Audit in A Cis Environment
Audit in A Cis Environment
Audit in A Cis Environment
A Computerized Information System (CIS) exists when a computer of any type or size is involved in the
processing by the entity of financial information of significance to the audit, whether the computer is operated by
the entity or by a third party.
A. CHARACTERISTICS OF A CIS
Concentration of functions the processing the number of persons involved in the processing of financial
information is significantly REDUCED.
Concentration of programs and data - transaction and master file data are often concentrated, usually in
a machine-readable form
Nature of Processing
May result in the design of systems that provide less visible evidence than manual systems
These systems may be accessible by a larger number of persons.
Consistency of performance
Programmed Control Procedure
Single transaction update of multiple or database computer file
System-generated transactions
Vulnerability of Data and program storage media.
The auditor should consider whether specialized skills are needed. If so, ask the assistance of a
computer professional who may be a staff or an outside professional.
If use of such a professional is planned, auditor should have sufficient computer-related knowledge to:
Communicate the objectives of the other professional work;
Evaluate whether specified procedures will meet the auditor's objectives; and
Evaluate results of the procedures applied.
The auditor can NEVER DELEGATE his responsibility in forming important audit conclusions or
expressing an opinion on the financial statements.
C. TYPES OF COMPUTERS
Super computers - extremely powerful, high-speed computers used for extremely high volume and/or complex
processing needs.
Mainframe computers - large, powerful, high-speed computers that is less powerful than supercomputers.
Servers - high-powered microcomputers that "serve” applications and data to clients that are connected via a
Virtual Machines - servers ate simultane operating systems can coexist and operate simultaneously on the
same machine
Microcomputers or Personal Computer - designed to be used by one person at a time, typically for word
processing, e-mail, spreadsheets and others.
Personal Data Assistants (e.g., Tablets or smart phones) - typically smaller, handheld wireless devices that
depend on Wi-Fi and/or cellular technology for communication.
Hardware
Central Processing Unit (CPU) - principal hardware component of a computer which contains the
arithmetic/logic unit, primary memory and a control unit.
Online Real Time Processing - transactions are processed immediately, and master file is updated immediately.
Errors in this kind of processing are detected as soon as the data are entered.
Online Batch Processing - individual transactions are entered at a terminal device, which is later processed
together. Errors in this kind of processing are detected in a later part.
Online Memo Update - mixture of batch and real-time processing where individual transactions update a memo
file which is subsequently updated to the master file by batch.
Online Inquiry - restricts users at terminal devices to making inquiries of master file
Network Environments - communication system that enables computer users to share computer equipment,
application software, data and voice and video transmissions.
a. File server - a computer with an operating system that allows multiple users in a network to access
software applications and data files.
b. Basic types of Networks:
Local Area Network
Wide Area Network
National Area Network
Internet
D. CLASSIFICATION OF CONTROLS
As to Objectives
• Detective Controls - detect the existence of errors or wrongdoing after they have occurred
• Corrective Controls - aid in the correction of erroneous data entry or application, or in the correction of full
application run
As to Scope:
• General Controls - Typically related to the entire information system and apply to all programs used by the
system.
GENERAL CONTROLS
1. Organization and operations control - pertains to the plan of organization and operations of CIS activity
a. Operating Controls - concerned with efficient and effective CIS operations and proper procedures for
new computer applications, and to control changes made to existing applications.
b. Organizational controls - concerned with the proper segregation of duties and responsibilities within
the CIS environment.
c. Data processing should be independent of those that provide input data to, or use information generated
by CIS
Those who perform computer functions should not:
- Authorize transactions
- Have custody or control of assets
- Correct errors in transactions
- Be able to change the controls or initiate the preparation of data
2. System development and documentation controls - intended to monitor the design of, and documentation
for new computer applications, and to control changes made to existing applications.
a. System design - include representatives of user departments and, as appropriate, the accounting
department and internal auditors.
b. Written specifications - each system should have written specifications that are reviewed and
approved by management and the user department.
c. System testing - should be a cooperative effort of users and CIS personnel
d. Final Approval - the CIS manager, the user personnel and the appropriate level of management should
give final approval to a new system before it is placed in normal operation.
e. Program changes - should be approved before implementation to determine whether they have been
authorized, tested and documented.
3. Documentation Controls - provides basis for reviewing the system, training new personnel and maintaining
and revising existing systems and programs.
a. Systems documentation - described the information flow, input, output and file structure, which are
useful to systems analysts and programmers.
b. Program documentation - describes detailed program data that systems analysts and programmers
will need to correct or revise the programs.
c. Operations documentation provides instructions to the computer operator for running the program.
d. User documentation - describes the data that users will submit or enter, the form of the data, any
control totals, and the procedures to follow when the system rejects incorrect data submitted for
processing.
4. Access controls - designed to ensure that only persons who should have access to information or programs
are allowed to examine or change them.
a. Segregation controls
b. Physical access to computer facility
Limited physical access
Visitor entry log
c. Hardware and software access controls
Access control software (user identification) most commonly used control is a combination of a unique
identification code and a confidential password.
Calle back - specialized form of user identification in which the user dials the system identifies
him/herself, and is disconnected from the system.
Encryption - data is encoded when stored in computer files and/or before transmission to or from remote
locations. This coding protects data since to use the data unauthorized users must not only obtain
access, but must also translate the coded form of the data.
APPLICATION CONTROLS
1. Input controls - designed to provide reasonable assurance that data received for processing by the computer
department have been properly authorized and that data have not been lost, suppressed, added, duplicated, or
otherwise changed improperly.
2. Processing Controls - designed to provide reasonable assurance that data processing has been performed
as intended for the particular application.
3. Output Controls - designed to assure that the results of processing are accurate and that only authorized
personnel receive or have access to the input
- Output distribution
- File reconstruction
Audit Approaches:
Auditor enters the clients' system and examines directly the computer, its system and application software.
1. Program Analysis - techniques that allow the auditor to gain understanding of the clients' program.
a. Code review - involves actual analysis of the logic of the program's processing routines
b. Comparison programs - programs that allow the auditor to compare computerized files
c. Flowcharting software - used to produce a flowchart of a program's logic and may be used both in
mainframe and microcomputer environments
d. Program tracing and mapping
Program tracing - techniques in which instruction executed is listed along with control information
affecting that instruction
Program mapping - identifies sections of code, which may be a potential source of abuse.
e. Snapshot - takes a picture of the status of program execution, immediate results, or transaction data at
specified processing points in the program processing.
a. Test Data/Deck Method - auditor prepares a series of dummy transactions, some of which are valid and
some of which contain errors that should be detected by the controls he wants to test.
b. Integrated Test Facility (ITF) or Mini-company approach - auditor creates a fictitious entity within the
client's regular data processing.
c. Parallel Simulation - auditor uses live client data that is reprocessed with auditor-controlled program.
This uses a Generalized Audit Software (GAS) prepared by the auditor designed to perform the same
process and produce the same results as the client's program. The client's input is compared with the
auditor's output.
d. Continuous Audit Technique - test the audit computer controls throughout a period.