Auditing Computer-Based Information Systems: Financial Audits Compliance Audits Operational or Management Audits
Auditing Computer-Based Information Systems: Financial Audits Compliance Audits Operational or Management Audits
Auditing Computer-Based Information Systems: Financial Audits Compliance Audits Operational or Management Audits
Evaluating Evidence
--The auditor evaluates the evidence gathered in light of thespecific audit objective and decides if it supports
a favorable or unfavorableconclusion. If inconclusive, the auditor plans and executes additional proceduresuntil
sufficient evidence is obtained. Two important factors when deciding howmuch audit work is necessary and in
evaluating audit evidence are
materiality
(the potential impact of the item on decision-making); and
reasonable assurance
(the balance between costs and benefits of procedures). Conclusions should becarefully documented in working
papers.–
Communicating Audit Results
--The auditor prepares a written (and sometime soral) report summarizing audit findings and recommendations,
with references to supporting evidence in the working papers. The report is presented to management, the audit
committee, the board of directors, and other appropriate parties. After results are communicated, auditors often
perform a follow-upstudy to see if recommendations have been implemented.
•A risk-based audit approach is a four-step approach to internal control evaluation thatprovides a logical
framework for carrying out an audit. Steps are (1) determine thethreats (errors and irregularities) facing the AIS;
(2) identify control proceduresimplemented to minimize each threat by preventing or detecting such errors
andirregularities; (3) evaluate the control procedures; and (4) evaluate weaknesses (errorsand irregularities not
covered by control procedures) to determine their effect on thenature, timing, or extent of auditing procedures
and client suggestions. Thisunderstanding provides a basis for developing recommendations to management on
howthe AIS control system should be improved.
INFORMATION SYSTEMS AUDITS
•The purpose of an information systems audit is to review and evaluate the internalcontrols that protect the
system. When performing an information system audit, auditorsshould ascertain that the following objectives
are met:–
OBJECTIVE 1: Security provisions protect computer equipment, programs,communications, and data from
unauthorized access, modification, ordestruction.–
OBJECTIVE 2: Program development and acquisition are performed inaccordance with management’s general
and specific authorization
OBJECTIVE 3: Program modifications have management’s authorization andapproval.–
OBJECTIVE 4: Processing of transactions, files, reports, and other computerrecords is accurate and complete.–
OBJECTIVE 5: Source data that are inaccurate or improperly authorized areidentified and handled according to
prescribed managerial policies.–
OBJECTIVE 6: Computer data files are accurate, complete, and confidential.
OBJECTIVE 1: OVERALL SECURITY
•Types of errors and fraud include damage to system assets; unauthorized access, disclosure, or modification of
data and programs; theft; and business interruption
•Control procedures include developing an IS protection plan; restricting physical and logical access; encrypting
data; using virus protection; using data transmission controls; and preventing or recovering from system
failures or disasters.
•Audit procedures include inspecting sites; interviewing personnel; reviewing policies and procedures; and
examining access logs, insurance policies, and disaster recovery plans.
•Tests of control include observation; verifying controls are in place and work as intended; investigating error
handling; and examining tests performed previously.
•Compensating controls may include sound personnel policies, segregation of duties, and effective user
controls.
OBJECTIVE 2: PROGRAM DEVELOPMENT AND ACQUISITION
•Types of errors and fraud include inadvertent programming errors or deliberate insertion of unauthorized
instructions.
•Control procedures include appropriate authorizations; thorough testing; and proper documentation.
•Audit procedures include an independent review of system activity, including development procedures,
policies, standards, and documentation, as well as tests of systems development controls. Strong
processing controls can sometimes compensate for inadequate development controls.
OBJECTIVE 3: PROGRAM MODIFICATION
•Types of errors and fraud include the same events that occur during program development, i.e., inadvertent
programming errors and unauthorized code.
•Control procedures include documentation and testing of updates; separation of development version from
production version of program; replacement of production version after approval; implementation by personnel
independent of users or programmers; and logical access controls.
•Audit procedures for systems review include gleaning understanding of change process from management;
examining policies, procedures, and standards for program changes; reviewing final documentation; and
reviewing procedures to restrict logical access.
•Audit procedures for tests of controls include verification that program changes went through required steps;
observation of implementation process; review of access control table; use of source code comparison to test for
unauthorized changes; and reprocessing; and parallel simulation.
OBJECTIVE 4: COMPUTER PROCESSING
•Types of errors and fraud include failure to detect erroneous inputs; improperly correcting input errors;
processing erroneous input; or improperly distributing or disclosing output.
•Control procedures include computer data editing routines; use of internal and external file labels;
reconciliation of batch totals; error correction procedures; operating documentation; competent supervision;
handling of data input and output by data control personnel; file change listings; and maintenance of proper
environmental conditions in computer facility.
•Audit procedures for systems review include review of administrative, systems, and operating documentation,
as well as error listings; observations of computer operations and data control; and discussion of processing and
output controls with IS supervisors.
•Audit procedures for tests of controls include evaluating adequacy of processing control standards and
data editing controls; verifying adherence by observation; verifying that output is properly distributed;
reconciling batch totals; tracing errors; verifying processing accuracy for samples; searching for erroneous
or unauthorized code; using concurrent audit techniques to monitor online processing; and recreating selected
reports.
•Specialized techniques for testing processing controls include:
Processing test data
—Involves testing a hypothetical series of valid and invalid transactions. This process is time consuming and
requires care not to contaminate the company’s actual data with test data.
COMPUTER SOFTWARE
•Computer audit software (CAS)
or
generalized audit software (GAS)are computer programs that have been written especially for auditors. Two of
the most popular are Audit Control Language (ACL) and IDEA. CAS generates programs that perform the audit
function and is ideally suited for examination of large data files to identify records needing further audit
scrutiny.
•CAS functions include: reformatting, file manipulation, calculation, data selection, data analysis, file
processing, statistics, and report generation.
•To use CAS, the auditor decides on audit objectives; learns about the files and databases to be audited;
designs the audit reports; and determines how to produce them. The program creates specification records used
to produce auditing programs. The auditing programs process the source files and produce specified audit
reports. When the auditor receives the CAS reports, most of the audit work still needs to be done. Advantages of
CAS are numerous, but it does not replace the auditor’s judgment or free the auditor from other phases of the
audit
OPERATIONAL AUDITS OF AN ACCOUNTING INFO SYSTEM
•Techniques and procedures in operational audits are similar to audits of information systems and financial
statement audits. However, the scope of the operational audit is much broader and encompasses all aspects of
information systems management. The objectives are also different in that operational audit objectives include
evaluating factors such as effectiveness, efficiency, and goal achievement. The steps include audit planning,
evidence collection, evidence evaluation, and documentation and communication of conclusions.
•The ideal operational auditor is a person with audit training and some managerial experience