SlideShare a Scribd company logo
AWARENESS SESSION ON
“COMPUTER-ASSISTED AUDIT TOOLS
AND TECHNIQUES”
18 & 19 JULY 2019 KOLKATA
Presented By………………
Sunil Kumar Patro - 807
Swatishree Gupta - 808
Objectives
• Be familiar with the classes of transaction input controls
used by accounting applications.
• Understand the objectives and techniques used to
implement processing controls, including run-to-run,
operator inventions, and audit trail controls.
• Understand the methods used to establish effective output
controls for both batch and real-time systems.
Input Controls
 Programmed procedures also known as edits or validation
controls.
 Perform tests on transaction data to ensure they are error free
before processing. Three categories:
 Field interrogation involves programmed procedures to examine
the characteristics of the data in the field:
 Common data input errors are (1) transcription (addition
truncation or substitution) and (2) transposition errors. These
problems are controlled with Check digits.
 Missing data checks are used to check for blank spaces.
 Numeric-alphabetic check identify data in the wrong form.
 Limit checks test for amounts that exceed authorized limits.
 Range checks for upper & lower limits of acceptable values.
 Validity checks compare actual against acceptable values.
 Record interrogation procedures valid records by
examining the interrelationship of its field values.
 Reasonableness check determines if a value is reasonable
when considered alone with other data fields.
 Sign check verifies the sign of the field is correct.
 Sequence check use to determine if a record is out of order.
 File interrogation is to ensure the correct file is being
processed:
 Internal and external label checks verify the file being
processed is the one being called for.
 Version checks are used to verify the correct version is being
processed.
Processing Controls
 Run-to-run controls monitor a batch as it moves from
one run to another and ensures:
 All records are processed, no record processed more
than once.
 A transaction audit trail is created.
 Accomplished through batch control data that
includes: unique batch number, date, transaction
code, record count, total dollar value (control total),
and a hash total.
 Common error handling techniques:
 Correct immediately: With the direct data validation
approach, error detection and correction can take place
during data entry.
 Create an error file: Individual errors are flagged to
prevent them from being processed, corrected and
resubmitted as a separate batch for reprocessing.
 Reject the batch: Some errors are associated with the
entire batch making the best solution to cease
processing.
 Operator intervention increases potential for
human error. Systems with operator intervention
controls less prone to processing errors.
 Preservation of audit trail important objective of
process control.
 Transaction logs should record every transaction
successfully processed by the system.
 All automatically generated transactions should be
included in the log with the responsible end user
receiving a detailed listing.
 Each transaction processed must have a unique
identifier.
 A listing of all error records should go to the appropriate
user to support error correction and resubmission.
Transaction Log to Preserve the
Audit Trail
Output Controls
 Ensure system output is not lost, misplaced or corrupted
and that privacy policy not violated. Controls for batch
system output include:
 Output spooling directs output to a magnetic disk rather
than to the printer. When resources become available
output files are printed.
 Creation of the output file presents an added exposure for a
computer criminal to access, copy or destroy the file.
 Print program requires operator interventions to print,
monitor and remove the output. Program controls are
designed to:
 Prevent unauthorized copies and unauthorized browsing of
sensitive data by employees.
 Printed output reports go through the bursting stage
to have pages separated and collated.
 Primary control is supervision.
 Printed output reports go through the bursting stage
to have pages separated and collated.
 Primary control is supervision.
 Computer waste represents a potential risk.
 Should be shredded before disposal
Computer Aided Audit Tools & Techniques
for Testing Controls
 Test data method used to establish the application
processing integrity.
 Results from test run compared to predetermined
expectations to evaluate application logic and controls.
 Test data includes b
 Base case system evaluation (BCSE) is a variant of test data
method in which comprehensive test data goes through
repetitive testing until a valid base case is obtained.
 When application is modified, subsequent test (new) results
can be compared with previous results (base). d. oth valid and
invalid transactions.
Test Data Technique
Computer Aided Audit Tools & Techniques
for Testing Controls
 Tracing takes step-by-step walk of application’s internal logic.
 Advantages of test data technique:
 Provide explicit evidence concerning application function.
 Can be employed with only minimal disruption.
 Require only mini
 Disadvantages of test data technique: mal auditor computer
expertise.
 Auditors must rely on computer services personnel to obtain a copy
of the application for testing.
 Provides static picture of application integrity and not a convenient
means of gathering evidence about ongoing application
functionality.
 Relatively high cost to implement, auditing inefficiency.
The Integrated Test Facility (ITF)
 Automated technique allows auditors to test logic and
controls during normal operations by setting up a dummy
entity within the application system.
 System discriminates between ITF and routine transactions.
 Advantages of ITF: Auditor analyzes ITF results against
expected results.
 Supports ongoing monitoring of controls as specified by
COSO control framework.
 Applications can be economically tested without disrupting
user operations and without the intervention of computer
service personnel, improving efficiency and reliability.
 Primary disadvantage of ITF is potential for corrupting
data files.
Parallel Simulation
 Requires auditor to write program that simulates key
features or processes of application under review.
 Auditor gains a thorough understanding of application under
review and identifies critical processes and controls.
 Auditor creates the simulation using program or Generalized
Audit Software (GAS).
 Auditor runs the simulated program using selected data and
files.
 Auditor evaluates results and reconciles differences.
 Auditor must carefully evaluate differences between test
results and production results.
COMPUTERISED ACCOUNTING
AUDITING TECHNOLOGY
 CAATTs is a growing field within the accounting audit
profession.
 CAATs is the practice of using computers to automate
the accounting and audit processes.
 CAATs normally includes using basic office
productivity software such as spreadsheet, word
processors and text editing programs and more
advanced software packages involves use statistical
analysis and business intelligence tools.
Traditional Accounting and Auditing
example
 The traditional method of accounting and auditing,
allows auditors to build conclusions based upon a
limited sample of a population, rather than an
examination of all available or a large sample of data.
 The use of small samples may diminish the validity of
accounting and audit conclusions.
 Management realizes that they conduct thousands or
perhaps millions of transactions a year and the auditor
only sampled a handful.
Specialized Software
 In the most general terms, CAATTs can refer to any
computer program utilized to improve the audit
process.
 Generally, however, it is used to refer to any data
extraction and analysis software.
 This would include programs such as spreadsheets
(e.g. Excel), databases (e.g. Access), statistical analysis
(e.g. SAS), business intelligence
(e.g. Crystal Reports and Business Objects), etc.
Audit Through Computers
 Auditing around the computer is one of the methods
used to test or evaluate a PC or Mac.
 It involves grabbing random chunks of data, and then
executing or testing them to see what output is given.
 Auditing around the computer is an excellent way to
tell if there is an overall PC
 Examination of data is more rapid.
 Examination of data is more accurate problem.
Conclusion
Internal Auditors can take advantage of CAATs to
improve efficiency and effectiveness of the audit.
With the right tools, training and methodology,
CAAT-Enabled Auditing can help speed up the audit
process, and provide access to data that would
otherwise remain untapped.
Thank You…..
Sunil Kumar Patro Swatishree Gupta
(ICAI BBSR Branch) (ICAI BBSR Branch)
Audit Assistant Audit Assistant
Ernst& Young LLP Ernst& Young LLP
HYD HYD

More Related Content

What's hot

Computer Audit an Introductory
Computer Audit an IntroductoryComputer Audit an Introductory
Computer Audit an Introductory
MNorazizi HM
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
EMAC Consulting Group
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Sharah Ayumi
 
IT Revision and Auditing
IT Revision and AuditingIT Revision and Auditing
IT Revision and Auditing
Amith Reddy
 
03.1 general control
03.1 general control03.1 general control
03.1 general controlMulyadi Yusuf
 
Auditing in a computer environment copy
Auditing in a computer environment   copyAuditing in a computer environment   copy
Auditing in a computer environment copySaleh Rashid
 
Audit in computerised informaton system environment and recent development i...
Audit in computerised  informaton system environment and recent development i...Audit in computerised  informaton system environment and recent development i...
Audit in computerised informaton system environment and recent development i...
Dr. Sanjay Sawant Dessai
 
IT General Controls
IT General ControlsIT General Controls
IT General Controls
Cicero Ray Rufino
 
Audit bab1 sem 6- Audit Approach
Audit bab1 sem 6- Audit ApproachAudit bab1 sem 6- Audit Approach
Audit bab1 sem 6- Audit Approach
Nur Dalila Zamri
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)Rikesh Chaurasia
 
Auditing in Computerized Environment
Auditing in Computerized EnvironmentAuditing in Computerized Environment
Auditing in Computerized Environment
Dr. Sushil Bansode
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
Nur Dalila Zamri
 
Effects of IT on internal controls
Effects of IT on internal controlsEffects of IT on internal controls
Effects of IT on internal controls
Lou Foja
 
Aml analyser management (bro101 pe)
Aml analyser management (bro101 pe)Aml analyser management (bro101 pe)
Aml analyser management (bro101 pe)Han64
 
Information system audit
Information system audit Information system audit
Information system audit
Jayant Dalvi
 
Software quality metrics methodology _tanmi kiran
Software quality metrics methodology _tanmi kiranSoftware quality metrics methodology _tanmi kiran
Software quality metrics methodology _tanmi kiranTanmi Kapoor
 

What's hot (17)

Computer Audit an Introductory
Computer Audit an IntroductoryComputer Audit an Introductory
Computer Audit an Introductory
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
 
IT Revision and Auditing
IT Revision and AuditingIT Revision and Auditing
IT Revision and Auditing
 
03.1 general control
03.1 general control03.1 general control
03.1 general control
 
Auditing in a computer environment copy
Auditing in a computer environment   copyAuditing in a computer environment   copy
Auditing in a computer environment copy
 
Audit in computerised informaton system environment and recent development i...
Audit in computerised  informaton system environment and recent development i...Audit in computerised  informaton system environment and recent development i...
Audit in computerised informaton system environment and recent development i...
 
IT General Controls
IT General ControlsIT General Controls
IT General Controls
 
Audit bab1 sem 6- Audit Approach
Audit bab1 sem 6- Audit ApproachAudit bab1 sem 6- Audit Approach
Audit bab1 sem 6- Audit Approach
 
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
COMPUTERIZED ACCOUNTING AND AUDITING TECHNIQUES (CAAT)
 
Caat
CaatCaat
Caat
 
Auditing in Computerized Environment
Auditing in Computerized EnvironmentAuditing in Computerized Environment
Auditing in Computerized Environment
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Effects of IT on internal controls
Effects of IT on internal controlsEffects of IT on internal controls
Effects of IT on internal controls
 
Aml analyser management (bro101 pe)
Aml analyser management (bro101 pe)Aml analyser management (bro101 pe)
Aml analyser management (bro101 pe)
 
Information system audit
Information system audit Information system audit
Information system audit
 
Software quality metrics methodology _tanmi kiran
Software quality metrics methodology _tanmi kiranSoftware quality metrics methodology _tanmi kiran
Software quality metrics methodology _tanmi kiran
 

Similar to Icai seminar kolkata

Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
Ashish Desai
 
From Data to Insights: How IT Operations Data Can Boost Quality
From Data to Insights: How IT Operations Data Can Boost QualityFrom Data to Insights: How IT Operations Data Can Boost Quality
From Data to Insights: How IT Operations Data Can Boost Quality
Cognizant
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
Mufaddal Nullwala
 
Computerized Environment
Computerized EnvironmentComputerized Environment
Computerized Environment
VadivelM9
 
hhhh.ppt
hhhh.ppthhhh.ppt
hhhh.ppt
jack952975
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
_supriadi
 
CAAT ppt.pptx (Computer Asstt. Technique)
CAAT ppt.pptx (Computer Asstt. Technique)CAAT ppt.pptx (Computer Asstt. Technique)
CAAT ppt.pptx (Computer Asstt. Technique)
rkhasua004
 
Chapter 11 Metrics for process and projects.ppt
Chapter 11  Metrics for process and projects.pptChapter 11  Metrics for process and projects.ppt
Chapter 11 Metrics for process and projects.ppt
ssuser3f82c9
 
System Integration and Architecture.pptx
System Integration and Architecture.pptxSystem Integration and Architecture.pptx
System Integration and Architecture.pptx
MARIVICJOYCLAMUCHA1
 
Software testing for project report .pdf
Software testing for project report .pdfSoftware testing for project report .pdf
Software testing for project report .pdf
Kamal Acharya
 
Validation
ValidationValidation
Validation
Janet Robinson
 
Application Security: By Prashant Mali Cyber law Consultant
Application Security: By Prashant Mali Cyber law ConsultantApplication Security: By Prashant Mali Cyber law Consultant
Application Security: By Prashant Mali Cyber law ConsultantShivaami Corporation
 
Asp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ AbstractsAsp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ Abstracts
ncct
 
IRJET- Automated Test Case Generation using Data Mining
IRJET- Automated Test Case Generation using Data MiningIRJET- Automated Test Case Generation using Data Mining
IRJET- Automated Test Case Generation using Data Mining
IRJET Journal
 
Ready, Set, Automate - Best Practices in Using Automated Tools for Validation
Ready, Set, Automate - Best Practices in Using Automated Tools for ValidationReady, Set, Automate - Best Practices in Using Automated Tools for Validation
Ready, Set, Automate - Best Practices in Using Automated Tools for Validation
Covance
 
Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security
Arish Roy
 

Similar to Icai seminar kolkata (20)

Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
 
From Data to Insights: How IT Operations Data Can Boost Quality
From Data to Insights: How IT Operations Data Can Boost QualityFrom Data to Insights: How IT Operations Data Can Boost Quality
From Data to Insights: How IT Operations Data Can Boost Quality
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
Computerized Environment
Computerized EnvironmentComputerized Environment
Computerized Environment
 
hhhh.ppt
hhhh.ppthhhh.ppt
hhhh.ppt
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
 
CAAT ppt.pptx (Computer Asstt. Technique)
CAAT ppt.pptx (Computer Asstt. Technique)CAAT ppt.pptx (Computer Asstt. Technique)
CAAT ppt.pptx (Computer Asstt. Technique)
 
Chapter 11 Metrics for process and projects.ppt
Chapter 11  Metrics for process and projects.pptChapter 11  Metrics for process and projects.ppt
Chapter 11 Metrics for process and projects.ppt
 
System Integration and Architecture.pptx
System Integration and Architecture.pptxSystem Integration and Architecture.pptx
System Integration and Architecture.pptx
 
Software testing for project report .pdf
Software testing for project report .pdfSoftware testing for project report .pdf
Software testing for project report .pdf
 
Validation
ValidationValidation
Validation
 
Application Security: By Prashant Mali Cyber law Consultant
Application Security: By Prashant Mali Cyber law ConsultantApplication Security: By Prashant Mali Cyber law Consultant
Application Security: By Prashant Mali Cyber law Consultant
 
Application Security:
Application Security: Application Security:
Application Security:
 
Asp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ AbstractsAsp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ Abstracts
 
Bankauditin it env
Bankauditin it envBankauditin it env
Bankauditin it env
 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
 
IRJET- Automated Test Case Generation using Data Mining
IRJET- Automated Test Case Generation using Data MiningIRJET- Automated Test Case Generation using Data Mining
IRJET- Automated Test Case Generation using Data Mining
 
Ready, Set, Automate - Best Practices in Using Automated Tools for Validation
Ready, Set, Automate - Best Practices in Using Automated Tools for ValidationReady, Set, Automate - Best Practices in Using Automated Tools for Validation
Ready, Set, Automate - Best Practices in Using Automated Tools for Validation
 
Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security Technology Audit | IT Audit | ERP Audit | Database Security
Technology Audit | IT Audit | ERP Audit | Database Security
 

Recently uploaded

SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
ukgaet
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
ArpitMalhotra16
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
axoqas
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
oz8q3jxlp
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
haila53
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
benishzehra469
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
mbawufebxi
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
axoqas
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
yhkoc
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
ewymefz
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
slg6lamcq
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
MaleehaSheikh2
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
ewymefz
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
NABLAS株式会社
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
jerlynmaetalle
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
vcaxypu
 

Recently uploaded (20)

SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
 

Icai seminar kolkata

  • 1. AWARENESS SESSION ON “COMPUTER-ASSISTED AUDIT TOOLS AND TECHNIQUES” 18 & 19 JULY 2019 KOLKATA
  • 2. Presented By……………… Sunil Kumar Patro - 807 Swatishree Gupta - 808
  • 3. Objectives • Be familiar with the classes of transaction input controls used by accounting applications. • Understand the objectives and techniques used to implement processing controls, including run-to-run, operator inventions, and audit trail controls. • Understand the methods used to establish effective output controls for both batch and real-time systems.
  • 4. Input Controls  Programmed procedures also known as edits or validation controls.  Perform tests on transaction data to ensure they are error free before processing. Three categories:  Field interrogation involves programmed procedures to examine the characteristics of the data in the field:  Common data input errors are (1) transcription (addition truncation or substitution) and (2) transposition errors. These problems are controlled with Check digits.  Missing data checks are used to check for blank spaces.  Numeric-alphabetic check identify data in the wrong form.  Limit checks test for amounts that exceed authorized limits.  Range checks for upper & lower limits of acceptable values.  Validity checks compare actual against acceptable values.
  • 5.  Record interrogation procedures valid records by examining the interrelationship of its field values.  Reasonableness check determines if a value is reasonable when considered alone with other data fields.  Sign check verifies the sign of the field is correct.  Sequence check use to determine if a record is out of order.  File interrogation is to ensure the correct file is being processed:  Internal and external label checks verify the file being processed is the one being called for.  Version checks are used to verify the correct version is being processed.
  • 6. Processing Controls  Run-to-run controls monitor a batch as it moves from one run to another and ensures:  All records are processed, no record processed more than once.  A transaction audit trail is created.  Accomplished through batch control data that includes: unique batch number, date, transaction code, record count, total dollar value (control total), and a hash total.
  • 7.  Common error handling techniques:  Correct immediately: With the direct data validation approach, error detection and correction can take place during data entry.  Create an error file: Individual errors are flagged to prevent them from being processed, corrected and resubmitted as a separate batch for reprocessing.  Reject the batch: Some errors are associated with the entire batch making the best solution to cease processing.
  • 8.  Operator intervention increases potential for human error. Systems with operator intervention controls less prone to processing errors.  Preservation of audit trail important objective of process control.  Transaction logs should record every transaction successfully processed by the system.  All automatically generated transactions should be included in the log with the responsible end user receiving a detailed listing.  Each transaction processed must have a unique identifier.  A listing of all error records should go to the appropriate user to support error correction and resubmission.
  • 9. Transaction Log to Preserve the Audit Trail
  • 10. Output Controls  Ensure system output is not lost, misplaced or corrupted and that privacy policy not violated. Controls for batch system output include:  Output spooling directs output to a magnetic disk rather than to the printer. When resources become available output files are printed.  Creation of the output file presents an added exposure for a computer criminal to access, copy or destroy the file.  Print program requires operator interventions to print, monitor and remove the output. Program controls are designed to:  Prevent unauthorized copies and unauthorized browsing of sensitive data by employees.
  • 11.  Printed output reports go through the bursting stage to have pages separated and collated.  Primary control is supervision.  Printed output reports go through the bursting stage to have pages separated and collated.  Primary control is supervision.  Computer waste represents a potential risk.  Should be shredded before disposal
  • 12. Computer Aided Audit Tools & Techniques for Testing Controls  Test data method used to establish the application processing integrity.  Results from test run compared to predetermined expectations to evaluate application logic and controls.  Test data includes b  Base case system evaluation (BCSE) is a variant of test data method in which comprehensive test data goes through repetitive testing until a valid base case is obtained.  When application is modified, subsequent test (new) results can be compared with previous results (base). d. oth valid and invalid transactions.
  • 14. Computer Aided Audit Tools & Techniques for Testing Controls  Tracing takes step-by-step walk of application’s internal logic.  Advantages of test data technique:  Provide explicit evidence concerning application function.  Can be employed with only minimal disruption.  Require only mini  Disadvantages of test data technique: mal auditor computer expertise.  Auditors must rely on computer services personnel to obtain a copy of the application for testing.  Provides static picture of application integrity and not a convenient means of gathering evidence about ongoing application functionality.  Relatively high cost to implement, auditing inefficiency.
  • 15. The Integrated Test Facility (ITF)  Automated technique allows auditors to test logic and controls during normal operations by setting up a dummy entity within the application system.  System discriminates between ITF and routine transactions.  Advantages of ITF: Auditor analyzes ITF results against expected results.  Supports ongoing monitoring of controls as specified by COSO control framework.  Applications can be economically tested without disrupting user operations and without the intervention of computer service personnel, improving efficiency and reliability.  Primary disadvantage of ITF is potential for corrupting data files.
  • 16. Parallel Simulation  Requires auditor to write program that simulates key features or processes of application under review.  Auditor gains a thorough understanding of application under review and identifies critical processes and controls.  Auditor creates the simulation using program or Generalized Audit Software (GAS).  Auditor runs the simulated program using selected data and files.  Auditor evaluates results and reconciles differences.  Auditor must carefully evaluate differences between test results and production results.
  • 17. COMPUTERISED ACCOUNTING AUDITING TECHNOLOGY  CAATTs is a growing field within the accounting audit profession.  CAATs is the practice of using computers to automate the accounting and audit processes.  CAATs normally includes using basic office productivity software such as spreadsheet, word processors and text editing programs and more advanced software packages involves use statistical analysis and business intelligence tools.
  • 18. Traditional Accounting and Auditing example  The traditional method of accounting and auditing, allows auditors to build conclusions based upon a limited sample of a population, rather than an examination of all available or a large sample of data.  The use of small samples may diminish the validity of accounting and audit conclusions.  Management realizes that they conduct thousands or perhaps millions of transactions a year and the auditor only sampled a handful.
  • 19. Specialized Software  In the most general terms, CAATTs can refer to any computer program utilized to improve the audit process.  Generally, however, it is used to refer to any data extraction and analysis software.  This would include programs such as spreadsheets (e.g. Excel), databases (e.g. Access), statistical analysis (e.g. SAS), business intelligence (e.g. Crystal Reports and Business Objects), etc.
  • 20. Audit Through Computers  Auditing around the computer is one of the methods used to test or evaluate a PC or Mac.  It involves grabbing random chunks of data, and then executing or testing them to see what output is given.  Auditing around the computer is an excellent way to tell if there is an overall PC  Examination of data is more rapid.  Examination of data is more accurate problem.
  • 21. Conclusion Internal Auditors can take advantage of CAATs to improve efficiency and effectiveness of the audit. With the right tools, training and methodology, CAAT-Enabled Auditing can help speed up the audit process, and provide access to data that would otherwise remain untapped.
  • 22. Thank You….. Sunil Kumar Patro Swatishree Gupta (ICAI BBSR Branch) (ICAI BBSR Branch) Audit Assistant Audit Assistant Ernst& Young LLP Ernst& Young LLP HYD HYD

Editor's Notes

  1. Presented By……………… Sunil Kumar Patro – 807 Swatishree Gupta - 808
  2. Sunil Kumar Patro Swatishree Gupta Audit Assistant Ernst& Young LLP HYD