56
Chapter 14-1

Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Embed Size (px)

Citation preview

Page 1: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-1

Page 2: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-2

Chapter 14:Information Technology

Auditing

Introduction

The Audit Function

The IT Auditor’s Toolkit

Auditing Computerized AIS

IT Auditing Today

Page 3: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-3

Introduction

Audits of AISs Ensure controls are functioning properly Confirm additional controls not necessary

Nature of Auditing Internal and external auditing IT Audit and financial audit Tools of an IT auditor

Page 4: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-4

The Audit Function

Internal versus External Auditing

Information Technology Auditing

Evaluating the Effectiveness of Information Systems Controls

Page 5: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-5

Internal Auditing

Responsibility of Performance Company’s own employees External of the department being audited

Audit Purpose Employee compliance with policies and procedures Development and evaluation of internal controls

Page 6: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-6

External Auditing

Responsibility of Performance Those outside the organization Accountants working for independent CPA

Audit Purpose Performance of the attest function Evaluate the accuracy and fairness of the financial

statements relative to GAAP

Page 7: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-7

Information Technology Auditing

Function Evaluate computer’s role in achieving audit and

control objectives

Assurance Provided Data and information are reliable, confidential,

secure, and available Safeguarding assets, data integrity, and

operational effectiveness

Page 8: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-8

The Componentsof an IT Audit

Page 9: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-9

The IT Audit Process

Computer-Assisted Audit Techniques (CAAT) Use of computer processes to perform audit

functions Performing substantive tests

Approaches Auditing through the computer Auditing with the computer

Page 10: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-10

The IT Audit Process

Page 11: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-11

Careers in IT Auditing

Background Accounting skills Information systems or computer science skills

Certified Information System Auditor (CISA) Successfully complete examination Experience requirements Comply with Code of Professional Ethics Continuing professional education Comply with standards

Page 12: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-12

CISA Exam Components

Page 13: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-13

Careers in IT Auditing

Certified Information Security Manager (CISM) Business orientation Understand risk management and security

CISM Knowledge Information security governance Information security program management Risk management Information security management Response management

Page 14: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-14

Evaluating the Effectiveness of

Information Systems Controls

Impact on Substantive Testing Strong controls, less substantive testing Weak controls, more substantive testing

Risk Assessment Evaluate the risks associated with control

weaknesses Make recommendations to improve controls

Page 15: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-15

Risk Assessment

Risk-Based Audit Approach Determine the threats Identify the control procedures needed Evaluate the current control procedures Evaluate the weaknesses within the AIS

Benefits Understanding of errors and irregularities Sound basis for recommendations

Page 16: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-16

Information Systems Risk Assessment

Method of evaluating desirability of IT controls

Types of Risks Loss of company secrets Unauthorized manipulation of company files Interrupted computer access

Penetration Testing

Page 17: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-17

Guidance is Designing and Evaluating IT Controls

Systems Auditability and Control Report (SAC)

Electronic Systems Assurance and Control (eSAC) Framework for evaluating e-business controls

Control Objectives for Information and Related Technology (COBIT)

Page 18: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-18

An IT auditor:

A.Must be an external auditor

B.Must be an internal auditor

C.Can be either an internal or external auditor

D.Must be a Certified Public Accountant

Study Break #1

Page 19: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-19

An IT auditor:

A.Must be an external auditor

B.Must be an internal auditor

C.Can be either an internal or external auditor

D.Must be a Certified Public Accountant

Study Break #1 - Answer

Page 20: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-20

In determining the scope of an IT audit, the auditor should pay most attention to:

A.Threats and risks

B.The cost of the audit

C.What the IT manager asks to be evaluated

D.Listings of standard control procedures

Study Break #2

Page 21: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-21

In determining the scope of an IT audit, the auditor should pay most attention to:

A.Threats and risks

B.The cost of the audit

C.What the IT manager asks to be evaluated

D.Listings of standard control procedures

Study Break #2 - Answer

Page 22: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-22

The IT Auditor’s Toolkit

Utilization of CAATs Auditing with the computer Manual access to data stored on computers is

impossible

Tools Auditing Software People Skills

Page 23: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-23

General-Use Software

Productivity tools that improve the auditor’s work

Types Word processing programs Spreadsheet software Database management systems (DBMS) Structured Query Language (SQL)

Page 24: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-24

Generalized Audit Software

Overview Allow for reviewing of files without rewriting

processing programs Basic data manipulation Tailored to auditor tasks

Common Programs Audit Command Language (ACL) Interactive Data Extraction and Analysis (IDEA)

Page 25: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-25

Generalized Audit Software - Inventory

Page 26: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-26

Automated Workpaper Software

Overview Similar to general ledger software Handles accounts from many organizations

Features Generate trial balances Make adjusting entries Perform consolidations Conduct analytical procedures

Page 27: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-27

People Skills

Examples Working as a team Interact with clients and other auditors Interviewing clients

Importance of Interviews Gain understanding of organization Evaluate internal controls

Page 28: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-28

Auditing Computerized AISs

Auditing Around the Computer Assumes accurate output verifies proper

processing Not effective in a computerized environment

Auditing Through the Computer Follows audit trail through the computer Verifies proper functioning of processing controls

in AIS programs

Page 29: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-29

Auditing Computerized AISs

Testing Computer Programs

Validating Computer Programs

Review of Systems Software

Validating Users and Access Privileges

Continuous Auditing

Page 30: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-30

Testing Computer Programs

Test Data Create set of transactions Covering range of exception situations Compare results and investigate further

Integrated Test Facility Establish a fictitious entity Enter transactions for that entity Observe how they are processed

Page 31: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-31

Testing Computer Programs

Parallel Simulation Utilized live input data Simulates all or some of the operations Compare results Very time-consuming and cost-prohibitive

Page 32: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-32

Edit Tests and Test Data

Page 33: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-33

Validating Computer Programs

Tests of Program Change Controls Protect against unauthorized program changes Documentation of requests for program changes Utilize special forms for authorization

Program Comparison Test of Length Comparison Program

Page 34: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-34

Reviewing a Responsibility System

Page 35: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-35

Review of Systems Software

Systems Software Controls Operating system software Utility programs Program library software Access control software

Inspect Outputs Logs Incident reports

Page 36: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-36

Password Parameters

Page 37: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-37

Validating Users and Access Privileges

Purpose Ensure all system users are valid Appropriate access privileges

Utilize Software Tools Examine login times Exception conditions Irregularities

Page 38: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-38

Continuous Auditing

Embedded Audit Modules (Audit Hooks) Capture data for audit purposes

Exception Reporting Transactions falling outside given parameters are

rejected

Transaction Tagging Certain transactions tagged and progress recorded

Page 39: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-39

Continuous Auditing

Snapshot Technique Examines how transactions are processed

Continuous and Intermittent Simulation (CIS) Embeds audit module in a database management

system (DBMS) Similar to parallel simulation

Page 40: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-40

Continuous Auditing – Spreadsheet Errors

Page 41: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-41

Which of the following is NOT an audit technique for auditing computerized AIS?

A.Parallel simulation

B.Use of specialized control software

C.Continuous auditing

D.All of the above are techniques used to audit computerized AIS

Study Break #3

Page 42: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-42

Which of the following is NOT an audit technique for auditing computerized AIS?

A.Parallel simulation

B.Use of specialized control software

C.Continuous auditing

D.All of the above are techniques used to audit computerized AIS

Study Break #3 - Answer

Page 43: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-43

Continuous auditing:

A.Has been talked about for years but will never catch on

B.Will likely become popular if organizations adopt XBRL in their financial reporting

C.Does not include techniques such as embedded audit modules

D.Will never allow IT auditors to provide some types of assurance on a real-time basis

Study Break #4

Page 44: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-44

Continuous auditing:

A.Has been talked about for years but will never catch on

B.Will likely become popular if organizations adopt XBRL in their financial reporting

C.Does not include techniques such as embedded audit modules

D.Will never allow IT auditors to provide some types of assurance on a real-time basis

Study Break #4 - Answer

Page 45: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-45

IT Auditing Today

IT Governance

Auditing for Fraud: Statement on Auditing Standards No. 99

The Sarbanes-Oxley Act of 2002

Third Party and Information Systems Reliability Assurances

Page 46: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-46

IT Governance

Overview Process of using IT resources effectively Efficient, responsible, strategic use of IT

Objectives Using IT strategically to fulfill mission of

organization Ensure effective management of IT

Page 47: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-47

Auditing for Fraud: Statement on Auditing

Standard No. 99

Overview Supersedes SAS No. 82 Provides more guidance to prevent and deter fraud

Fraud Triangle Motive for committing fraud Opportunity that allows fraud to occur Rationalization by individual

Page 48: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-48

Fraud Triangle

Page 49: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-49

The Sarbanes-Oxley Act of 2002

Overview Limits services that auditors can provide clients while

they are conducting audits

Groups of Compliance Requirements Audit committee/corporate governance requirements Certification, disclosure, and internal control Financial statement reporting rules Executive reporting and conduct

Page 50: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-50

The Sarbanes-Oxley Act of 2002

Section 302 CEOs and CFOs are required to certify the

financial statements Internal controls and disclosures are adequate

Section 404 CEOs and CFOs assess and attest to the

effectiveness of internal controls

Page 51: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-51

Key Provisions of SOX

Page 52: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-52

Key Provisions of SOX

Page 53: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-53

Third Party and Information Systems Reliability

Assurances

Growth of Electronic Commerce Area of growing risk Security and privacy concerns Difficult to audit

AICPA Trust Services CPA WebTrust SysTrust

Page 54: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-54

Third Party and Information Systems Reliability

Assurances

Principles of Trust Services Security Availability Processing integrity Online privacy Confidentiality

Page 55: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-55

Copyright

Copyright 2010 John Wiley & Sons, Inc. All rights reserved.

Reproduction or translation of this work beyond that permitted in

Section 117 of the 1976 United States Copyright Act without the

express written permission of the copyright owner is unlawful.

Request for further information should be addressed to the

Permissions Department, John Wiley & Sons, Inc. The purchasermay make backup copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

Page 56: Chapter 14-1. Chapter 14-2 Chapter 14: Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing Computerized

Chapter 14-56

Chapter 14