SlideShare a Scribd company logo
1 of 19
CHAPTER 6
AUDITING IN COMPUTERISED
INFORMATION SYSTEM
ENVIROMENT
4.1 Understand The Basic Approach To
Computerised Information System
(CIS)
4.1.1 Changing Information Of Technology
And its Implication for Auditing
• People are constanly looking for online activities and
expect faster delivery.In accounting well as auditing,IT
plays a vital role in producing reliable and timely
financial statements and reports.
• Most companies use IT to improve company internal
control system through the addition of new control
procedure through computer and replacing the manual
control due to the likelihood of possible human error.
Electronic Data Processing (EDP)
Reporting
Business
Transacti
on
Electronic Data Processing (EDP)
Source Document:
•invoice
•revenue receipt
•payment voucher
•cheque
The Basis Financial Reporting:
•SOFP
•Profit and Loss Account
•Statement of Cash Flow
•Statement of Charge In Equity
Advantages and Disadvantages of
Using IT Systems
Advantages Disadvantages
Easier to have instant data
processing compared to
manual data processing
The use of electronic data
processing have resulted in
decreased vacancles for job
searchers ike accountant
more accurate and affective
time of transaction
high cost for companies as
effective electronic data
processing software tents to
be expensive
increase performance
especially in manucfacturing
industriesand related
industries due to improved
the incentory automated
system
additional cost fir support and
backup systems in the events
of power failure
Implication
From manual control to electronic enviroment:
Traditional paperwork in which the auditor can see and feel the
printed marks evidencing transaction are carried out online and most
cases in 'real time'
Generally looks for the authorizing signature on the papers
evidencing the transaction and electronic
It processing enviroment such authority is evidence by the user of
identification codes and passwords which are all physically invisible
The level of complexity can be classified into 2 level that is low and
high
4.1.2 Determine the Level of Complexity in
Computerized Information System
1. EPD system can be defined by their technical complecity and the
extent to which they are used in an organization
2. Technical complexity:
•Online-line processing
•All online system allows direct acces into the computer.
Transactions can be put directly into the system so that master files
are update all the time the entry is made
 Communication systems
• Communication channels can connect the computer
directly to users anywhere in the world.
 Distributed processing
• When the computing function is apportioned among
CPUs spread geographically and connected by a
communication system.
 Data base Management
• As the volume and users of computer-processed data
expand, data on different files are often redundant.
4.1.3 General Control CIS
Control Description
The IT control environment • The IT government structure .
• How IT risk are identified, miligated
and managed
• The information system, strategic
plan and budget.
• The organizational structure and
segregation of duties.
Day-to-day computer operation • Acquisition,installation,configuration,i
ntergration and maintanence of the IT
infrastucture.
• Delivery of information services to
user.
• Management of third-party provider
Access to program and data • Security of password
• Internet firewalls and remote
access controls
• Data encryption and cryptografic
keys
Program development and program
changes
• Acquisition and implementation of
new applications
• system development and quality
assurance methodology
Monitoring of IT opertions • Policies and procedures regarding
the information system and
reporting that ensure that user
comply with IT general control.
Application Control On CIS
1. Application control is controls within a computer
application to ensure-completeness, accuracy of
input,processing and validity of the resulting
accounting entries.
2. The main aim is to ensure validity,completeness and
accuracy of accounting data.
3. Application control classified into:
- inputs control
-processing controls
-output controls
An application may be considered be complex when:
a)The volume of transaction is such that users would find
it difficult to identify and correct error processing.
b)The computer automatically generate material
transactions or entries directly to another application
c)The computer perform complicated compulations of
financial information and automatically generates
material transactions.
Application Control On CIS
1. Application control is controls within a computer application to
ensure-completeness, accuracy of input, processing and validity of
the resulting accounting entries.
2. The main aim is to ensure Validity completeness and accuracy of
accounting data.
3. Application controls classified into :
a) Input Controls
b) Processing Controls
c) Output Controls
 Input controls
- The main aim of input controls is to reduce errors in the data
entered in the system for processing.Input controls include
checking and ensuring that:
- Input data are authorized by the appropriate official.
- Data represent valid record of actual transaction.
- Correctly classitied for the purpose of accounting.
-Example:
- Sequence checks
- Batch control
 Processing controls
- There are dividen into mechanical and programmed
controls
- Programmed control are done during the system
development to ensure that only data related to a
particular transaction is processed and not
otherwise.
 Output controls
- Control relating to input and processing itself with the final
objective.
- Relates precisely to the original input.
- Represent the outcome of a valid and tested program of
instructions.
4.1.4 The Plan An Audit Strategic
1. Ensure that these is adequate compliance and
substantive procedures and transmitted data are
correct and completed.
2. Apply professional scepticism by cross verification of
record, reconciliation between primary and subsidlary
ledger, questioning and critical assesment of audit
evidencee.
3. The audit which may be affected by the client CIS
environment.
Example Of Auditing And Through The
Computer
Internal Control Auditing Around The
Computer Approach
Auditing Through The
Computer Approach
1. Credit is approved for
sales on account
Select a sample of
sales transaction from
the journal and obtain
the related customer
sales order.
Obtain a copy of the
client sales applications
program and related
credit limit master file.
2. Payroll is processed
only
Select a sample of
payroll disbursements
from the payroll journal.
Create a test data file of
valid and invalid
employee ID number.
The Posts In IT Department

More Related Content

What's hot

IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubKaushal Trivedi
 
Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1Yasir Khan
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1Cheng Olayvar
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2 Jayant Dalvi
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPsJayesh Daga
 
Security and Audit Report Sign-Off—Made Easy
Security and Audit Report Sign-Off—Made EasySecurity and Audit Report Sign-Off—Made Easy
Security and Audit Report Sign-Off—Made EasyHelpSystems
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networksjayussuryawan
 
Information systems audit and control
Information systems audit and controlInformation systems audit and control
Information systems audit and controlKashif Rana ACCA
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques_supriadi
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Sreekanth Narendran
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Complianceseanpizzy
 
Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2Yasir Khan
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditingDamilola Mosaku
 
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...Sreekanth Narendran
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseDesmond Devendran
 

What's hot (20)

IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1Information System Architecture and Audit Control Lecture 1
Information System Architecture and Audit Control Lecture 1
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2
 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
 
Security and Audit Report Sign-Off—Made Easy
Security and Audit Report Sign-Off—Made EasySecurity and Audit Report Sign-Off—Made Easy
Security and Audit Report Sign-Off—Made Easy
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 
Information systems audit and control
Information systems audit and controlInformation systems audit and control
Information systems audit and control
 
3c 2 Information Systems Audit
3c   2   Information Systems Audit3c   2   Information Systems Audit
3c 2 Information Systems Audit
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Compliance
 
Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2
 
Internal controls in an IT environment
Internal controls in an IT environment Internal controls in an IT environment
Internal controls in an IT environment
 
5.4 it security audit (mauritius)
5.4  it security audit (mauritius)5.4  it security audit (mauritius)
5.4 it security audit (mauritius)
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditing
 
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
 
Chap5 2007 C I S A Review Course
Chap5 2007 C I S A Review CourseChap5 2007 C I S A Review Course
Chap5 2007 C I S A Review Course
 

Similar to Audit and Assurance

3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdfNehemiah27
 
Auditing in computerized environment.pptx
Auditing in computerized environment.pptxAuditing in computerized environment.pptx
Auditing in computerized environment.pptxinfantemiliya18
 
Computerized Environment
Computerized EnvironmentComputerized Environment
Computerized EnvironmentVadivelM9
 
Computer in accounting
Computer in accountingComputer in accounting
Computer in accountingVivek Casillas
 
Core Areas of a CA- Interlinked with computers
Core Areas of a CA- Interlinked with computersCore Areas of a CA- Interlinked with computers
Core Areas of a CA- Interlinked with computersShikha Gupta
 
Introduction to computerised accounting
Introduction to computerised  accountingIntroduction to computerised  accounting
Introduction to computerised accountingItisha Sharma
 
CISA_WK_1.pptx
CISA_WK_1.pptxCISA_WK_1.pptx
CISA_WK_1.pptxdotco
 
Sushant edp
Sushant edpSushant edp
Sushant edpzalak007
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditingMarc Vael
 
computer system validation
computer system validationcomputer system validation
computer system validationGopal Patel
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques_supriadi
 
Perfexpert
PerfexpertPerfexpert
Perfexpertgystell
 
Accounting Information Systems Understanding Business Processes 4th Edition C...
Accounting Information Systems Understanding Business Processes 4th Edition C...Accounting Information Systems Understanding Business Processes 4th Edition C...
Accounting Information Systems Understanding Business Processes 4th Edition C...ryfomoluq
 
Accounting Information Systems The Processes and Controls 2nd Edition Turner ...
Accounting Information Systems The Processes and Controls 2nd Edition Turner ...Accounting Information Systems The Processes and Controls 2nd Edition Turner ...
Accounting Information Systems The Processes and Controls 2nd Edition Turner ...ryfomoluq
 
How to Choose the Most Effective E-Invoicing System.pdf
How to Choose the Most Effective E-Invoicing System.pdfHow to Choose the Most Effective E-Invoicing System.pdf
How to Choose the Most Effective E-Invoicing System.pdfJose thomas
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment PresentationEMAC Consulting Group
 

Similar to Audit and Assurance (20)

3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf
 
Auditing in computerized environment.pptx
Auditing in computerized environment.pptxAuditing in computerized environment.pptx
Auditing in computerized environment.pptx
 
Bankauditin it env
Bankauditin it envBankauditin it env
Bankauditin it env
 
Bankauditin it env
Bankauditin it envBankauditin it env
Bankauditin it env
 
Computerized Environment
Computerized EnvironmentComputerized Environment
Computerized Environment
 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
 
Computer in accounting
Computer in accountingComputer in accounting
Computer in accounting
 
Core Areas of a CA- Interlinked with computers
Core Areas of a CA- Interlinked with computersCore Areas of a CA- Interlinked with computers
Core Areas of a CA- Interlinked with computers
 
Introduction to computerised accounting
Introduction to computerised  accountingIntroduction to computerised  accounting
Introduction to computerised accounting
 
CISA_WK_1.pptx
CISA_WK_1.pptxCISA_WK_1.pptx
CISA_WK_1.pptx
 
Sushant edp
Sushant edpSushant edp
Sushant edp
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
 
computer system validation
computer system validationcomputer system validation
computer system validation
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
 
Perfexpert
PerfexpertPerfexpert
Perfexpert
 
Accounting Information Systems Understanding Business Processes 4th Edition C...
Accounting Information Systems Understanding Business Processes 4th Edition C...Accounting Information Systems Understanding Business Processes 4th Edition C...
Accounting Information Systems Understanding Business Processes 4th Edition C...
 
Accounting Information Systems The Processes and Controls 2nd Edition Turner ...
Accounting Information Systems The Processes and Controls 2nd Edition Turner ...Accounting Information Systems The Processes and Controls 2nd Edition Turner ...
Accounting Information Systems The Processes and Controls 2nd Edition Turner ...
 
How to Choose the Most Effective E-Invoicing System.pdf
How to Choose the Most Effective E-Invoicing System.pdfHow to Choose the Most Effective E-Invoicing System.pdf
How to Choose the Most Effective E-Invoicing System.pdf
 
audit_it_250759.pdf
audit_it_250759.pdfaudit_it_250759.pdf
audit_it_250759.pdf
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
 

Recently uploaded

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 

Recently uploaded (20)

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 

Audit and Assurance

  • 1. CHAPTER 6 AUDITING IN COMPUTERISED INFORMATION SYSTEM ENVIROMENT
  • 2. 4.1 Understand The Basic Approach To Computerised Information System (CIS)
  • 3. 4.1.1 Changing Information Of Technology And its Implication for Auditing • People are constanly looking for online activities and expect faster delivery.In accounting well as auditing,IT plays a vital role in producing reliable and timely financial statements and reports. • Most companies use IT to improve company internal control system through the addition of new control procedure through computer and replacing the manual control due to the likelihood of possible human error.
  • 4. Electronic Data Processing (EDP) Reporting Business Transacti on
  • 5. Electronic Data Processing (EDP) Source Document: •invoice •revenue receipt •payment voucher •cheque The Basis Financial Reporting: •SOFP •Profit and Loss Account •Statement of Cash Flow •Statement of Charge In Equity
  • 6. Advantages and Disadvantages of Using IT Systems Advantages Disadvantages Easier to have instant data processing compared to manual data processing The use of electronic data processing have resulted in decreased vacancles for job searchers ike accountant more accurate and affective time of transaction high cost for companies as effective electronic data processing software tents to be expensive increase performance especially in manucfacturing industriesand related industries due to improved the incentory automated system additional cost fir support and backup systems in the events of power failure
  • 7. Implication From manual control to electronic enviroment: Traditional paperwork in which the auditor can see and feel the printed marks evidencing transaction are carried out online and most cases in 'real time' Generally looks for the authorizing signature on the papers evidencing the transaction and electronic It processing enviroment such authority is evidence by the user of identification codes and passwords which are all physically invisible The level of complexity can be classified into 2 level that is low and high
  • 8. 4.1.2 Determine the Level of Complexity in Computerized Information System 1. EPD system can be defined by their technical complecity and the extent to which they are used in an organization 2. Technical complexity: •Online-line processing •All online system allows direct acces into the computer. Transactions can be put directly into the system so that master files are update all the time the entry is made
  • 9.  Communication systems • Communication channels can connect the computer directly to users anywhere in the world.  Distributed processing • When the computing function is apportioned among CPUs spread geographically and connected by a communication system.  Data base Management • As the volume and users of computer-processed data expand, data on different files are often redundant.
  • 10. 4.1.3 General Control CIS Control Description The IT control environment • The IT government structure . • How IT risk are identified, miligated and managed • The information system, strategic plan and budget. • The organizational structure and segregation of duties. Day-to-day computer operation • Acquisition,installation,configuration,i ntergration and maintanence of the IT infrastucture. • Delivery of information services to user. • Management of third-party provider
  • 11. Access to program and data • Security of password • Internet firewalls and remote access controls • Data encryption and cryptografic keys Program development and program changes • Acquisition and implementation of new applications • system development and quality assurance methodology Monitoring of IT opertions • Policies and procedures regarding the information system and reporting that ensure that user comply with IT general control.
  • 12. Application Control On CIS 1. Application control is controls within a computer application to ensure-completeness, accuracy of input,processing and validity of the resulting accounting entries. 2. The main aim is to ensure validity,completeness and accuracy of accounting data. 3. Application control classified into: - inputs control -processing controls -output controls
  • 13. An application may be considered be complex when: a)The volume of transaction is such that users would find it difficult to identify and correct error processing. b)The computer automatically generate material transactions or entries directly to another application c)The computer perform complicated compulations of financial information and automatically generates material transactions.
  • 14. Application Control On CIS 1. Application control is controls within a computer application to ensure-completeness, accuracy of input, processing and validity of the resulting accounting entries. 2. The main aim is to ensure Validity completeness and accuracy of accounting data. 3. Application controls classified into : a) Input Controls b) Processing Controls c) Output Controls
  • 15.  Input controls - The main aim of input controls is to reduce errors in the data entered in the system for processing.Input controls include checking and ensuring that: - Input data are authorized by the appropriate official. - Data represent valid record of actual transaction. - Correctly classitied for the purpose of accounting. -Example: - Sequence checks - Batch control
  • 16.  Processing controls - There are dividen into mechanical and programmed controls - Programmed control are done during the system development to ensure that only data related to a particular transaction is processed and not otherwise.  Output controls - Control relating to input and processing itself with the final objective. - Relates precisely to the original input. - Represent the outcome of a valid and tested program of instructions.
  • 17. 4.1.4 The Plan An Audit Strategic 1. Ensure that these is adequate compliance and substantive procedures and transmitted data are correct and completed. 2. Apply professional scepticism by cross verification of record, reconciliation between primary and subsidlary ledger, questioning and critical assesment of audit evidencee. 3. The audit which may be affected by the client CIS environment.
  • 18. Example Of Auditing And Through The Computer Internal Control Auditing Around The Computer Approach Auditing Through The Computer Approach 1. Credit is approved for sales on account Select a sample of sales transaction from the journal and obtain the related customer sales order. Obtain a copy of the client sales applications program and related credit limit master file. 2. Payroll is processed only Select a sample of payroll disbursements from the payroll journal. Create a test data file of valid and invalid employee ID number.
  • 19. The Posts In IT Department