Chapter XI SIA
Chapter XI SIA
Chapter XI SIA
Learning Objectives
• Describe the nature, scope, and objectives of audit work, and identify the major steps in the
audit process.
• Identify the six objectives of an information system audit, and describe how the risk-based
audit approach can be used to accomplish these objectives.
• Describe the different tools and techniques auditors use to test software programs and
program logic.
• Describe computer audit software, and explain how it is used in the audit of an AIS.
Threats
• Theft of hardware
▫ Programs
▫ Data
Controls
• Preventive maintenance
• Insurance
Controls
• Review software license agreements
• Management authorization for:
▫ Program development
▫ Software acquisition
• Management and user approval of programming specifications
• Testing and user acceptance of new programs
• Systems documentation
• List program components to be modified
• Management authorization and approval for modifications
• User approval for modifications
• Test changes to program
• System documentation of changes
• Logical access controls
Controls
• Data editing routines
• Reconciliation of batch totals
• Error correction procedures
• Understandable documentation
Competent supervision
G. Prevent, Detect, or Correct Inaccurate or Unauthorized Source Data
Threats
• Inaccurate source data
• Unauthorized source data
Controls
• User authorization of source data input
• Batch control totals
• Log receipt, movement, and disposition of source data input
• Turnaround documents
• Check digit and key verification
• Data editing routines
Controls
• Secure storage of data and restrict physical access
• Logical access controls
• Write-protection and proper file labels
• Concurrent update controls
• Data encryption
• Virus protection
• Backup of data files (offsite)
System recovery procedures
I. Audit Techniques Used to Test Programs
a. Integrated Test Facility
i. Uses fictitious inputs
b. Snapshot Technique
i. Master files before and after update are stored for specially marked
transactions
c. System Control Audit Review File (SCARF)
i. Continuous monitoring and storing of transactions that meet pre-
specifications
d. Audit Hooks
i. Notify auditors of questionable transactions
e. Continuous and Intermittent Simulation
i. Similar to SCARF for DBMS
Assignment
We were learned about audit system information. Now i ask you with your group to make a video
how to do audit procedure. Begin from step by step audit procedure. Assume all of you have
function in each division with in company. I give you one week to finish it!