Control, Audit and Security - ACCA F1
Control, Audit and Security - ACCA F1
Control, Audit and Security - ACCA F1
CONTROL
AUDIT
&
SECURITY
A useful definition of internal control was provided in 1992 in the US by the COSO
Framework (COSO is the Committee of Sponsoring Organizations of the Treadway
Commission). This defined internal control as: ‘a process, effected by an entity’s
board of directors, management and other personnel, designed to provide reasonable
assurance regarding the achievement of objectives’ in three particular areas: the
effectiveness and efficiency of operations, the reliability of financial reporting, and
compliance with applicable laws and regulations.
„ Risks to the effectiveness and efficiency of operations are ‘operational risks’
and controls designed to limit operational risks are ‘operational controls’. (These
controls are tested by operational audits.)
Monitoring
There should be regular monitoring and review of the effectiveness of the system of
internal control. One way of monitoring internal control is to have an internal audit
department, for carrying out reviews and reporting to senior management.
„ Detective controls. These are controls that are designed to identify an error (or
fraud) when it happens. When there are detective controls, there should also be
corrective measures for correcting the error or dealing with the fraud.
In addition, the cost of an internal control should not exceed the benefits obtain from
implementing it.
Internal check
An internal check is a type of internal control. An internal check is intended to prevent
errors or fraud, or to detect them quickly when they occur. In financial accounting, an
internal check involves arranging accounting tasks and duties so that no single task is
performed from beginning to end by just one person. In this way, the work of each
individual is subject to an independent check in the course of the work that is done by
somebody else.
Prepared & Complied by: Mohammad Faizan Farooq Qadri Attari
ACCA (Finalist)
http://www.ffqacca.co.cc
Contact: [email protected]
COPYRIGHT © 2010 BY Mohammad Faizan Farooq FFQA 7
IT system security and controls
„ Natural disasters.
General controls are controls that are applied to all IT systems and in particular to
the development, security and use of computer programs. Examples of general
controls are:
„ physical security measures and controls
„ physical protection against risks to the continuity of IT operations
„ general controls within the system software such as passwords, encryption
software, and software firewalls
„ general controls over the introduction and use of new versions of a computer program
Prepared & Complied by: Mohammad Faizan Farooq Qadri Attari
ACCA (Finalist)
http://www.ffqacca.co.cc
Contact: [email protected]
COPYRIGHT © 2010 BY Mohammad Faizan Farooq FFQA 8
Application controls are specific controls that are unique to a particular IT system
or IT application. They include controls that are written into the computer software,
such as data validation checks on data input.
Passwords
A computer password is defined as ‘a sequence of characters that must be presented
to a computer system before it will allow access to the systems or parts of a system’
Users should be required to use passwords that are not easy to guess: for example, an
organisation might require its employees to use passwords that are at least 8 digits and
include a mixture of letters and numbers.
Encryption
Encryption involves the coding of data into a form that is not understandable to the
casual reader. Data can be encrypted (converted into a coded language) using an
encryption key in the software.
A hacker into a system holding data in encrypted form would not be able to read
the data, and would not be able to convert it back into a readable form (‘decrypt the
data’) without a special decryption key.
„ audit trails, so that transactions can be traced through the system when
hacking is suspected
„ network logs, whereby network servers record attempts to gain access to the
system „ firewalls.
The purpose of a firewall is to detect and prevent any attempt to gain unauthorised
entry through the Internet into a user’s computer or Intranet system.
A firewall:
„ will block suspicious messages from he Internet, and prevent them from
entering the user’s computer, and
Computer viruses
Viruses are computer software that is designed to deliberately corrupt computer
systems. Viruses can be introduced into a system on a file containing the virus. A
virus may be contained:
„ in a file attachment to an e-mail or
„ on a backing storage device such as a CD.
The term ‘virus’ might also be used to describe other methods of corrupting a
system.
Trojan horses Whilst the user thins that the system is carrying out one program, the
Trojan horse secretly carries on another.
Worms This is corrupt data that replicates itself within the system, moving from one file
or program to another.
Trap doors A trap door is an entry point to a system that bypasses normal controls to
prevent unauthorised entry.
Logic bombs This is a virus that is designed to start ‘working’ (corrupting the files or
data processing) when a certain event occurs.
Time bombs This is a virus that is designed to start ‘working’ (corrupting the files or
data processing) on a certain date.
IT Standards are a form of general control within IT that help to reduce the risk of IT
system weaknesses and processing errors, for entities that apply the Standards.
Application controls
Application controls are controls that are designed for a specific IT system. One
example of application controls is data validation. Data validation checks are checks
on specific items of data that are input to a computer system, to test the logical
‘correctness’ of the data. If an item of data appears to be incorrect, the system does
not process the data: instead it issues a data validation report, so that the apparent
error can be checked and corrected if appropriate.
AUDIT
Internal audit and internal control
Internal audit is one part of an internal control system which assesses the effectiveness
of other controls.
The work of the internal audit department may cover the following broad areas:
(a) Review of accounting and internal control systems
(b) Examination of financial and operating information
(c) Review of the economy, efficiency and effectiveness of operations
(d) Review of compliance
(e) Review of safeguarding of assets
(f) Review of implementation of corporate objectives
(g) Identification of significant business risks, monitoring overall risk management policy
and monitoring risk management strategies
(h) Special investigations
Internal auditors' work depends on the scope and priority of the identified risks. They may have to
conduct a risk assessment from which they will recommend an appropriate framework.
Systems audits test and evaluate internal controls. Typically there are two types of test:
• Compliance (controls are applied as laid down)
• Substantive (seeking errors and omissions)
If compliance tests reveal that internal controls are working satisfactorily then the
amount of substantive testing can be reduced.
A transactions audit aims to detect fraud and uses only substantive tests.
Ideally the internal audit department should report to the audit committee of the board
of directors as it is then free to report on all levels of management and can ensure that
any of its recommendations are implemented.
The internal audit department plays a significant part in an organisation's risk
management
External audit
External audit is the regular examination of the organisation's records by an outside
party to ensure that they have been properly maintained and give a true and fair view of
the entity's financial state.
There should be co-ordination between the external and internal auditors to ensure
that duplication of work is minimised and controls enhanced.
If external auditors rely to an extent on the work of the internal audit department they
will consider:
(a) Organisational status (b) Scope of internal audit functions
(c) Technical competence 5(d) Due professional care
QUESTION FFQA
Which of the following is not an inherent limitation of an internal control system?
A Procedures manual
B Non routine transactions
C Management by passing controls
D Employee collusion
QUESTION FFQA
Which of the following is an incorrect statement regarding the external auditors?
A They report to the Board of Directors
B There work relates to financial statements
C They express an opinion on the financial statements
D They are independent of the company and its management
QUESTION FFQA
Which of the following is not a method of data validation?
A Audit trails
B Range checks
C Control totals
D Limit checks
QUESTION FFQA Which of the following is not suggested by Turnbull to help ensure a
strong control environment?
A Clear definition of authority
B Clear strategies
C Good internal communications
D Reconciliations