Computer-Aided Audit Tools and Techniques: IT Auditing, Hall, 3e
Computer-Aided Audit Tools and Techniques: IT Auditing, Hall, 3e
Computer-Aided Audit Tools and Techniques: IT Auditing, Hall, 3e
IT Auditing, Hall, 3e
2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated,
or posted to a publicly accessible website, in whole or in part.
systems
2011 Cengage Learning. All Rights Reserved. May not be scanned,Hall,
copied
3e or duplicated,
or posted to a publicly accessible website, in whole or in part.
documents
Source document fraud
To control for exposure, control procedures
Transposition errors
Single transposition: adjacent digits transposed (reversed)
Multiple transposition: non-adjacent digits are transposed
transcription errors
#3-Batch Controls
Method for handling high volumes of
#3-Batch Controls
Requires controlling batch throughout
Hash totals
#4-Validation Controls
Intended to detect errors in data
before processing
Most effective if performed close to
file
2011 Cengage Learning. All Rights Reserved. May not be scanned,Hall,
copied
3e or duplicated,
or posted to a publicly accessible website, in whole or in part.
#4-Validation Controls
Field Interrogation
Missing data checks
Numeric-alphabetic data checks
Zero-value checks
Limit checks
Range checks
Validity checks
Check digit
Record Interrogation
Reasonableness checks
Sign checks
Sequence checks
File Interrogation
Internal label checks (tape)
Version checks
Expiration date check
2011 Cengage Learning. All Rights Reserved. May not be scanned,Hall,
copied
3e or duplicated,
or posted to a publicly accessible website, in whole or in part.
10
11
#6-GDIS
Major components:
12
Controls
3) Audit Trail Controls
13
#1-Run-to-Run (Batch)
14
#2-Operator Intervention
15
Transaction logs
Log of automatic transactions
Listing of automatic transactions
Unique transaction identifiers [s/n]
Error listing
16
Output Controls
Not misplaced
Not misdirected
Not corrupted
Privacy policy not violated
17
Output Controls
18
Output Controls
Print Programs
Operator Intervention:
1) Pausing the print program to load output paper
2) Entering parameters needed by the print run
3) Restarting the print run at a prescribed checkpoint after a
printer malfunction
4) Removing printer output from the printer for review and
distribution
19
Output Controls
Bursting
Supervision
Waste
Proper disposal of aborted copies
and carbon copies
Data control
Data control group verify and log
Report distribution
Supervision
20
Output Controls
Report retention:
21
Output Controls
Eliminates intermediaries
Threats:
Interception
Disruption
Destruction
Corruption
Exposures:
Equipment failure
Subversive acts
22
23
Flowcharts
Interview key personnel
Advantages:
Appropriately applied:
Simple applications
Relative low level of risk
24
25
Individuals / users
Programmed procedure
Messages to access system (e.g., logons)
logon *
2) Accuracy tests:
3) Completeness tests:
26
Salami slicing
Monitor activities excessive ones are serious
exceptions; e.g, rounding and thousands of
entries into a single account for $1 or 1
27
28
#1 Test Data
Used to establish the application processing
integrity
Uses a test deck
Valid data
Purposefully selected invalid data
Every possible:
Input error
Logical processes
Irregularity
Procedures:
1) Predetermined results and expectations
2) Run test deck
3) Compare
2011 Cengage Learning. All Rights Reserved. May not be scanned,Hall,
copied
3e or duplicated,
or posted to a publicly accessible website, in whole or in part.
29
30
#3 Tracing
Test data technique that takes step-by-step
test data
3) Test data is traced through all processing steps of
program
31
evidence
2) Can be employed with minimal disruption to operations
3) They require minimal computer expertise on the part of
the auditors
33
#5 Parallel Simulation
Auditor writes or obtains a copy of the program that
under review
the application
and files
34