Pertemuan 8
Chapter 7:
Computer-Assisted Audit
Techniques [CAATs]
IT Auditing & Assurance, 2e, Hall &
Singleton
IT Auditing & Assurance, 2e, Hall & Singleton
CHAPTER REVIEW
CHAPTER 1 Auditing and Internal Control 1
CHAPTER 2 Auditing IT Governance Controls 35
CHAPTER 3 Security Part I: Auditing Operating Systems and Networks
67
CHAPTER 4 Security Part II: Auditing Database Systems 129
CHAPTER 5 Systems Development and Program Change Activities 171
CHAPTER 6 Transaction Processing and Financial Reporting Systems
Overview 223
CHAPTER 7 Computer-Assisted Audit Tools and
Techniques 289
CHAPTER 8 Data Structures and CAATTs for Data Extraction 327
CHAPTER 9 Auditing the Revenue Cycle 393
CHAPTER 10 Auditing the Expenditure Cycle 469
CHAPTER 11 Enterprise Resource Planning Systems 545
CHAPTER 12 Business Ethics, Fraud, and Fraud Detection 585
IT Auditing & Assurance, 2e, Hall &
Singleton
INTRODUCTION TO INPUT CONTROLS
Designed to ensure that the transactions that bring
data into the system are valid, accurate, and
complete
Data input procedures can be either:
Source document-triggered (batch) – human
involvement
Direct input (real-time) - real time editing
IT Auditing & Assurance, 2e, Hall & Singleton
CLASSES OF INPUT CONTROLS
1) Source document controls
2) Data coding controls
3) Batch controls
4) Validation controls
5) Input error correction
6) Generalized data input
systems
IT Auditing & Assurance, 2e, Hall & Singleton
#1-SOURCE DOCUMENT CONTROLS
Controls in systems using physical source
documents
Source document fraud
To control for exposure, control procedures
are needed over source documents to
account for each one
Use pre-numbered source documents
Use source documents in sequence
Periodically audit source documents
IT Auditing & Assurance, 2e, Hall & Singleton
IT Auditing & Assurance, 2e, Hall & Singleton
#2-DATA CODING CONTROLS
Checks on data integrity during processing
Transcription errors
Addition errors, extra digits 12345123455
Truncation errors, digit removed 123451234
Substitution errors, digit replaced 1234512355
Transposition errors
Single transposition: adjacent digits transposed (reversed)
1234521345
Multiple transposition: non-adjacent digits are transposed
1234514325
Control = Check digits
Added to code when created (suffix, prefix,
embedded)
Sum of digits (ones): transcription errors only
Modulus 11: different weights per column: transposition and
transcription errors
Storage andITprocessing inefficiencies
Auditing & Assurance, 2e, Hall & Singleton
#3-BATCH CONTROLS
Method for handling high volumes of
transaction data – esp. paper-fed IS
Controls of batch continues thru all phases of
system and all processes (i.e., not JUST an
input control)
1) All records in the batch are processed together
2) No records are processed more than once
3) An audit trail is maintained from input to output
Requires grouping of similar input transactions
IT Auditing & Assurance, 2e, Hall & Singleton
Batch Processing
IT Auditing & Assurance, 2e, Hall & Singleton
IT Auditing & Assurance, 2e, Hall & Singleton
#3-BATCH CONTROLS (cont’d)
Requires controlling batch throughout
Batch transmittal sheet (batch control record) –
Figure 7-1, p. 302
Unique batch number (serial #)
A batch date
A transaction code
Number of records in the batch
Total dollar value of financial field
Sum of unique non-financial field
• Hash total
• E.g., customer number
Batch control log – Figure 7-3, p 303
Hash totals
IT Auditing & Assurance, 2e, Hall & Singleton
#4-VALIDATION CONTROLS
Field Interrogation
Missing data checks
Numeric-alphabetic data checks
Zero-value checks
Limit checks
Range checks
Validity checks
Check digit
Record Interrogation
Reasonableness checks (logic)
Sign checks (+/- in finance)
Sequence checks
File Interrogation
Internal label checks (tape)
Version checks
Expiration date check
IT Auditing & Assurance, 2e, Hall & Singleton
#5-INPUT ERROR CORRECTION
Batch – correct and resubmit
Controls to make sure errors dealt with
completely and accurately
1) Immediate Correction
2) Create an Error File
Reverse the effects of partially
processed, resubmit corrected records
Reinsert corrected records in
processing stage where error was
detected
3) Reject the Entire Batch
IT Auditing & Assurance, 2e, Hall & Singleton
#6-GENERALIZED DATA INPUT SYSTEMS
(GDIS)
Centralized procedures to manage data input for
all transaction processing systems
Eliminates need to create redundant routines for
each new application
Advantages:
Improves control by having one common
system perform all data validation
Ensures each AIS application applies a
consistent standard of data validation
Improves systems development efficiency
IT Auditing & Assurance, 2e, Hall & Singleton
#6-GDIS (cont’d)
Major components:
1) Generalized Validation Module
2) Validated Data File
3) Error File
4) Error Reports
5) Transaction Log
IT Auditing & Assurance, 2e, Hall & Singleton
CLASSES OF PROCESSING
CONTROLS
1) Run-to-Run Controls
2) Operator Intervention
Controls
3) Audit Trail Controls
IT Auditing & Assurance, 2e, Hall & Singleton
#1-RUN-TO-RUN (BATCH)
Use batch figures to monitor
the batch as it moves from
one process to another
1) Recalculate Control Totals
2) Check Transaction Codes
3) Sequence Checks
IT Auditing & Assurance, 2e, Hall & Singleton
#2-OPERATOR INTERVENTION
When operator manually enters
controls into the system
Preference is to derive by logic
or provided by system
IT Auditing & Assurance, 2e, Hall & Singleton
#3-AUDIT TRAIL CONTROLS
Every transaction becomes traceable from
input to output
Each processing step is documented
Preservation is key to auditability of AIS
Transaction logs
Log of automatic transactions
Listing of automatic transactions
Unique transaction identifiers [s/n]
Error listing
IT Auditing & Assurance, 2e, Hall & Singleton
IT Auditing & Assurance, 2e, Hall & Singleton
OUTPUT CONTROLS
Ensure system output:
1) Not misplaced
2) Not misdirected
3) Not corrupted
4) Privacy policy not violated
Batch systems more susceptible to exposure,
require greater controls
Controlling Batch Systems Output
Many steps from printer to end user
Data control clerk check point
Unacceptable printing should be shredded
Cost/benefit basis for controls
Sensitivity of data drives levels of controls
IT Auditing & Assurance, 2e, Hall & Singleton
OUTPUT CONTROLS (cont’d)
Print Programs
Operator Intervention:
1) Pausing the print program to load output paper
2) Entering parameters needed by the print run
3) Restarting the print run at a prescribed checkpoint
after a printer malfunction
4) Removing printer output from the printer for review
and distribution
Print Program Controls
Production of unauthorized copies
Employ output document controls similar to source
document controls
Unauthorized browsing of sensitive data by
employees
Special multi-part paper that blocks certain fields
IT Auditing & Assurance, 2e, Hall & Singleton
IT Auditing & Assurance, 2e, Hall & Singleton
OUTPUT CONTROLS (cont’d)
Bursting
Supervision
Waste
Proper disposal of aborted copies
and carbon copies
Data control
Data control group – verify and log
Report distribution
Supervision
IT Auditing & Assurance, 2e, Hall & Singleton
OUTPUT CONTROLS (cont’d)
Controlling real-time systems output
Eliminates intermediaries : direct to computer
screen, terminal, or printer
Threats:
Interception
Disruption
Destruction
Corruption
Exposures:
Equipment failure
Subversive acts : intercepts output between
sender & receiver
IT Auditing & Assurance, 2e, Hall & Singleton
TESTING COMPUTER
APPLICATION CONTROLS
1) Black box (around)
2) White box (through)
IT Auditing & Assurance, 2e, Hall & Singleton
TESTING COMPUTER APPLICATION
CONTROLS-BLACK BOX
Ignore internal logic of application
Use functional characteristics
Flowcharts
Interview key personnel
Advantages:
Do not have to remove application from
operations to test it
Appropriately applied:
Simple applications
Relative low level of risk
IT Auditing & Assurance, 2e, Hall & Singleton
TESTING COMPUTER APPLICATION
CONTROLS-WHITE BOX
Relies on in-depth understanding of the
internal logic of the application
Uses small volume of carefully crafted,
custom test transactions to verify specific
aspects of logic and controls
Allows auditors to conduct precise test
with known outcomes, which can be
compared objectively to actual results
IT Auditing & Assurance, 2e, Hall & Singleton
WHITE BOX TEST METHODS
1) Authenticity tests:
Individuals / users
Programmed procedure
Messages to access system (e.g., logons)
All-American University, student lab: logon,
reboot, logon *
2) Accuracy tests:
System only processes data values that
conform to specified tolerances (range tests,
field tests, and limit tests)
3) Completeness tests:
Identify missing data (field, records, files)
IT Auditing & Assurance, 2e, Hall & Singleton
WHITE BOX TEST METHODS
4) Redundancy tests:
Process each record exactly once
5) Audit trail tests:
Ensure application and/or system creates an
adequate audit trail
Transactions listing
Error files or reports for all exceptions
6) Rounding error tests:
“Salami slicing”
Monitor activities – excessive ones are serious
exceptions; e.g, rounding and thousands of
entries into a single account for $1 or 1¢
IT Auditing & Assurance, 2e, Hall & Singleton
COMPUTER AIDED AUDIT TOOLS AND
TECHNIQUES (CAATTs)
1) Test data method
2) Base case system evaluation
3) Tracing
4) Integrated Test Facility [ITF]
5) Parallel simulation
6) GAS
IT Auditing & Assurance, 2e, Hall & Singleton
#1 –TEST DATA
Used to establish the application processing
integrity
Uses a “test deck”
Valid data
Purposefully selected invalid data
Every possible:
Input error
Logical processes
Irregularity
Procedures:
1) Predetermined results and expectations
2) Run test deck
3) Compare
IT Auditing & Assurance, 2e, Hall & Singleton
#2 – BASE CASE SYSTEM
EVALUATION (BCSE)
Variant of Test Data method
Comprehensive test data
Repetitive testing throughout SDLC
When application is modified, subsequent
test (new) results can be compared with
previous results (base)
IT Auditing & Assurance, 2e, Hall & Singleton
#3 – TRACING
Test data technique that takes step-by-step
walk through application
1) The trace option must be enabled for the application
2) Specific data or types of transactions are created as
test data
3) Test data is “traced” through all processing steps of
the application, and a listing is produced of all lines
of code as executed (variables, results, etc.)
Excellent means of debugging a faculty
program
IT Auditing & Assurance, 2e, Hall & Singleton
TEST DATA: ADVANTAGES AND
DISADVANTAGES
Advantages of test data
1) They employ white box approach, thus providing explicit
evidence
2) Can be employed with minimal disruption to operations
3) They require minimal computer expertise on the part of
the auditors
Disadvantages of test data
1) Auditors must rely on IS personnel to obtain a copy of
the application for testing
2) Audit evidence is not entirely independent
3) Provides static picture of application integrity
4) Relatively high cost to implement, auditing inefficiency
IT Auditing & Assurance, 2e, Hall & Singleton
#4 – INTEGRATED TEST FACILITY
ITF is an automated technique that allows
auditors to test logic and controls during normal
operations
Set up a dummy entity within the application
system
1) Set up a dummy entity within the application system
2) System able to discriminate between ITF audit module
transactions and routine transactions
3) Auditor analyzes ITF results against expected results
IT Auditing & Assurance, 2e, Hall & Singleton
#5 – PARALLEL SIMULATION
Auditor writes or obtains a copy of the program
that simulates key features or processes to be
reviewed / tested
1) Auditor gains a thorough understanding of the
application under review
2) Auditor identifies those processes and controls critical
to the application
3) Auditor creates the simulation using program or
Generalized Audit Software (GAS)
4) Auditor runs the simulated program using selected
data and files
5) Auditor evaluates results and reconciles differences
IT Auditing & Assurance, 2e, Hall & Singleton
IT Auditing & Assurance, 2e, Hall & Singleton
Chapter 7:
Computer-Assisted
Audit Techniques
[CAATs]
IT Auditing & Assurance, 2e, Hall &
IT Auditing & Assurance, 2e, Hall &
Singleton
Singleton