Audit in CIS Module
Audit in CIS Module
ENVIRONMENT
MODULE
Prepared by:
CARL JOSEPH C. FUERZAS, CPA
Instructor
Dear Student,
Panagdait sa Tanang Kabuhatan!
The success of this module lies in
your hands. This was prepared for you TEACHER’S
to learn diligently, intelligently, and PHOTO
independently. This will be a great
opportunity for you as a would be
teacher to equip yourself not only with
academic content but as well as some
invaluable skills which you will be very
proud of as a responsible learner
STUDY SCHEDULE AND HOUSE RULES
STUDY SCHEDULE
Introduction
Information Technology throughout the world has revolutionized and dramatically changed the manner in which
the business is conducted today. Computerization has a significant effect on organization control, flow of
document information processing and so on. Auditing in a CIS environment even though has not changed the
fundamental nature of auditing, it has definitely caused substantial changes in the method of evidence collection
and evaluation. This also requires auditors to become knowledge about computer environment (Hardware,
software etc.) and keep pace with rapidly changing technology, even to the extent of using sophisticated Audit
software. Students are advised to study the technical issue relating to Information Technology from the study
material of paper 6.
b. How it is processed.
c. When the results are available to the user.
c. On-Line/Inquiry
d. On-Line/Combined Processing
10. It is a communication system that enables computer users to share computer equipment,
application software, data and voice and video transmissions.
Learning Objectives
Compare
with
Predetermined Client
Output Output
The processes and controls surrounding the subject are not only subject to audit but also the
processing controls operating over this process are investigated. In order to help the auditor to gain
access to these processes computer Audit software may be used. These packages may typically
contain:
(a) interactive enquiry facilities to interrogate files.
(b) facilities to analyze computer security logs for unusual usage of the computer.
(c) the ability to compare source and object (compiled) program codes in order to
detect dissimilarities.
(d) the facility to execute and observe the computer treatment of "live transaction"
by moving through the processing as it occurs.
(e) the generation of test data.
(f) the generation of aids showing the logs of application programs. The actual
controls and the higher level control will be evaluated and then subjected to
compliance testing and, if necessary, substantive testing before an audit report is
produced.
It is obvious, that to follow this approach the auditor needs to have sufficient knowledge of
computers to plan, direct-supervise and review the work performed.
The areas covered in an audit will concentrate on the following controls:
(1) Input controls,
(2) Processing control,
(3) Storage control,
(4) Output control and
(5) Data transmission control.
The auditor will also need to be satisfied that there are adequate controls over the prevention
of unauthorised access to the computer and the computerised database. The auditors task will
also involve consideration of the separation of functions between staff involves in transaction
processing and the computerised system and ensuring that adequate supervision of personnel
is administered.
The process of auditing is not a straight forward flow of work from start to finish to be
completed by satisfying oneself against a standard checklist or a list of questions. It involves
exposure, experiences and application of knowledge and expertise to differing circumstances.
No two information system is same. From the view point of analysis of computerised
information system, the auditors need not only have adequacy on knowledge regarding
information requirement and computer data security they must also get exposed to system
analysis and design so as to facilitate post implementation audit.
1. A collection of data that is shared and used by a number of different users for
different purposes.
f. Database b. Information file c. Master file d.
Transaction file
2. Which of the following is least likely a characteristic of a database system?
a. Individual applications share the data in the database for different purposes.
b. Separate data files are maintained for each application and similar data used by
several applications may be repeated on several different files.
c. A software facility is required to keep track of the location of the data in the database.
a. All of the above b. All except I c. II and V only d. II, III and V
only
4. Due to data sharing, data independence and other characteristics of database systems
a. General CIS controls normally have a greater influence than CIS application controls
on database systems.
b. CIS application controls normally have a greater influence than general CIS controls
on database systems.
c. General CIS controls normally have an equal influence with CIS application controls on
database systems.
d. CIS application controls normally have no influence on database systems.
5. Which statement is incorrect regarding the general CIS controls of particular importance
in a database environment?
a. Since data are shared by many users, control may be enhanced when a standard
approach is used for developing each new application program and for application
program modification.
b. Several data owners should be assigned responsibility for defining access and security
rules, such as who can use the data (access) and what functions they can perform
(security).
c. User access to the database can be restricted through the use of passwords.
c. The nature of the database, the DBMS, the database administration tasks and the
applications.
c. The nature of the database, the DBMS, the database administration tasks and the
applications.
d. The general CIS controls which are particularly important in a database environment.
REFERENCES: