for an IS auditor in compared to the expected or intended controls.
both the planning and fieldwork phases of the audit. - Though not necessarily required, programming
skills is a useful or additional knowledge that can
POSSIBLE APPLICATIONS be advantageous for an IS auditor to possess.
- But before using CAATs, you must first request the
● Combining logical access files with human
permission of the auditee, especially if you are a
resources employee master files for
third-party auditor since you are going to access
authorized users
their system.
● Combining file library settings with data from
the change management systems and dates
CAATs are important tools that an IS auditor uses to
of file changes that can be matched to dates
gather and analyze data during an IS audit or
of authorized events
review. When systems have different hardware and
● Matching ingress with egress records to
software environments, data structures, record
identify tailgating in physical security logs
formats or processing functions, it is almost
- Ingress - enter; egress; exit
impossible for an IS auditor to collect certain
● Reviewing table or system configuration
evidence without using such a software tool.
settings
● Reviewing system logs for unauthorized
CAATs also enable an IS auditor to gather
access or unusual activities
information independently. They provide a means
● Testing system conversion
to gain access and analyze data for a
● Testing logical access SoD (e.g., analyzing
predetermined audit objective and to report the
Active Directory data combined with job
audit findings with emphasis on the reliability of the
descriptions)
records produced and maintained in the system.
The reliability of the source of the information used
COMPUTER-ASSISTED AUDIT TECHNIQUES provides reassurance on findings generated.
● Used to gather and analyze data during an IS
audit or review Here are some examples of CAATs:
● Enable an IS auditor to gather information CAATs include many types of tools and techniques
independently such as:
● Provide a means to gain access and analyze ● generalized audit software (GAS)
data for a predetermined audit objective and ● utility software
to report the audit findings with emphasis on ● debugging and scanning software
the reliability of the records produced and ● test data
maintained in the system ● application software tracing and mapping
● expert systems
- CAATs are needed because of the large volumes
of data in multiple locations involved in the CAATS include many types of tools and
managing of the complex business environment. techniques such as:
- It involves the merging of software in the audit
program.
- In order for this to be effective, key control GENERALIZED AUDIT SOFTWARE
questions must be predefined in order to facilitate ● GAS refers to standard software that has the
the use of the technology to analyze the data and capability to directly read and access data
provide the answers. from various database platforms, flat-file
- Advantages from the auditors’ perspective systems and ASCII formats.
includes increase in productivity, creativity, and ○ ASCII stands for American Standard Code
the application of consistent methodology. for Information Interchange.

MARIA BERNISE DIMZON • ELEINA BEA BERNARDO 2


Module 9: Data Analytics

○ If you are familiar with the numbering query-based system is built on the knowledge
system, this includes the binary, base of senior auditors or managers.
hexadecimal, and decimal. ● results of each test are compared to
○ When you say flat-file, it consists of a single predetermined expectations to obtain an
table of data. objective assessment of application logic and
● GAS provides an IS auditor with an control effectiveness
independent means to gain access to data for
analysis and the ability to use high-level, - This technique involves the utilization of a copy
problem-solving software to invoke functions of the live computer system through which a
to be performed on data files. Features include series of transactions is passed in order to
mathematical computations, stratification, produce predetermined results.
statistical analysis, sequence checking, - This technique, while effective in searching for
duplicate checking and recomputations defects, is limited by the volume of data that
○ GAS is designed specifically for auditors in can be handled.
order to provide a user-friendly audit to - Creating a test data requires a complete set of
carry out a variety of standard tasks valid and invalid transactions.
required by the auditor, such as examining - Incomplete test data may explore critical
records, testing calculations, and making branches of application logic and error
computations. checking routines.
○ One example of GAS is the Audit Command - Test transactions should be designed to test all
Language (ACL). possible input errors, logical process, and
irregularities.
COMMON FUNCTIONS SUPPORTED BY GAS
UTILITY SOFTWARE
● File access—Enables the reading of different
● Utility software is a subset of software—such
record formats and file structures
as report generators of the database
○ When accessing the file, you harness the
management system—that provides evidence
information from their system.
about system control effectiveness.
● File reorganization—Enables indexing,
- Utility software is already covered in AIS 5135 -
sorting, merging and linking with another file
ISOM.
● Data selection—Enables global filtration
conditions and selection criteria
○ In here, you filter the data that is within the DEBUGGING/TRACING/MAPPING
parameters that you set. ● The review of an application system will
● Statistical functions—Enables sampling, provide information about internal controls
stratification and frequency analysis built in the system
○ Will aid you in the selection of sample size - Debugging is usually associated with the
that we discussed in our previous modules. testing of the systems development cycle, but
● Arithmetical functions—Enables arithmetic might as well helpful during audits since you
operators and functions can have an overview or map of the system.
○ This includes the basic addition,
subtraction, multiplication, division, or some EXPERT SYSTEMS
other algebraic functions.
● Gives direction and valuable information to all
levels of auditors while carrying out the audit
TEST DATA because the query-based system is built on
● Test data involve an IS auditor using a sample the knowledge base of senior auditors or
set of data to assess whether logic errors exist managers
in a program and whether the program meets - This is already discussed in Module 2.
its objectives. The review of an application
system will provide information about internal
AUDIT APPLICATION OF CAATS
controls built in the system. The audit-expert
system will give direction and valuable ● Tests of the details of transactions and
information to all levels of auditors while balances
carrying out the audit because the ● Analytical review procedures
● Compliance tests of IS general controls

MARIA BERNISE DIMZON • ELEINA BEA BERNARDO 3


Module 9: Data Analytics

● Compliance tests of IS application controls


● Network and OS vulnerability assessments When developing CAATs, the following are
● Penetration testing examples of documentation to be retained:
○ Secured exercise where a cyber security
● Online reports detailing high-risk issues for
expert attempts to find and exploit the
review
weaknesses or vulnerabilities of a computer
● Commented program listings
system
● Flowcharts
● Application security testing and source code
● Sample reports
security scans
● Record and file layouts
● Field definitions
An IS auditor should have a thorough understanding
● Operating instructions
of CAATs and know where and when to apply them.
● Description of applicable source documents
For example, an IS auditor should review the results
of engagement procedures to determine whether
there are indications that irregularities or illegal acts WHEN USING CAATS
may have occurred. Using CAATs could aid ● CAATs documentation should be referenced to
significantly in the effective and efficient detection of the audit program and clearly identify the
irregularities or illegal acts. audit procedures and objectives being served.
○ The usage of CAATS, purpose, and
An IS auditor should weigh the costs and benefits of application should be likewise be
using CAATs before going through the effort, time documented in the working papers.
and expense of purchasing or developing them. ● When requesting access to production data for
use with CAATs, an IS auditor should request
THINGS TO CONSIDER read-only access.
○ This is a cardinal rule in audit. Auditors
should only have a read-only access and
Issues to consider include: should not in any way given the opportunity
● Ease of use for existing and future audit staff to alter and tamper the live production data
● Training requirements files.
● Complexity of coding and maintenance ● Any data manipulation by an IS auditor
● Flexibility of uses should be applied to copies of production files
● Installation requirements in a controlled environment to ensure that
● Processing efficiencies production data are not exposed to
● Effort required to bring the source data into unauthorized updating.
the CAATs for analysis ○ This is in relation to the second bullet. A
● Ensuring the integrity of imported data by master file should still be maintained and
safeguarding their authenticity procedures such as indexing, filtering, and
● Recording the time stamp of data analysis should be done on the duplicate
downloaded at critical processing points to copy.
sustain the credibility of the review ● Most CAATs allow for production data to be
● Obtaining permission to install the software downloaded from production systems to a
on the auditee servers stand-alone platform and then analyzed from
● Reliability of the software the standalone platform, thereby insulating the
● Confidentiality of the data being processed production systems from any adverse impact.

- To summarize, we should first consider the CAATS AS A CONTINUOUS ONLINE AUDIT


cost-benefit analysis in securing CAATs. APPROACH
- Aside from the acquisition, there are also costs
such as the installation, maintenance, periodic An important advantage of CAATs is the ability to
updates, as well as the training of the IS improve audit efficiency through continuous online
auditors who will use the CAATs. auditing techniques. To this end, an IS auditor must
- The CAATs should be aligned with the audit develop audit techniques that are appropriate for
objectives and we should also take into use with advanced information systems. In addition,
consideration any laws and regulations if any, they must be involved in the creation of advanced
with regards to the usage of CAATs. systems at the early stages of development and

MARIA BERNISE DIMZON • ELEINA BEA BERNARDO 4


Module 9: Data Analytics

implementation and must make greater use of management adopting continuous monitoring as a
automated tools that are suitable for their process on a day-to-day basis. Often, the audit
organization’s automated environment. This takes function will hand over the techniques used in
the form of the continuous audit approach continuous auditing to the business, which will then
run the continuous monitoring. This collaboration has
CONTINUOUS AUDITING AND MONITORING led to increased appreciation among process owners
of the value that the audit function brings to the
Continuous auditing is an approach used by IS organization, leading to greater confidence and trust
auditors to monitor system reliability on a between the business and the audit function.
continuous basis and gather selective audit Nevertheless, the lack of independence and
evidence through the computer. A distinctive objectivity inherent in continuous monitoring should
characteristic of continuous auditing is the short time not be overlooked, and continuous monitoring should
lapse between the facts to be audited, the collection never be considered as a substitute for the audit
of evidence and audit reporting. function.

CONTINUOUS AUDITING Continuous auditing efforts often incorporate new IT


● Enables an IS auditor to perform tests and developments; increased processing capabilities of
assessments in a real-time or near-real-time current hardware, software, standards and AI tools;
environment. and attempts to collect and analyze data at the
● Continuous auditing is designed to enable an moment of the transaction. Data must be gathered
IS auditor to report results on the subject from different applications working within different
matter being audited within a much shorter environments, transactions must be screened, the
time frame than under a traditional audit transaction environment has to be analyzed to
approach. detect trends and exceptions, and atypical patterns
(i.e., a transaction with significantly higher or lower
- Continuous auditing permits the IS auditor to value than typical for a given business partner) must
conduct audits of an online environment in a be exposed. If all this must happen in real time,
way that is less disruptive to the business perhaps even before final sign-off of a transaction, it
operations. is mandatory to adopt and combine various top-level
- Instead of the more costly and invasive audits, IT techniques. The IT environment is a natural
IS auditors can test the system while they are enabler for the application of continuous auditing
running and with minimum or no involvement because of the intrinsic automated nature of its
from the IT staff. underlying processes.

CONTINUOUS MONITORING Continuous auditing aims to provide a more secure


platform to avoid fraud and a real-time process
● Used by an organization to observe the aimed at ensuring a high level of financial control.
performance of one or many processes, Continuous auditing and monitoring tools are often
systems or types of data. For example, built into many enterprise resource planning
real-time antivirus, IPS, or IDSs may operate packages and most OS and network security
in a continuous monitoring fashion. packages. These environments, if appropriately
configured and populated with rules, parameters and
Continuous auditing should be independent of formulas, can output exception lists on request while
continuous control or monitoring activities which is operating against actual data. Therefore, they
being implemented by the management. represent an instance of continuous auditing. The
- Eventually, the IS audit may share this the difficulty, but significant added value, of using these
continuous auditing techniques or the parameters features is that they postulate a definition of what
being set to the management for their usage to would be a “dangerous” or exception condition. For
create a higher level of assurance as part of their example, whether a set of granted IS access
continuous monitoring. permissions is to be deemed risk-free will depend on
- But still, the review under the continuous auditing having well defined SoD. On the other hand, it may
should still be independent. be much harder to decide if a given sequence of
steps taken to modify and maintain a database
When both continuous monitoring and auditing take record points to a potential risk.
place, continuous assurance can be established. In
practice, continuous auditing is the precursor to

MARIA BERNISE DIMZON • ELEINA BEA BERNARDO 5


Module 9: Data Analytics

It is important to validate the source of the data 2. Continuous and intermittent simulation (CIS)
used for continuous auditing and note the possibility
● During a process run of a transaction, the
of manual changes.
computer system simulates the instruction
execution of the application. As each
CONTINUOUS AUDITING TECHNIQUES transaction is entered, the simulator decides
whether the transaction meets certain
Continuous audit techniques are important IS audit
predetermined criteria and, if so, audits the
tools, particularly when they are used in time-sharing
transaction. If not, the simulator waits until it
environments that process a large number of
encounters the next transaction that meets the
transactions but leave a scarce paper trail. By
criteria.
permitting an IS auditor to evaluate operating
● Useful when only transactions meeting certain
controls on a continuous basis without disrupting the
criteria need to be examined
organization’s usual operations, continuous audit
● Complexity: MEDIUM
techniques improve the security of a system. When a
- The application software always tests for
system is misused by someone withdrawing money
transactions that meet a certain criteria.
from an inoperative account, a continuous audit
- When a criteria is met, the software runs an
technique will report this withdrawal in a timely
audit of the transaction—this is what we call
fashion to an IS auditor. Thus, the time lag between
the intermittent test.
the misuse of the system and the detection of that
- Then the computer waits until the next
misuse is reduced. The realization that failures,
transaction meeting those criteria occurs.
improper manipulation and lack of controls will be
- This provides for the continuous audit as a
detected on a timely basis by the use of continuous
selected transaction occurs.
audit procedures gives an IS auditor and
management greater confidence in a system’s
reliability. 3. Snapshots
● This technique involves taking what might be
termed “pictures” of the processing path that
FIVE TYPES OF AUTOMATED EVALUATION
a transaction follows, from the input to the
TECHNIQUES APPLICABLE TO CONTINUOUS
output stage. With the use of this technique,
AUDITING
transactions are tagged by applying
identifiers to input data and recording
1. Audit hooks selected information about what occurs for an
● This technique involves taking what might be IS auditor’s subsequent review.
termed “pictures” of the processing path that a ● Useful when an audit trail is required
transaction follows, from the input to the output ● Complexity: MEDIUM
stage. With the use of this technique, - This technique involves the use of special audit
transactions are tagged by applying identifiers modules embedded in samples of specific
to input data and recording selected transactions.
information about what occurs for an IS - The modules make copies of the key parts of
auditor’s subsequent review. the transactions often by copying database
● involves embedding hooks in application records and storing them independently.
systems to function as red flags and induce IS - This allows an auditor to trace specific
security and auditors to act before an error or transactions through an application to view
irregularity gets out of hand the state of transactions as they flow through
● Useful when only select transactions or the entire application.
processes need to be examined
● Complexity: LOW 4. Integrated test facility (ITF)
- Audit hooks are special audit modules which ● In this technique, dummy entities are set up
are placed in key points in the application and and included in an auditee’s production files.
are designed to trigger if a specific audit An IS auditor can make the system either
exception or special condition occurs. process live transactions or test transactions
- This can alert the auditors with the situation during regular processing runs and have these
permitting them to decide whether additional transactions update the records of the
action is required. dummy entity. The operator enters the test
transactions simultaneously with the live

MARIA BERNISE DIMZON • ELEINA BEA BERNARDO 6


Module 9: Data Analytics

transactions that are entered for processing. An to understand and evaluate the system with and
auditor then compares the output with the data without the use of continuous audit techniques. In
that have been independently calculated to addition, an IS auditor must recognize that
verify the correctness of the continuous audit techniques are not a cure for all
computer-processed data. control problems and the use of these techniques
● Useful when it is not beneficial to use test provides only limited assurance that the information
data processing systems examined are operating as they
● Complexity: HIGH were intended to function.
- ITF permits test transactions to be processed
in a live application environment.
Techniques that are used to operate in a
- A separate test entity is required however so
continuous auditing environment must work at
that the test data does not alter financial or
all data levels—single input, transaction and
business results because test data does not
databases—and include:
present actual transactions.
- Test data are only simulated
transactions—those data that are created by Techniques that are used to operate in a continuous
auditors includes all the possible errors and auditing environment must work at all data
good data. levels—single input, transaction and databases—and
- Like in the ITF, we are using live data here. include:
● Transaction logging
5. Systems control audit review file and ● Query tools
embedded audit modules (SCARF/EAM) ● Statistics and data analysis
● DBMS
● The use of this technique involves embedding
● Data warehouses, data marts, data mining
specially written audit software in the
● Intelligent agents
organization’s host application system so the
● EAM
application systems are monitored on a
● Neural network technology
selective basis.
● Standards such as Extensible Business
● Useful when regular monitoring cannot be
Reporting Language (XBRL)
interrupted
● Complexity: VERY HIGH
Intelligent software agents may be used to automate
- Special audit software modules are embedded
the evaluation processes and allow for flexibility and
in the application and these modules perform
dynamic analysis capabilities. The configuration and
continuous auditing and create independent
application of intelligent agents (sometimes referred
log of audit results.
to as bots) allow for continuous monitoring of
- System level audit program used to monitor
systems settings and the delivery of alert messages
multiple embedded audit modules inside the
when certain thresholds are exceeded or certain
application software.
conditions are met.
- This is usually considered a mainframe class of
control.
Full continuous auditing processes have to be
carefully built into applications and work in layers.
The auditing tools must operate in parallel to normal
RELATIVE ADVANTAGES AND processing—capturing real-time data, extracting
DISADVANTAGES OF THE VARIOUS standardized profiles or descriptors, and passing the
CONTINUOUS AUDIT TOOLS result to the auditing layers.

Continuous auditing has an intrinsic edge over


point-in-time or periodic auditing because it
captures internal control problems as they occur,
preventing negative effects. Implementation can
also reduce possible or intrinsic audit inefficiencies
The use of each of the continuous audit techniques
such as delays, planning time, inefficiencies of the
has advantages and disadvantages. Their selection
audit process, overhead due to work segmentation,
and implementation depends, to a large extent, on
multiple quality or supervisory reviews, or discussions
the complexity of an organization’s computer
concerning the validity of findings.
systems and applications, and an IS auditor’s ability

MARIA BERNISE DIMZON • ELEINA BEA BERNARDO 7


Module 9: Data Analytics

Full top management support, dedication, and


extensive experience and technical knowledge are all
necessary to accomplish continuous auditing, while
minimizing the impact on the underlying audited
business processes. The auditing layers and settings
may also need continual adjustment and updating.

Besides difficulty and cost, continuous auditing has


an inherent disadvantage in that internal control
experts and auditors might be resistant to trust an
automated tool in lieu of their personal judgment
and evaluation. Also, mechanisms have to be put in
place to eliminate false negatives and false positives
in the reports generated by such audits so that the
report generated continues to inspire stakeholders’
confidence in its accuracy.

MARIA BERNISE DIMZON • ELEINA BEA BERNARDO 8

You might also like