Z17520020220174028New PPT Ch10
Z17520020220174028New PPT Ch10
Z17520020220174028New PPT Ch10
IT Auditing, Hall
Learning Objectives
• Understand the components of data structures and how these
are used to achieve data-processing operations.
• Be familiar with structures used in flat-file systems, including
sequential, indexes, hashing, and pointer structures.
• Be familiar with relational database structures and the
principles of normalization.
• Understand the features, advantages, and disadvantages of the
embedded audit module approach to data extraction.
• Know the capabilities and primary features of generalized audit
software.
• Become familiar with the more commonly used features of ACL.
DATA STRUCTURES
Organization
Access method
Access:
Non-Index
Methods
Hashing
Pointers
INDEX File DATA File
Access: Data
Index Methods Organization
SEQUENTIAL SEQUENTIAL
ISAM RANDOM
RANDOM
FILE PROCESSING OPERATIONS
Efficient: 4, 5 – sometimes 3
DATA STRUCTURES
Efficient: 1, 2, 3, 7
DATA STRUCTURES
Legacy systems
Legacy systems
Inefficient
CUSTOMERS
INVOICES
INVENTORY
DATABASE STRUCTURES
Relational structure
User views
Data a particular user needs to achieve his/her
assigned tasks
Relational structure
Creating views
Designing output reports, documents, and input
screens needed by users or groups
Relational structure
Importance of data normalization
Relational structure
Normalization process
Un-normalized data [Table 8-4]
Eliminates the 3 anomalies if:
• All non-key attributes are dependent on the primary key
• There are no partial dependencies (on part of the
primary key)
• There are no transitive dependencies; non-key attributes
are not dependent on other non-key attributes
Relational structure
Query function
Allows users to create customized lists from database
Users stipulate, using English-like commands, which tables,
records, fields, filtering criteria needed to produce the desired
list
Result is virtual table derived from actual database tables
SQL
Relational structure
Auditors and data normalization
Database normalization is a technical matter that is
usually the responsibility of systems professionals.
The subject has implications for internal control that
make it the concern of auditors also.
Most auditors will never be responsible for normalizing
an organization’s databases; they should have an
understanding of the process and be able to determine
whether a table is properly normalized.
In order to extract data from tables to perform audit
procedures, the auditor first needs to know how the data
are structured.
EMBEDDED AUDIT MODULE
Errors
Fraud
Compliance
Disadvantages:
5) Printing confirmations