Chapter Two
Chapter Two
Chapter Two
established criteria
Promote and improve operational
efficiency
Cont’d…….
4
recorded.
Transactions are recorded accurately.
Assets are safeguarded from loss or
theft.
Business activities are performed
Cont’d………
8
whom to order.
Verify the accuracy of vendor invoices.
Decide whether purchase discounts
should be taken.
Monitor cash flow needs to pay
Threats & Control in
Expenditure Cycle
15
Data Collection
The simplest stage to perpetrate a
computer fraud as it only requires
understanding the system and its control
weaknesses.
The fraudulent act involves entering
falsified data into the system. For
example;
To commit a payroll fraud, the
perpetrator may insert a fraudulent
payroll transaction along with other
legitimate transactions.
Cont’d………..
18
Data Processing
Data processing frauds fall into two
classes: program fraud and operations
fraud.
Program fraud techniques:
personal business.
Cont’d……..
20
Database Management
DBM Fraud includes altering, deleting,
Information Generation
It is the process of compiling, arranging,
Audit Procedures:
Review relevant documentation to verify
if individuals are performing
incompatible functions.
Review system documentation and
maintenance records to verify
maintenance programmers are not
original design programmers.
Review that computer operators do not
have access to the operational details of
the system’s internal logic and Systems
documentation.
Cont’d………..
25
Computer Center
The auditor should examine the physical
environment of the computer center to
Identify risks, and check for controls
Mitigate risks and
Create a secure computer
environment.
Audit areas include;
Physical location: Where should the
computer center be located?
Construction: Soundly constructed
Cont’d………
27
Operating Systems
Set of programs that controls the way a
OS Security Components
1. Log on Procedure
Use ID and Password
2. Access Token
If successfully logged in, the OS creates
an access token (sign).
Access token contains key information
about the user;
ID, Password, User group and privileges
granted
Access token uses to approve all actions
Cont’d……..
31
Threats to OS Integrity
Accidental: Disk failures, OS Crushes,
Memory damp
Intentional: Illegal access, Destructive
programs
Operating System controls and Audit
tests
The design of OS security controls
must be assessed, covering;
Access privileges,
Password control,
Virus control and
Cont’d………
33
Access privileges
Audit Objective:
Verify that access privileges are granted
Password Control
Audit Objective:
Ensure that there is adequate and
have passwords.
Verify that new users are instructed in
Virus control
Audit Objective:
Verify that effective policies and
procedures are in place to prevent
destructive programs: viruses….
Audit Procedures:
Determine that operation personnel have
Audit Objective:
Ensure that the established audit trial
Audit Procedures
Verify that the audit trial has been
The End!
Thank You!