Cse 4502 Computer Auditing: Group Assignment Group 7 "Computer Auditing in A Glance" Name Matric No
Cse 4502 Computer Auditing: Group Assignment Group 7 "Computer Auditing in A Glance" Name Matric No
GROUP ASSIGNMENT
GROUP 7
“COMPUTER AUDITING IN A GLANCE”
Name Matric No
Muhammad Esyraf Syahir Bin S48268
Edham Lutfe
Siti Hajar Binti Mohd Rafie S47848
Rathnaa Preyaa Thayalan S48870
Nurul Hanim Binti Ab Khalib S48030
Megat Abdul Wafiy Bin Abd S48084
Halim
LECTURER:
DR. ZURIANA BT ABU BAKAR
Introduction
What is computer auditing and how the tool is works? Computer auditing is the tool
that facilities the business regarding data processing while putting a special concern to
some targeted operations. The tool merges or review the data by the programmers or
the accountants and the analysts and extract the data in the summarize form. These
computer auditing tools save the time, money and the frustration. These auditing tools
also serve for monitoring any individual activity, the tool automatically picks the data
from the linked PC that is being used by another employee who are usually the
accountants and analysts.
The extracted and the summarize form of the data generated by the computer auditing
tools will help the management for decision making and in keeping under veil the
business secrets. What else could be more practical than using these high performance
and greater efficiency tools?
Many companies’ law emphasizes to safeguard the assets of the business and make a
string hold among all such things. They make some rules or policies that make strong
the internal environment of the business. Hence, such tool safeguards the assets and
provides the complete monitor to its users.
Content
1. Akim is the IT auditor at Lynx Technology Sdn Bhd. One day, Stacy, an
external auditor from an audit firm appointed needs to review the IT controls of
their company. How will both of them cooperate with each other to achieve an
effective IT audit?
To provide for long-term effectiveness, the IT organization must have some sort of
strategy regarding where it plans to go, as opposed to being in reactive mode
constantly, where day-to-day issues and crises are the only considerations. The IT
organization must be aware of upcoming business needs and changes in the
environment so that it can plan and react accordingly. It is important that IT priorities
align with business priorities. Too many IT organizations lose sight of the fact that
their only reason for existence is to support the company in meeting its business
objectives. Instead, these IT organizations focus on becoming a “world-class IT
shop,” even when this goal doesn’t directly support the overall company objectives. It
is critical for IT organizations to stay grounded by tying their objectives to the
company’s objectives.
There are multiple differences between the internal audit and external audit functions,
which are as follows:
Can issue their findings in any type of Must use specific formats to their audit
report format opinions and management letters
Reports are used by management Reports are used by stakeholder
(Investors, Creditors, Lenders)
Can be used to provide advice and other Constrained from supporting an audit
consulting assistance to employees client too closely
Examine issues related to company Examine the financial records and issue
business practices and risks an opinion regarding the financial
statements of the company
In short, the two functions share one word in their names, but are otherwise quite
different. Larger organizations typically have both functions, thereby ensuring that
their records, processes, and financial statements are closely examined at regular
intervals.
2. Among the audits that Stacy will need to perform is the IT Project Auditing,
she founds out that there are purchases of software in the project, what actions
are taken by her?
represents a commitment to that vendor’s product. If the process for selecting the
vendor is inadequate or the contract does not provide the company with adequate
protection, it can lead to the purchase of products that do not meet the requirements of
the project and a lack of legal recourse. Review the vendor selection process for
elements such as these:
Ensure that products from multiple vendors are evaluated as to their ability to
meet all project requirements and their compatibility with the company’s IT
environment. This not only helps you select the best product for your
requirements, but it provides for competitive bidding and lower prices.
Ensure that a cost analysis has been performed on the products being evaluated.
This analysis should include all relevant costs, including product costs, one-time
startup costs, hardware costs, licensing fees, and maintenance costs.
Determine whether the vendors’ financial stability was investigated as part of the
evaluation process. Failure to do so may result in your company signing up with a
vendor that goes out of business, causing significant disruption to your operations
as you attempt to move them to another vendor.
Determine whether the vendors’ experience with providing support for the
product for similar companies in the industry was evaluated. This may include
obtaining and interviewing references from companies that currently use the
product. You generally want to use vendors that have already demonstrated that
they can perform the types of services you require at a scale similar to yours.
Fields that are used to report such things as dates and hours should be set up
either to require input in the correct format (such as MMDDYY or HHMM) or
transform input into the correct format.
When a finite number of valid entries are available for a field, entries that are
invalid should not be allowed. In other words, input screens should validate such
things as cost centers, account numbers, product codes, employee numbers, and
so on, against the appropriate database(s) or file(s).
Duplicate entries should not be allowed for data that is intended to be unique. For
example, the transaction should not allow a product code to be added to the
product database if that code already exists on the database.
Where applicable, transactions should perform “calculation” checks on inputs.
For example, the system should ensure that journal-entry credits and debits
balance to zero before processing a transaction. Another example would be a
labor-entry system where hours charged for the week need to add up to at least
40.
Conclusion
Computer auditing tools also do the safety measuring job for your business. This tool
makes the backup of the data which is stored in the auditors or the accountant’s
computer. Computer memory is the volatile memory, any sort of virus can do serious
damage to company’s data which have obtained after a long hard work. The computer
auditing tools automatically gather the data from the linked-up server pcs and make a
backup of it’s on a weekly or daily basis, here the user will set the priority. Even these
tools make the hard copy of the documents. It’s now become very much essential to
use these computer auditing tools, these are real time saving tools and reliable too.
References
Books
Davis, C., Schiller, M., & Wheeler, K. IT Auditing: Using Controls to Protect
Information Assets, 2011 McGraw-Hill. Osborne ISBN: 9780071742382.
Websites
The difference between internal and external audits — AccountingTools. (2019, July 9).
AccountingTools. https://www.accountingtools.com/articles/the-difference-between-i
nternal-and-external-audits.html
Member Task
Megat Discussion