Lecture 8 IT Auditing
Lecture 8 IT Auditing
IS Audit Definitions
IS Audits are required to give reasonable assurance on the following regarding ICT
systems:
• That Information Technology and the controls supporting such technologies assist
the organization in achieving its business objectives (effectiveness) with less
wastage (efficiency)
• Confidentiality of information contained in the systems
• Availability of the information and the systems
• Reliability (consistency) of the systems
• Compliance with legal and regulatory requirements
1
• Viruses, Worms, Hackers and other security threats
• Changing Regulatory environment
You should understand the various types of audits that can be performed, internally or
externally, and the audit procedures associated with each:
• Operational audits —evaluate the internal control structure in a given process or area.
IS audits of application controls or logical security systems are examples of operational
audits.
• Integrated audits —An integrated audit combines financial and operational audit steps.
It is also performed to assess the overall objectives within an organization, related to
financial information and assets’ safeguarding, efficiency and compliance. An integrated
audit can be performed by external or internal auditors and would include compliance
tests of internal controls and substantive audit steps.
• Specialized audits —Within the category of IS audits, there are a number of specialized
reviews that examine areas such as services performed by third parties and forensic
auditing.
2
• Forensic audits —traditionally, forensic auditing has been defined as an audit
specialized in discovering, disclosing and following up on frauds and crimes.
In recent years, the forensic professional has been called upon to participate in
investigations related to corporate fraud and cybercrime.
Audit charter gives the authority to perform the audit and is issued by the executive
management of the organization. It outlines the responsibility, authority and
accountability of the auditor such as the agreed completion date and deliverables.
Include gaining the knowledge of the business such as strategic plans, business
objectives and operational objectives of internal controls. It also include identification
of critical success factors of the audits and development of audit project plan.
3
Mitigate (reduce) : Do something to lower the possibility of getting hurt. Internal
controls are designed to mitigate the risk
Transfer: Let someone else take the chance of loss e.g by using an insurance company
Avoid: Change the situation to avoid taking the risk
This entails identifying the risk of the audit and whether it will be possible meaningful
evidence from the audit
Assigning appropriate staff to perform a proper data collection and review existing
controls.
Substantive testing seeks to verify the content and integrity of evidence and the
effectiveness of the controls put in place. It includes verifying account balances,
performing physical inventory counts, and executing detailed scans to detect
effectiveness of specific system configuration. CAATs can be applied here.
4
9. Analyzing the results- Preparing summaries and ranking the findings according to
their seriousness
Substantive testing
Substantive audit “substantiates” the adequacy of existing controls in protecting the
organisation from fraudulent activity and encompasses substantiating the reported
results of processing transactions or activities. Substantive testing of auditee’s data
can be done with the help of CAATs software.
5
QUESTIONS FOR FURTHER READING