SlideShare a Scribd company logo
1 of 151
HAPTER 9 Auditing Computer-Based Information Systems
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],Evaluating Evidence Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning ,[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Communicating Audit Results Evaluating Evidence Collecting Evidence Planning
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
THE NATURE OF AUDITING ,[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INFORMATION SYSTEMS AUDITS ,[object Object],[object Object],[object Object],[object Object],[object Object]
INFORMATION SYSTEMS AUDITS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Files
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
OBJECTIVE 1:  OVERALL SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 1:  OVERALL SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 1:  OVERALL SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 1:  OVERALL SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 1:  OVERALL SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
OBJECTIVE 2:  PROGRAM DEVELOPMENT AND ACQUISITION ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 2:  PROGRAM DEVELOPMENT AND ACQUISITION ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 2:  PROGRAM DEVELOPMENT AND ACQUISITION ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 2:  PROGRAM DEVELOPMENT AND ACQUISITION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 2:  PROGRAM DEVELOPMENT AND ACQUISITION ,[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object]
OBJECTIVE 3:  PROGRAM MODIFICATION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 4:  COMPUTER PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Source Data Output Processing Source Data Data Entry Programs Files
IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Files
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object]
Record Name Employee Weekly Time Report Field Names
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 5:  SOURCE DATA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Files
IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5:  Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4:  Computer Processing Objective 6: Data Files Objective 1:  Overall Security Files
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OBJECTIVE 6:  DATA FILES ,[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
COMPUTER SOFTWARE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OPERATIONAL AUDITS OF AN AIS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OPERATIONAL AUDITS OF AN AIS ,[object Object],[object Object],[object Object],[object Object]
OPERATIONAL AUDITS OF AN AIS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OPERATIONAL AUDITS OF AN AIS ,[object Object],[object Object],[object Object],[object Object]
OPERATIONAL AUDITS OF AN AIS ,[object Object],[object Object]
SUMMARY ,[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Business continuity planning guide
Business continuity planning guideBusiness continuity planning guide
Business continuity planning guideCenapSerdarolu
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)Muhammad Azmy
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditingDamilola Mosaku
 
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...Sreekanth Narendran
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems Jeffrey Paulette
 
Information System Audit and Control
Information System Audit and ControlInformation System Audit and Control
Information System Audit and ControlAsad Raza
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...Habib Ullah Qamar
 
Information System audit
Information System auditInformation System audit
Information System auditPratapchandra
 
Auditing application controls
Auditing application controlsAuditing application controls
Auditing application controlsCenapSerdarolu
 
Data analytics and audit coverage guide
Data analytics and audit coverage guideData analytics and audit coverage guide
Data analytics and audit coverage guideCenapSerdarolu
 
Ethics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom sEthics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom sBabasab Patil
 
Compliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCompliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCorporater
 
Ais Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentAis Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentSharing Slides Training
 
Auditing corporate governance guide
Auditing corporate governance guideAuditing corporate governance guide
Auditing corporate governance guideCenapSerdarolu
 

What's hot (19)

Internal controls in an IT environment
Internal controls in an IT environment Internal controls in an IT environment
Internal controls in an IT environment
 
Business continuity planning guide
Business continuity planning guideBusiness continuity planning guide
Business continuity planning guide
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditing
 
AIS Lecture 1
AIS Lecture 1AIS Lecture 1
AIS Lecture 1
 
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
Information System Audit and Control
Information System Audit and ControlInformation System Audit and Control
Information System Audit and Control
 
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...Lecture 13  oveview of etichs, fraud, and internal control- james a. hall boo...
Lecture 13 oveview of etichs, fraud, and internal control- james a. hall boo...
 
3c 2 Information Systems Audit
3c   2   Information Systems Audit3c   2   Information Systems Audit
3c 2 Information Systems Audit
 
Information System audit
Information System auditInformation System audit
Information System audit
 
Auditing application controls
Auditing application controlsAuditing application controls
Auditing application controls
 
Simplifying IT GRC
Simplifying IT GRCSimplifying IT GRC
Simplifying IT GRC
 
Data analytics and audit coverage guide
Data analytics and audit coverage guideData analytics and audit coverage guide
Data analytics and audit coverage guide
 
Ethics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom sEthics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom s
 
Compliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCompliance Management | Compliance Solutions
Compliance Management | Compliance Solutions
 
Fix nix, inc
Fix nix, incFix nix, inc
Fix nix, inc
 
Ais Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems DevelopmentAis Romney 2006 Slides 18 Introduction To Systems Development
Ais Romney 2006 Slides 18 Introduction To Systems Development
 
Auditing corporate governance guide
Auditing corporate governance guideAuditing corporate governance guide
Auditing corporate governance guide
 

Viewers also liked

Chapter 4 : Security Part II Auditing Database System
Chapter 4 : Security Part II Auditing Database SystemChapter 4 : Security Part II Auditing Database System
Chapter 4 : Security Part II Auditing Database Systemrefidelia19
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overviewelvinchan
 
Computer system administrator
Computer system administratorComputer system administrator
Computer system administratorTheZayne92
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network servicesUc Man
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administrationKhang-Ling Loh
 
Duties of a system administrator
Duties of a system administratorDuties of a system administrator
Duties of a system administratorKhang-Ling Loh
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsEd Tobias
 
13 Learning and Development Quotes to Spark Inspiration
13 Learning and Development Quotes to Spark Inspiration13 Learning and Development Quotes to Spark Inspiration
13 Learning and Development Quotes to Spark InspirationAllenComm
 
Audit Checklist for Information Systems
Audit Checklist for Information SystemsAudit Checklist for Information Systems
Audit Checklist for Information SystemsAhmad Tariq Bhatti
 
9 Learning Strategies from Knowledge to Know-How
9 Learning Strategies from Knowledge to Know-How9 Learning Strategies from Knowledge to Know-How
9 Learning Strategies from Knowledge to Know-HowLinkedIn Learning Solutions
 

Viewers also liked (13)

ISO Diagram
ISO DiagramISO Diagram
ISO Diagram
 
Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...
Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...
Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...
 
Sop 7
Sop 7Sop 7
Sop 7
 
Chapter 4 : Security Part II Auditing Database System
Chapter 4 : Security Part II Auditing Database SystemChapter 4 : Security Part II Auditing Database System
Chapter 4 : Security Part II Auditing Database System
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overview
 
Computer system administrator
Computer system administratorComputer system administrator
Computer system administrator
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
 
Duties of a system administrator
Duties of a system administratorDuties of a system administrator
Duties of a system administrator
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
13 Learning and Development Quotes to Spark Inspiration
13 Learning and Development Quotes to Spark Inspiration13 Learning and Development Quotes to Spark Inspiration
13 Learning and Development Quotes to Spark Inspiration
 
Audit Checklist for Information Systems
Audit Checklist for Information SystemsAudit Checklist for Information Systems
Audit Checklist for Information Systems
 
9 Learning Strategies from Knowledge to Know-How
9 Learning Strategies from Knowledge to Know-How9 Learning Strategies from Knowledge to Know-How
9 Learning Strategies from Knowledge to Know-How
 

Similar to Ais Romney 2006 Slides 09 Auditing Computer Based Is

Audits and Regulatory Compliance
Audits and Regulatory ComplianceAudits and Regulatory Compliance
Audits and Regulatory Compliancesomeshwar mankar
 
Kontrol & Audit Sistem Informasi
Kontrol & Audit Sistem InformasiKontrol & Audit Sistem Informasi
Kontrol & Audit Sistem Informasidwiki apsyarin
 
AUDIT - AUDITING STRATEGIES.pptx
AUDIT - AUDITING STRATEGIES.pptxAUDIT - AUDITING STRATEGIES.pptx
AUDIT - AUDITING STRATEGIES.pptxMohamed Fazil M
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal controlTommy Zul Hidayat
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal controljayussuryawan
 
24201843 studdy-note-8
24201843 studdy-note-824201843 studdy-note-8
24201843 studdy-note-8Akash Saxena
 
SEATA by TOMMY SEAH
SEATA by TOMMY SEAHSEATA by TOMMY SEAH
SEATA by TOMMY SEAHTommy Seah
 
auditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdfauditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdfowaissayyed0041
 
.POINTS TO REMEMBER ADVANCED AUDITING.pdf
.POINTS TO REMEMBER ADVANCED AUDITING.pdf.POINTS TO REMEMBER ADVANCED AUDITING.pdf
.POINTS TO REMEMBER ADVANCED AUDITING.pdfGauri More
 
Internal control.. control env
Internal control.. control envInternal control.. control env
Internal control.. control envPhillys Sebastiane
 
2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College SectorNikhat Rasheed
 
Internal control and Control Self Assessment
Internal control and Control Self AssessmentInternal control and Control Self Assessment
Internal control and Control Self AssessmentManoj Agarwal
 
Tugas mandiri audit novita dewi 11353202277
Tugas mandiri audit  novita dewi 11353202277Tugas mandiri audit  novita dewi 11353202277
Tugas mandiri audit novita dewi 11353202277novita dewi
 

Similar to Ais Romney 2006 Slides 09 Auditing Computer Based Is (20)

Audits and Regulatory Compliance
Audits and Regulatory ComplianceAudits and Regulatory Compliance
Audits and Regulatory Compliance
 
Kontrol & Audit Sistem Informasi
Kontrol & Audit Sistem InformasiKontrol & Audit Sistem Informasi
Kontrol & Audit Sistem Informasi
 
AUDIT - AUDITING STRATEGIES.pptx
AUDIT - AUDITING STRATEGIES.pptxAUDIT - AUDITING STRATEGIES.pptx
AUDIT - AUDITING STRATEGIES.pptx
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal control
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal control
 
Audit process
Audit processAudit process
Audit process
 
24201843 studdy-note-8
24201843 studdy-note-824201843 studdy-note-8
24201843 studdy-note-8
 
SEATA by TOMMY SEAH
SEATA by TOMMY SEAHSEATA by TOMMY SEAH
SEATA by TOMMY SEAH
 
Auditing concept
Auditing conceptAuditing concept
Auditing concept
 
auditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdfauditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdf
 
Audit presentation
Audit presentationAudit presentation
Audit presentation
 
.POINTS TO REMEMBER ADVANCED AUDITING.pdf
.POINTS TO REMEMBER ADVANCED AUDITING.pdf.POINTS TO REMEMBER ADVANCED AUDITING.pdf
.POINTS TO REMEMBER ADVANCED AUDITING.pdf
 
Internal control.. control env
Internal control.. control envInternal control.. control env
Internal control.. control env
 
01 Auditing CH 1.ppt
01 Auditing CH 1.ppt01 Auditing CH 1.ppt
01 Auditing CH 1.ppt
 
Operational Auditing
Operational AuditingOperational Auditing
Operational Auditing
 
2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector
 
Internal control and Control Self Assessment
Internal control and Control Self AssessmentInternal control and Control Self Assessment
Internal control and Control Self Assessment
 
Database auditing models
 Database auditing models  Database auditing models
Database auditing models
 
Internal audit
Internal auditInternal audit
Internal audit
 
Tugas mandiri audit novita dewi 11353202277
Tugas mandiri audit  novita dewi 11353202277Tugas mandiri audit  novita dewi 11353202277
Tugas mandiri audit novita dewi 11353202277
 

More from Sharing Slides Training

Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesSharing Slides Training
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesSharing Slides Training
 
Ais Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In ReaAis Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In ReaSharing Slides Training
 
Ais Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An ReaAis Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An ReaSharing Slides Training
 
Ais Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The ReaAis Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The ReaSharing Slides Training
 
Ais Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting SystemAis Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting SystemSharing Slides Training
 
Ais Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production CycleAis Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production CycleSharing Slides Training
 
Ais Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure CycleAis Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure CycleSharing Slides Training
 
Ais Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue CycleAis Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue CycleSharing Slides Training
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseSharing Slides Training
 

More from Sharing Slides Training (12)

Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 
Ais Romney 2006 Slides 20 System Design
Ais Romney 2006 Slides 20 System DesignAis Romney 2006 Slides 20 System Design
Ais Romney 2006 Slides 20 System Design
 
Ais Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In ReaAis Romney 2006 Slides 17 Special Topics In Rea
Ais Romney 2006 Slides 17 Special Topics In Rea
 
Ais Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An ReaAis Romney 2006 Slides 16 Implementing An Rea
Ais Romney 2006 Slides 16 Implementing An Rea
 
Ais Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The ReaAis Romney 2006 Slides 15 Database Design Using The Rea
Ais Romney 2006 Slides 15 Database Design Using The Rea
 
Ais Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting SystemAis Romney 2006 Slides 14 General Ledger And Reporting System
Ais Romney 2006 Slides 14 General Ledger And Reporting System
 
Ais Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production CycleAis Romney 2006 Slides 12 The Production Cycle
Ais Romney 2006 Slides 12 The Production Cycle
 
Ais Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure CycleAis Romney 2006 Slides 11 The Expenditure Cycle
Ais Romney 2006 Slides 11 The Expenditure Cycle
 
Ais Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue CycleAis Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue Cycle
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Ais Romney 2006 Slides 01 Overview
Ais Romney 2006 Slides 01 OverviewAis Romney 2006 Slides 01 Overview
Ais Romney 2006 Slides 01 Overview
 

Recently uploaded

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 

Recently uploaded (20)

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 

Ais Romney 2006 Slides 09 Auditing Computer Based Is

  • 1. HAPTER 9 Auditing Computer-Based Information Systems
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49. IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Files
  • 50. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 57. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 64. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 74. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109. IS COMPONENTS AND AUDIT OBJECTIVES Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Source Data Output Processing Source Data Data Entry Programs Files
  • 110. IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Files
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 117. Record Name Employee Weekly Time Report Field Names
  • 118.
  • 119.
  • 120.
  • 121.
  • 122. IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Files
  • 123. IS COMPONENTS AND AUDIT OBJECTIVES Source Data Output Processing Source Data Data Entry Programs Objective 5: Source Data Objective 2: Program Development And Acquisition Objective 3: Program Modification Objective 4: Computer Processing Objective 6: Data Files Objective 1: Overall Security Files
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136.
  • 137.
  • 138.
  • 139.
  • 140.
  • 141.
  • 142.
  • 143.
  • 144.
  • 145.
  • 146.
  • 147.
  • 148.
  • 149.
  • 150.
  • 151.