SlideShare a Scribd company logo
Auditing Concept
-Ganesh Sharma
๏ƒ˜ Auditing evolved and grew rapidly after the industrial
revolution in 18th
century and in India the companies
Act 1913 made audit of company compulsory.
๏ƒ˜ Auditing is the process of analysing the log records so
as to describe the information about the system in a
clear and understandable manner.
๏ƒ˜ Auditing is an independent Review and Examination
of records and activities
๏ƒ˜ Audit is done with the help of Vouchers
Documents,Information and Explanations received
from the authorities
๏ƒ˜ Audit helps the management providing Suggestions to
attain goal of an organization.
Defination and Meaning:
๏ƒ˜ Auditing is the process of collecting and Evaluating
Evidence to determine whether a Computer System
Safeguards, Assets, Maintains Data Integrity, allows
organizationl goals to be achieved effectively.
๏ƒ˜ Auditing is a serious discipline. Auditors must be the
most experienced, knowledgeable, professionally
qualified individuals in a discipline.
๏ƒ˜ It is conducted for proprietors only.
๏ƒ˜ Audit is legally compulsory for companies
Exampe of Audits are as :
1.Financial Audits
2.Operational Audits
3.Administrative Audits
4.Information System Audits
5.Specialized Audits
6.Integrated Audits
7.Forensic Audits
Auditing Types
1.Internal Auditing
๏ƒ˜ It Depands on management and its function`s objective that
vary according to management requirement.
๏ƒ˜ It is an independent approach that is designed to improve
the organization operations and accomplish its bringing up a
systematic disciplined approach to evaluate and improve the
effectiveness of risk management.
2.External Auditing
๏ƒ˜ It is carried out by an individual independent of the company
being audited.
๏ƒ˜ It focusus on the interests of third party stakeholder, while
internal auditors serve as an independent apprisal function
within the organization.
Information Security Audit(ISA)
Need for an information systems audit function comes from
two reasons
๏ƒ˜ Auditors realized that computers had affected their ability to
perform the attest function
๏ƒ˜ Both corporate and information systems management
recognized that computers were valuble resources that
needed controling like any other key resources within an
organization.
Other reasons
๏ƒ˜ Increasing level of computerization of manual functions
๏ƒ˜ Rapid technology development
๏ƒ˜ Lack of users knowledge resulting in insecure practices
๏ƒ˜ Viruses,worms Hackers and security threats
๏ƒ˜ Changing regulatory environment
Skills required in an IS Auditor
๏ƒ˜ Knowledge of auditing ,Information Systems And
Network security.
๏ƒ˜ Investigation and process flow analysis skills
๏ƒ˜ Interpersonal relation skills.
๏ƒ˜ Verbal and written communication skills
๏ƒ˜ Ability to make maintain confidentaility
๏ƒ˜ Ability to use It desktop office tools vulnerability
analysis and other IT tools.
Standard and Performance
The IS Auditing standard include
1.Audit charter:
It must state roles and responsibilities,
authority and accountability of the ISA function
2.Maintain Professional Independence and Organizational
relationship:-
The IS auditmust be independent in all matters related to
auditing in attitude and in apperance.
3.Ethics and Standard:
Appropriate professional auditing standard must be used in all
aspects of IS auditor`s work.
4.Planning:
The IS auditor needs to plan the IS audit works to achieve the
audit objectives complying with the audit standard.
๏ƒ˜ Performance of audit work:The IS audit team must be
supervised so as to achieve the audit objective applicable to
professional auditing standard.
๏ƒ˜ Reporting:The IS auditormust present the audit report to the
intended recipets.
๏ƒ˜ Follow up activities: The IS auditor must request and evaluate
the previous relevant findings,conclusion and
recommendations so as to check appropriate action have
been implemented in timely manner or Not
๏ƒ˜ IT Governance: It is process of controling an organization IT
resources information ,communication systems and
technology in order to achieve organization obejctives and to
manage and control IT related Risks.
Audit Steps
๏ƒ˜ Step 1: Notification and request for preliminary
information
๏ƒ˜ Step 2: Planning
๏ƒ˜ Step 3: Open Meeting
๏ƒ˜ Step 4: FieldWork
๏ƒ˜ Step 5: Communication
๏ƒ˜ Step 6: Draft report
๏ƒ˜ Step 7: Management responses
๏ƒ˜ Step 8: Closing meeting
๏ƒ˜ Step 9: Report Distribution
๏ƒ˜ Step 10:Follow Up:IS auditor have follow up programs to
determine if agreed correctives actions have been
implemented.
IS Audit Phases
๏ƒ˜ Audit the Subject:
Identify the area to be audited
๏ƒ˜ Audit the Objective:
identify the specific systems and function of the
organization
๏ƒ˜ Plan the Pre Audit:
identify the technical skills,required resources and sources of
information for test and review and Identify locations and
facilities to be audited.
๏ƒ˜ Process for data Gathering:
Identify the appropriate audit approach,Identify the list of
individual to interview,identify and review the department
policies,standard and guidelines and develop audit tools and
methodology
๏ƒ˜ Evaluate the test and review the result
๏ƒ˜ Procedures for Cummunication:
IS auditors should communicate theresults to the
senior management and to the audit committee of
the board of directors.
๏ƒ˜ Audit the report preparation:
Identify follow up review,
identify procedure to test operational efficiency and
effectiveness and controls review and evaluate the
soundness of documents,polocies and procedures
Audit Risk
๏ƒ˜ Audit Risk is a material error in the IS report that may
remain undetected during the audit.
๏ƒ˜ IT risks is a case where IS will not achieve the
business Objective and responding to threat to the
provision of IT services.
๏ƒ˜ A RISK based audit approach is used to assist an IS
auditor decision to perform either compliance or
substantive testing.
The variou components of risk include
1.Inherent risk: It is associaoted with the unique
characteristics of the business of the client.
2.Control risk: It is the risk that is not prevented or
detected on a timely basis by the system of
internal controls
3.Detection risk: The risk arises when IS auditors
uses as inadequate test procedure and concludes
that errors do not exist but they do exist.
4.Overall audit risk: It is the combination of
inherent,control and detection risk.Its Objective
is to limit the audit risk at low level and is to
access and control the risk to achieve the desired
level of assurance.
Disadvantages
๏ƒ˜ Reviewing operational processes can be very time consuming
and costly.
๏ƒ˜ When employees and managers are working with the auditor,
they can't do other activities that might benefit the business,
so projects or production might slow temporarily. Sometimes,
the changes that a business makes are hard for workers to get
used to, which can increase conflicts or confusion.
Advantages
๏ƒ˜ In addition to making the business more efficient and
profitable in the long run, an operational audit almost always
provides a company with some new, fresh perspectives.
๏ƒ˜ It makes executives aware of problems that might not have
been found otherwise and lets them evaluate risks for the
future. Managers also can use results to motivate employees,
as the company always has something to work toward at the
end of the process.
Thank You

More Related Content

What's hot

Introduction of auditing
Introduction of auditingIntroduction of auditing
Introduction of auditing
Kanchan Tripathi
ย 
Audit report
Audit reportAudit report
Audit reportWINNERbd.it
ย 
Audit Programme: Concept, Types, Functions, Advantages & Disadvantages
Audit Programme: Concept, Types, Functions, Advantages & DisadvantagesAudit Programme: Concept, Types, Functions, Advantages & Disadvantages
Audit Programme: Concept, Types, Functions, Advantages & Disadvantages
Jagriti Gupta
ย 
planning process in audit ppt
planning process in audit pptplanning process in audit ppt
planning process in audit ppt
KunalPatel257
ย 
Internal audit ppt
Internal audit pptInternal audit ppt
Internal audit ppt
Letzconsult.com
ย 
Uniform costing and inter firm comparison methods
Uniform costing and inter firm comparison methodsUniform costing and inter firm comparison methods
Unit 1 Introduction to Auditing
Unit 1 Introduction to AuditingUnit 1 Introduction to Auditing
Unit 1 Introduction to Auditing
Radhika Gohel
ย 
Internal audit
Internal auditInternal audit
Internal auditRahul Mithia
ย 
Audit Process, Audit Procedures, Audit Planning, Auditing
Audit Process, Audit Procedures, Audit Planning, AuditingAudit Process, Audit Procedures, Audit Planning, Auditing
Audit Process, Audit Procedures, Audit Planning, Auditing
Advance Business Consulting
ย 
Management audit
Management auditManagement audit
Management audit
Himani Panwar
ย 
Auditing
AuditingAuditing
Auditing
Anita Tongli
ย 
Auditing and assurance standards
Auditing and assurance standardsAuditing and assurance standards
Auditing and assurance standards
Sri Ramakrishna College of Arts and Science
ย 
Auditing (Introduction to Auditing)
Auditing (Introduction to Auditing) Auditing (Introduction to Auditing)
Auditing (Introduction to Auditing)
Noorulhadi Qureshi
ย 
Audit & Assurance
Audit & Assurance Audit & Assurance
Audit & Assurance
Md. Mehadi Hassan Bappy
ย 
Audit report
Audit reportAudit report
Audit report
Minali Jain
ย 
Cost & mgt audit ppt
Cost & mgt audit pptCost & mgt audit ppt
Cost & mgt audit ppt
jyothi B O
ย 
Types of Audit
Types of AuditTypes of Audit
Types of Audit
L.Prakash Kannan
ย 
Internal check audit (ppt)
Internal check audit (ppt)Internal check audit (ppt)
Internal check audit (ppt)
MahithaKatragadda
ย 
Accounting standard 05
Accounting standard 05Accounting standard 05
Accounting standard 05
Shrikrishna Barure
ย 
Audit & Investigation Presentation Module 1.pptx
Audit & Investigation Presentation Module 1.pptxAudit & Investigation Presentation Module 1.pptx
Audit & Investigation Presentation Module 1.pptx
MudugPrimaryandsecon
ย 

What's hot (20)

Introduction of auditing
Introduction of auditingIntroduction of auditing
Introduction of auditing
ย 
Audit report
Audit reportAudit report
Audit report
ย 
Audit Programme: Concept, Types, Functions, Advantages & Disadvantages
Audit Programme: Concept, Types, Functions, Advantages & DisadvantagesAudit Programme: Concept, Types, Functions, Advantages & Disadvantages
Audit Programme: Concept, Types, Functions, Advantages & Disadvantages
ย 
planning process in audit ppt
planning process in audit pptplanning process in audit ppt
planning process in audit ppt
ย 
Internal audit ppt
Internal audit pptInternal audit ppt
Internal audit ppt
ย 
Uniform costing and inter firm comparison methods
Uniform costing and inter firm comparison methodsUniform costing and inter firm comparison methods
Uniform costing and inter firm comparison methods
ย 
Unit 1 Introduction to Auditing
Unit 1 Introduction to AuditingUnit 1 Introduction to Auditing
Unit 1 Introduction to Auditing
ย 
Internal audit
Internal auditInternal audit
Internal audit
ย 
Audit Process, Audit Procedures, Audit Planning, Auditing
Audit Process, Audit Procedures, Audit Planning, AuditingAudit Process, Audit Procedures, Audit Planning, Auditing
Audit Process, Audit Procedures, Audit Planning, Auditing
ย 
Management audit
Management auditManagement audit
Management audit
ย 
Auditing
AuditingAuditing
Auditing
ย 
Auditing and assurance standards
Auditing and assurance standardsAuditing and assurance standards
Auditing and assurance standards
ย 
Auditing (Introduction to Auditing)
Auditing (Introduction to Auditing) Auditing (Introduction to Auditing)
Auditing (Introduction to Auditing)
ย 
Audit & Assurance
Audit & Assurance Audit & Assurance
Audit & Assurance
ย 
Audit report
Audit reportAudit report
Audit report
ย 
Cost & mgt audit ppt
Cost & mgt audit pptCost & mgt audit ppt
Cost & mgt audit ppt
ย 
Types of Audit
Types of AuditTypes of Audit
Types of Audit
ย 
Internal check audit (ppt)
Internal check audit (ppt)Internal check audit (ppt)
Internal check audit (ppt)
ย 
Accounting standard 05
Accounting standard 05Accounting standard 05
Accounting standard 05
ย 
Audit & Investigation Presentation Module 1.pptx
Audit & Investigation Presentation Module 1.pptxAudit & Investigation Presentation Module 1.pptx
Audit & Investigation Presentation Module 1.pptx
ย 

Similar to Auditing concept

Tugas mandiri audit novita dewi 11353202277
Tugas mandiri audit  novita dewi 11353202277Tugas mandiri audit  novita dewi 11353202277
Tugas mandiri audit novita dewi 11353202277
novita dewi
ย 
Kontrol & Audit Sistem Informasi
Kontrol & Audit Sistem InformasiKontrol & Audit Sistem Informasi
Kontrol & Audit Sistem Informasi
dwiki apsyarin
ย 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)
Hendri Eka Saputra
ย 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Sharing Slides Training
ย 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
sharing notes123
ย 
Audit presentation
Audit presentationAudit presentation
Audit presentation
Metafrique group
ย 
2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College SectorNikhat Rasheed
ย 
Internal control and Control Self Assessment
Internal control and Control Self AssessmentInternal control and Control Self Assessment
Internal control and Control Self Assessment
Manoj Agarwal
ย 
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
Infosec train
ย 
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
priyanshamadhwal2
ย 
How to Become an IT Auditor.: A Step-by-Step Guide
How to Become an IT Auditor.: A Step-by-Step GuideHow to Become an IT Auditor.: A Step-by-Step Guide
How to Become an IT Auditor.: A Step-by-Step Guide
infosecTrain
ย 
Internal audit
Internal auditInternal audit
Tugas control & audit sistem informasi
Tugas control & audit sistem informasiTugas control & audit sistem informasi
Tugas control & audit sistem informasi
Nur Fatrianti
ย 
477 10 (5)
477 10 (5)477 10 (5)
477 10 (5)
saramkhan5
ย 
Audits and Regulatory Compliance
Audits and Regulatory ComplianceAudits and Regulatory Compliance
Audits and Regulatory Compliance
someshwar mankar
ย 
CONTROL AND AUDIT
CONTROL AND AUDITCONTROL AND AUDIT
CONTROL AND AUDIT
Ros Dina
ย 
Spire Brief - Risk Consulting
Spire Brief - Risk ConsultingSpire Brief - Risk Consulting
Spire Brief - Risk ConsultingPrashant Jain
ย 
social audit
social auditsocial audit
social audit
Debashish Debnath
ย 
Auditing
AuditingAuditing
Auditing
Pardhasaradhi ch
ย 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
Muhammad Azmy
ย 

Similar to Auditing concept (20)

Tugas mandiri audit novita dewi 11353202277
Tugas mandiri audit  novita dewi 11353202277Tugas mandiri audit  novita dewi 11353202277
Tugas mandiri audit novita dewi 11353202277
ย 
Kontrol & Audit Sistem Informasi
Kontrol & Audit Sistem InformasiKontrol & Audit Sistem Informasi
Kontrol & Audit Sistem Informasi
ย 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)
ย 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
ย 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
ย 
Audit presentation
Audit presentationAudit presentation
Audit presentation
ย 
2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector
ย 
Internal control and Control Self Assessment
Internal control and Control Self AssessmentInternal control and Control Self Assessment
Internal control and Control Self Assessment
ย 
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
ย 
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
ย 
How to Become an IT Auditor.: A Step-by-Step Guide
How to Become an IT Auditor.: A Step-by-Step GuideHow to Become an IT Auditor.: A Step-by-Step Guide
How to Become an IT Auditor.: A Step-by-Step Guide
ย 
Internal audit
Internal auditInternal audit
Internal audit
ย 
Tugas control & audit sistem informasi
Tugas control & audit sistem informasiTugas control & audit sistem informasi
Tugas control & audit sistem informasi
ย 
477 10 (5)
477 10 (5)477 10 (5)
477 10 (5)
ย 
Audits and Regulatory Compliance
Audits and Regulatory ComplianceAudits and Regulatory Compliance
Audits and Regulatory Compliance
ย 
CONTROL AND AUDIT
CONTROL AND AUDITCONTROL AND AUDIT
CONTROL AND AUDIT
ย 
Spire Brief - Risk Consulting
Spire Brief - Risk ConsultingSpire Brief - Risk Consulting
Spire Brief - Risk Consulting
ย 
social audit
social auditsocial audit
social audit
ย 
Auditing
AuditingAuditing
Auditing
ย 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
ย 

Recently uploaded

Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
ย 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
ย 
Marรญa Carolina Martรญnez - eCommerce Day Colombia 2024
Marรญa Carolina Martรญnez - eCommerce Day Colombia 2024Marรญa Carolina Martรญnez - eCommerce Day Colombia 2024
Marรญa Carolina Martรญnez - eCommerce Day Colombia 2024
eCommerce Institute
ย 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
ย 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
ย 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
ย 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
ย 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaลพ Lipuลก
ย 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
ย 
Competition and Regulation in Professional Services โ€“ KLEINER โ€“ June 2024 OEC...
Competition and Regulation in Professional Services โ€“ KLEINER โ€“ June 2024 OEC...Competition and Regulation in Professional Services โ€“ KLEINER โ€“ June 2024 OEC...
Competition and Regulation in Professional Services โ€“ KLEINER โ€“ June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
ย 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
ย 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
ย 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
ย 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
ย 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
ย 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
ย 

Recently uploaded (16)

Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
ย 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
ย 
Marรญa Carolina Martรญnez - eCommerce Day Colombia 2024
Marรญa Carolina Martรญnez - eCommerce Day Colombia 2024Marรญa Carolina Martรญnez - eCommerce Day Colombia 2024
Marรญa Carolina Martรญnez - eCommerce Day Colombia 2024
ย 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
ย 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
ย 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
ย 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
ย 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
ย 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
ย 
Competition and Regulation in Professional Services โ€“ KLEINER โ€“ June 2024 OEC...
Competition and Regulation in Professional Services โ€“ KLEINER โ€“ June 2024 OEC...Competition and Regulation in Professional Services โ€“ KLEINER โ€“ June 2024 OEC...
Competition and Regulation in Professional Services โ€“ KLEINER โ€“ June 2024 OEC...
ย 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
ย 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
ย 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
ย 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
ย 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
ย 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
ย 

Auditing concept

  • 2. ๏ƒ˜ Auditing evolved and grew rapidly after the industrial revolution in 18th century and in India the companies Act 1913 made audit of company compulsory. ๏ƒ˜ Auditing is the process of analysing the log records so as to describe the information about the system in a clear and understandable manner. ๏ƒ˜ Auditing is an independent Review and Examination of records and activities ๏ƒ˜ Audit is done with the help of Vouchers Documents,Information and Explanations received from the authorities ๏ƒ˜ Audit helps the management providing Suggestions to attain goal of an organization.
  • 3. Defination and Meaning: ๏ƒ˜ Auditing is the process of collecting and Evaluating Evidence to determine whether a Computer System Safeguards, Assets, Maintains Data Integrity, allows organizationl goals to be achieved effectively. ๏ƒ˜ Auditing is a serious discipline. Auditors must be the most experienced, knowledgeable, professionally qualified individuals in a discipline. ๏ƒ˜ It is conducted for proprietors only. ๏ƒ˜ Audit is legally compulsory for companies
  • 4. Exampe of Audits are as : 1.Financial Audits 2.Operational Audits 3.Administrative Audits 4.Information System Audits 5.Specialized Audits 6.Integrated Audits 7.Forensic Audits
  • 5. Auditing Types 1.Internal Auditing ๏ƒ˜ It Depands on management and its function`s objective that vary according to management requirement. ๏ƒ˜ It is an independent approach that is designed to improve the organization operations and accomplish its bringing up a systematic disciplined approach to evaluate and improve the effectiveness of risk management. 2.External Auditing ๏ƒ˜ It is carried out by an individual independent of the company being audited. ๏ƒ˜ It focusus on the interests of third party stakeholder, while internal auditors serve as an independent apprisal function within the organization.
  • 6. Information Security Audit(ISA) Need for an information systems audit function comes from two reasons ๏ƒ˜ Auditors realized that computers had affected their ability to perform the attest function ๏ƒ˜ Both corporate and information systems management recognized that computers were valuble resources that needed controling like any other key resources within an organization. Other reasons ๏ƒ˜ Increasing level of computerization of manual functions ๏ƒ˜ Rapid technology development ๏ƒ˜ Lack of users knowledge resulting in insecure practices ๏ƒ˜ Viruses,worms Hackers and security threats ๏ƒ˜ Changing regulatory environment
  • 7. Skills required in an IS Auditor ๏ƒ˜ Knowledge of auditing ,Information Systems And Network security. ๏ƒ˜ Investigation and process flow analysis skills ๏ƒ˜ Interpersonal relation skills. ๏ƒ˜ Verbal and written communication skills ๏ƒ˜ Ability to make maintain confidentaility ๏ƒ˜ Ability to use It desktop office tools vulnerability analysis and other IT tools.
  • 8. Standard and Performance The IS Auditing standard include 1.Audit charter: It must state roles and responsibilities, authority and accountability of the ISA function 2.Maintain Professional Independence and Organizational relationship:- The IS auditmust be independent in all matters related to auditing in attitude and in apperance. 3.Ethics and Standard: Appropriate professional auditing standard must be used in all aspects of IS auditor`s work. 4.Planning: The IS auditor needs to plan the IS audit works to achieve the audit objectives complying with the audit standard.
  • 9. ๏ƒ˜ Performance of audit work:The IS audit team must be supervised so as to achieve the audit objective applicable to professional auditing standard. ๏ƒ˜ Reporting:The IS auditormust present the audit report to the intended recipets. ๏ƒ˜ Follow up activities: The IS auditor must request and evaluate the previous relevant findings,conclusion and recommendations so as to check appropriate action have been implemented in timely manner or Not ๏ƒ˜ IT Governance: It is process of controling an organization IT resources information ,communication systems and technology in order to achieve organization obejctives and to manage and control IT related Risks.
  • 10. Audit Steps ๏ƒ˜ Step 1: Notification and request for preliminary information ๏ƒ˜ Step 2: Planning ๏ƒ˜ Step 3: Open Meeting ๏ƒ˜ Step 4: FieldWork ๏ƒ˜ Step 5: Communication ๏ƒ˜ Step 6: Draft report ๏ƒ˜ Step 7: Management responses ๏ƒ˜ Step 8: Closing meeting ๏ƒ˜ Step 9: Report Distribution ๏ƒ˜ Step 10:Follow Up:IS auditor have follow up programs to determine if agreed correctives actions have been implemented.
  • 11. IS Audit Phases ๏ƒ˜ Audit the Subject: Identify the area to be audited ๏ƒ˜ Audit the Objective: identify the specific systems and function of the organization ๏ƒ˜ Plan the Pre Audit: identify the technical skills,required resources and sources of information for test and review and Identify locations and facilities to be audited. ๏ƒ˜ Process for data Gathering: Identify the appropriate audit approach,Identify the list of individual to interview,identify and review the department policies,standard and guidelines and develop audit tools and methodology
  • 12. ๏ƒ˜ Evaluate the test and review the result ๏ƒ˜ Procedures for Cummunication: IS auditors should communicate theresults to the senior management and to the audit committee of the board of directors. ๏ƒ˜ Audit the report preparation: Identify follow up review, identify procedure to test operational efficiency and effectiveness and controls review and evaluate the soundness of documents,polocies and procedures
  • 13. Audit Risk ๏ƒ˜ Audit Risk is a material error in the IS report that may remain undetected during the audit. ๏ƒ˜ IT risks is a case where IS will not achieve the business Objective and responding to threat to the provision of IT services. ๏ƒ˜ A RISK based audit approach is used to assist an IS auditor decision to perform either compliance or substantive testing.
  • 14. The variou components of risk include 1.Inherent risk: It is associaoted with the unique characteristics of the business of the client. 2.Control risk: It is the risk that is not prevented or detected on a timely basis by the system of internal controls 3.Detection risk: The risk arises when IS auditors uses as inadequate test procedure and concludes that errors do not exist but they do exist. 4.Overall audit risk: It is the combination of inherent,control and detection risk.Its Objective is to limit the audit risk at low level and is to access and control the risk to achieve the desired level of assurance.
  • 15. Disadvantages ๏ƒ˜ Reviewing operational processes can be very time consuming and costly. ๏ƒ˜ When employees and managers are working with the auditor, they can't do other activities that might benefit the business, so projects or production might slow temporarily. Sometimes, the changes that a business makes are hard for workers to get used to, which can increase conflicts or confusion. Advantages ๏ƒ˜ In addition to making the business more efficient and profitable in the long run, an operational audit almost always provides a company with some new, fresh perspectives. ๏ƒ˜ It makes executives aware of problems that might not have been found otherwise and lets them evaluate risks for the future. Managers also can use results to motivate employees, as the company always has something to work toward at the end of the process.