Chapter 2
Chapter 2
• Web cramming/ billing consumers for a web page they did not even
know they had/
COSO COSO-ERM
Control Internalenvironment
(internal)
environment Objective setting
Risk assessment Event identification
Control activities Risk assessment
Information and Risk response
communication Control activities
Monitoring Information and
communication
Monitoring
Threats Controls
Inadvertent Reviewsoftware license
programming errors agreements
Unauthorized Management authorization
Threats Controls
Inadvertent Listprogram components
programming errors to be modified
Unauthorized Management
program code authorization and
approval for modifications
User approval for
modifications
Test changes to program
System documentation of
changes
71
Tuesday, February 11, 2
6. Auditing Computer-Based
Information Systems
4. Accurate and Complete Processing of Transactions, Records, Files, and
Reports
Threats Controls
• Failure to detect • Data editing routines
incorrect, incomplete, or
unauthorized input data • Reconciliation of batch
totals
• Failure to correct errors
identified from data • Error correction
editing procedures procedures
• Errors in files or • Understandable
databases during documentation
updating • Competent supervision
• Improper distribution of
output
• Inaccuracies
Tuesday, Februaryin
11, reporting
2
72
6. Auditing Computer-Based
Information Systems
5. Prevent, Detect, or Correct Inaccurate or Unauthorized Source Data
Threats Controls
• Inaccurate source data • User authorization of
• Unauthorized source source data input
data • Batch control totals
• Log receipt, movement,
and disposition of
source data input
• Turnaround documents
• Check digit and key
verification
• Data editing routines 73
Tuesday, February 11, 2
6. Auditing Computer-Based
Information Systems
6. Accurate, Complete, and Confidential Data Files
Threats Controls
• Destruction of stored • Secure storage of data and
data from restrict physical access
Errors • Logical access controls
Hardware and software
• Write-protection and proper
malfunctions
Sabotage file labels
• Unauthorized • Concurrent update controls
modification or • Data encryption
disclosure of stored • Virus protection
data • Backup of data files (offsite)
• System recovery procedures
74
Tuesday, February 11, 2
6. Auditing Computer-Based
Information Systems
Audit Techniques Used to Test Programs
• Integrated Test Facility
▫ Uses fictitious inputs
• Snapshot Technique
▫ Master files before and after update are stored for
specially marked transactions
• System Control Audit Review File (SCARF)
▫ Continuous monitoring and storing of transactions
that meet pre-specifications
• Audit Hooks
▫ Notify auditors of questionable transactions
• Continuous and Intermittent Simulation
▫ Similar to SCARF for DBMS 75
Tuesday, February 11, 2
6. Auditing Computer-Based
Information Systems
Software Tools Used to Test Program
Logic
• Automated flowcharting program
▫ Interprets source code and generates flowchart
• Automated decision table program
▫ Interprets source code and generates a decision table
• Scanning routines
▫ Searches program for specified items
• Mapping programs
▫ Identifies unexecuted code
• Program tracing
▫ Prints program steps with regular output to observe
sequence of program execution events 76
Tuesday, February 11, 2
6. Auditing Computer-Based
Information Systems
Computer Audit Software
• Computer assisted audit software that can
perform audit tasks on a copy of a company’s
data. Can be used to:
Query data files and retrieve records based upon
specified criteria
Create, update, compare, download, and merge
files
Summarize, sort, and filter data
Access data in different formats and convert to
common format
Select records using statistical sampling techniques
Perform analytical tests
Perform calculations and statistical tests 77
Tuesday, February 11, 2
6. Auditing Computer-Based
Information Systems
Operational Audits
• Purpose is to evaluate effectiveness, efficiency,
and goal achievement. Although the basic
audit steps are the same, the specific activities
of evidence collection are focused toward
operations such as:
▫ Review operating policies and documentation
▫ Confirm procedures with management and
operating personnel
▫ Observe operating functions and activities
▫ Examine financial and operating plans and
reports
▫ Test accuracy of operating information
▫ Test operational controls Tuesday, February 11, 2 78
End of chapter
2