SlideShare a Scribd company logo
COMPUTER-ASSISTED
AUDIT TOOLS AND
TECHNIQUES
Supriadi
11353104780
Learning Objectives
• Be familiar with the classes of transaction input controls
used by accounting applications.
• Understand the objectives and techniques used to
implement processing controls, including run-to-run,
operator inventions, and audit trail controls.
• Understand the methods used to establish effective output
controls for both batch and real-time systems.
09/01/2017 1
Input Controls
• Programmed procedures also known as edits or validation
controls.
• Perform tests on transaction data to ensure they are error free
before processing. Three categories:
• Field interrogation involves programmed procedures to
examine the characteristics of the data in the field:
• Common data input errors are (1) transcription (addition truncation or
substitution) and (2) transposition errors. These problems are
controlled with Check digits.
• Missing data checks are used to check for blank spaces.
• Numeric-alphabetic check identify data in the wrong form.
• Limit checks test for amounts that exceed authorized limits.
• Range checks for upper & lower limits of acceptable values.
• Validity checks compare actual against acceptable values.
2
Validation During Data Input
3
Validation in Batch Sequential File System
4
Input Controls
• Record interrogation procedures valid records by
examining the interrelationship of its field values.
• Reasonableness check determines if a value is reasonable when
considered alone with other data fields.
• Sign check verifies the sign of the field is correct.
• Sequence check use to determine if a record is out of order.
• File interrogation is to ensure the correct file is being
processed:
• Internal and external label checks verify the file being processed is
the one being called for.
• Version checks are used to verify the correct version is being
processed.
5
Processing Controls
• Run-to-run controls monitor a batch as it moves from one
run to another and ensures:
• All records are processed, no record processed more than once.
• A transaction audit trail is created.
• Accomplished through batch control data that includes: unique
batch number, date, transaction code, record count, total dollar
value (control total), and a hash total.
09/01/2017 6
Processing Controls
• Common error handling techniques:
• Correct immediately: With the direct data validation approach, error
detection and correction can take place during data entry.
• Create an error file: Individual errors are flagged to prevent them
from being processed, corrected and resubmitted as a separate
batch for reprocessing.
• Reject the batch: Some errors are associated with the entire batch
making the best solution to cease processing.
09/01/2017 7
Run-to-Run Controls
8
Processing Controls
• Operator intervention increases potential for human error.
Systems with operator intervention controls less prone to
processing errors.
• Preservation of audit trail important objective of process
control.
• Transaction logs should record every transaction successfully
processed by the system.
• All automatically generated transactions should be included in the
log with the responsible end user receiving a detailed listing.
• Each transaction processed must have a unique identifier.
• A listing of all error records should go to the appropriate user to
support error correction and resubmission.
9
Transaction Log to Preserve the Audit
Trail
10
Stages in the Output Process
11
Output Controls
• Ensure system output is not lost, misplaced or corrupted
and that privacy policy not violated. Controls for batch
system output include:
• Output spooling directs output to a magnetic disk rather
than to the printer. When resources become available
output files are printed.
• Creation of the output file presents an added exposure for a
computer criminal to access, copy or destroy the file.
12
Output Controls
• Print program requires operator interventions to print,
monitor and remove the output. Program controls are
designed to:
• Prevent unauthorized copies and unauthorized browsing of
sensitive data by employees.
• Printed output reports go through the bursting stage to
have pages separated and collated.
• Primary control is supervision.
• Computer waste represents a potential risk.
• Should be shredded before disposal.
13
Output Controls
• Data control group sometimes responsible for verifying
accuracy of output before distribution.
• Report distribution risks include reports being lost, stolen
or misdirected.
• Secure mailboxes, in person pickup or secured delivery.
• End user control include error checking and secure
storage until report’s expiration period has expired.
• Real-time output threats include interception, disruption,
destruction or corruption of output.
14
Computer Aided Audit Tools & Techniques
for Testing Controls
• Test data method used to establish the application
processing integrity.
• Results from test run compared to predetermined expectations to
evaluate application logic and controls.
• Test data includes both valid and invalid transactions.
• Base case system evaluation (BCSE) is a variant of test
data method in which comprehensive test data goes
through repetitive testing until a valid base case is
obtained.
• When application is modified, subsequent test (new) results can be
compared with previous results (base).
15
Test Data Technique
16
Computer Aided Audit Tools & Techniques
for Testing Controls
• Tracing takes step-by-step walk of application’s internal
logic.
• Advantages of test data technique:
• Provide explicit evidence concerning application function.
• Can be employed with only minimal disruption.
• Require only minimal auditor computer expertise.
• Disadvantages of test data technique:
• Auditors must rely on computer services personnel to obtain a copy
of the application for testing.
• Provides static picture of application integrity and not a convenient
means of gathering evidence about ongoing application
functionality.
• Relatively high cost to implement, auditing inefficiency.
09/01/2017 17
The Integrated Test Facility (ITF)
• Automated technique allows auditors to test logic and
controls during normal operations by setting up a dummy
entity within the application system.
• System discriminates between ITF and routine transactions.
• Auditor analyzes ITF results against expected results.
• Advantages of ITF:
• Supports ongoing monitoring of controls as specified by COSO
control framework.
• Applications can be economically tested without disrupting user
operations and without the intervention of computer service
personnel, improving efficiency and reliability.
• Primary disadvantage of ITF is potential for corrupting
data files.
09/01/2017 18
ITF Technique
19
Parallel Simulation
• Requires auditor to write program that simulates key
features or processes of application under review.
• Auditor gains a thorough understanding of application under review
and identifies critical processes and controls.
• Auditor creates the simulation using program or Generalized Audit
Software (GAS).
• Auditor runs the simulated program using selected data and files.
• Auditor evaluates results and reconciles differences.
• Auditor must carefully evaluate differences between test
results and production results.
20
Parallel Simulation Technique
21

More Related Content

What's hot

Information System audit
Information System auditInformation System audit
Information System auditPratapchandra
 
Auditing the expenditure cycle
Auditing the expenditure cycleAuditing the expenditure cycle
Auditing the expenditure cycle
Angela Torres
 
Chapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsChapter 2 auditing it governance controls
Chapter 2 auditing it governance controls
Tommy Zul Hidayat
 
Generalized audit-software
Generalized audit-softwareGeneralized audit-software
Generalized audit-software
kzoe1996
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
_supriadi
 
Parallel simulation
Parallel simulationParallel simulation
Parallel simulation
kzoe1996
 
Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...
Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...
Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...
Ee Chuan Yoong
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal control
jayussuryawan
 
03.2 application control
03.2 application control03.2 application control
03.2 application controlMulyadi Yusuf
 
General Ledger and Financial Reporting System (GLFRS)
General Ledger and Financial Reporting System (GLFRS)General Ledger and Financial Reporting System (GLFRS)
General Ledger and Financial Reporting System (GLFRS)
Osareme Erhomosele
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Sharah Ayumi
 
Auditing in Computerized Environment
Auditing in Computerized EnvironmentAuditing in Computerized Environment
Auditing in Computerized Environment
Dr. Sushil Bansode
 
James hall ch 3
James hall ch 3James hall ch 3
James hall ch 3
David Julian
 
Chapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's PerspectiveChapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's Perspective
ermin08
 
Chapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsChapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systems
jayussuryawan
 
Introduction to Transaction Processing Chapter No. 2
Introduction to Transaction Processing   Chapter No. 2Introduction to Transaction Processing   Chapter No. 2
Introduction to Transaction Processing Chapter No. 2
Qamar Farooq
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
Sreekanth Narendran
 
IT Revision and Auditing
IT Revision and AuditingIT Revision and Auditing
IT Revision and Auditing
Amith Reddy
 
Systems development and program change activities
Systems development and program change activitiesSystems development and program change activities
Systems development and program change activities
kristine manzano
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1Cheng Olayvar
 

What's hot (20)

Information System audit
Information System auditInformation System audit
Information System audit
 
Auditing the expenditure cycle
Auditing the expenditure cycleAuditing the expenditure cycle
Auditing the expenditure cycle
 
Chapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsChapter 2 auditing it governance controls
Chapter 2 auditing it governance controls
 
Generalized audit-software
Generalized audit-softwareGeneralized audit-software
Generalized audit-software
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
 
Parallel simulation
Parallel simulationParallel simulation
Parallel simulation
 
Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...
Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...
Computer Assisted Audit Tools and Techniques - the Force multiplier in the ba...
 
Chapter 1 auditing and internal control
Chapter 1 auditing and internal controlChapter 1 auditing and internal control
Chapter 1 auditing and internal control
 
03.2 application control
03.2 application control03.2 application control
03.2 application control
 
General Ledger and Financial Reporting System (GLFRS)
General Ledger and Financial Reporting System (GLFRS)General Ledger and Financial Reporting System (GLFRS)
General Ledger and Financial Reporting System (GLFRS)
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
 
Auditing in Computerized Environment
Auditing in Computerized EnvironmentAuditing in Computerized Environment
Auditing in Computerized Environment
 
James hall ch 3
James hall ch 3James hall ch 3
James hall ch 3
 
Chapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's PerspectiveChapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's Perspective
 
Chapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsChapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systems
 
Introduction to Transaction Processing Chapter No. 2
Introduction to Transaction Processing   Chapter No. 2Introduction to Transaction Processing   Chapter No. 2
Introduction to Transaction Processing Chapter No. 2
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
 
IT Revision and Auditing
IT Revision and AuditingIT Revision and Auditing
IT Revision and Auditing
 
Systems development and program change activities
Systems development and program change activitiesSystems development and program change activities
Systems development and program change activities
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1
 

Viewers also liked

Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Shahzeb Pirzada
 
COMPUTER ASSITED AUDIT TOOLS AND TECHNIQUES
COMPUTER ASSITED AUDIT TOOLS AND TECHNIQUESCOMPUTER ASSITED AUDIT TOOLS AND TECHNIQUES
COMPUTER ASSITED AUDIT TOOLS AND TECHNIQUES
Dhina Pohan
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)Rikesh Chaurasia
 
Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques
Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques
Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques
Jim Kaplan CIA CFE
 
COMPUTER ASSISTED AUDIT TECHNIQUES (CAATS) / TABK
COMPUTER ASSISTED AUDIT TECHNIQUES (CAATS) / TABKCOMPUTER ASSISTED AUDIT TECHNIQUES (CAATS) / TABK
COMPUTER ASSISTED AUDIT TECHNIQUES (CAATS) / TABK
Catur Setiawan
 
Usha infotech - Stock Inventory Management & Audit Tools for CA Study Circle
Usha infotech - Stock Inventory Management & Audit Tools for CA Study CircleUsha infotech - Stock Inventory Management & Audit Tools for CA Study Circle
Usha infotech - Stock Inventory Management & Audit Tools for CA Study Circle
Usha Infotech
 
Computer Audit an Introductory
Computer Audit an IntroductoryComputer Audit an Introductory
Computer Audit an Introductory
MNorazizi HM
 
SEO Audit Tools, Tips and Tricks - SMX West 2016
SEO Audit Tools, Tips and Tricks - SMX West 2016SEO Audit Tools, Tips and Tricks - SMX West 2016
SEO Audit Tools, Tips and Tricks - SMX West 2016
Benj Arriola
 
vijaya bank audit procedure
vijaya bank audit procedurevijaya bank audit procedure
vijaya bank audit procedure
keerthiredddy
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
EMAC Consulting Group
 
Perform audit testing in excel: Monetary Unit Sampling Method
Perform audit testing in excel: Monetary Unit Sampling MethodPerform audit testing in excel: Monetary Unit Sampling Method
Perform audit testing in excel: Monetary Unit Sampling Method
Tao Li CPA,CA
 
A Quick Simple MS Excel Dashboard
A Quick Simple MS Excel DashboardA Quick Simple MS Excel Dashboard
A Quick Simple MS Excel Dashboard
Pranav Ghode
 
Bank audit slideshare
Bank audit   slideshareBank audit   slideshare
Bank audit slideshare
Priti Parab
 

Viewers also liked (15)

Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
 
COMPUTER ASSITED AUDIT TOOLS AND TECHNIQUES
COMPUTER ASSITED AUDIT TOOLS AND TECHNIQUESCOMPUTER ASSITED AUDIT TOOLS AND TECHNIQUES
COMPUTER ASSITED AUDIT TOOLS AND TECHNIQUES
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
 
Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques
Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques
Using MS Excel In Your Next Audit - Top Basic & Intermediate Techniques
 
COMPUTER ASSISTED AUDIT TECHNIQUES (CAATS) / TABK
COMPUTER ASSISTED AUDIT TECHNIQUES (CAATS) / TABKCOMPUTER ASSISTED AUDIT TECHNIQUES (CAATS) / TABK
COMPUTER ASSISTED AUDIT TECHNIQUES (CAATS) / TABK
 
Pp 17-new
Pp 17-newPp 17-new
Pp 17-new
 
Usha infotech - Stock Inventory Management & Audit Tools for CA Study Circle
Usha infotech - Stock Inventory Management & Audit Tools for CA Study CircleUsha infotech - Stock Inventory Management & Audit Tools for CA Study Circle
Usha infotech - Stock Inventory Management & Audit Tools for CA Study Circle
 
Computer Audit an Introductory
Computer Audit an IntroductoryComputer Audit an Introductory
Computer Audit an Introductory
 
SEO Audit Tools, Tips and Tricks - SMX West 2016
SEO Audit Tools, Tips and Tricks - SMX West 2016SEO Audit Tools, Tips and Tricks - SMX West 2016
SEO Audit Tools, Tips and Tricks - SMX West 2016
 
Caat
CaatCaat
Caat
 
vijaya bank audit procedure
vijaya bank audit procedurevijaya bank audit procedure
vijaya bank audit procedure
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
 
Perform audit testing in excel: Monetary Unit Sampling Method
Perform audit testing in excel: Monetary Unit Sampling MethodPerform audit testing in excel: Monetary Unit Sampling Method
Perform audit testing in excel: Monetary Unit Sampling Method
 
A Quick Simple MS Excel Dashboard
A Quick Simple MS Excel DashboardA Quick Simple MS Excel Dashboard
A Quick Simple MS Excel Dashboard
 
Bank audit slideshare
Bank audit   slideshareBank audit   slideshare
Bank audit slideshare
 

Similar to Computer-Assisted Audit Tools and Techniques

CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
dotco
 
3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf
Nehemiah27
 
Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkata
sunil patro
 
Information system audit
Information system audit Information system audit
Information system audit
Jayant Dalvi
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
Adetula Bunmi
 
Chromatography Data System: Getting It “Right First Time” Seminar Series – Pa...
Chromatography Data System: Getting It “Right First Time” Seminar Series – Pa...Chromatography Data System: Getting It “Right First Time” Seminar Series – Pa...
Chromatography Data System: Getting It “Right First Time” Seminar Series – Pa...
Chromatography & Mass Spectrometry Solutions
 
Information systems audit n control introduction.ppt
Information systems audit n control introduction.pptInformation systems audit n control introduction.ppt
Information systems audit n control introduction.ppt
r209777z
 
UNIT TESTING.pptx
UNIT TESTING.pptxUNIT TESTING.pptx
UNIT TESTING.pptx
DrTThendralCompSci
 
Audit and Assurance
Audit and AssuranceAudit and Assurance
Audit and Assurance
MuhamadSyawal7
 
Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering Introduction
rajeswaricseAvinuty
 
ISTQB foundation level - day 2
ISTQB foundation level - day 2ISTQB foundation level - day 2
ISTQB foundation level - day 2
Shuchi Singla AKT,SPC4,PMI-ACP,ITIL(F),CP-AAT
 
unit-2_20-july-2018 (1).pptx
unit-2_20-july-2018 (1).pptxunit-2_20-july-2018 (1).pptx
unit-2_20-july-2018 (1).pptx
PriyaFulpagare1
 
Auditing in computerized environment.pptx
Auditing in computerized environment.pptxAuditing in computerized environment.pptx
Auditing in computerized environment.pptx
infantemiliya18
 
Information system audit
Information system audit Information system audit
Information system audit
Jayant Dalvi
 
CISA_WK_1.pptx
CISA_WK_1.pptxCISA_WK_1.pptx
CISA_WK_1.pptx
dotco
 
Real time Audit
Real time AuditReal time Audit
Real time Audit
PawanRohilla12
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2
Jayant Dalvi
 
Chapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptxChapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptx
ToxicHawk
 
Effects of IT on internal controls
Effects of IT on internal controlsEffects of IT on internal controls
Effects of IT on internal controls
Lou Foja
 

Similar to Computer-Assisted Audit Tools and Techniques (20)

CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
 
3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf
 
Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkata
 
Information system audit
Information system audit Information system audit
Information system audit
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
Chromatography Data System: Getting It “Right First Time” Seminar Series – Pa...
Chromatography Data System: Getting It “Right First Time” Seminar Series – Pa...Chromatography Data System: Getting It “Right First Time” Seminar Series – Pa...
Chromatography Data System: Getting It “Right First Time” Seminar Series – Pa...
 
Information systems audit n control introduction.ppt
Information systems audit n control introduction.pptInformation systems audit n control introduction.ppt
Information systems audit n control introduction.ppt
 
UNIT TESTING.pptx
UNIT TESTING.pptxUNIT TESTING.pptx
UNIT TESTING.pptx
 
Audit and Assurance
Audit and AssuranceAudit and Assurance
Audit and Assurance
 
Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering Introduction
 
ISTQB foundation level - day 2
ISTQB foundation level - day 2ISTQB foundation level - day 2
ISTQB foundation level - day 2
 
unit-2_20-july-2018 (1).pptx
unit-2_20-july-2018 (1).pptxunit-2_20-july-2018 (1).pptx
unit-2_20-july-2018 (1).pptx
 
Auditing in computerized environment.pptx
Auditing in computerized environment.pptxAuditing in computerized environment.pptx
Auditing in computerized environment.pptx
 
Information system audit
Information system audit Information system audit
Information system audit
 
CISA_WK_1.pptx
CISA_WK_1.pptxCISA_WK_1.pptx
CISA_WK_1.pptx
 
Real time Audit
Real time AuditReal time Audit
Real time Audit
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2
 
Chapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptxChapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptx
 
Epitome Corporate PPT
Epitome Corporate PPTEpitome Corporate PPT
Epitome Corporate PPT
 
Effects of IT on internal controls
Effects of IT on internal controlsEffects of IT on internal controls
Effects of IT on internal controls
 

Recently uploaded

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 

Recently uploaded (20)

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 

Computer-Assisted Audit Tools and Techniques

  • 2. Learning Objectives • Be familiar with the classes of transaction input controls used by accounting applications. • Understand the objectives and techniques used to implement processing controls, including run-to-run, operator inventions, and audit trail controls. • Understand the methods used to establish effective output controls for both batch and real-time systems. 09/01/2017 1
  • 3. Input Controls • Programmed procedures also known as edits or validation controls. • Perform tests on transaction data to ensure they are error free before processing. Three categories: • Field interrogation involves programmed procedures to examine the characteristics of the data in the field: • Common data input errors are (1) transcription (addition truncation or substitution) and (2) transposition errors. These problems are controlled with Check digits. • Missing data checks are used to check for blank spaces. • Numeric-alphabetic check identify data in the wrong form. • Limit checks test for amounts that exceed authorized limits. • Range checks for upper & lower limits of acceptable values. • Validity checks compare actual against acceptable values. 2
  • 5. Validation in Batch Sequential File System 4
  • 6. Input Controls • Record interrogation procedures valid records by examining the interrelationship of its field values. • Reasonableness check determines if a value is reasonable when considered alone with other data fields. • Sign check verifies the sign of the field is correct. • Sequence check use to determine if a record is out of order. • File interrogation is to ensure the correct file is being processed: • Internal and external label checks verify the file being processed is the one being called for. • Version checks are used to verify the correct version is being processed. 5
  • 7. Processing Controls • Run-to-run controls monitor a batch as it moves from one run to another and ensures: • All records are processed, no record processed more than once. • A transaction audit trail is created. • Accomplished through batch control data that includes: unique batch number, date, transaction code, record count, total dollar value (control total), and a hash total. 09/01/2017 6
  • 8. Processing Controls • Common error handling techniques: • Correct immediately: With the direct data validation approach, error detection and correction can take place during data entry. • Create an error file: Individual errors are flagged to prevent them from being processed, corrected and resubmitted as a separate batch for reprocessing. • Reject the batch: Some errors are associated with the entire batch making the best solution to cease processing. 09/01/2017 7
  • 10. Processing Controls • Operator intervention increases potential for human error. Systems with operator intervention controls less prone to processing errors. • Preservation of audit trail important objective of process control. • Transaction logs should record every transaction successfully processed by the system. • All automatically generated transactions should be included in the log with the responsible end user receiving a detailed listing. • Each transaction processed must have a unique identifier. • A listing of all error records should go to the appropriate user to support error correction and resubmission. 9
  • 11. Transaction Log to Preserve the Audit Trail 10
  • 12. Stages in the Output Process 11
  • 13. Output Controls • Ensure system output is not lost, misplaced or corrupted and that privacy policy not violated. Controls for batch system output include: • Output spooling directs output to a magnetic disk rather than to the printer. When resources become available output files are printed. • Creation of the output file presents an added exposure for a computer criminal to access, copy or destroy the file. 12
  • 14. Output Controls • Print program requires operator interventions to print, monitor and remove the output. Program controls are designed to: • Prevent unauthorized copies and unauthorized browsing of sensitive data by employees. • Printed output reports go through the bursting stage to have pages separated and collated. • Primary control is supervision. • Computer waste represents a potential risk. • Should be shredded before disposal. 13
  • 15. Output Controls • Data control group sometimes responsible for verifying accuracy of output before distribution. • Report distribution risks include reports being lost, stolen or misdirected. • Secure mailboxes, in person pickup or secured delivery. • End user control include error checking and secure storage until report’s expiration period has expired. • Real-time output threats include interception, disruption, destruction or corruption of output. 14
  • 16. Computer Aided Audit Tools & Techniques for Testing Controls • Test data method used to establish the application processing integrity. • Results from test run compared to predetermined expectations to evaluate application logic and controls. • Test data includes both valid and invalid transactions. • Base case system evaluation (BCSE) is a variant of test data method in which comprehensive test data goes through repetitive testing until a valid base case is obtained. • When application is modified, subsequent test (new) results can be compared with previous results (base). 15
  • 18. Computer Aided Audit Tools & Techniques for Testing Controls • Tracing takes step-by-step walk of application’s internal logic. • Advantages of test data technique: • Provide explicit evidence concerning application function. • Can be employed with only minimal disruption. • Require only minimal auditor computer expertise. • Disadvantages of test data technique: • Auditors must rely on computer services personnel to obtain a copy of the application for testing. • Provides static picture of application integrity and not a convenient means of gathering evidence about ongoing application functionality. • Relatively high cost to implement, auditing inefficiency. 09/01/2017 17
  • 19. The Integrated Test Facility (ITF) • Automated technique allows auditors to test logic and controls during normal operations by setting up a dummy entity within the application system. • System discriminates between ITF and routine transactions. • Auditor analyzes ITF results against expected results. • Advantages of ITF: • Supports ongoing monitoring of controls as specified by COSO control framework. • Applications can be economically tested without disrupting user operations and without the intervention of computer service personnel, improving efficiency and reliability. • Primary disadvantage of ITF is potential for corrupting data files. 09/01/2017 18
  • 21. Parallel Simulation • Requires auditor to write program that simulates key features or processes of application under review. • Auditor gains a thorough understanding of application under review and identifies critical processes and controls. • Auditor creates the simulation using program or Generalized Audit Software (GAS). • Auditor runs the simulated program using selected data and files. • Auditor evaluates results and reconciles differences. • Auditor must carefully evaluate differences between test results and production results. 20