Auditing in An IT Environment
Auditing in An IT Environment
ENVIRONMENT
AUDITING IN A COMPUTERIZED
ENVIRONMENT
• With the rapid development in technology in recent years, computer information systems have become
feasible, perhaps essential, for use even in small scale business operations.
• Regardless of the extent of computerization or the methods of data processing being used, the
responsibility for the establishment and implementation of appropriate internal controls rests with the
management and those charged with governance.
• The auditor’s responsibility is to obtain an understanding of the entity’s internal control system to be
able to assess control risk and determine the nature, timing and extend of tests to be performed.
CHARACTERISTICS OF COMPUTERIZED
INFORMATION SYSTEMS
• General Controls
• Control policies and procedures that relate to the overall computer information system.
• Application Controls
• Policies and procedures that relate to specific use of the system.
GENERAL CONTROLS
• Organizational controls
• A written plan of the organization, with clear assignment of authority and responsibility.
• Includes segregation of duties between the CIS department and the user department, and segregation of duties within the CIS
department.
• Systems development and documentation controls
• Software development, as well as changes thereof, must be approved by the appropriate level of management and the user department.
• Access controls
• Adequate security controls to protect equipment, files and programs (i.e. using passwords).
• Data recovery controls
• Provides for the maintenance of back up files and off-site storage procedures.
• Monitoring controls
• Designed to ensure that CIS controls are working effectively as planned.
APPLICATION CONTROLS
• Involves evaluating the client’s internal control policies and procedures to determine if they are
functioning as intended.
• The auditor may either: audit around the computer or use Computer-Assisted Audit Techniques.
AUDITING AROUND THE COMPUTER
• The auditor ignores the client’s data processing procedures, focusing solely on the input documents and
the CIS output.
• This can be used only if there are visible input documents and detailed output that will enable the
auditor to trace individual transactions back and forth.
• Also known as the black box approach.
COMPUTER ASSISTED AUDIT TECHNIQUES
• These are computer programs and data which the auditor uses as part of the audit procedures to
process data of audit significance contained in an entity’s information systems.
• Also known as the white box approach.
• This includes:
• Test data
• Integrated test facilities
• Parallel simulation
TEST DATA
• Primarily designed to test the effectiveness of the internal control procedures which are incorporated in
the client’s computer programs.
• The auditor prepares test data (fictitious transactions) that consists of valid and invalid conditions. The
auditor enters the test data into the system and have the data processed by the client’s computer
programs.
• The auditor then compares the processing results with his predetermined output. If the output
generated by the client’s program is the same as the auditor’s expected output, the auditor may
conclude that the clients program is reliable.
INTEGRATED TEST FACILITY
• When using the ITF, the auditor creates a dummy or fictitious employee or other appropriate unit for
testing within the entity’s computer system.
• The ITF integrates the processing of test data with the actual processing of ordinary transactions
without management being aware of the testing process. The resultant output, relating to the dummy
unit, is then compared with the predetermined results to evaluate the reliability of the client’s program.
• Unlike test data, ITF provides assurance that the program tested by the auditor is the same program
used by the client in the processing of transactions.
PARALLEL SIMULATION
• This requires the auditor to write a program that simulates key features or processes of the program
under review.
• The simulated program is then used to reprocess transactions that were previously processed by the
client’s programs. The auditor compares the results obtained from the simulation with the client’s
output to be able to draw conclusion about the reliability or the client’s program.
OTHER COMPUTER ASSISTED AUDIT
TECHINIQUES
• Snapshots
• This involves the use of audit software routines to take a picture of a transaction as it flows through computer
systems. This permits the auditor to track data and evaluate the computer processes applied to the data.
• System control audit review files (SCARF)
• This involves embedding audit software modules within an application system to provide continuous
monitoring of the systems transactions. The information is collected into a special computer file that the auditor
can examine.