IT Audit 4ed SM Ch7
IT Audit 4ed SM Ch7
IT Audit 4ed SM Ch7
REVIEW QUESTIONS
3. Give one example of an error that could be detected by a check digit control.
Response: An accounts receivable clerk incorrectly posts a$1,000 remittance advice to
customer account number 674534. The payment should have been posted to customer
account number 674543. This transposition error resulted in the payment being posted to
a legitimate, but incorrect account. A check digit routine could detected this error
Response
a. field
b. field
c. file
d. field
e. record
f. file
g. field
h. record
i. field
j. file
k. field
l. record
6. What are the three common error-handling techniques discussed in the text.
Response:
Three common error handling techniques are (1) correct immediately, (2) create an error
file, and (3) reject the entire batch.
9. If all of the inputs have been validated before processing, then what purpose do
run-to-run controls serve?
Response: The run-to-run control is a control device to ensure that no records are lost,
unprocessed, or processed more than once for each of the computer runs (processes) that
the records must flow through.
DISCUSSION QUESTIONS
1. The field calls for an “M” for married or an “S” for single. The entry is a “2.” What
control will detect this error?
Response: Numeric/alphabetic data checks or validity check
2. The firm allows no more than 10 hours of overtime a week. An employee entered
“15” in the field. Which control will detect this error?
Response: Limit check
3. The password was “CANARY”; the employee entered “CAANARY.” Which control
will detect this error?
Response: Validity check
4. The inventory item number was omitted on the purchase order. Which control will
detect this error?
Response: Missing data check
5. The order entry system will allow a 10 percent variation in list price. For example,
an item with a list price of $1 could be sold for 90 cents or $1.10 without any system
interference. The cost of the item is $3, but the cashier entered $2. Which control
would detect this error?
Response: Range check
8. Output controls ensure that output is not lost, misdirected, or corrupted and that
privacy is not violated. What are some output exposures, or situations where output
is at risk?
Response: Output is removed from the printer by the computer operator, separated into
sheets and separated from other reports, reviewed for correctness by the data control
clerk, and then sent through interoffice mail to the end user. Each stage in this process is a
point of potential exposure where the output could be reviewed, stolen, copied, or
misdirected. An additional exposure exists when processing or printing goes wrong and
produces output that is unacceptable to the end user. These corrupted or partially
damaged reports are often discarded in waste cans. Computer criminals have successfully
used such waste to achieve their illicit objectives.
9. Input validation includes field interrogation that examines the data in individual
fields. List four validation tests and indicate what is checked in each.
Response: Numeric-alphabetic checks look for the correct content in a field, numbers, or
letters; zero-value checks determine if necessary zeros are present; limit checks verify
that values are within preset limits; range checks verify the values fall within an
acceptable range. Other acceptable responses include missing data checks that look for
blank spaces, validity checks that compare actual values in a field against known
acceptable values, and check digit controls that identify keystroke errors in key fields.
12. What are rounding error routines, and why are they used?
Response: Financial systems that calculate interest payments on bank accounts or
charges on mortgages and other loans employ special rounding error applications.
Rounding errors occur when the level of precision used in a calculation is greater than
that used for reporting. For example, interest calculations on bank account balances may
have a precision of five decimal places, whereas only two decimal places are reported on
balances. If the remaining three decimal places are simply truncated, the total interest
reported for the total number of accounts will not equal the sum of the individual
calculations. The routine uses an accumulator to keep track of the rounding differences
between calculated and reported balances. When the accumulator exceeds one cent
positive or negative, the penny is added or subtracted from the current account.
13. How does the salami fraud get its name, and how does it work?
Response: The fraud scheme takes its name from the analogy of slicing large salami (the
total fraud) into many thin pieces. Each victim gets one of these small pieces and is
unaware of being defrauded. For example, a programmer, or someone with access to the
rounding program, can modify the rounding logic to perpetrating a salami fraud as
follows: at the point in the process where the algorithm should increase the current
customer’s account (that is, the accumulator value is > +.01), the program instead adds
one cent to the perpetrator’s account. Although the absolute amount of each fraud
transaction is small, given the hundreds of thousands of accounts processed, the total
amount of the fraud becomes significant over time
14. Discuss the black box approach, and explain how it is different from white box
approaches to testing application controls.
Response: The black box approach does not require the auditor to create test files or to
obtain a detailed knowledge of the application’s internal logic. Instead, auditors analyze
flowcharts and interview knowledgeable personnel in the client’s organization to
understand the functional characteristics of the application. With an understanding of
what the application is supposed to do, the auditor tests the application by reconciling
actual production transactions processed with output results. The output results are
analyzed to verify the application’s compliance with its functional requirements.
White box techniques require a detailed understanding of the application’s logic and
involve creating test data to verify the logic directly.
MULTIPLE CHOICE
1. d 17. b
2. c 18. a
3. a 19. c
4. d 20. c
5. c
6. a
7. c
8. d
9. c
10. c
11. d
12. d
13. d
14. c
15. b
16. c
PROBLEMS
1. Input Validation
Identify the types of input validation techniques for the following inputs to the payroll system.
Briefly explain the control provided by each of these techniques.
a. The payroll system accessed the payroll file.
b. New employee
c. Employee name
d. Employee number
e. Social Security number
f. Rate per hour or salary
g. Marital status
h. Number of dependents
i. Cost center
j. Regular hours worked
k. Overtime hours worked
Response:
a. File Interrogation. Verify internal label to ensure the correct file is being accessed.
b. Record Interrogation. Reasonableness and sequence checks to verify the entire record. Field
checks on pay rate and personal information to be entered: Validity check, missing data check,
sign checks, numeric-alphabetic data check.
c. Alphabetic check validates that letters are entered where only letters are required to be entered,
e.g., employee name.
d., Check digit to verify that the number is correct.
e. Missing data check, numeric check, validity check.
f. Range check, reasonableness check
g. Missing data check ensures that no blank fields are entered where data should be present, e.g.,
marital status, validity check
h. Reasonableness check, limit check. Missing data check.
i, Validity check.
j. limit check, missing data check
k. Reasonableness checks validate that only data within a pre-specified range is entered, e.g.,
number of hours worked greater than zero and less than 70.
2. IT Application Controls
IT application controls are classified as (a) input controls, (b) processing controls, and (c) output
controls.
Required:
For each of the three application control categories listed, provide two specific controls and
explain how each control contributes to ensuring the reliability of data. Use the following format
for your answer.
Control Specific Contribution to
Category Controls Data Reliability
Response:
Student answers will vary. Presented below are the three application control categories, with
examples of specific controls, and how they contribute to ensuring data reliability.
Required:
Determine control techniques to make sure that all orders are entered accurately into the system.
Also, discuss any differences in control measures between the batch and the real-time processing.
Response: For the phone orders, if a customer has a customer number, it should be verified
against a master file. If a customer needs to establish a customer number, one should be assigned,
and the customer’s name should be entered. A missing data check should be used to verify that a
first name, last name, and street address have been entered. If the firm has a U.S. zip code
database, the zip code can be entered and the city and town should appear.
The payment method should be a menu choice of credit cards that are accepted. The credit
card number should be entered into an alpha-numeric field as well as the expiration date—a
numeric field. Once the order is totaled, authorization with the credit card company will be
provided online. The item ordered should be entered and verified against an inventory master file.
The description should appear and be read to the customer and verified as accurate. The unit price
should automatically appear. The quantity should be entered, and a range check performed to see
if the order is reasonable.
For the batch processed data, customers without customer numbers should be placed into a
batch for adding and receiving customer numbers before the order can be processed. For those
orders with customer numbers, the data will be grouped into batches. Check digits will be
calculated for the customer numbers and the inventory items. Any records that have an invalid
customer number, invalid inventory item, check digits that do not match, or an unreasonable
quantity ordered will be written to an error file, and the rest of the orders will be processed. The
clean transactions should be sorted according to charge type and the credit card numbers verified.
Any rejected transactions will be sent to a special file from which letters will be sent to the
customer. The doubly-clean transactions will then be processed. The real-time processing
technique is more efficient because any errors can be resolved easily and immediately.
4. Write an essay explaining the following three methods of correcting errors in data entry:
immediate correction, creation of an error file, and rejection of the batch
Response:
Key Points
a. Immediate Correction: In the direct data validation approach, error detection and correction
take place during data entry. When an error or illogical relationship is entered, the system should
halt the data entry procedure until the error is corrected.
b. Creation of an Error File: In the delayed data validation approach, errors are flagged and
placed in an error file. Records with errors will not be processed until the error is investigated and
corrected.
c. Rejection of the Batch: Some errors are associated with the entire batch and are not
attributable to individual records. An example of this is a control total that does not balance. The
entire batch is placed in the error file and will be reprocessed when the error is corrected.
5. Many techniques can be used to control the input effort. Write a one-page essay
discussing three techniques.
Response:
Key Points
a. Source document controls are designed to control the documents used to initiate transactions
with pre-numbered source documents, used in sequence, and periodically accounted for.
b. Data coding controls are designed to check on the integrity of data by preventing transcription
errors and transposition errors.
c. Batch controls are designed to manage large volumes of data by repeatedly verifying totals of
specific fields, some financial and others nonfinancial.
6. The presence of an audit trail is critical to the integrity of the accounting information
system. Write a one-page essay discussing three of the techniques used to preserve the audit
trail.
Response:
Key Points
a. Transaction logs list all transactions successfully processed by the system and serve as journals,
and permanent records. Transactions that were not processed successfully should be recorded in
an error file.
b. After processing transactions, a paper transaction listing should be produced and used by
appropriate users to reconcile input.
c. Logs and listings of automatic transactions should be produced for transactions initiated
internally by the system.
d. Error listing should document all errors and be sent to appropriate users to support error
correction.
7. Write an essay comparing and contrasting the following audit techniques based on costs
and benefits:
● test data method
● base case system evaluation
● tracing
● integrated test facility
● parallel simulation
Response:
Key Points
The test data method is used to establish application integrity by processing specially prepared
sets of input data through production applications that are under review. The results of the test are
compared with the expected results. The base case system evaluation tests extend the test data
method; the test data set constrains all possible transaction types. Tracing is an electronic
walk-through of the application’s internal logic and analysis of the execution of each program
command line for a specific transaction. An integrated test facility is an automated technique that
enables the auditor to test an application’s logic and controls during its normal operations by
creating dummy transactions and files. This method promotes ongoing application auditing.
Parallel simulation involves creating a simulation of the transaction processing system and then
using actual transactions to determine if the results of processing reconcile with the organization’s
transaction processing system.