Audit in Cis Module
Audit in Cis Module
AUDIT IN A CIS
ENVIRONMENT
MODULE
Prepared by:
CARL JOSEPH C. FUERZAS, CPA
Instructor
Dear Student,
Panagdait sa Tanang Kabuhatan!
The success of this module lies in
your hands. This was prepared for you TEACHER’S
to learn diligently, intelligently, and PHOTO
independently. This will be a great
opportunity for you as a would be
teacher to equip yourself not only with
academic content but as well as some
invaluable skills which you will be very
proud of as a responsible learner
STUDY SCHEDULE
The following guides and house rules will help you to be on track and complete the
module with a smile on your face.
1. Read and understand every part of the module. If there are some contents or tasks
which you find difficult to understand, try to re-read and focus. You may also ask help
from your family at home, if it doesn’t work, you may send a private message on my
Facebook account (Carl Fuerzas) or you may text me on this cellphone number
09381715396.
2. Each module begins with an overview and a list of the topics you are expected to
learn.
3. Before reading the module and working on the activities, answer the pretest first. Find
out how well you did by checking your answers against the correct answers in the
answer key.
4. At the end of each lesson try to reflect and assess if you were able to achieve the
learning objectives. Remember that you can always read again if necessary.
5. Learn to manage your time properly. Study how you can manage to work on this
module in consideration of your other modules.
6. Have patience and do not procrastinate.
7. Practice the virtue of honesty in doing all your tasks.
8. Lastly, the activities in the module must be done by you and not by others. Your family
and friends may support and guide you but you must not let them do the work. DO
YOUR BEST AND GOD WILL DO THE REST.
MODULE 1
OVERVIEW OF IT
AUDIT
MODULE CONTENTS
Curriculum: An Overview
PRETEST
To find out how much you already know about the concepts in this module, Answer the
Pretest below.
Introduction
Information Technology throughout the world has revolutionized and dramatically changed the manner in which
the business is conducted today. Computerization has a significant effect on organization control, flow of
document information processing and so on. Auditing in a CIS environment even though has not changed the
fundamental nature of auditing, it has definitely caused substantial changes in the method of evidence collection
and evaluation. This also requires auditors to become knowledge about computer environment (Hardware,
software etc.) and keep pace with rapidly changing technology, even to the extent of using sophisticated Audit
software. Students are advised to study the technical issue relating to Information Technology from the study
material of paper 6.
b. How it is processed.
c. When the results are available to the user.
c. On-Line/Inquiry
d. On-Line/Combined Processing
10. It is a communication system that enables computer users to share computer equipment,
application software, data and voice and video transmissions.
Learning Objectives
In the Black box approach or Auditing around the computer, the Auditor concentrates on input
and output and ignores the specifics of how computer process the data or transactions. If input
matches the output, the auditor assumes that the processing of transaction/data must have
been correct.
In testing, say, Payroll Application, the auditor might first examine selected time cards for hours
worked and employee earning cards for rates and then trace these to the payroll summary output
and finally compare hours, rates and extensions. The comparison of inputs and outputs may be
done manually with the assistance of the computer. The computer assisted approach has the
advantage of permitting the auditor to make more comparisons than would be possible, if done
manually.
Auditing around the computer has the advantage of ease of comprehension as the tracing of
documents to output does not require any in-depth study of application program.
A major disadvantage, however, is that the auditor not having directly tested the control,
cannot make assertions about the underlying process. Moreover, in some of the more complex
computer systems intermediate printout may not be available for making the needed
comparisons.
B. The White Box Approach
Compare
with
Predetermined Client
Output Output
The processes and controls surrounding the subject are not only subject to audit but also the
processing controls operating over this process are investigated. In order to help the auditor to gain
access to these processes computer Audit software may be used. These packages may typically
contain:
(a) interactive enquiry facilities to interrogate files.
(b) facilities to analyze computer security logs for unusual usage of the computer.
(c) the ability to compare source and object (compiled) program codes in order to
detect dissimilarities.
(d) the facility to execute and observe the computer treatment of "live transaction"
by moving through the processing as it occurs.
(e) the generation of test data.
(f) the generation of aids showing the logs of application programs. The actual
controls and the higher level control will be evaluated and then subjected to
compliance testing and, if necessary, substantive testing before an audit report is
produced.
It is obvious, that to follow this approach the auditor needs to have sufficient knowledge of
computers to plan, direct-supervise and review the work performed.
The areas covered in an audit will concentrate on the following controls:
(1) Input controls,
(2) Processing control,
(3) Storage control,
(4) Output control and
(5) Data transmission control.
The auditor will also need to be satisfied that there are adequate controls over the prevention
of unauthorised access to the computer and the computerised database. The auditors task will
also involve consideration of the separation of functions between staff involves in transaction
processing and the computerised system and ensuring that adequate supervision of personnel
is administered.
The process of auditing is not a straight forward flow of work from start to finish to be
completed by satisfying oneself against a standard checklist or a list of questions. It involves
exposure, experiences and application of knowledge and expertise to differing circumstances.
No two information system is same. From the view point of analysis of computerised
information system, the auditors need not only have adequacy on knowledge regarding
information requirement and computer data security they must also get exposed to system
analysis and design so as to facilitate post implementation audit.
1. A collection of data that is shared and used by a number of different users for
different purposes.
f. Database b. Information file c. Master file d.
Transaction file
2. Which of the following is least likely a characteristic of a database system?
a. Individual applications share the data in the database for different purposes.
b. Separate data files are maintained for each application and similar data used by
several applications may be repeated on several different files.
c. A software facility is required to keep track of the location of the data in the database.
a. All of the above b. All except I c. II and V only d. II, III and V
only
4. Due to data sharing, data independence and other characteristics of database systems
a. General CIS controls normally have a greater influence than CIS application controls
on database systems.
b. CIS application controls normally have a greater influence than general CIS controls
on database systems.
c. General CIS controls normally have an equal influence with CIS application controls on
database systems.
b. Several data owners should be assigned responsibility for defining access and security
rules, such as who can use the data (access) and what functions they can perform
(security).
c. User access to the database can be restricted through the use of passwords.
c. The nature of the database, the DBMS, the database administration tasks and the
applications.
c. The nature of the database, the DBMS, the database administration tasks and the
applications.
d. The general CIS controls which are particularly important in a database environment.
REFERENCES: