Auditing in A Computerized Environment
Auditing in A Computerized Environment
ENVIRONMENT
REPORTERS
Shem
Claire
Ireen
INTRO
Vulnerability of
Systems Generated
data and program
Transactions
storage media
General and
Application controls.
GENERAL CONTROLS
Systems Computer
Development Other Functions
Operations
Data Entry Operator Prepares and verifies input data for processing
Control Group Reviews all input procedures, monitors processing, follows-up data processing
errors the reasonableness of output, and distributes on authorized personnel.
GENERAL CONTROLS - SYSTEMS DEVELOPMENT AND
DOCUMENTATION CONTROLS
A large number of errors in a computer system are caused by inaccurate or incomplete data entry.
Input controls are designed to provide reasonable assurance that data submitted for processing are
complete, properly authorized, and accurately translated into machine readable form.
Examples of input controls include:
Key verification
This requires data to be entered twice (usually by different operators) to provide assurance that there
are no key entry errors committed
Field check
This ensures that the input data agree with the required field format. For example, all SSS number
must contain ten digits. An input of an employee's SSS number with more or less than ten digits will
be rejected by the computer.
Validity check
Information entered are compared with valid information in the master file to determine the authenticity of
the input. For example, the employees' master file may contain two valid codes to indicate the employee's
gender "1" for male and "2" for female. A code of "3" is considered invalid and will be rejected by the
computer.
Self-checking digit
This is a mathematically calculated digit which is usually added to a document number to detect common
transpositional errors in data submitted for processing.
Limit check
Limit check or reasonable check is designed to ensure that data submitted for processing do not exceed a
pre-determined limit or a reasonable amount.
Control totals
These are totals computed based on the data submitted for processing. Control totals ensure the
completeness of data before and after they are processed. These controls include financial totals, hash
totals, and record counts.
Processing controls are designed to
provide reasonable assurance that
APPLICATION input data are processed accurately,
CONTROLS - and that are not lost, added, excluded,
CONTROLS duplicated or improperly changed.
OVER Almost all of the input controls that
were mentioned earlier are also part
PROCESSING of the processing controls because
controls are usually incorporated in
the client's comp program to detect
errors in processing of transactions.
APPLICATION CONTROLS - CONTROLS OVER OUTPUT
1. Test data
The test data technique is primarily designed to test the effectiveness of the internal control
procedures which are incorporated in the client's computer program. The objective of the test
data technique is to determine whether the client's computer programs can correctly handle
valid and invalid conditions as they arise.
To accomplish this objective, the auditor prepares test data (fictitious transactions) that consist
of valid and invalid conditions. The auditor enters the test data into the system and have the
data processed by the entity's computer program. Because the auditor is the one who creates
the test data, the auditor knows what the output should look like, assuming the client's computer
program is functioning effectively. The auditor then compares the processing results with his
predetermined output. If the output generated by the client's program is the same as the
auditor's expected output, the auditor may conclude that the client's program is reliable.
TEST DATA
Auditor’s Test
Data
Proceed using
Client’s
Program
Auditor’s
Compare
Output Expected
Manually
Output
COMPUTER ASSISTED AUDIT TECHNIQUES (CAATS)
Proceed Using
Client’s Program
Auditor’s Expected
Output Compare Manually
Output
COMPUTER ASSISTED AUDIT TECHNIQUES (CAATS)
3. Parallel simulation
In contrast to the test data and ITF techniques, which require the auditor to
create test inputs (data) and process these data using the client's computer
program; parallel simulation requires the auditor to write a program that
simulates key features or processes of the program under review. The simulated
program is then used to reprocess transactions that were previously processed
by the client's program.
PARALLEL SIMULATION
Client’s Data
Client’s Data
Proceed Using
Proceed Using Auditor’s
Client’s Program Program
Compare
Output Output
Manually
OTHER CAATS
1. Snapshots
This technique involves taking a picture of a transaction as it flows through the computer
systems. Audit software routines are embedded at different points in the processing logic
to capture the images of the transaction as it progresses through the various stages of
processing. Such a technique allows an auditor to track data and evaluate the computer
processes applied to the data.
2. Systems control audit review files (SCARF)
This involves embedding audit software modules within an application system to provide
continuous monitoring of the systems transactions. The information is collected into a
special computer file that the auditor can examine.
THANK YOU