Computer Auditing
Computer Auditing
2. The purpose of auditing is still the same. The objective of auditing is still to express an
opinion on whether the financial statements show a true and fair view.
3. The auditor isstill required to comply with auditing standards (See;International Standards on
Auditing ((SA) 315 for example)
The way the data is processed.The processing of data in the IT system is not the same as in
manual system. For example, IT system the input documents do not contain all the details,
in the
such as, the signatures for the authorization of purchases or salary payments. Another
inventory, payroll
of individual applications (e.g.,
()Application.These are applied at the level exercised over the manual processes involved in
controls
etc.). The controls
include both manual
controls performed by the
computer itself
the system and programmed
1
Auditing & Assurance: Introduction to ITAudit (Part One) Mwamba. Ally. Jingu: FCPA: PhD
(ii) General Controls. These are applied at the level of the computercentre. They ensure that
the computercentre is able to process the work received in spite ofrisks from natural disasters!
(fire, flood, ctc.) or from malicious or accidental human action.
(ii) Systems Development Controls. These are applied during the developmentof systems.
They ensure that developmentresource are used efficiently,and effectively and that delivered
systems meet real business needs
APPLICATION CONTROLS
Application controls are classified into three categories: (i) Input Controls; (ii) Processing
Controls and Output Controls: See figure 1.1. Input controls means first, that the transactions
sent to the IT department for processing are (a) authorized, (b) accurate, (c) compete,(d) timely
and (e) presented only once. Second,any errors detected at the input level must be corrected and
resubmitted for processing. Processing controls ensures that the system provides for accurate and
timely processing of the input data. Finally, the input controls ensure the outputs are
valid.
Application controls
Figure 1.1
Introduction
In conducting a review of a computerized system, the auditor must know that, methods of
processing data will vary. Whichever method of processing is used the auditor has a clear
understanding of the basic controls and safeguards which should apply in all circumstances
Audit Objectives:
The overall objective of an audit review of a computer system is to review system proposals to
ascertain whetherthey incorporate adequate internal controls and ensure that these controls form
part of the operational system when implemented and that any system amendments do not
invalidate them.This overall objective may be broken into four sub-objectives: (i)input control;
()processing controls; (ii) Outputcontrols
().INPUT CONTROLS
Audit objectives of inputcontrols
(iv) accurateand
(v) timely.
are crucial because most errors in IT systems come from data entry errors.
Input controls
1.Input is genuine.
genuine (authentic)?
2.Input is Complete
5.Input is timely
system timely
The data should be entered into the computer
3
Auditing & Assurance: Introduction to IT Audit (Part Onc) Mwamba. Ally. Jingu: FCPA: PhD
(II). PROCESSINGCONTROLS
Processing controls prevent and detect irregularities as transaction data are processed. Specific
application processing areoften programmed into soft ware to prevent, detect and
controls
correct processing irregularities.They ensures that each transaction is appropriate for processing
(iv) data conforms to predetermined standards or falls within specified parameter values, for
- Are there controls to ensure that correct data and program files are used in processing?
4
& Assurance: Introduction to IT Audit (Part One) Mwamba. Ally. Jingu: FCPA: PhD
Auditing
Table 2 summarizes the objectives of processing controls and gives some examples.
authorized
4 Correct program and data Program procedures to identify files. Validation
(II).OUTPUT CONTROLS
Controls over output from the computer systemsare important application controls The main
concern here is that computer output
preventing irregularities. The most important output control is review of data for reasonableness.
)
The main
all
(i)it is complete,
objective is to ensure that:
expected output is
appears
produced and that it
is not lost
on time, and
(iii)it serves a useful purposeand is distributed
- Is output accurate?
5
& Assurance: Introduction to IT Audit (Part One) Mwamba. Ally. Jingu: FCPA: PhD
Auditing
• InputControls -These controls are used mostly to check the integrity of data entered into a
business application,
• Output Controls -These controls address what is done with the data and should compare
output results with the intended result by checking the outputagainst the input..
The purpose of master file controls is to ensure the ongoing integrity of the standing data
contained in the master files. It is very important that strict 'security' controls are exercised over
all master files. These include:
5. Processing controls over the updating of master files, including the use of record counts and
control totals
INTERACTIVE QUESTIONS
QUESTION ONE
A IT inputcontrol
B IT processingcontrol
C ITmaster file control
D IT output control
B Ensure that data input is performed in a timely manner by authorised and qualified staff.
D ensure that the correct data and program files are used, that all data is processed in a
secure manner, accounted for and written to appropriate file
The purpose of the IT master file control isto ensure the ongoing integrity of the standing
of the
data contained in the master files. The objectives of Master file control include all
following except
access to master file data
A Appropriateuse of passwords,torestrict
of data
B The establishment of adequate procedures over the amendment
data, by an independent official
C Regular checking of master file data to authorised
D Ensure that all expected output is produced,that it is completeand
appears reasonable.
QUESTION TWO
The following represent irregularities that could occur in a computerized environment. For each
iregularity identify control proceduresthat would have been effective in either preventing or
detecing the iregularity.
i
A deposit for Julius A. Kingu at the local bank was by mistakerecorded asa deposit in the
Duplicate payments were prepared for all employees of the accounts section in Tanya & Co for the
month ended December, 2023. This occurred because the data processing department processed
the data paymentvouchers twice
iii
An individual in the accountssection gained access to the products master fle and, in an
attempt tochange prices for one customer, inadvertently changed prices for theproducts
identified for all customers
iv A customer order was filled and sent to a former customer, who had already declared
bankruptcy
V The selling price for all products handled by a company sales person was consistently
reduces by 25% by a sales person. The sales manager did not authorize the sales person to
reduce prices from a price list
vi A customer number was transposed during the order-taking process. Consequently, the
sales were billed to anotherperson. By the time the original customer was identified, the
original customer was out of business
ix A computer programmer added a module to the payroll program that started with an "IF"
statement to identify his employee
number. If it were his record, the program was
instructed tomultiply computed pay by 1.5, thus increasing the programmer's pay by 50%%
8
Auditing & Assurance: Introduction to IT Audit (Part One) Mwamba. Ally. Jingu: FCPA:PhD
The data that have been input into the computer system was not accurate. The deposit
was supposed to be credited into the accountof Julius A. Kingu and not in Julius A Jingu
iii
Master file controls were either missing or were weak and thus ineffective.
Access tothe master files should be to
personnel and not to any
restricted appropriate
person including those from the accountssection. Moreover, authority to amend a product
master file should be restricted to appropriate individuals responsible forthe master file.
iv
Input controls wereeither missing or were weak and thus ineffective
The data was not entered into the computer system timely
vi Input controls were either missing or were weak and thus ineffective
vii Input controls were either missing or were weak and thus ineffective
The trade discount entered in accounts receivable was not appropriate as there was no
discount at all, Therefore, there we no controls to ensure that all input into the computer
system was accurate
viii Master file controls were either missing or were weak and thus ineffective.
Access to the master filesshould be restricted to appropriate personnel and not to any
other person including computer programmers.
9
IT Audit (Part One) Mwamba. Ally. Jingu: FCPA: PhD
Auditing & Assurance: Introduction to
ix Processing controls were either missing or were weak and thus ineffective
X Input controls were either missing orwere weak and thus ineffective
Some wardens and matrons entered fictitious students on the system and had support
payments sent to authorized addresses. Therefore, there we no controls to ensure that all
process level and apply to the processing of transactions by individual applications. Application
controls can be preventative or detective in nature and are designed to ensure the integrity of the
accounting records. Aplication controls are divided into the following three control categories:
)
Required
ofprocessing
Controls (2.5 marks)
Controls (2Mark)
(iü) Mention any five audit objectives of output Controls (2.5 Marks)
Gv)Mention any fouraudit objectives of master file Controls (2Marks)
Required
Auditing around the computer means that; processing done by the computer system needs not to
be examined because auditor expects that sufficient appropriate audit evidence can be obtained
by comparing inputs with outputs. In simple words evidence is obtained and conclusions are
drawn without considering how inputs are being processed to provide outputs. The auditor
carries out his audit work in the same way as in a manual audit system except with one
difference that the auditor examines computer printouts instead of handwrittenbooks of account.
He or she concentrates on input & outputand ignores the data processing. This approach ismore
often known as black box audit approach. Most often this approach is used either because.
processing done by the computer is too simple e.g. casting, sorting etc
auditor is already aware of the software's reliability. This is the case with most of off
the-shelfsoftwareuSed by client without any in-house alteration and thus need not to
be checked.
auditor has no mean to gain understanding of the computer system and thus resorts
with this approach.This situation can arise out of circumstancesincluding:
lack of appropriate system documentation
auditorlacks expertise or skills to understand or use the computer system
for auditing purposes.
auditor is not given accessto computer system at the level required
Audit around the computer approach is used in situations when auditor is of the opinion that
computer system is reliable and often comparison of inputsi.e. source documents to outputs i.e.
financial reports is done which in auditor's judgement is enough.
For this reason, relying too much on this approach is not recommended forimportant aspectsof
the audit especially where assessed risk is high as this may result in ineffective auditand in the
end the auditor may express an inappropriate audit opinion.
ii. Extensive knowledge of the computer and data processing is not required for the auditor
Jenores the system of controls and hence fails to recognize potential weakness with the system
i.
ii. The auditor fails to utilize the full potential of the computer to assist him or her
iii. Increasing of printing expenses because of enormous print-out requirements of the auditor.
11
(Part Onc) Mwamba. FCPA: PhD
Auditing & Assurance: Introduction to IT Audit Ally. Jingu:
approach)
Auditing through the computer (White box
through the computer auditors follow the audit through the internal computer
When auditing trail
processed. The auditor assumes that the CPU and additional hardware are functioning properly.
The five techniques used in auditing through the computer include; use of test data, integrated
achievecontinuousauditing
(iv) Mention any 5advantagesand 3 disadvantages of auditing though the computer (4 marks)
12