SlideShare a Scribd company logo
Bank Audit in IT Environment ,[object Object],[object Object]
During the past few years Information Technology  has made  rapid inroads  into  our lives  in a way  we could ever imagine.
Mom, When is my Happy Download Day?
How many times have I told you!  You were not downloaded. You were born…
we are currently developing an insatiable appetite for instant information made possible by Information Technology. Information Technology has completely changed the way, we lead our lives.
Everyday one trillion dollars worth of money is transacted over the global networks. Money equal to 200 per cent of India’s GDP over a whole year moves over the global financial networks in a single day. ,[object Object],[object Object],[object Object],[object Object]
The wide spread use and ongoing development of Information Technology has affected business immeasurably.  And that is the reason; the audit environment has also undergone a chemical change.
Banking Applications Today ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Partial Branch Automation Software ,[object Object],[object Object],[object Object],[object Object]
Total Branch Automation Solution ,[object Object],[object Object],[object Object],[object Object],[object Object]
Core Banking Solution: ,[object Object],[object Object],[object Object],[object Object],[object Object]
The basic tenet of Audit remains the same-i.e. reliability and integrity of data. Use of IT does not give rise to new audit objectives nor does it change the same. But the role, focus and scope of audit has certainly changed in the changed environment .
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Physical Environment Vs e-Environment
[object Object],[object Object],Impact of Information systems on internal control
[object Object],[object Object],[object Object],Impact of Information systems on internal control
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Impact of Information systems on internal control
[object Object],[object Object],[object Object],[object Object],[object Object],Impact of Information systems on internal control
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Impact of Information systems on Audit
[object Object],[object Object],[object Object],[object Object],[object Object],Impact of Information systems on Audit
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Potential Risk Areas in computerised environment
Arithmetic accuracy and uniform processing of transactions that reduces the audit risk as there is no need to maintain and verify balancing ledgers and no need to verify postings if there is a fool proof computer system.  Further, the system calculates interest automatically and chances of error are limited.  The clerical errors ordinarily associated with manual processing are virtually eliminated.   Advantages over manual system
[object Object],[object Object],[object Object],[object Object],Challenges
After the AAS 29 on Auditing in a Computerised Information Systems (CIS) environment became operative for all audits related to accounting periods beginning on or after 1st April 2003, the responsibility of the bank branch auditor has increased manifold.  As per AAS 29, the overall objective and scope of an audit does not change in a CIS environment, however, the use of a computer changes the processing, storage, retrieval and communication of financial information and may affect the accounting and internal control systems employed by the entity. AAS 29
[object Object],[object Object],[object Object],[object Object],[object Object],AAS 29
[object Object],[object Object],[object Object],Controls in Information System Environment
[object Object],[object Object],Application Controls
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Lock Guard Security: Scenario
Networked Domain / Intranet Internal Threats Through : Employees / Vendors/ Ex-Employees etc. Reasons:   Sabotage / Revenge/ Money  Methods:   Virus/ Trojan, Denial of service attack / Trap door/ Spoofing/ Destruction etc INCREASING RISK  Environmental / Physical Threats  E.g. Fire / Storms/ Earthquake Manual TBA CBS External Threats Through:   Hackers/ competitors /   criminals etc. Reasons:   Sabotage /  Revenge/ Money  Methods:   Virus/ Trojan, Denial of service attack / Trap door/ Spoofing/ Destruction / social engineering etc Information Security Risk in a Bank
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],[object Object],[object Object],[object Object],[object Object],Important Security Control Aspects
[object Object],Thanks for being nice & giving a patient hearing

More Related Content

What's hot

03.1 general control
03.1 general control03.1 general control
03.1 general controlMulyadi Yusuf
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
Kaushal Trivedi
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Compliance
seanpizzy
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
jayussuryawan
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
Sreekanth Narendran
 
Computer Audit an Introductory
Computer Audit an IntroductoryComputer Audit an Introductory
Computer Audit an Introductory
MNorazizi HM
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
Jayesh Daga
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
Adetula Bunmi
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Sharah Ayumi
 
Audit and Assurance
Audit and AssuranceAudit and Assurance
Audit and Assurance
MuhamadSyawal7
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample Report
Randy James
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
Ed Tobias
 
Information systems audit and control
Information systems audit and controlInformation systems audit and control
Information systems audit and controlKashif Rana ACCA
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
EMAC Consulting Group
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologiesgenetics
 
Hipaa checklist - information security
Hipaa checklist - information securityHipaa checklist - information security
Hipaa checklist - information security
Vijay Sekar
 
Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System Administration
Lisa Dowdell, MSISTM
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
Jeffrey Paulette
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
edwardstudyemai
 

What's hot (20)

03.1 general control
03.1 general control03.1 general control
03.1 general control
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Compliance
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 
3c 2 Information Systems Audit
3c   2   Information Systems Audit3c   2   Information Systems Audit
3c 2 Information Systems Audit
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
 
Computer Audit an Introductory
Computer Audit an IntroductoryComputer Audit an Introductory
Computer Audit an Introductory
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
 
Audit and Assurance
Audit and AssuranceAudit and Assurance
Audit and Assurance
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample Report
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
Information systems audit and control
Information systems audit and controlInformation systems audit and control
Information systems audit and control
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
 
IT Audit methodologies
IT Audit methodologiesIT Audit methodologies
IT Audit methodologies
 
Hipaa checklist - information security
Hipaa checklist - information securityHipaa checklist - information security
Hipaa checklist - information security
 
Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System Administration
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 

Viewers also liked

IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
Mukalele Rogers
 
Critical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet BankingCritical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet BankingThomas Donofrio
 
Audit through core banking solution
Audit through core banking solutionAudit through core banking solution
Audit through core banking solution
Charudutt Marathe
 
Bank 2.0 - How to get ready for the new era of Engagement Banking
Bank 2.0 - How to get ready for the new era of Engagement BankingBank 2.0 - How to get ready for the new era of Engagement Banking
Bank 2.0 - How to get ready for the new era of Engagement Banking
Backbase
 
introduction to finacle
introduction to finacleintroduction to finacle
introduction to finacledibashmajumder
 
Core Banking Transformation: Solutions to Standardize Processes and Cut Costs
Core Banking Transformation: Solutions to Standardize Processes and Cut CostsCore Banking Transformation: Solutions to Standardize Processes and Cut Costs
Core Banking Transformation: Solutions to Standardize Processes and Cut Costs
IBM Banking
 
Core Banking Solution PPT of TCS and SBI
Core Banking Solution PPT of TCS and SBICore Banking Solution PPT of TCS and SBI
Core Banking Solution PPT of TCS and SBI
Rajesh Kumar
 

Viewers also liked (8)

IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
 
Critical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet BankingCritical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet Banking
 
Audit through core banking solution
Audit through core banking solutionAudit through core banking solution
Audit through core banking solution
 
Bank 2.0 - How to get ready for the new era of Engagement Banking
Bank 2.0 - How to get ready for the new era of Engagement BankingBank 2.0 - How to get ready for the new era of Engagement Banking
Bank 2.0 - How to get ready for the new era of Engagement Banking
 
introduction to finacle
introduction to finacleintroduction to finacle
introduction to finacle
 
Core Banking Transformation: Solutions to Standardize Processes and Cut Costs
Core Banking Transformation: Solutions to Standardize Processes and Cut CostsCore Banking Transformation: Solutions to Standardize Processes and Cut Costs
Core Banking Transformation: Solutions to Standardize Processes and Cut Costs
 
Core banking
Core bankingCore banking
Core banking
 
Core Banking Solution PPT of TCS and SBI
Core Banking Solution PPT of TCS and SBICore Banking Solution PPT of TCS and SBI
Core Banking Solution PPT of TCS and SBI
 

Similar to bankauditinITEnv

Chapter 6
Chapter 6Chapter 6
Chapter 6
Nur Dalila Zamri
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
Ashish Desai
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
gueste080564
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
renetta
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computing
guestc1bca2
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
Mufaddal Nullwala
 
Chapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environmentChapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environment
KugendranMani
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
LynellBull52
 
CONTROL AND AUDIT
CONTROL AND AUDITCONTROL AND AUDIT
CONTROL AND AUDIT
Ros Dina
 
Information 2nd lesson
Information 2nd lessonInformation 2nd lesson
Information 2nd lesson
Anne ndolo
 
Sushant edp
Sushant edpSushant edp
Sushant edpzalak007
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Shahzeb Pirzada
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
Gene Kim
 
Computerized Environment
Computerized EnvironmentComputerized Environment
Computerized Environment
VadivelM9
 
Advantages of Electronic Permit System.pdf
Advantages of Electronic Permit System.pdfAdvantages of Electronic Permit System.pdf
Advantages of Electronic Permit System.pdf
Olivia Wilson
 
Advantages of Electronic Permit System.pdf
Advantages of Electronic Permit System.pdfAdvantages of Electronic Permit System.pdf
Advantages of Electronic Permit System.pdf
Harry George
 
Advantages of Electronic Permit System
Advantages of Electronic Permit SystemAdvantages of Electronic Permit System
Advantages of Electronic Permit System
Olivia Wilson
 
Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkata
sunil patro
 
Core Areas of a CA- Interlinked with computers
Core Areas of a CA- Interlinked with computersCore Areas of a CA- Interlinked with computers
Core Areas of a CA- Interlinked with computersShikha Gupta
 

Similar to bankauditinITEnv (20)

Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computing
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
Chapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environmentChapter 4 : Auditing and the information technology environment
Chapter 4 : Auditing and the information technology environment
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
CONTROL AND AUDIT
CONTROL AND AUDITCONTROL AND AUDIT
CONTROL AND AUDIT
 
Information 2nd lesson
Information 2nd lessonInformation 2nd lesson
Information 2nd lesson
 
Sushant edp
Sushant edpSushant edp
Sushant edp
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
 
Computerized Environment
Computerized EnvironmentComputerized Environment
Computerized Environment
 
Advantages of Electronic Permit System.pdf
Advantages of Electronic Permit System.pdfAdvantages of Electronic Permit System.pdf
Advantages of Electronic Permit System.pdf
 
Advantages of Electronic Permit System.pdf
Advantages of Electronic Permit System.pdfAdvantages of Electronic Permit System.pdf
Advantages of Electronic Permit System.pdf
 
Advantages of Electronic Permit System
Advantages of Electronic Permit SystemAdvantages of Electronic Permit System
Advantages of Electronic Permit System
 
Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkata
 
Core Areas of a CA- Interlinked with computers
Core Areas of a CA- Interlinked with computersCore Areas of a CA- Interlinked with computers
Core Areas of a CA- Interlinked with computers
 

More from Dr Vijay Pithadia Director

Lecture 4 employee testing and selection
Lecture 4 employee testing and selectionLecture 4 employee testing and selection
Lecture 4 employee testing and selection
Dr Vijay Pithadia Director
 
Lecture 1 introduction to hrm dessler
Lecture 1 introduction to hrm desslerLecture 1 introduction to hrm dessler
Lecture 1 introduction to hrm dessler
Dr Vijay Pithadia Director
 
Lecture 3 pay for performance and financial incentives
Lecture 3 pay for performance and financial incentivesLecture 3 pay for performance and financial incentives
Lecture 3 pay for performance and financial incentives
Dr Vijay Pithadia Director
 

More from Dr Vijay Pithadia Director (20)

Lecture 6 training development
Lecture 6 training developmentLecture 6 training development
Lecture 6 training development
 
Lecture 5 interviewing candidates
Lecture 5 interviewing candidatesLecture 5 interviewing candidates
Lecture 5 interviewing candidates
 
Lecture 4 employee testing and selection
Lecture 4 employee testing and selectionLecture 4 employee testing and selection
Lecture 4 employee testing and selection
 
Lecture 2 job aanalysis
Lecture 2 job aanalysisLecture 2 job aanalysis
Lecture 2 job aanalysis
 
Lecture 1 introduction to hrm dessler
Lecture 1 introduction to hrm desslerLecture 1 introduction to hrm dessler
Lecture 1 introduction to hrm dessler
 
Performance management
Performance managementPerformance management
Performance management
 
Hr dev performanceappraisal
Hr dev performanceappraisalHr dev performanceappraisal
Hr dev performanceappraisal
 
Dessler hrm12e ppt_11
Dessler hrm12e ppt_11Dessler hrm12e ppt_11
Dessler hrm12e ppt_11
 
Lecture 3 pay for performance and financial incentives
Lecture 3 pay for performance and financial incentivesLecture 3 pay for performance and financial incentives
Lecture 3 pay for performance and financial incentives
 
Session plan
Session planSession plan
Session plan
 
Seminar presentation
Seminar presentationSeminar presentation
Seminar presentation
 
Processing cooperatives
Processing cooperativesProcessing cooperatives
Processing cooperatives
 
New microsoft office word document
New microsoft office word documentNew microsoft office word document
New microsoft office word document
 
History of the cooperative movement
History of the cooperative movementHistory of the cooperative movement
History of the cooperative movement
 
Dairy cooperatives
Dairy cooperativesDairy cooperatives
Dairy cooperatives
 
Cooperative
CooperativeCooperative
Cooperative
 
Consumer cooperative
Consumer cooperativeConsumer cooperative
Consumer cooperative
 
Capitalism and socialism
Capitalism and socialismCapitalism and socialism
Capitalism and socialism
 
Banking cooperative
Banking cooperativeBanking cooperative
Banking cooperative
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 

Recently uploaded

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 

bankauditinITEnv

  • 1.
  • 2. During the past few years Information Technology has made rapid inroads into our lives in a way we could ever imagine.
  • 3. Mom, When is my Happy Download Day?
  • 4. How many times have I told you! You were not downloaded. You were born…
  • 5. we are currently developing an insatiable appetite for instant information made possible by Information Technology. Information Technology has completely changed the way, we lead our lives.
  • 6.
  • 7. The wide spread use and ongoing development of Information Technology has affected business immeasurably. And that is the reason; the audit environment has also undergone a chemical change.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. The basic tenet of Audit remains the same-i.e. reliability and integrity of data. Use of IT does not give rise to new audit objectives nor does it change the same. But the role, focus and scope of audit has certainly changed in the changed environment .
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. Arithmetic accuracy and uniform processing of transactions that reduces the audit risk as there is no need to maintain and verify balancing ledgers and no need to verify postings if there is a fool proof computer system. Further, the system calculates interest automatically and chances of error are limited. The clerical errors ordinarily associated with manual processing are virtually eliminated. Advantages over manual system
  • 23.
  • 24. After the AAS 29 on Auditing in a Computerised Information Systems (CIS) environment became operative for all audits related to accounting periods beginning on or after 1st April 2003, the responsibility of the bank branch auditor has increased manifold. As per AAS 29, the overall objective and scope of an audit does not change in a CIS environment, however, the use of a computer changes the processing, storage, retrieval and communication of financial information and may affect the accounting and internal control systems employed by the entity. AAS 29
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Networked Domain / Intranet Internal Threats Through : Employees / Vendors/ Ex-Employees etc. Reasons: Sabotage / Revenge/ Money Methods: Virus/ Trojan, Denial of service attack / Trap door/ Spoofing/ Destruction etc INCREASING RISK Environmental / Physical Threats E.g. Fire / Storms/ Earthquake Manual TBA CBS External Threats Through: Hackers/ competitors / criminals etc. Reasons: Sabotage / Revenge/ Money Methods: Virus/ Trojan, Denial of service attack / Trap door/ Spoofing/ Destruction / social engineering etc Information Security Risk in a Bank
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.