SlideShare a Scribd company logo
USING COMPUTER
ASSISTED AUDIT
TOOLS AND
TECHNIQUES
(CAATT’S)
Computer Assisted Audit Tools and Techniques
• Has two subcomponents:
1. Software used to increase an auditor’s
personal productivity and software used
to perform data extraction and analysis,
2. Techniques to increase the efficiency
and effectiveness of the audit function.
Input Controls
• Designed to ensure that the
transactions that bring data into
the system are valid, accurate, and
complete
 Data input procedures can be
either:
 Source document-triggered (batch)
 Direct input (real-time)
 Source document input requires
human involvement and is prone to
clerical errors.
 Direct input employs real-time
editing techniques to identify and
correct errors immediately
Classes of Input Controls
1) Source document controls
2) Data coding controls
3) Batch controls
4) Validation controls
5) Input error correction
6) Generalized data input systems
Source Document Controls


Controls in systems using physical source
documents



To control for exposure, control
procedures are needed over source
documents to account for each one




Use pre-numbered source documents
Use source documents in sequence
Periodically audit source documents
Data Coding Controls




Checks on data integrity during processing

Transcription errors
 Addition errors
 Truncation errors
 Substitution errors

Transposition errors
 Single transposition
 Multiple transposition
Control = Check digits

Added to code when created (suffix, prefix,
embedded)
 Sum of digits (ones): transcription errors only
 Modulus 11: different weights per column:
transposition and transcription errors

Introduces storage and processing inefficiencies
Batch Controls


Method for handling high volumes of
transaction data – esp. paper-fed IS



Controls of batch continues thru all phases
of system and all processes (i.e., not JUST an
input control)
1) All records in the batch are processed together
2) No records are processed more than once
3) An audit trail is maintained from input to output



Requires grouping of similar input
transactions
Batch Controls
 Requires controlling batch throughout


Batch transmittal sheet (batch control record)







Unique batch number (serial #)
A batch date
A transaction code
Number of records in the batch
Total dollar value of financial field
Sum of unique non-financial field

• Hash total
• E.g., customer number


Batch control log



Hash totals
Validation Controls


Intended to detect errors in data
before processing



Most effective if performed close to
the source of the transaction



Some require referencing a master
file
 Field Interrogation
 Missing data checks
 Numeric-alphabetic data checks
 Zero-value checks
 Limit checks
 Range checks
 Validity checks
 Check digit
 Record Interrogation
 Reasonableness checks
 Sign checks
 Sequence checks
 File Interrogation
 Internal label checks (tape)
 Version checks
 Expiration date check
Input Error Connection


Batch – correct and resubmit



Controls to make sure errors dealt
with completely and accurately

1) Immediate Correction
2) Create an Error File
 Reverse the effects of partially

processed, resubmit corrected
records
 Reinsert corrected records in
processing stage where error was
detected
3) Reject the Entire Batch
Generalized Data Input Systems (GDIS)


Centralized procedures to manage data
input for all transaction processing systems



Eliminates need to create redundant
routines for each new application



Advantages:




Improves control by having one
common system perform all data
validation
Ensures each AIS application applies a
consistent standard of data validation
Improves systems development
efficiency
 Major components:

1) Generalized Validation
Module
2) Validated Data File
3) Error File
4) Error Reports
5) Transaction Log
Process Controls
1) Run-to-Run Controls
2) Operator Intervention Controls
3) Audit Trail Controls
Run-to-Run (Batch)

 Use batch figures to
monitor the batch as it
moves from one process
to another
1) Recalculate Control

Totals
2) Check Transaction Codes
3) Sequence Checks
Operator Intervention
 When operator manually enters
controls into the system
 Preference is to derive by logic or
provided by system
Audit Trail Controls
 Every transaction becomes
traceable from input to output
 Each processing step is documented
 Preservation is key to auditability of
AIS






Transaction logs
Log of automatic transactions
Listing of automatic transactions
Unique transaction identifiers [s/n]
Error listing
Output Controls
 Ensure system output:
1)
2)
3)
4)

Not misplaced
Not misdirected
Not corrupted
Privacy policy not violated

 Batch systems more susceptible to exposure,
require greater controls


Controlling Batch Systems Output






Many steps from printer to end user
Data control clerk check point
Unacceptable printing should be shredded
Cost/benefit basis for controls
Sensitivity of data drives levels of controls
 Output spooling – risks:
 Access the output file and change
critical data values
 Access the file and change the
number of copies to be printed
 Make a copy of the output file so
illegal output can be generated
 Destroy the output file before
printing take place
 Print Programs
 Operator Intervention:
1) Pausing the print program to load output paper
2) Entering parameters needed by the print run
3) Restarting the print run at a prescribed checkpoint after
a printer malfunction
4) Removing printer output from the printer for review and
distribution

 Print Program Controls


Production of unauthorized copies
 Employ output document controls similar to source
document controls

 Unauthorized browsing of sensitive data by
employees
 Special multi-part paper that blocks certain fields
 Bursting
 Supervision

 Waste
 Proper disposal of aborted
copies and carbon copies

 Data control
 Data control group – verify
and log

 Report distribution
 Supervision
 End user controls


End user detection

 Report retention:





Statutory requirements (gov’t)
Number of copies in existence
Existence of softcopies (backups)
Destroyed in a manner consistent
with the sensitivity of its
contents
 Controlling real-time systems
output


Eliminates intermediaries



Threats:







Interception
Disruption
Destruction
Corruption

Exposures:
 Equipment failure
 Subversive acts



Systems performance controls



Chain of custody controls
TESTING COMPUTER
APPLICATION CONTROLS
1) Black box (around)
2) White box (through)
Black Box Testing



Ignore internal logic of application
Use functional characteristics





Advantages:




Flowcharts
Interview key personnel
Do not have to remove application from
operations to test it

Appropriately applied:



Simple applications
Relative low level of risk
White Box Testing





Relies on in-depth understanding of
the internal logic of the application
Uses small volume of carefully
crafted, custom test transactions to
verify specific aspects of logic and
controls
Allows auditors to conduct precise
test with known outcomes, which
can be compared objectively to
actual results
White Box Tests Methods
1) Authenticity tests:




Individuals / users
Programmed procedure
Messages to access system (e.g., logons)
 All-American University, student lab:

logon, reboot, logon *

2) Accuracy tests:


System only processes data values that
conform to specified tolerances

3) Completeness tests:


Identify missing data (field, records,
files)
4) Redundancy tests:


Process each record exactly once

5) Audit trail tests:


Ensure application and/or system
creates an adequate audit trail
 Transactions listing
 Error files or reports for all exceptions

6) Rounding error tests:



“Salami slicing”
Monitor activities – excessive ones are
serious exceptions; e.g, rounding and
thousands of entries into a single
account for $1 or 1¢
Computer Aided Audit Tools and
Controls (CAATTs)
1)
2)
3)
4)
5)
6)

Test data method
Base case system evaluation
Tracing
Integrated Test Facility [ITF]
Parallel simulation
GAS
Test Data Method


Used to establish the application
processing integrity



Uses a “test deck”




Valid data
Purposefully selected invalid data
Every possible:
 Input error
 Logical processes
 Irregularity



Procedures:
1) Predetermined results and expectations
2) Run test deck
3) Compare
Base Case System Evaluation


Variant of Test Data method



Comprehensive test data



Repetitive testing throughout SDLC



When application is modified,
subsequent test (new) results can
be compared with previous results
(base)
Tracing


Test data technique that takes stepby-step walk through application
1) The trace option must be enabled for

the application
2) Specific data or types of transactions are

created as test data
3) Test data is “traced” through all

processing steps of the application, and
a listing is produced of all lines of code
as executed (variables, results, etc.)



Excellent means of debugging a
faculty program
Test Data: Pro’s and Cons
Pro’s
– They employ white

box approach, thus
providing explicit
evidence
– Can be employed

with minimal
disruption to
operations
– They require

minimal computer
expertise on the
part of the auditors

Cons
– Auditors must rely

on IS personnel to
obtain a copy of the
application for
testing
– Audit evidence is not
entirely independent
– Provides static
picture of
application integrity
– Relatively high cost
to implement,
auditing inefficiency
Integrated Test Facility


ITF is an automated technique that
allows auditors to test logic and
controls during normal operations



Set up a dummy entity within the
application system
1) Set up a dummy entity within the

application system
2) System able to discriminate between ITF
audit module transactions and routine
transactions
3) Auditor analyzes ITF results against
expected results
Parallel Simulation


Auditor writes or obtains a copy of
the program that simulates key
features or processes to be
reviewed / tested
1) Auditor gains a thorough

2)
3)

4)
5)

understanding of the application under
review
Auditor identifies those processes and
controls critical to the application
Auditor creates the simulation using
program or Generalized Audit Software
(GAS)
Auditor runs the simulated program
using selected data and files
Auditor evaluates results and reconciles
differences

More Related Content

What's hot

Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
_supriadi
 
Lecture 23 expenditure cycle part ii -fixed assets accounting information sy...
Lecture 23  expenditure cycle part ii -fixed assets accounting information sy...Lecture 23  expenditure cycle part ii -fixed assets accounting information sy...
Lecture 23 expenditure cycle part ii -fixed assets accounting information sy...
Habib Ullah Qamar
 
James hall ch 6
James hall ch 6James hall ch 6
James hall ch 6
David Julian
 
James hall ch 8
James hall ch 8James hall ch 8
James hall ch 8
David Julian
 
Chapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsChapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systems
jayussuryawan
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
_supriadi
 
General Ledger and Financial Reporting System (GLFRS)
General Ledger and Financial Reporting System (GLFRS)General Ledger and Financial Reporting System (GLFRS)
General Ledger and Financial Reporting System (GLFRS)
Osareme Erhomosele
 
Lecture 19 physical and manual system -revenue cycle - accounting informatio...
Lecture 19  physical and manual system -revenue cycle - accounting informatio...Lecture 19  physical and manual system -revenue cycle - accounting informatio...
Lecture 19 physical and manual system -revenue cycle - accounting informatio...
Habib Ullah Qamar
 
Transaction cycles @ ppt dom s
Transaction cycles @ ppt dom sTransaction cycles @ ppt dom s
Transaction cycles @ ppt dom s
Babasab Patil
 
James hall ch 7
James hall ch 7James hall ch 7
James hall ch 7
David Julian
 
James hall ch 15
James hall ch 15James hall ch 15
James hall ch 15
David Julian
 
Introduction to Transaction Processing Chapter No. 2
Introduction to Transaction Processing   Chapter No. 2Introduction to Transaction Processing   Chapter No. 2
Introduction to Transaction Processing Chapter No. 2
Qamar Farooq
 
Auditing the expenditure cycle
Auditing the expenditure cycleAuditing the expenditure cycle
Auditing the expenditure cycle
Angela Torres
 
Chapter 02 - Transaction Processing System
Chapter 02 - Transaction Processing SystemChapter 02 - Transaction Processing System
Chapter 02 - Transaction Processing System
Viduni Udovita
 
Lecture 10, Chapter 14, Auditing Sales and Receivables
Lecture 10, Chapter 14, Auditing Sales and ReceivablesLecture 10, Chapter 14, Auditing Sales and Receivables
Lecture 10, Chapter 14, Auditing Sales and Receivables
Sazzad Hossain, ITP, MBA, CSCA™
 
Presentation on Audit Findings
Presentation on Audit FindingsPresentation on Audit Findings
Presentation on Audit Findings
Deshapriya Senanayake
 
Auditing in a computer environment copy
Auditing in a computer environment   copyAuditing in a computer environment   copy
Auditing in a computer environment copySaleh Rashid
 
Lecture 21 expenditure cycle part i - accounting information systesm james ...
Lecture 21  expenditure cycle part i - accounting information systesm  james ...Lecture 21  expenditure cycle part i - accounting information systesm  james ...
Lecture 21 expenditure cycle part i - accounting information systesm james ...
Habib Ullah Qamar
 
ETHICS Fraud and Internal Control wfa.pptx
ETHICS Fraud and Internal Control wfa.pptxETHICS Fraud and Internal Control wfa.pptx
ETHICS Fraud and Internal Control wfa.pptx
NICOLECOCA2
 
The Revenue Cycle
The Revenue Cycle The Revenue Cycle
The Revenue Cycle
Qamar Farooq
 

What's hot (20)

Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
 
Lecture 23 expenditure cycle part ii -fixed assets accounting information sy...
Lecture 23  expenditure cycle part ii -fixed assets accounting information sy...Lecture 23  expenditure cycle part ii -fixed assets accounting information sy...
Lecture 23 expenditure cycle part ii -fixed assets accounting information sy...
 
James hall ch 6
James hall ch 6James hall ch 6
James hall ch 6
 
James hall ch 8
James hall ch 8James hall ch 8
James hall ch 8
 
Chapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsChapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systems
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
 
General Ledger and Financial Reporting System (GLFRS)
General Ledger and Financial Reporting System (GLFRS)General Ledger and Financial Reporting System (GLFRS)
General Ledger and Financial Reporting System (GLFRS)
 
Lecture 19 physical and manual system -revenue cycle - accounting informatio...
Lecture 19  physical and manual system -revenue cycle - accounting informatio...Lecture 19  physical and manual system -revenue cycle - accounting informatio...
Lecture 19 physical and manual system -revenue cycle - accounting informatio...
 
Transaction cycles @ ppt dom s
Transaction cycles @ ppt dom sTransaction cycles @ ppt dom s
Transaction cycles @ ppt dom s
 
James hall ch 7
James hall ch 7James hall ch 7
James hall ch 7
 
James hall ch 15
James hall ch 15James hall ch 15
James hall ch 15
 
Introduction to Transaction Processing Chapter No. 2
Introduction to Transaction Processing   Chapter No. 2Introduction to Transaction Processing   Chapter No. 2
Introduction to Transaction Processing Chapter No. 2
 
Auditing the expenditure cycle
Auditing the expenditure cycleAuditing the expenditure cycle
Auditing the expenditure cycle
 
Chapter 02 - Transaction Processing System
Chapter 02 - Transaction Processing SystemChapter 02 - Transaction Processing System
Chapter 02 - Transaction Processing System
 
Lecture 10, Chapter 14, Auditing Sales and Receivables
Lecture 10, Chapter 14, Auditing Sales and ReceivablesLecture 10, Chapter 14, Auditing Sales and Receivables
Lecture 10, Chapter 14, Auditing Sales and Receivables
 
Presentation on Audit Findings
Presentation on Audit FindingsPresentation on Audit Findings
Presentation on Audit Findings
 
Auditing in a computer environment copy
Auditing in a computer environment   copyAuditing in a computer environment   copy
Auditing in a computer environment copy
 
Lecture 21 expenditure cycle part i - accounting information systesm james ...
Lecture 21  expenditure cycle part i - accounting information systesm  james ...Lecture 21  expenditure cycle part i - accounting information systesm  james ...
Lecture 21 expenditure cycle part i - accounting information systesm james ...
 
ETHICS Fraud and Internal Control wfa.pptx
ETHICS Fraud and Internal Control wfa.pptxETHICS Fraud and Internal Control wfa.pptx
ETHICS Fraud and Internal Control wfa.pptx
 
The Revenue Cycle
The Revenue Cycle The Revenue Cycle
The Revenue Cycle
 

Viewers also liked

ชื่อ นางสาวรัตติยา ละชินลา
ชื่อ นางสาวรัตติยา  ละชินลาชื่อ นางสาวรัตติยา  ละชินลา
ชื่อ นางสาวรัตติยา ละชินลา
Rattiya Lachinla
 
Parallel Simulation of Urban Dynamics on the GPU Ivan Blečić, Arnaldo Cecchi...
Parallel Simulation of Urban Dynamics on the GPU  Ivan Blečić, Arnaldo Cecchi...Parallel Simulation of Urban Dynamics on the GPU  Ivan Blečić, Arnaldo Cecchi...
Parallel Simulation of Urban Dynamics on the GPU Ivan Blečić, Arnaldo Cecchi...Beniamino Murgante
 
Parallel Left Ventricle Simulation Using the FEniCS Framework
Parallel Left Ventricle Simulation Using the FEniCS FrameworkParallel Left Ventricle Simulation Using the FEniCS Framework
Parallel Left Ventricle Simulation Using the FEniCS Framework
Ural-PDC
 
Income Tax Audit
Income Tax AuditIncome Tax Audit
Income Tax Audit
Augustin Bangalore
 
Epic research daily agri report 27 sep 2016
Epic research daily agri report 27 sep 2016Epic research daily agri report 27 sep 2016
Epic research daily agri report 27 sep 2016
Epic Research
 
Types & Fundamentals of Information System
Types & Fundamentals of Information SystemTypes & Fundamentals of Information System
Types & Fundamentals of Information System
Awais Mansoor Chohan
 
Hotel night auditor kpi
Hotel night auditor kpiHotel night auditor kpi
Hotel night auditor kpideritahar
 
service audit-hotel
service audit-hotelservice audit-hotel
service audit-hotelRMC
 
Enfeite de natal em EVA para porta ou parede
Enfeite de natal em EVA para porta ou paredeEnfeite de natal em EVA para porta ou parede
Enfeite de natal em EVA para porta ou parede
Vila do Artesão
 

Viewers also liked (10)

ชื่อ นางสาวรัตติยา ละชินลา
ชื่อ นางสาวรัตติยา  ละชินลาชื่อ นางสาวรัตติยา  ละชินลา
ชื่อ นางสาวรัตติยา ละชินลา
 
Parallel Simulation of Urban Dynamics on the GPU Ivan Blečić, Arnaldo Cecchi...
Parallel Simulation of Urban Dynamics on the GPU  Ivan Blečić, Arnaldo Cecchi...Parallel Simulation of Urban Dynamics on the GPU  Ivan Blečić, Arnaldo Cecchi...
Parallel Simulation of Urban Dynamics on the GPU Ivan Blečić, Arnaldo Cecchi...
 
Parallel Left Ventricle Simulation Using the FEniCS Framework
Parallel Left Ventricle Simulation Using the FEniCS FrameworkParallel Left Ventricle Simulation Using the FEniCS Framework
Parallel Left Ventricle Simulation Using the FEniCS Framework
 
Income Tax Audit
Income Tax AuditIncome Tax Audit
Income Tax Audit
 
Epic research daily agri report 27 sep 2016
Epic research daily agri report 27 sep 2016Epic research daily agri report 27 sep 2016
Epic research daily agri report 27 sep 2016
 
Types & Fundamentals of Information System
Types & Fundamentals of Information SystemTypes & Fundamentals of Information System
Types & Fundamentals of Information System
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Hotel night auditor kpi
Hotel night auditor kpiHotel night auditor kpi
Hotel night auditor kpi
 
service audit-hotel
service audit-hotelservice audit-hotel
service audit-hotel
 
Enfeite de natal em EVA para porta ou parede
Enfeite de natal em EVA para porta ou paredeEnfeite de natal em EVA para porta ou parede
Enfeite de natal em EVA para porta ou parede
 

Similar to Caa ts

Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkata
sunil patro
 
IT Revision and Auditing
IT Revision and AuditingIT Revision and Auditing
IT Revision and Auditing
Amith Reddy
 
03.2 application control
03.2 application control03.2 application control
03.2 application controlMulyadi Yusuf
 
hhhh.ppt
hhhh.ppthhhh.ppt
hhhh.ppt
jack952975
 
Internal-control-in-the-computer-information-system-chap-27-aud-5-FINAL.pptx
Internal-control-in-the-computer-information-system-chap-27-aud-5-FINAL.pptxInternal-control-in-the-computer-information-system-chap-27-aud-5-FINAL.pptx
Internal-control-in-the-computer-information-system-chap-27-aud-5-FINAL.pptx
JayLloyd8
 
Testcase Preparation Checklist
Testcase Preparation ChecklistTestcase Preparation Checklist
Testcase Preparation Checklist
Sreeram Kishore Chavali
 
Softwaretestingtoolsanditstaxonomy 131204003332-phpapp01
Softwaretestingtoolsanditstaxonomy 131204003332-phpapp01Softwaretestingtoolsanditstaxonomy 131204003332-phpapp01
Softwaretestingtoolsanditstaxonomy 131204003332-phpapp01
Aravindharamanan S
 
Software testing tools and its taxonomy
Software testing tools and its taxonomySoftware testing tools and its taxonomy
Software testing tools and its taxonomy
Himanshu
 
Information system audit
Information system audit Information system audit
Information system audit
Jayant Dalvi
 
System Integration and Architecture.pptx
System Integration and Architecture.pptxSystem Integration and Architecture.pptx
System Integration and Architecture.pptx
MARIVICJOYCLAMUCHA1
 
Systems Analysis Midterm Lesson
Systems Analysis Midterm LessonSystems Analysis Midterm Lesson
Systems Analysis Midterm Lesson
Maulen Bale
 
System testing
System testingSystem testing
System testing
Sifat Hossain
 
Effects of IT on internal controls
Effects of IT on internal controlsEffects of IT on internal controls
Effects of IT on internal controls
Lou Foja
 
Chapter 8 - Software Testing.ppt
Chapter 8 - Software Testing.pptChapter 8 - Software Testing.ppt
Chapter 8 - Software Testing.ppt
GentaSahuri2
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
Mufaddal Nullwala
 
DI workshop.pdf
DI workshop.pdfDI workshop.pdf
DI workshop.pdf
agothoskar
 
System Testing.pptx
System Testing.pptxSystem Testing.pptx
System Testing.pptx
KarthigaiSelviS3
 
Application Security: By Prashant Mali Cyber law Consultant
Application Security: By Prashant Mali Cyber law ConsultantApplication Security: By Prashant Mali Cyber law Consultant
Application Security: By Prashant Mali Cyber law ConsultantShivaami Corporation
 

Similar to Caa ts (20)

Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkata
 
IT Revision and Auditing
IT Revision and AuditingIT Revision and Auditing
IT Revision and Auditing
 
03.2 application control
03.2 application control03.2 application control
03.2 application control
 
hhhh.ppt
hhhh.ppthhhh.ppt
hhhh.ppt
 
Internal-control-in-the-computer-information-system-chap-27-aud-5-FINAL.pptx
Internal-control-in-the-computer-information-system-chap-27-aud-5-FINAL.pptxInternal-control-in-the-computer-information-system-chap-27-aud-5-FINAL.pptx
Internal-control-in-the-computer-information-system-chap-27-aud-5-FINAL.pptx
 
Testcase Preparation Checklist
Testcase Preparation ChecklistTestcase Preparation Checklist
Testcase Preparation Checklist
 
Tc Checklist
Tc ChecklistTc Checklist
Tc Checklist
 
SECh1920
SECh1920SECh1920
SECh1920
 
Softwaretestingtoolsanditstaxonomy 131204003332-phpapp01
Softwaretestingtoolsanditstaxonomy 131204003332-phpapp01Softwaretestingtoolsanditstaxonomy 131204003332-phpapp01
Softwaretestingtoolsanditstaxonomy 131204003332-phpapp01
 
Software testing tools and its taxonomy
Software testing tools and its taxonomySoftware testing tools and its taxonomy
Software testing tools and its taxonomy
 
Information system audit
Information system audit Information system audit
Information system audit
 
System Integration and Architecture.pptx
System Integration and Architecture.pptxSystem Integration and Architecture.pptx
System Integration and Architecture.pptx
 
Systems Analysis Midterm Lesson
Systems Analysis Midterm LessonSystems Analysis Midterm Lesson
Systems Analysis Midterm Lesson
 
System testing
System testingSystem testing
System testing
 
Effects of IT on internal controls
Effects of IT on internal controlsEffects of IT on internal controls
Effects of IT on internal controls
 
Chapter 8 - Software Testing.ppt
Chapter 8 - Software Testing.pptChapter 8 - Software Testing.ppt
Chapter 8 - Software Testing.ppt
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
DI workshop.pdf
DI workshop.pdfDI workshop.pdf
DI workshop.pdf
 
System Testing.pptx
System Testing.pptxSystem Testing.pptx
System Testing.pptx
 
Application Security: By Prashant Mali Cyber law Consultant
Application Security: By Prashant Mali Cyber law ConsultantApplication Security: By Prashant Mali Cyber law Consultant
Application Security: By Prashant Mali Cyber law Consultant
 

Recently uploaded

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Caa ts

  • 1. USING COMPUTER ASSISTED AUDIT TOOLS AND TECHNIQUES (CAATT’S)
  • 2. Computer Assisted Audit Tools and Techniques • Has two subcomponents: 1. Software used to increase an auditor’s personal productivity and software used to perform data extraction and analysis, 2. Techniques to increase the efficiency and effectiveness of the audit function.
  • 3. Input Controls • Designed to ensure that the transactions that bring data into the system are valid, accurate, and complete  Data input procedures can be either:  Source document-triggered (batch)  Direct input (real-time)
  • 4.  Source document input requires human involvement and is prone to clerical errors.  Direct input employs real-time editing techniques to identify and correct errors immediately
  • 5. Classes of Input Controls 1) Source document controls 2) Data coding controls 3) Batch controls 4) Validation controls 5) Input error correction 6) Generalized data input systems
  • 6. Source Document Controls  Controls in systems using physical source documents  To control for exposure, control procedures are needed over source documents to account for each one    Use pre-numbered source documents Use source documents in sequence Periodically audit source documents
  • 7. Data Coding Controls   Checks on data integrity during processing  Transcription errors  Addition errors  Truncation errors  Substitution errors  Transposition errors  Single transposition  Multiple transposition Control = Check digits  Added to code when created (suffix, prefix, embedded)  Sum of digits (ones): transcription errors only  Modulus 11: different weights per column: transposition and transcription errors  Introduces storage and processing inefficiencies
  • 8. Batch Controls  Method for handling high volumes of transaction data – esp. paper-fed IS  Controls of batch continues thru all phases of system and all processes (i.e., not JUST an input control) 1) All records in the batch are processed together 2) No records are processed more than once 3) An audit trail is maintained from input to output  Requires grouping of similar input transactions
  • 9. Batch Controls  Requires controlling batch throughout  Batch transmittal sheet (batch control record)       Unique batch number (serial #) A batch date A transaction code Number of records in the batch Total dollar value of financial field Sum of unique non-financial field • Hash total • E.g., customer number  Batch control log  Hash totals
  • 10. Validation Controls  Intended to detect errors in data before processing  Most effective if performed close to the source of the transaction  Some require referencing a master file
  • 11.  Field Interrogation  Missing data checks  Numeric-alphabetic data checks  Zero-value checks  Limit checks  Range checks  Validity checks  Check digit  Record Interrogation  Reasonableness checks  Sign checks  Sequence checks
  • 12.  File Interrogation  Internal label checks (tape)  Version checks  Expiration date check
  • 13. Input Error Connection  Batch – correct and resubmit  Controls to make sure errors dealt with completely and accurately 1) Immediate Correction 2) Create an Error File  Reverse the effects of partially processed, resubmit corrected records  Reinsert corrected records in processing stage where error was detected 3) Reject the Entire Batch
  • 14. Generalized Data Input Systems (GDIS)  Centralized procedures to manage data input for all transaction processing systems  Eliminates need to create redundant routines for each new application  Advantages:    Improves control by having one common system perform all data validation Ensures each AIS application applies a consistent standard of data validation Improves systems development efficiency
  • 15.  Major components: 1) Generalized Validation Module 2) Validated Data File 3) Error File 4) Error Reports 5) Transaction Log
  • 16. Process Controls 1) Run-to-Run Controls 2) Operator Intervention Controls 3) Audit Trail Controls
  • 17. Run-to-Run (Batch)  Use batch figures to monitor the batch as it moves from one process to another 1) Recalculate Control Totals 2) Check Transaction Codes 3) Sequence Checks
  • 18. Operator Intervention  When operator manually enters controls into the system  Preference is to derive by logic or provided by system
  • 19. Audit Trail Controls  Every transaction becomes traceable from input to output  Each processing step is documented  Preservation is key to auditability of AIS      Transaction logs Log of automatic transactions Listing of automatic transactions Unique transaction identifiers [s/n] Error listing
  • 20. Output Controls  Ensure system output: 1) 2) 3) 4) Not misplaced Not misdirected Not corrupted Privacy policy not violated  Batch systems more susceptible to exposure, require greater controls  Controlling Batch Systems Output      Many steps from printer to end user Data control clerk check point Unacceptable printing should be shredded Cost/benefit basis for controls Sensitivity of data drives levels of controls
  • 21.  Output spooling – risks:  Access the output file and change critical data values  Access the file and change the number of copies to be printed  Make a copy of the output file so illegal output can be generated  Destroy the output file before printing take place
  • 22.  Print Programs  Operator Intervention: 1) Pausing the print program to load output paper 2) Entering parameters needed by the print run 3) Restarting the print run at a prescribed checkpoint after a printer malfunction 4) Removing printer output from the printer for review and distribution  Print Program Controls  Production of unauthorized copies  Employ output document controls similar to source document controls  Unauthorized browsing of sensitive data by employees  Special multi-part paper that blocks certain fields
  • 23.  Bursting  Supervision  Waste  Proper disposal of aborted copies and carbon copies  Data control  Data control group – verify and log  Report distribution  Supervision
  • 24.  End user controls  End user detection  Report retention:     Statutory requirements (gov’t) Number of copies in existence Existence of softcopies (backups) Destroyed in a manner consistent with the sensitivity of its contents
  • 25.  Controlling real-time systems output  Eliminates intermediaries  Threats:      Interception Disruption Destruction Corruption Exposures:  Equipment failure  Subversive acts  Systems performance controls  Chain of custody controls
  • 27. 1) Black box (around) 2) White box (through)
  • 28. Black Box Testing   Ignore internal logic of application Use functional characteristics    Advantages:   Flowcharts Interview key personnel Do not have to remove application from operations to test it Appropriately applied:   Simple applications Relative low level of risk
  • 29. White Box Testing    Relies on in-depth understanding of the internal logic of the application Uses small volume of carefully crafted, custom test transactions to verify specific aspects of logic and controls Allows auditors to conduct precise test with known outcomes, which can be compared objectively to actual results
  • 30. White Box Tests Methods 1) Authenticity tests:    Individuals / users Programmed procedure Messages to access system (e.g., logons)  All-American University, student lab: logon, reboot, logon * 2) Accuracy tests:  System only processes data values that conform to specified tolerances 3) Completeness tests:  Identify missing data (field, records, files)
  • 31. 4) Redundancy tests:  Process each record exactly once 5) Audit trail tests:  Ensure application and/or system creates an adequate audit trail  Transactions listing  Error files or reports for all exceptions 6) Rounding error tests:   “Salami slicing” Monitor activities – excessive ones are serious exceptions; e.g, rounding and thousands of entries into a single account for $1 or 1¢
  • 32. Computer Aided Audit Tools and Controls (CAATTs) 1) 2) 3) 4) 5) 6) Test data method Base case system evaluation Tracing Integrated Test Facility [ITF] Parallel simulation GAS
  • 33. Test Data Method  Used to establish the application processing integrity  Uses a “test deck”    Valid data Purposefully selected invalid data Every possible:  Input error  Logical processes  Irregularity  Procedures: 1) Predetermined results and expectations 2) Run test deck 3) Compare
  • 34. Base Case System Evaluation  Variant of Test Data method  Comprehensive test data  Repetitive testing throughout SDLC  When application is modified, subsequent test (new) results can be compared with previous results (base)
  • 35. Tracing  Test data technique that takes stepby-step walk through application 1) The trace option must be enabled for the application 2) Specific data or types of transactions are created as test data 3) Test data is “traced” through all processing steps of the application, and a listing is produced of all lines of code as executed (variables, results, etc.)  Excellent means of debugging a faculty program
  • 36. Test Data: Pro’s and Cons Pro’s – They employ white box approach, thus providing explicit evidence – Can be employed with minimal disruption to operations – They require minimal computer expertise on the part of the auditors Cons – Auditors must rely on IS personnel to obtain a copy of the application for testing – Audit evidence is not entirely independent – Provides static picture of application integrity – Relatively high cost to implement, auditing inefficiency
  • 37. Integrated Test Facility  ITF is an automated technique that allows auditors to test logic and controls during normal operations  Set up a dummy entity within the application system 1) Set up a dummy entity within the application system 2) System able to discriminate between ITF audit module transactions and routine transactions 3) Auditor analyzes ITF results against expected results
  • 38. Parallel Simulation  Auditor writes or obtains a copy of the program that simulates key features or processes to be reviewed / tested 1) Auditor gains a thorough 2) 3) 4) 5) understanding of the application under review Auditor identifies those processes and controls critical to the application Auditor creates the simulation using program or Generalized Audit Software (GAS) Auditor runs the simulated program using selected data and files Auditor evaluates results and reconciles differences