SlideShare a Scribd company logo
Chapter 13
Auditing Information Technology
Presentation Outline
I. Concepts in Information Systems
Auditing
II. Auditing Technology for Information
Systems
I. Concepts in Information
Systems Auditing
A. The Phases to the Information Systems
Audit
B. Structure of the Financial Statement Audit
C. Auditing Around the Computer
D. Auditing With the Computer
E. Auditing Through the Computer
A. Phases of the Information
Systems Audit
1. Initial review and
evaluation of the area to
be audited, and the audit
plan preparation
2. Detailed review and
evaluation of controls
3. Compliance testing
4. Analysis and reporting of
results
B. Structure of the Financial
Statement Audit
Transactions Accounting
System
Financial
Reports
Interim Audit
Compliance Testing
Financial
Statement Audit
Substantive
Testing
B1. Compliance Testing
Auditors perform tests of controls to determine
that the control policies, practices, and
procedures established by management are
functioning as planned. This is known as
compliance testing.
B2. Substantive Testing
Substantive testing is the direct verification of
financial statement figures. Examples would
include reconciling a bank account and
confirming accounts receivable.
Audit Confirmation
To ABC Co. Customer:
Please confirm that the
balance of your account
on Dec. 31 is _____ .
C. Auditing Around the
Computer
The auditor ignores computer processing.
Instead, the auditor selects source documents that
have been input into the system and summarizes
them manually to see if they match the output of
computer processing.
Processing
D. Auditing With The Computer
The utilization of the computer by an auditor to
perform some audit work that would otherwise
have to be done manually.
E. Auditing Through the
Computer
The process of reviewing and evaluating the
internal controls in an electronic data processing
system.
Audit
II. Auditing Technology for
Information Systems
A. Review of Systems Documentation
B. Test Data
C. Integrated-Test-Facility (ITF) Approach
D. Parallel Simulation
E. Audit Software
F. Embedded Audit Routines
G. Mapping
H. Extended Records and Snapshots
A. Review of Systems
Documentation
The auditor reviews documentation such as
narrative descriptions, flowcharts, and program
listings. In desk checking the auditor processes
test or real data through the program logic.
B. Test Data
The auditor prepares input containing both valid
and invalid data. Prior to processing the test
data, the input is manually processed to
determine what the output should look like.
The auditor then compares the computer-
processed output with the manually processed
results.
Illustration of Test Data
Approach
Computer Operations
Prepare Test
Transactions
And Results
Auditors
Computer
Application
System
Computer
Output
Auditor Compares
Transaction
Test Data
Manually
Processed
Results
C. Integrated Test Facility (ITF)
Approach
A common form of an ITF is as follows:
1. A dummy ITF center is created for the auditors.
2. Auditors create transactions for controls they
want to test.
3. Working papers are created to show expected
results from manually processed information.
4. Auditor transactions are run with actual
transactions.
5. Auditors compare ITF results to working papers.
Illustration of ITF Approach
Computer
Application
System
Reports
With Only
Actual Data
Auditors
Computer Operations
Prepare ITF
Transactions
And Results
Actual
Transactions
ITF
Transactions
Data Files
ITF Data
Reports
With Only
ITF Data
Manually
Processed
Results
Auditor
Compares
D. Parallel Simulation
The test data and ITF methods both process test
data through real programs. With parallel
simulation, the auditor processes real client data
on an audit program similar to some aspect of the
client’s program. The auditor compares the
results of this processing with the results of the
processing done by the client’s program.
Illustration of Parallel Simulation
Computer Operations Auditors
Actual
Transactions
Computer
Application
System
Auditor’s
Simulation
Program
Actual Client
Report
Auditor
Simulation
Report
Auditor Compares
E. Audit Software
Computer programs that permit computers to be
used as auditing tools include:
1. Generalized audit software
Perform tasks such as selecting sample data
from file, checking computations, and
searching files for unusual items.
2. P.C. Software
Allows auditors to analyze data from
notebook computers in the field.
F. Embedded Audit Routines
1. In-line Code – Application program performs
audit data collection while it processes data
for normal production purposes.
2. System Control Audit
Review File (SCARF)–
Edit tests for audit
transaction analysis are
included in program.
Exceptions are written
to a file for audit review.
The Auditor
G. Mapping
Special software counts the number of times each
program statement in a program executes.
Helps identify code that is bypassed when the
bypass is not readily apparent in the program code
and/or documentation.
H. Extended Records and
Snapshots
Extended Records
Specific transactions are
tagged, and the
intervening processing
steps that normally
would not be saved are
added to the extended
record, permitting the
audit trail to be
reconstructed for these
transactions.
Snapshot
A snapshot is similar to
an extended record
except that the
snapshot is a printed
audit trail.
Summary
Compliance and Substantive Testing
Auditing Around the Computer
Auditing with the Computer
Auditing Through the Computer
Testing Approaches Through the Computer

More Related Content

Similar to 301_ch_13.ppt

computer system validation
computer system validationcomputer system validation
computer system validation
Gopal Patel
 
Audit and Assurance
Audit and AssuranceAudit and Assurance
Audit and Assurance
MuhamadSyawal7
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
EMAC Consulting Group
 
e - Audit
e - Audite - Audit
e - Audit
MohanRajR33
 
Auditing in Computerized Environment
Auditing in Computerized EnvironmentAuditing in Computerized Environment
Auditing in Computerized Environment
Dr. Sushil Bansode
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
Sharah Ayumi
 
05.2 auditing procedure application controls
05.2 auditing procedure   application controls05.2 auditing procedure   application controls
05.2 auditing procedure application controls
Mulyadi Yusuf
 
CISA exam 100 practice question
CISA exam 100 practice questionCISA exam 100 practice question
CISA exam 100 practice question
Arshad A Javed
 
James hall ch 15
James hall ch 15James hall ch 15
James hall ch 15
David Julian
 
Supplier Auditing Case Study - HFG.pdf
Supplier Auditing Case Study - HFG.pdfSupplier Auditing Case Study - HFG.pdf
Supplier Auditing Case Study - HFG.pdf
Seán Baird
 
Software Metrics
Software MetricsSoftware Metrics
Software Metrics
swatisinghal
 
Software process and project metrics
Software process and project metricsSoftware process and project metrics
Software process and project metrics
Indu Sharma Bhardwaj
 
Sample audit plan
Sample audit planSample audit plan
Sample audit plan
Maher Manan
 
Chapter 11, Tests of Controls
Chapter 11, Tests of ControlsChapter 11, Tests of Controls
Chapter 11, Tests of Controls
Sazzad Hossain, ITP, MBA, CSCA™
 
Software metrics
Software metricsSoftware metrics
Software metrics
Aadarsh Sharma
 
02 a&a all questions
02 a&a   all questions02 a&a   all questions
02 a&a all questions
Muhammad Ovais
 
Software Testing and Quality Assurance Assignment 3
Software Testing and Quality Assurance Assignment 3Software Testing and Quality Assurance Assignment 3
Software Testing and Quality Assurance Assignment 3
Gurpreet singh
 
Chap005 tb-sample
Chap005 tb-sampleChap005 tb-sample
Chap005 tb-sample
Ying Sun
 
Generalized audit-software
Generalized audit-softwareGeneralized audit-software
Generalized audit-software
kzoe1996
 
CAAT - Data Analysis and Audit Techniques
CAAT - Data Analysis and Audit TechniquesCAAT - Data Analysis and Audit Techniques
CAAT - Data Analysis and Audit Techniques
Saurabh Rai
 

Similar to 301_ch_13.ppt (20)

computer system validation
computer system validationcomputer system validation
computer system validation
 
Audit and Assurance
Audit and AssuranceAudit and Assurance
Audit and Assurance
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
 
e - Audit
e - Audite - Audit
e - Audit
 
Auditing in Computerized Environment
Auditing in Computerized EnvironmentAuditing in Computerized Environment
Auditing in Computerized Environment
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
 
05.2 auditing procedure application controls
05.2 auditing procedure   application controls05.2 auditing procedure   application controls
05.2 auditing procedure application controls
 
CISA exam 100 practice question
CISA exam 100 practice questionCISA exam 100 practice question
CISA exam 100 practice question
 
James hall ch 15
James hall ch 15James hall ch 15
James hall ch 15
 
Supplier Auditing Case Study - HFG.pdf
Supplier Auditing Case Study - HFG.pdfSupplier Auditing Case Study - HFG.pdf
Supplier Auditing Case Study - HFG.pdf
 
Software Metrics
Software MetricsSoftware Metrics
Software Metrics
 
Software process and project metrics
Software process and project metricsSoftware process and project metrics
Software process and project metrics
 
Sample audit plan
Sample audit planSample audit plan
Sample audit plan
 
Chapter 11, Tests of Controls
Chapter 11, Tests of ControlsChapter 11, Tests of Controls
Chapter 11, Tests of Controls
 
Software metrics
Software metricsSoftware metrics
Software metrics
 
02 a&a all questions
02 a&a   all questions02 a&a   all questions
02 a&a all questions
 
Software Testing and Quality Assurance Assignment 3
Software Testing and Quality Assurance Assignment 3Software Testing and Quality Assurance Assignment 3
Software Testing and Quality Assurance Assignment 3
 
Chap005 tb-sample
Chap005 tb-sampleChap005 tb-sample
Chap005 tb-sample
 
Generalized audit-software
Generalized audit-softwareGeneralized audit-software
Generalized audit-software
 
CAAT - Data Analysis and Audit Techniques
CAAT - Data Analysis and Audit TechniquesCAAT - Data Analysis and Audit Techniques
CAAT - Data Analysis and Audit Techniques
 

Recently uploaded

CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 

Recently uploaded (20)

CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 

301_ch_13.ppt

  • 2. Presentation Outline I. Concepts in Information Systems Auditing II. Auditing Technology for Information Systems
  • 3. I. Concepts in Information Systems Auditing A. The Phases to the Information Systems Audit B. Structure of the Financial Statement Audit C. Auditing Around the Computer D. Auditing With the Computer E. Auditing Through the Computer
  • 4. A. Phases of the Information Systems Audit 1. Initial review and evaluation of the area to be audited, and the audit plan preparation 2. Detailed review and evaluation of controls 3. Compliance testing 4. Analysis and reporting of results
  • 5. B. Structure of the Financial Statement Audit Transactions Accounting System Financial Reports Interim Audit Compliance Testing Financial Statement Audit Substantive Testing
  • 6. B1. Compliance Testing Auditors perform tests of controls to determine that the control policies, practices, and procedures established by management are functioning as planned. This is known as compliance testing.
  • 7. B2. Substantive Testing Substantive testing is the direct verification of financial statement figures. Examples would include reconciling a bank account and confirming accounts receivable. Audit Confirmation To ABC Co. Customer: Please confirm that the balance of your account on Dec. 31 is _____ .
  • 8. C. Auditing Around the Computer The auditor ignores computer processing. Instead, the auditor selects source documents that have been input into the system and summarizes them manually to see if they match the output of computer processing. Processing
  • 9. D. Auditing With The Computer The utilization of the computer by an auditor to perform some audit work that would otherwise have to be done manually.
  • 10. E. Auditing Through the Computer The process of reviewing and evaluating the internal controls in an electronic data processing system. Audit
  • 11. II. Auditing Technology for Information Systems A. Review of Systems Documentation B. Test Data C. Integrated-Test-Facility (ITF) Approach D. Parallel Simulation E. Audit Software F. Embedded Audit Routines G. Mapping H. Extended Records and Snapshots
  • 12. A. Review of Systems Documentation The auditor reviews documentation such as narrative descriptions, flowcharts, and program listings. In desk checking the auditor processes test or real data through the program logic.
  • 13. B. Test Data The auditor prepares input containing both valid and invalid data. Prior to processing the test data, the input is manually processed to determine what the output should look like. The auditor then compares the computer- processed output with the manually processed results.
  • 14. Illustration of Test Data Approach Computer Operations Prepare Test Transactions And Results Auditors Computer Application System Computer Output Auditor Compares Transaction Test Data Manually Processed Results
  • 15. C. Integrated Test Facility (ITF) Approach A common form of an ITF is as follows: 1. A dummy ITF center is created for the auditors. 2. Auditors create transactions for controls they want to test. 3. Working papers are created to show expected results from manually processed information. 4. Auditor transactions are run with actual transactions. 5. Auditors compare ITF results to working papers.
  • 16. Illustration of ITF Approach Computer Application System Reports With Only Actual Data Auditors Computer Operations Prepare ITF Transactions And Results Actual Transactions ITF Transactions Data Files ITF Data Reports With Only ITF Data Manually Processed Results Auditor Compares
  • 17. D. Parallel Simulation The test data and ITF methods both process test data through real programs. With parallel simulation, the auditor processes real client data on an audit program similar to some aspect of the client’s program. The auditor compares the results of this processing with the results of the processing done by the client’s program.
  • 18. Illustration of Parallel Simulation Computer Operations Auditors Actual Transactions Computer Application System Auditor’s Simulation Program Actual Client Report Auditor Simulation Report Auditor Compares
  • 19. E. Audit Software Computer programs that permit computers to be used as auditing tools include: 1. Generalized audit software Perform tasks such as selecting sample data from file, checking computations, and searching files for unusual items. 2. P.C. Software Allows auditors to analyze data from notebook computers in the field.
  • 20. F. Embedded Audit Routines 1. In-line Code – Application program performs audit data collection while it processes data for normal production purposes. 2. System Control Audit Review File (SCARF)– Edit tests for audit transaction analysis are included in program. Exceptions are written to a file for audit review. The Auditor
  • 21. G. Mapping Special software counts the number of times each program statement in a program executes. Helps identify code that is bypassed when the bypass is not readily apparent in the program code and/or documentation.
  • 22. H. Extended Records and Snapshots Extended Records Specific transactions are tagged, and the intervening processing steps that normally would not be saved are added to the extended record, permitting the audit trail to be reconstructed for these transactions. Snapshot A snapshot is similar to an extended record except that the snapshot is a printed audit trail.
  • 23. Summary Compliance and Substantive Testing Auditing Around the Computer Auditing with the Computer Auditing Through the Computer Testing Approaches Through the Computer