Module 1 Overview of Auditing Merged 1
Module 1 Overview of Auditing Merged 1
ENVIRONMENT
OVERVIEW OF
AUDITING
MODULE 1
3
Overview of Auditing
4
Financial Audit Components
5
Generally Accepted Auditing
Standards
7
Structure of an Audit
8
AUDIT PLANNING
• Audit planning is the first step in the IT audit in which the
auditor gains a thorough understanding of the client’s
business. A major part of this phase of the audit is the
analysis of audit risk.
• Tests of Controls
• The tests of controls are tests that establish whether internal controls are
functioning properly.
• Computer-assisted audit tools and techniques (CAATTs) is the use of
computers to illustrate how application controls are tested and to
verify the effective functioning of application controls.
• Control risk is the likelihood that the control structure is flawed because
controls are either absent or inadequate to prevent or detect errors in
the accounts.
9
AUDIT PLANNING (continued)
• Substantive Testing
• Substantive tests are tests that determine whether
database contents fairly reflect the organization’s
transactions.
10
Phases of an Audit
12
Audit Objectives and Audit
Procedures Based on Management
Assertions
• Control Risk
14
AUDIT RISK (continued)
• Detection Risk
• Detection risk (DR) is risk that auditors are willing to take
that errors not detected or prevented by the control
structure will also not be detected by the auditor.
15
End of Module 1
AUDITING IN A CIS
ENVIRONMENT
THE SARBANES OXLEY ACT
AND ITS AUDIT
IMPLICATIONS
MODULE 2
4
RELATIONSHIP BETWEEN IT
CONTROLS AND FINANCIAL
REPORTING
• Application controls ensure the integrity of specific systems.
• General controls are controls that pertain to entity-wide concerns such
as controls over the data center, organization databases, systems
development, and program maintenance.
• General computer controls are specific activities performed by persons
or systems designed to ensure that business objectives are met.
• Information technology controls include controls over IT governance, IT
infrastructure, security, and access to operating systems and
databases, application acquisition and development, and program
changes.
5
AUDIT IMPLICATIONS OF
SECTIONS 302 AND 404
• Computer fraud is the theft, misuse, or
misappropriation of assets by altering computer-
readable records and files, or by altering the logic
of computer software; the illegal use of
computer-readable information; or the intentional
destruction of computer software or hardware.
6
AUDIT IMPLICATIONS OF
SECTIONS 302 AND 404 (continued)
• Computer Fraud
• DATA COLLECTION
• DATA PROCESSING: Program fraud includes techniques such as
creating illegal programs that can access data files to alter, delete, or
insert values into accounting records; destroying or corrupting a
program’s logic using a computer virus; or altering program logic to
cause the application to process data incorrectly. Operations fraud is
the misuse or theft of the firm’s computer resources.
• DATABASE MANAGEMENT: Database management fraud includes
altering, deleting, corrupting, destroying, or stealing an organization’s
data.
• INFORMATION GENERATION: Scavenging involves searching through
the trash of the computer center for discarded output. Eavesdropping
involves listening to output transmissions over telecommunication lines.
7
Information Technology Control
Relationship
10
Organizational Structure
Controls
• Operational tasks should be separated to:
• Segregate the task of transaction authorization from
transaction processing.
• Segregate record keeping from asset custody.
• Divide transaction-processing tasks among individuals so
that fraud will require collusion between two or more
individuals.
11
SEGREGATION OF DUTIES WITHIN
THE CENTRALIZED FIRM
• Separating Systems Development from Computer Operations
• Separating the Database Administrator from Other Functions
• User views are sets of data that a particular user needs to achieve his or her
assigned tasks.
• SEPARATING THE DBA FROM SYSTEMS DEVELOPMENT: Access controls are
controls that ensure that only authorized personnel have access to the firm’s
assets.
12
Organizational Chart of a Centralized
Information Technology Function
15
THE DISTRIBUTED MODEL (continued)
• Disadvantages of DDP
• MISMANAGEMENT OF ORGANIZATION-WIDE RESOURCES
• HARDWARE AND SOFTWARE INCOMPATIBILITY
• REDUNDANT TASKS
• CONSOLIDATING INCOMPATIBLE ACTIVITIES
• HIRING QUALIFIED PROFESSIONALS
• LACK OF STANDARDS
16
Organizational Structure for a
Distributed System
18
Distributed Organization with Corporate IT Function
20
AUDIT PROCEDURES RELATING TO
ORGANIZATIONAL STRUCTURE
• The following audit tests provide evidence in achieving the
audit objective:
• Obtain and review the corporate policy on computer security.
• Review relevant documentation, including the current
organizational chart, mission statement, and job descriptions for
key functions, to determine if individuals or groups are performing
incompatible functions.
• Review systems documentation and maintenance records for a
sample of applications.
• Through observation, determine that the segregation policy is
being followed in practice.
• Review user roles to verify that programmers have access to
privileges consistent with their job descriptions.
21
Computer Center Security and
Controls
• Fires, floods, wind, sabotage, earthquakes, or
even power outages can deprive an organization
of its data processing facilities and bring to a halt
those functions that are performed or aided by
computer.
• What does a company do to prepare itself for
such an event?
• How will it recover?
22
COMPUTER CENTER CONTROLS
• Physical Location
• Construction
• Access
• Air Conditioning
• Fire Suppression
• Fault Tolerance Controls
• Fault tolerance is the ability of the system to continue operation when
part of the system fails because of hardware failure, application
program error, or operator error.
23
COMPUTER CENTER CONTROLS
(continued)
24
End of Module 2
AUDITING IN A CIS
ENVIRONMENT
DISASTER RECOVERY
PLANNING
MODULE 3
4
PROVIDING SECOND-SITE
BACKUP
• The Empty Shell
• The empty shell is an arrangement that involves two or more user
organizations that buy or lease a building and remodel it into a
computer site, but without the computer and peripheral
equipment.
5
IDENTIFYING CRITICAL
APPLICATIONS
• An essential element of a DRP involves procedures to identify
the critical applications and data files of the firm to be
restored.
• For most organizations, short-term survival requires the
restoration of those functions that generate cash flows
sufficient to satisfy short-term obligations.
• Applications should be identified and prioritized in the
restoration plan.
• The task of identifying and prioritizing critical applications
requires active participation of management, user
departments, and internal auditors.
6
PERFORMING BACKUP AND OFF-
SITE STORAGE PROCEDURES
• Backup Data Files
• Backup Documentation
• Backup Supplies and Source Documents
7
CREATING A DISASTER
RECOVERY TEAM
• Recovering from a disaster depends on timely
corrective action.
• Failure to perform essential tasks prolongs the
recovery period and diminishes the prospects for
a successful recovery.
• Individual task responsibility must be clearly
defined and communicated to the personnel
involved.
8
Disaster Recovery Team
10
AUDIT OBJECTIVE: ASSESSING
DISASTER RECOVERY PLANNING
• The auditor should verify that management’s
disaster recovery plan is adequate and feasible
for dealing with a catastrophe that could deprive
the organization of its computing resources.
11
AUDIT PROCEDURES FOR ASSESSING
DISASTER RECOVERY PLANNING
• Second-Site Backup
• Critical Application List
• Backup Critical Applications and Critical Data Files
• Backup Supplies, Source Documents, and Documentation
• The Disaster Recovery Team
• CURRENT TREND IN DISASTER RECOVERY: Disaster recovery as a
service (DRaaS) is a variant on cloud computing, which draws
upon these traditional services to provide computing and backup
services.
12
Outsourcing the IT Function
13
Outsourcing the IT Function
(continued)
14
RISKS INHERENT TO IT
OUTSOURCING
• Failure to Perform
• Vendor Exploitation of Clients
• Outsourcing Costs Exceed Benefits
• Reduced Security
15
LOSS OF STRATEGIC
ADVANTAGE
• Organizations that use IT strategically must align
business strategy and IT strategy or run the risk of
decreased business performance.
• To accomplish such alignment necessitates a
close working relationship between corporate
management and IT management in the
concurrent development of business and IT
strategies.
16
AUDIT IMPLICATIONS OF IT
OUTSOURCING
• The PCAOB specifically states in its Auditing Standard No. 2 that the use
of a service organization does not reduce management’s responsibility
to maintain effective internal control over financial reporting.
• Statement on Standards for Attestation Engagements No. 16 (SSAE 16) is
an internationally recognized third-party attestation report designed for
service organizations such as IT outsourcing vendors.
• SSAE 16 is the definitive standard by which client organizations’ auditors
can determine whether processes and controls at the third-party
vendor are adequate to prevent or detect material errors that could
impact the client’s financial statements.
17
SSAE 16 Reporting
19
End of Module 3