Modules_auditing in Cis
Modules_auditing in Cis
- Planning
→ The auditor should obtain an understanding about the CIS
environment regarding the following:
CIS ENVIRONMENT INFORMATION a. Internal control structure
→ The organizational structure of the entity’s CIS
SYSTEM activities and the extent of concentration or
distribution of computer processing and development
- Auditing in CIS Environment
→ CIS Environment exists when a computer of any type or throughout the entity, particularly as they may affect
size is involved in the processing by an entity of financial segregation of duties at both the user and CIS
information of significance to the audit, whether that computer personnel levels
is operated by the entity or a third party → Plans by the entity to replace or significantly
change a CIS where these changes will affect the
- How CIS Environment affects the audit internal control structure
→ The use of computer has implications for the processing,
storage, and communication of financial information, and b. Significance and complexity of the computer
therefore affects the internal control structure employed by the processes
entity → The significance of computer processing in each
● CIS roles includes performing controls and significant accounting application. For this purpose
providing information to management to assist them significance relates to materiality of the financial
in controlling the business report assertions affected by the computer processing
● Under Manual Information system (MIS), → The complexity of computer processing in each
management tends to require reperformance or significant accounting application. Applications may
review of the system to confirm integrity and be considered complex when, for examples:
consistency BUT under CIS, management assumes ● The volume of transactions is such that users
that the computer system works correctly and does would find it difficult to identify and correct errors
not need to be reviewed. Thus effective design, in processing
testing, implementation and ongoing maintenance ● the computer automatically generates material
of the system are important factors in its integrity transactions or entries directly to another
→ The CIS environment affects all aspects of the audit application (integrated systems)
including the: ● The computer performs complicated
● Consideration of inherent risk and control risk computations of financial information and /or
● Procedures followed by the auditor to obtain automatically generates material transactions or
sufficient understanding of the internal control entries that may not be (or are not) validated
structure independently
● Auditor’s design and performance of audit ● Transactions are exchanged electronically with
procedures other organizations
- Skills and Competence c. Availability of data for use in the audit
→ The auditor should have sufficient knowledge of the CIS to → Source documents, certain computer files, and
plan, direct, supervise, and review the worked performed other evidential matters that may be required by the
→ The auditor should consider whether specialized CIS skills auditor may exist for only a short period or only with
are needed in an audit machine-readable form. An entity’s CIS may generate
→ When using the work performed by a CIS expert, the internal reports that may be useful in performing
auditor should obtain sufficient appropriate audit evidence that substantive tests.
such work will be adequate for the purpose of the audit → The potential for use of computer-assisted audit
→ Specialized skills may be needed to: techniques (CAATs) may permit increased efficiency
● Determine the effect of the CIS environment on the in the performance of audit procedures, or may
assessment of overall audit risk and of risk at the enable the auditor to economically apply certain
account balance and class of transaction levels procedures to obtain sufficient appropriate audit
● Obtain an understanding of the internal control evidence
structure affected by the CIS environment and its
effect on the business operations of the entity - Assessment of Risk
● Design and perform appropriate tests of controls → The auditor should make an assessment of inherent and
and substantive procedures control risk for material financial report assertions
● Evaluate the results of procedures performed → The effectiveness of the design and operation of a CIS is
dependent on system development and logical access control.
- Knowledge of the Business → The design or operation of a CIS may introduce the
→ The auditor should have or obtain a knowledge of the CIS potential risks not present in similar manual systems. The
environment sufficient to enable the auditor to assess its auditor would consider the process by which computer
potential impact on the identification and understanding of the information is produced
events, transactions, and practices that, in the auditor’s ● For example, automatically generated sales invoices
judgment, may have a significant effect on the financial report from a price matrix and the extent to which this affects
or audit report audit risk
→ Matters the auditor would ordinarily consider in obtaining → As new CIS technologies emerge, sophistication and
this knowledge include: complexity of CIS increase. As a result, they may increase
● The entity’s use of and attitude towards information risk and require further considerations
technology and the effect of this on the nature and → CIS’s facilitate large volumes of information to be
source of system applications. processed without review, based on pre-agreed rules, and
○ (For example the extent to which the entity reporting a small number of exceptions for manual follow-up.
purchases recognized and proven system ● The design of the system therefore becomes
applications or develops systems applications increasingly important to ensure that errors are
in-house or under contract) properly identified by the system.
● Usage of CIS by entity compared with general ● Where exceptions occur, management needs to
usage within the industry and the local environment implement control procedures to ensure that the
within which the entity operates, and information errors are properly investigated. In these
technology trends, including generally available circumstances, the auditor needs to consider, where
information about CIS usage by competitors and appropriate, the effectiveness of the manual follow-up
trading partners procedures implemented by management.
● Recent and planned changes to the entity’s CIS and → The inherent and control risks in a CIS environment may
CIS environment have both a pervasive (inevitable) and an account-specific
○ For example, outsourcing the CIS department, effect on the likelihood of material misstatement:
changing the technical platform and changing ● The risk may result from deficiencies in CIS activities
CIS leadership and business direction that will result in a pervasive effect on ALL application
systems that are processed on the computer. ○ The auditor may change the nature of its audit
(Pervasive) procedure like additional emphasis on analytical
○ Deficiencies in program development, system procedures or perform reperformance of
software support, physical CIS security and calculations
control over access to computer programs will ● Where there are less complex calculations but
affect all the operations run in the computer inherent risk has been assessed as high
system ○ For example: Irregularities resulting to increase in
→ The risks may increase the potential for errors or fraudulent risk of material misstatement-
activities in specific applications, in specific database or ■ the auditor may design audit procedures to
master files, or in specific processing activities. obtain audit evidence regarding access to
(Account-specific effect) critical functions, particularly by users, and
● For example, errors are not uncommon in systems regarding controls which provide for effective
that perform complex logic tasks or calculations, or review and approval.
that must deal with many different exception → Because of the characteristics of a CIS environment, the
conditions. Systems that control cash disbursements nature, timing and extent of audit procedures may differ from
or other liquid assets are more susceptible to those audit procedures conducted in a manual environment.
fraudulent action For example:
→ In making the assessment of inherent and control risks, the ● The nature, timing and extent of audit procedures on
auditor would consider such matters as the extent to which: the performance of computer controls and computer
a. The client develops and operates their own processes can be restricted to cover the key
applications rather than outsourcing and the use of processes. These tests may be performed using test
established industry and financial packages data. Their effectiveness is subject to:
b. Aspects of the entity’s industry or internal ○ conducting audit procedures which provide audit
environment may affect the development and evidence as to the continuing and consistent
application of controls. operation of specific systems throughout the
● For example, competitive pressure to introduce period
EDI may result in the entity using a CIS that is ○ obtaining an understanding regarding the various
not adequately controlled or performing in alternative processes which contribute to the
accordance with specifications process or control being tested and clearly
c. The users have or can grant access to specific defining these
functions or data ○ Assessing the effect of the key processes being
d. Users have the ability to change data and develop affected by other processes or information
reports ● the auditor may use the results of audit procedures
e. CIS controls affect the reliability of all application conducted in prior periods when the auditor has
systems that are processed on the computer. obtained sufficient appropriate audit evidence that no
● Are they applicable to specific applications changes to the CIS environment have been identified
only? → In evaluating the results of audit procedures, Errors
● Are they appropriate to the level of risk identified may have a significant effect on the application or
associated with that application? data used in an application.
f. The nature and extent of documentation regarding ● Thus, the auditor needs to understand the nature of the
the CIS is appropriate given the complexity of CIS error identified and its effect on the nature, timing and
environment , and inherent risks faced by it. extent, and results of audit procedures
g. Factors that affect the quality of audit evidence
available
● For example, a paperless environment, may
increase the potential for audit evidence to be
incomplete, unreliable or difficult to obtain
h. Specific risks associated with a particular CIS
environment are identified
● For example, electronic fund transfer systems
where the risk of irregularities may be increased
or a complex CIS environment where the risk of
error may be higher
i. End-user computing, which refers to any individual
exercising control over and using particular
resource or more particularly a software application
is used to produce financial information, in particular
where this use may more susceptible to
manipulation
j. Users lack the time, discipline or knowledge to
effectively monitor the results of processing
- Audit Procedures
→ The auditor should consider the CIS environment in
designing audit procedures to reduce audit risk to an
acceptably low level
● The application of audit procedures to gather audit
evidence may be influenced by the methods of
computer processing. The auditor can use either
manuals, CAATs or a combination of both to obtain
sufficient appropriate audit evidence. However,
where an entity uses a computer for processing
significant applications, it may be difficult or
impossible for the auditor to obtain certain data for
inspection, confirmation or inquiry without computer
assistance
→ The identification of the nature and operation of controls
will affect audit risk and its components and therefore the
nature, timing and extent of audit procedures. For examples:
● Where there is a complex calculation and
inherent/control risks have been assessed as high:
○ The auditor may perform test of controls to CIS
controls or to controls that were changed due to
CIS
MODULE 2 - INFORMATION SYSTEM
● Image Data- graphic shapes and figures
● Audio Data- human voice or other sounds
- System ● Others – biometric
→ Group of Interrelated components working together to → Criteria of Data resources
achieve a common goal or to perform a task ● Comprehensiveness- means that all the data
about the subject are actually present in the
- Information System database
→ Information System is a set of interrelated components ● Non-redundancy- each individual piece of data
working together to collect, process, store and disseminate exists only once in the database
information to support decision making, coordination, control, ● Appropriate Structure- data are stored in such a
analysis and visualization in an organization way as to minimize the cost of expected
processing and storage
a. Functional Perspective
→ Information system is a technologically implemented 5. Networks- communication media and network support
medium for the purpose of recording, storing and ● Telecommunication networks- internet, intranet,
disseminating linguistic expressions as well as for the extranet, computers, communication processors and
support of inference making. other devices interconnected by communications
→ Users point of view while using the system media and controlled by communications software.
b. Structural Perspective ○ Communication media- twisted pair wire,
→ Information System consists of a collection of people, fiber-optic cable, microwave systems and
processes, data, models, technology and partly communication satellite systems
formalized language, forming a cohesive structure which ○ Network support- includes all of the people,
serves some organizational purpose or function. hardware, software, and data resources that
→ IS are socio-technical which consists of humans, directly support the operation and use of a
behavior rules and conceptual and technical artifacts. communications network
- Three Activities in an IS
- Processing Controls
● Application software has no error
● Some of the input controls also serve as processing
controls: Control Totals, limit and range checks,
reasonableness check, sign check
● Run-to-run control totals- reconciliation of control totals at
various stages of the processing
● Computer logs of transactions processed, production run
logs, and error listings
●
- Application Controls - Output Controls
1. Input Controls- intended to ensure the accuracy and → Objectives: (1) ensure the accuracy and completeness of
completeness of data input procedures and the resulting the output and (2) to properly manage the safekeeping of
data output reports to ascertain that security and confidentiality of
2. Process Controls- intended to ensure the accuracy and the information is maintained.
completeness of processing that occurs in the accounting → Users can notice if the reports are complete and accurate.
applications Any errors must be logged and corrected.
3. Output Controls- intended to help ensure the accuracy, → Output reports containing data that should not fall into the
completeness and security of outputs that result from wrong hands are confidential therefore , an organization must
application processing maintain procedures to protect output from unauthorized
access.
- Input Controls → Guidelines as to how reports are stored and length of time
→ GIGO “ Garbage in, Garbage out” they are to be retained
→ Source Document Controls → Sensitive output should be shredded
a. Form Design → Most of the outputs are stored in the computer, thus
b. Form Authorization and Control authentication controls can help to prevent, detect and control
c. Retention of Source Document the access to it.
→ Standard procedures for data preparation and error
handling - Ethical Issues
● Data Preparation- process of collecting and preparing → Misuse of confidential customer information stored in an IT
source documents system
○ Which form to use, when to use them, how to use → Theft of data, such as credit card information, by hackers
them and where to route them → Employee use of IT system hardware and software for
○ Reduce the chance of lost, misuse, misdirected or personal use or personal gain
incorrect data collection from source documents → Using company email to send offensive, threatening, or
● Error Handling- logged, investigated, corrected and sexually explicit material
resubmitted for processing
→ Programmed edit checked
● Input Validation Check
○ Field Check-examines the field to determine
whether the appropriate type of data was
entered (either number or letter) (not applicable
for both number and letter) (name or date)
○ Validity Check-examines the field to ensure that
the data entry in the field is value compared
with a preexisting list of acceptable values (Civil
Status)
○ Limit Check- check field input against a pre
established limit or limits but only an upper limit
(maximum number of hours, no negative)
○ Range Check- check field input against a pre
established limit to both upper and lower limit
○ Reasonableness Check- compares the value in
a field with those fields to which it is related to
MODULE 4 - SPECIFIC CIS
telecommunications where processing and data
storage occur at two or more than one sites. The
main computer and the decentralized units
ENVIRONMENT communicate via communication links. A more
- Types of CIS Environment integrated connection occurs with cooperative
1. System Configuration processing where the output of its processing is
● Computers, processes and devices that compose the sent to another for completion. The system
system and their boundaries. becomes more complex, where operating
2. Processing Systems systems to both machines are different
● A combination of machines, people, and processes → Source Resources
that for a set of inputs produces a defined set of ● Electronic Data Interchange (EDI)- the transfer of
outputs. electronic data from one organization's computer
system to another’s, the data being structured in a
- System Configuration commonly agreed format so that it is directly
1. Large system computers usable by the receiving organization computer
→ The processing task of multiple users is performed on system. EDI groups who wish to share data
a single centralized computer electronically should have EDI services in order to
→ All inputs more directly from the terminal to central effect the data exchanges. The advantages of EDI
processors and after processing goes back to the users are: paperwork are eliminated, the cost of
from central processors. transaction processing are reduced and reduced
→ All terminals in these systems were called “dumb human involvement reduces error
terminals” as their terminals were not capable of
processing data on their own and casually served only as - Processing System
input or output terminals. 1. Batch Processing
→ These system have become more efficient and → A large volume of homologous transactions are
sophisticated and in many instances dumb terminals have aggregated and processed periodically. Four steps in
given way to intelligent terminals, allowing data batch processing:
processing at local levels ● Occurrence of Transactions- source documents
● Recorded in a Transaction file- a batch of source
2. Stand alone personal computers is periodically transferred to the data entry
→ One that is not connected to or does not communicate operator to extract information from the source
with other computer system document and enter it into the computer format.
→ Computing is done by an individual at a time Once the data entry is done, the records entered
→ All input data and its processing takes place on the are confirmed with the source document. Source
machine itself documents are still stored for future reference
→ Many small business rely on personal computers for all ● Updation of Master file- after data is entered, it is
their accounting functions processed and summarized, the master files are
→ The advantage of stand alone is damage control, when updated
a computer is damaged, other computers will not be ● Generation of output- reports are periodically
affected. generated
→ The disadvantages of stand alone are
● Users are restricted to one computer 2. Online Processing System
● Software can not be installed simultaneously → Processing of individual transactions as they occur
● Harder to monitor from their point of origin as opposed to accumulating
them into batches. This is possible by direct access
3. Network Computing system devices such as magnetic disk and number of terminals
→ A network is a group of interconnected system sharing connected to and controlled by central processors.
services and interacting by shared communication links. Various departments in a company can be connected to
→ All networks have something to share, a transmission the processor by cables. Inquiries are also handled by the
medium and rules for communication. online processing system. Online processing ensures that
→ Networks share hardware and software resources. the records are in a updated status any time but it is
→ Hardware Resources: costly
● Client Server- a server in a network is dedicated
to perform specific tasks to support other 3. Interactive Processing
computers on the network → A continuous dialogue exists between the user and the
● File Server-are network applications that store, computer. It is also called “transaction driven” processing
retrieve, and move data as transactions dealt with completely on an individual
● Database server- it provides a powerful facility to basis through all the relevant processing operations
process data before dealing with the next transaction occur and
● Message Server- they provide a variety of inquiries to be dealt with on an immediate response basis
communication methods which takes the form of
graphics, digitized audio and video 4. Online Real time Processing
● Print Server- manages print services on the → Real time- technique of updating files with transaction
network data immediately after the occurrence of the event.
→ Software Resources → Real time systems are basically on-line systems with
a. Local Area Network (LAN)- computers located in one speciality in inquiry processing.
a small area can be connected through cables. → The response of the system to the to the inquiry itself
One computer acts as the server, it stores the is used to control the activity
program and data file centrally that can be → The response of real time system is one type of
accessed by other computers forming part of the feedback control system
LAN. → The response time would naturally differ from one
b. Wide Area Network (WAN)- networks that employ activity to another
public telecommunications facilities to provide → Real time system usually operates in
users with access to the resources of centrally multiprogramming and multiprocessing which increase
located computers. It uses a public switched both the availability and reliability of the system
telephone network, high speed fiber optic cable, → CPU’s in real time systems should possess the
ratio links or the internet. It uses a modem to capability of “Program Interrupts”. These are temporary
connect computers over telephone lines. Modems stoppage of halts in the execution of a program so that
are used to convert analog signals into digital and more urgent message can be handled on priority
vice versa →https://www.youtube.com/watch?v=2VJLWot9T7Y
→ System Resources
● Distributed Data processing- it consists of 5. Time Sharing
hardware located at least two geographically → It allows access to a CPU and files through many
distinct sites connected electronically by remote terminals.
→ Multiprogramming is the method of implementing time is also updated and the sales control and sales details are
shared operations. also posted as the sales order is processed
→ In transaction processing, time sharing occurs when a → It contains a set of interrelated master files that are
computer processes transactions of more than one entity integrated in order to reduce data redundancy
→https://www.youtube.com/watch?v=YptksG8h8f8 → Software used to control input processing and output is
referred to as DATABASE MANAGEMENT SYSTEM
6. Service Bureau which handles the storage, retrieval, updating and
→ It is a company that processes transactions for other maintenance of the data in the database
entities. → This is commonly associated with online real time
→ It handles computer processing for small companies system and pose the greatest challenge to the auditors
that singly do not have sufficient transactions to justify the → Controls within these systems are harder to test and
acquisition of a computer assess due to danger of file destruction
→ Files may be physically stored on disk in the following
a. Decision Support System way:
→ System that solving provided tools to managers to ● Sequentially records are physically ordered by
assist them in soloing semi-structures and an some fields (employee number)
unstructured problem ● Randomly records are stored at a physical
→ It is not intended to make decisions for manager, address computed by an algorithm working on a
but rather to provide managers with a set of field value
capabilities that enables them to generate information ● Indexed records are physically stored randomly
that is required by them for decision making with a sequentially ordered index field (by
→ It supports the human decision making process customer) and a pointer to the physical location of
rather than providing a means to replace it each record
→ DSS is characterized by: ● Indexed Sequential records are physically stored
● It support semi-structured or unstructured sequentially ordered by some field together with
decision making an index which provides access by some possibly
● It is flexible enough to respond to the other field
changing need of decision makers ● https://www.youtube.com/watch?v=lDpB9zF8LBw
● It is easy to operate
→ Components of DSS:
● Users- represent managers at any given level
of authority in the organization
● Database- contains routine and nonroutine
data from internal and external sources
● Model Base- is the brain of the decision
support system because it performa data
manipulations and computations with the data
provided by the user and database
● https://www.youtube.com/watch?v=siMgr-Pw
XaI
b. Expert System
→ A computerized information system that allows
nonexperts to make decision comparable to that of an
expert
→ Used for complex or ill structured tasks that require
experience and special knowledge in s specific
subject areas
→ Components:
● Knowledge base- includes data, knowledge,
relationship, rules of thumb to and decision
rules used by experts to solve a particular
type of problem. It is the computer equivalent
of all the knowledge and insight that an expert
or a group of experts develop through the
years of experience in their field
● Inference Engine- a program that contains the
logic and reasoning mechanisms that
stimulate the expert system logic process and
deliver advice. It uses data obtained from both
the knowledge base and the user to make
associations and inference, forms its
conclusion and recommends a course of
action
● User interface- programs that allows the user to
design, create, update, use and communicate
with the expert system
● Explanation Facility- facility that provides the
user with an explanation of the logic the expert
system use to arrive
● Knowledge acquisition facility- building a
knowledge base involves both a human expert
and a knowledge engineer. The knowledge
engineer is responsible for extracting an
individual's expertise and using the knowledge
acquisition facility to enter into a knowledge
base
● https://www.youtube.com/watch?v=11nzrNkn9
D8