Auditing, Assurance and Internal Control
Auditing, Assurance and Internal Control
Auditing, Assurance and Internal Control
Audit Defined
“Auditing is a systematic process of objectively obtaining and evaluating evidence regarding
assertions about economic actions and events to ascertain the degree of correspondence
between those assertions and establishing criteria and communication the results to interested
users.”
What is an IT Audit?
An IT audit focuses on the computer-based aspects of an organization’s information system. This
audit includes assessing the proper implementation, operation, and control of computer
resources.
The IT Environment
There has always been a need to for an effective internal control system to protect the integrity of
the accounting processes and data.
The design and oversight of that system has typically been the responsibility of accountants,
especially the auditors.
The Structure of an IT Audit
Audit Planning
A major part of this phase of the audit is the analysis of audit risk.
The auditor’s objective is to obtain sufficient information about the firm to plan the other
phases of the audit.
The auditor also identifies the financially significant applications and attempts to
understand the controls over the primary transactions that are processed by these
applications.
Techniques for gathering evidence at this phase include: conducting questionnaires,
interviewing management, reviewing system documentation, and observing activities.
Test of Controls
To determine whether adequate internal controls are in place and functioning properly.
The evidence-gathering techniques includes both manual and specialized computer audit
techniques.
At the conclusion of this phase, the auditor must assess the quality of internal controls.
Substantive Testing
Involves a detailed investigation of specific account balances and transactions.
In an IT environment, the information needed to perform substantive tests is contained in
data files that often must be extracted using Computer-Assisted Audit Tools and
Techniques (CAATTs) software.
Internal Control
The internal control system comprises policies, practices, and procedures employed by the
organization to achieve four broad objectives:
To safeguard assets of the firm
To ensure the accuracy and reliability of accounting records and information
To promote efficiency in the firm’s operations
To measure compliance with management’s prescribed policies and procedures
Modifying Assumptions
Inherent in the control objectives are four modifying assumptions that guide designers and
auditors of internal control systems.
Management Responsibility
Reasonable Assurance
Methods of Data Processing
Limitations
Management Responsibility
o This concept holds that the establishment and maintenance of a system of internal
control is a management responsibility.
Reasonable Assurance
o The internal control system should provide reasonable assurance that the four
broad objectives of internal control are met
o No system of internal control is perfect and the cost of achieving improved control
should not outweigh its benefits.
Methods of Data Processing
o The internal control system should achieve the four broad objectives regardless of
the data processing method used.
o However, the specific techniques used to achieve these objectives will vary with
different types of technology
Limitations
o Every system of internal control has limitations on its effectiveness.
o These includes:
The possibility of error
Circumvention
Management override
Changing conditions
Detective Controls
Detection of problems is the second line of defense
These are devices, techniques, and procedures designed to identify and expose undesirable
events that elude preventive controls.
These reveal specific types of errors by comparing actual occurrences to preestablished
standards.
Corrective Controls
Actions that must be taken to reverse the effects of detected errors
These identify undesirable events and draw attention to the problem; corrective controls
actually fix the problem.
Auditors must obtain sufficient knowledge of the organization’s risk assessment procedures to
understand how management identifies, prioritizes, and manages the risks related to financial
reporting.
Monitoring
It is the process by which the quality of internal control and design and operation can be
assessed.
Ongoing monitoring may be achieved by integrating special computer modules into the
information system that capture key data and/or permit tests of controls to be conducted as part
of routine operations.
Another technique for achieving ongoing monitoring is the judicious use of management reports.
Control Activities
These are the policies and procedures used to ensure that appropriate actions are taken to deal
with the organization’s identified risks.
COMPUTER CONTROLS
General Controls
- General controls pertain to entity-wide concerns such as controls over data center,
organization databases, system access, system development, and program maintenance.
- General controls apply to a wide range of risks that systematically threaten the integrity of
all applications processed within the IT environment.
Application Controls
- Application controls ensure the integrity of specific systems such as sales order
processing, accounts payable, and payroll applications.
- Application controls are narrowly focused on risks associated with specific systems.
PHYSICAL CONTROLS
- These relate primarily to traditional accounting systems that employ manual procedures
- However, an understanding of these control concepts also gives insights to the risks and
control concerns associated with IT environment.
- Six traditional categories of physical control includes: transaction authorization,
segregation of duties, supervision, accounting records, access control, and independent
verification.
Transaction Authorization
The purpose of transaction authorization is to ensure that all material transactions processed by
the information system are valid and in accordance with management’s objectives.
- General authority is granted to operation personnel to perform day-to-day operations
- Special authority is usually a management responsibility.
Segregation of Duties
The following are the three objectives that serve as guidelines for segregation of duties:
The segregation of duties should be such that authorization for a transaction is separate
from the processing of the transaction.
Responsibility for the custody of assets should be separate from the recording
responsibility.
The organization should be structured so that a successful fraud requires collusion
between two or more individuals with incompatible responsibilities.
Supervision
In an IT environment, supervisory control must be more elaborate than in manual systems for
three reasons:
The first relates to the problem of attracting competent employees.
The second reflects management’s concern over the trustworthiness of data processing
personnel in high-risk areas.
The third reason is management’s inability to adequately observe employees in an IT
environment.
Accounting Records
Traditional accounting records of an organization consist of source documents, journals, and
ledgers. These records capture the economic essence of transactions and provide an audit trail of
economic events.
The audit trail enables the auditor to trace any transaction through all phases of its processing
from the initiation of the event to the financial statements.
Organization must maintain audit trail for two reasons:
This information is needed for conducting day-to-day operations.
The audit trail plays an essential role on the financial audit of the firm.
Access Controls
The purpose of access controls is to ensure that only authorized personnel have access to the
firm’s assets.
Unauthorized access exposes assets to misappropriation, damage, and theft.
In the IT environment, accounting records are often concentrated within the data processing
center on mass storage devices. Data consolidation exposes the organization to two forms of
threat: (1) computer fraud and (2) losses from disaster.
The timing of verification depends on the technology employed in the accounting system and the
task under review.
Independent verification control is needed in the manual environment because employees
sometimes makes mistakes or forget to perform necessary tasks. In an IT environment, computer
programs perform many routine tasks.
Still, most of the concern rest with application integrity.
QUIZ
Question
1/10
Which of the following is defined as a "systematic process of objectively obtaining and evaluating
evidence regarding assertions about economic actions and events to ascertain the degree of
correspondence between those assertions and establishing criteria and communicating the
results to interested users"?
Auditing
Accounting
Accounting Information System
Information System
Question
2/10
Which of the following is an audit associated with auditors who use technical skills and
knowledge to audit through the computer system, or provide audit services where processes or
data, or both, are embedded in technologies?
IT audit
External audit
Internal audit
Fraud audit
Question
3/10
Which of the following audit aims to investigate anomalies through gathering evidences of fraud
and has a legal goal of conviction of individuals?
IT audit
Fraud audit
External audit
Internal audit
Question
4/10
IT audit is generally divided into three phases as follows, except
Systems analysis
Audit planning
Substantive testing
Test of controls
Question
5/10
The major part of this phase of IT audit is the analysis of audit risk. What phase is this?
Systems design
Audit planning
Systems analysis
Test of controls
Question
6/10
In an IT environment, the information needed to perform substantive tests is contained in data
files that often must be extracted using
Management override
Employee fraud
Circumvention of controls
The possibility of error
Question
8/10
Internal control consists of three levels of control, as follows except
Detective
Predictive
Corrective
Preventive
Question
9/10
This pertains to entity-wide concerns such as controls over data center, organization databases,
system access, system development, and program maintenance. What is it?
Data controls
General controls
Internal controls
Application controls
Question
10/10
These controls ensure the integrity of specific systems such as sales order processing, accounts
payable, and etc.
Access controls
Application controls
Physical controls
General controls