SlideShare a Scribd company logo
INFORMATION SYSTEM
AUDIT-II
CHP 1. APPLICATION CONTROL FRAMEWORK
MR JAYANT DALVI
APPLICATION CONTROL FRAMEWORK
• controls related to individual business process or application systems
which includes data edits, segregation of business functions,
transaction maintenance and error reporting
• objectives:
1) Input data is accurate, complete, authorized and correct
2) Data should be processed in accurate time.
3) Data should be stored accurately and completely
4) Outputs should be accurate and complete
5) A record should be maintained to track process of data from input to
output and storage
TYPES OF APPLICATION CONTROLS
• Input Controls: used to check data integrity
• Processing Controls: to ensure processing is complete, accurate and
authorized
• Output Controls: to compare output results with predicted results by
checking output with input
• Integrity Controls: to ensure data processing and storing it to remain
consistend and correct
• Management Trail: enables mgmt to identify transactions and events
by tracking them from source to output and vice versa
1) INPUT CONTROLS
• are designed to provide reasonable assurance that input data forwarding for
processing should be complete, proper, authorized, accurate and translated
into machine readable form.
• Classes of Input Controls:
1) Source Document Control: controls in system uses source documents and
periodically audit source document
2) Data Coding Control: checks on data integrity during processing
3) Batch Controls: handles large volume of transaction data
4) Validation Controls: detect errors in data before processing
5) Input Error Correction: to ensure immediate correction to be done before
processing data
Types of Input Control
• Limit Check: used to identify field values that exceeds preset limit ensure
only data within limit should be entered into and accepted by system
• Range check: accept input between lower and upper limits
• Numeric check: ensure only numbers should be entered.
• Alphabetic check: ensure only alphabets should be entered
• Validity check: compare entered field value with preset value
• Field check: ensure data entered should be in field format
• Password: ensure password enterd should be in given conditions
• Data check: no blank data should be entered
• Missing Data check: complete data should be entered
• Special character check: special characters(dashes between date, account
nos or phone nos) should be properly entered
Components of Input Control
• Control environment: provides discipline and structure for financial
reporting
• Risk Assessment: identify and analyse risks to achieve reporting objectives
• Control activities: policies, procedures and practices to ensure financial
reporting objectives are achieved and risk mitigation strategies are carried
out
• Information and Communication: communicate control responsibilities for
financial reporting to employees.
• Monitoring: employees monitors customised procedures or standard
checklists
Elements of Input Control Components
• Control Environment: organizational structure, delegation of authority, HR,
Ethical values, Accounting officer/authority participation
• Risk Assessment: Objective and risk identification, Risk evaluation and
response, fraud risk.
• Control activities: authorisation of transactions and segregation of duties,
information systems, physical controls, risk assessment, selection and
development of control activities.
• Information and communication: origin of information and processing,
internal control information and communication
• Monitoring: Ongoing monitoring, critical process evaluations, deficiency
reporting,
Data Input Design
Source Document Design: Guidelines
• Titles, Headings, Notes and Instructions,Fields, MCQs to questions,Tick
marks, Spaces for answer
Data-entry Screen Design: Guidelines
1) Screen Organization 2) fields(textboxes) should near or below caption
3) Caption Design: structure, size, font type, display density, format, alignment,
justification, spacing
4) Tabbing and Skipping: avoid automatic skipping and tabbing
5) Color: seperate areas on display, indicate changed status
6) Response Time: it is interval that elapses betn entry of data item and
systems indication it is ready to accept a new data item
7) Display rate: rate at which characters or images on screen
8) Prompting and Help: advice
2) OUTPUT CONTROLS
• Determine content and ways, data to be presented to user
• they are designed to provide reasonable assurance that processing results are
accurate and distributed to authorized personnel only.
• Issues of Output control:
1) Inference control:
- used to prevent compromise of statistical database: user can only get statistics
not values of data
- restriction control: provide limited data to user
2) Batch Output production and distribution controls:
- provide output in batch to users and are controlled to ensure that accurate,
complete, timely output to provide to user
- control of it includes storage security, no access to unautorized users,
3) Online Output Production and Distribution controls:
- ouput provided electronically for gaining access to system for user
-provide output to users and are controlled to ensure that accurate, complete,
timely output to provide to user
- Implementation of control: online output should be accurate, authorized and
complete, output should be distributed to proper network address, preserve
privacy of output transmitted, data checks by intended user,.
4) Audit Trails: For auditing following questions to be check-
What output was presented to user, Who received the output, when output
was received, what actions were subseqently taken with output,
3) Database Controls
• controls security and integrity of database.
• while auditing the controls of database, auditor should check following
controls should be implemented and maintained to ensure database integrity
and availability:
- Definition standards and access controls
- Data backup and recovery procedures
- updation of database by authorised person
- handle concurrent access problems
- ensure accuracy, completeness and consistency of data and relationships
- checkpoints to minimize the loss and database reorganizations
- Monitor databse performance and capacity planning
• Database Security:
1) Access Control: only authorized person can access the database
2) Inference Control: prevent extraction of private information from publicly
available statistical databases
3) Flow Control: control the flow of data to authorized persons only.
4) Data encryption: encrypt the data for security purpose
Database Administrator is main central authority for managing database
systems.
4) PROCESSING CONTROLS
- ensure that incoming data should be processed
- processing controls include Data validation, Editing procedures, Data file
control procedures
- Data validation is used to identify data errors, incomplete or missing data and
inconsistencies among related data items.
- Editing procedures are preventive controls designed to keep bad data out of
our database.
- Data validation edits and controls are: Sequence check, limit check, range and
validity check, reasonableness and existence check, table lookups, key
verification, check digit, completeness and duplicate check.
- Data file controls are: parity checking, transactions logs, file maintenance and
updating authorization
5) Testing Controls
• controls to be tested: test of controls must be performed in audit of
financial statements, evidence is necessary to support audits control risk
assessment.
• Testing design effectiveness: auditor should test design effectiveness of
controls by determining satisfy company's control objectives and prevent or
detect error or faults.
• Testing operating effectiveness: determine whether control is operating as
designed and whether the person performing control possesses necessary
authority and competence to perform the contro effectively. It includes:
enquiry of appropriate personnel, observe company's operations, inspect
documentation and re-performance of control.
• Nature of test controls: provide appropriate evidence depends to large
degree on nature of control to be tested i.e enquiry, observation, inspection
of documentation, and reperformance of control.
• Extent of test of controls: affects frequency of performance of control,
length of time, expected rate of deviation, reliability of the audit, nature
of control during audit period.
• Timing of test controls: related to when evidence about operating
effectivness of controls is obtained and period of time to which it applies.
• Audit evidence obtained in past audit: factors to determine
nature and materiality of misstatements, inherent risk associated with
related account, changes in volume or nature of transactions, errored
accounts, competence of personnel, individual or automated performance,
complexity of control, planned degree of reliance
6) DATA CODE CONTROL
• identity of person who was source of data and who entered the data into
system.
• time and date when data was captured.
• no of keying errors and read errors by scanning device.
• details of transaction
• updation of account or record
• identify physical device used to enter the data
7) Communication Control
• establish requirements regarding designing and implementing appropriate
responses to risk of material misstatement.
• objective of auditor is to address the risks of material misstatement through
overall audit response and audit procedures
• types of audit responses:
1) responses that have overall effect on how the audit is conducted
2) responses involving the nature, timing and extent of audit procedures to be
performed
Advantages and Disadvantages of ACF
• Advantages:
1) Reliability
2) Benchmarking
3) Time and Cost Saving
Disadvantage:
1) low degree of assurance of audit with respect to cost benefit analysis
2) no guarantee of achievement of organizational and strategic
objectives

More Related Content

What's hot

Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Sreekanth Narendran
 
Auditing application controls
Auditing application controlsAuditing application controls
Auditing application controls
CenapSerdarolu
 
Steps in it audit
Steps in it auditSteps in it audit
Steps in it audit
kinjalmkothari92
 
Information systems audit and control
Information systems audit and controlInformation systems audit and control
Information systems audit and controlKashif Rana ACCA
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
Divya Tiwari
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Compliance
seanpizzy
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
Dinesh O Bareja
 
ISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and ChallengesISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and Challenges
Certification Europe
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit
Sreekanth Narendran
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
Kaushal Trivedi
 
Taxation of Extractives Industry in Kenya - RSM Ashvir
Taxation of Extractives Industry in Kenya - RSM AshvirTaxation of Extractives Industry in Kenya - RSM Ashvir
Taxation of Extractives Industry in Kenya - RSM Ashvir
Ashif Kassam
 
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
iFour Consultancy
 
Information Security Committee Presentation Sample
Information Security Committee Presentation SampleInformation Security Committee Presentation Sample
Information Security Committee Presentation Sample
oaes2006
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
Ersoy AKSOY
 
03.2 application control
03.2 application control03.2 application control
03.2 application controlMulyadi Yusuf
 
Enterprise Architecture and Information Security
Enterprise Architecture and Information SecurityEnterprise Architecture and Information Security
Enterprise Architecture and Information Security
John Macasio
 
Audit Checklist for Information Systems
Audit Checklist for Information SystemsAudit Checklist for Information Systems
Audit Checklist for Information Systems
Ahmad Tariq Bhatti
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample Report
Randy James
 

What's hot (20)

3c 2 Information Systems Audit
3c   2   Information Systems Audit3c   2   Information Systems Audit
3c 2 Information Systems Audit
 
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
 
Auditing application controls
Auditing application controlsAuditing application controls
Auditing application controls
 
Steps in it audit
Steps in it auditSteps in it audit
Steps in it audit
 
Information systems audit and control
Information systems audit and controlInformation systems audit and control
Information systems audit and control
 
5.4 it security audit (mauritius)
5.4  it security audit (mauritius)5.4  it security audit (mauritius)
5.4 it security audit (mauritius)
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Compliance
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
ISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and ChallengesISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and Challenges
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
Taxation of Extractives Industry in Kenya - RSM Ashvir
Taxation of Extractives Industry in Kenya - RSM AshvirTaxation of Extractives Industry in Kenya - RSM Ashvir
Taxation of Extractives Industry in Kenya - RSM Ashvir
 
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
ISO 27001 2013 Clause 4 - context of an organization - by Software developmen...
 
Information Security Committee Presentation Sample
Information Security Committee Presentation SampleInformation Security Committee Presentation Sample
Information Security Committee Presentation Sample
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
03.2 application control
03.2 application control03.2 application control
03.2 application control
 
Enterprise Architecture and Information Security
Enterprise Architecture and Information SecurityEnterprise Architecture and Information Security
Enterprise Architecture and Information Security
 
Audit Checklist for Information Systems
Audit Checklist for Information SystemsAudit Checklist for Information Systems
Audit Checklist for Information Systems
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample Report
 

Similar to Information system audit

Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2
Jayant Dalvi
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
_supriadi
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
_supriadi
 
General and Application Control - Security and Control Issues in Informatio...
General and Application Control - Security  and Control Issues in  Informatio...General and Application Control - Security  and Control Issues in  Informatio...
General and Application Control - Security and Control Issues in Informatio...
Dr. Rosemarie Sibbaluca-Guirre
 
Chapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptxChapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptx
ToxicHawk
 
auditing-190520092523.pdf
auditing-190520092523.pdfauditing-190520092523.pdf
auditing-190520092523.pdf
chetanvchaudhari
 
Information systems audit n control introduction.ppt
Information systems audit n control introduction.pptInformation systems audit n control introduction.ppt
Information systems audit n control introduction.ppt
r209777z
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
Marc Vael
 
CISA_WK_1.pptx
CISA_WK_1.pptxCISA_WK_1.pptx
CISA_WK_1.pptx
dotco
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
dotco
 
CISA_WK_2.pptx
CISA_WK_2.pptxCISA_WK_2.pptx
CISA_WK_2.pptx
dotco
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk AssessmentsPriyank Hada
 
Emerging Contractors Mitigating Control Risk
Emerging Contractors Mitigating Control Risk Emerging Contractors Mitigating Control Risk
Emerging Contractors Mitigating Control Risk
Marie Pagnotta
 
The Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptionsThe Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptions
Bharath Rao
 
Auditing in Computerized Environment
Auditing in Computerized EnvironmentAuditing in Computerized Environment
Auditing in Computerized Environment
Dr. Sushil Bansode
 
3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf
Nehemiah27
 
Quick Overview: Pharmaceutical Data Integrity
Quick Overview: Pharmaceutical Data IntegrityQuick Overview: Pharmaceutical Data Integrity
Quick Overview: Pharmaceutical Data Integrity
Peter Dellva
 
Fraud detection analysis
Fraud detection analysis Fraud detection analysis
Fraud detection analysis
SAI MANIKANTA MANASANI
 
Auditing in a computer environment copy
Auditing in a computer environment   copyAuditing in a computer environment   copy
Auditing in a computer environment copySaleh Rashid
 

Similar to Information system audit (20)

Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
 
General and Application Control - Security and Control Issues in Informatio...
General and Application Control - Security  and Control Issues in  Informatio...General and Application Control - Security  and Control Issues in  Informatio...
General and Application Control - Security and Control Issues in Informatio...
 
Chapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptxChapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptx
 
Compliance
ComplianceCompliance
Compliance
 
auditing-190520092523.pdf
auditing-190520092523.pdfauditing-190520092523.pdf
auditing-190520092523.pdf
 
Information systems audit n control introduction.ppt
Information systems audit n control introduction.pptInformation systems audit n control introduction.ppt
Information systems audit n control introduction.ppt
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
 
CISA_WK_1.pptx
CISA_WK_1.pptxCISA_WK_1.pptx
CISA_WK_1.pptx
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
 
CISA_WK_2.pptx
CISA_WK_2.pptxCISA_WK_2.pptx
CISA_WK_2.pptx
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk Assessments
 
Emerging Contractors Mitigating Control Risk
Emerging Contractors Mitigating Control Risk Emerging Contractors Mitigating Control Risk
Emerging Contractors Mitigating Control Risk
 
The Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptionsThe Next Gen Auditor - Auditing through technological disruptions
The Next Gen Auditor - Auditing through technological disruptions
 
Auditing in Computerized Environment
Auditing in Computerized EnvironmentAuditing in Computerized Environment
Auditing in Computerized Environment
 
3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf
 
Quick Overview: Pharmaceutical Data Integrity
Quick Overview: Pharmaceutical Data IntegrityQuick Overview: Pharmaceutical Data Integrity
Quick Overview: Pharmaceutical Data Integrity
 
Fraud detection analysis
Fraud detection analysis Fraud detection analysis
Fraud detection analysis
 
Auditing in a computer environment copy
Auditing in a computer environment   copyAuditing in a computer environment   copy
Auditing in a computer environment copy
 

More from Jayant Dalvi

Linux System Administration
Linux System AdministrationLinux System Administration
Linux System Administration
Jayant Dalvi
 
Linux System Administration
Linux System AdministrationLinux System Administration
Linux System Administration
Jayant Dalvi
 
Structured system analysis and design
Structured system analysis and design Structured system analysis and design
Structured system analysis and design
Jayant Dalvi
 
Structured system analysis and design
Structured system analysis and design Structured system analysis and design
Structured system analysis and design
Jayant Dalvi
 
Structured system analysis and design
Structured system analysis and design Structured system analysis and design
Structured system analysis and design
Jayant Dalvi
 
Java I/O
Java I/OJava I/O
Java I/O
Jayant Dalvi
 
Structured system analysis and design
Structured system analysis and design Structured system analysis and design
Structured system analysis and design
Jayant Dalvi
 
java- Abstract Window toolkit
java- Abstract Window toolkitjava- Abstract Window toolkit
java- Abstract Window toolkit
Jayant Dalvi
 
Structured system analysis and design
Structured system analysis and design Structured system analysis and design
Structured system analysis and design
Jayant Dalvi
 
Information system audit
Information system audit Information system audit
Information system audit
Jayant Dalvi
 
Information system audit
Information system audit Information system audit
Information system audit
Jayant Dalvi
 
Structured system analysis and design
Structured system analysis and design Structured system analysis and design
Structured system analysis and design
Jayant Dalvi
 
Multithreading in Java
Multithreading in JavaMultithreading in Java
Multithreading in Java
Jayant Dalvi
 
Exception handling c++
Exception handling c++Exception handling c++
Exception handling c++
Jayant Dalvi
 
Object Oriented Programming using C++
Object Oriented Programming using C++Object Oriented Programming using C++
Object Oriented Programming using C++
Jayant Dalvi
 

More from Jayant Dalvi (15)

Linux System Administration
Linux System AdministrationLinux System Administration
Linux System Administration
 
Linux System Administration
Linux System AdministrationLinux System Administration
Linux System Administration
 
Structured system analysis and design
Structured system analysis and design Structured system analysis and design
Structured system analysis and design
 
Structured system analysis and design
Structured system analysis and design Structured system analysis and design
Structured system analysis and design
 
Structured system analysis and design
Structured system analysis and design Structured system analysis and design
Structured system analysis and design
 
Java I/O
Java I/OJava I/O
Java I/O
 
Structured system analysis and design
Structured system analysis and design Structured system analysis and design
Structured system analysis and design
 
java- Abstract Window toolkit
java- Abstract Window toolkitjava- Abstract Window toolkit
java- Abstract Window toolkit
 
Structured system analysis and design
Structured system analysis and design Structured system analysis and design
Structured system analysis and design
 
Information system audit
Information system audit Information system audit
Information system audit
 
Information system audit
Information system audit Information system audit
Information system audit
 
Structured system analysis and design
Structured system analysis and design Structured system analysis and design
Structured system analysis and design
 
Multithreading in Java
Multithreading in JavaMultithreading in Java
Multithreading in Java
 
Exception handling c++
Exception handling c++Exception handling c++
Exception handling c++
 
Object Oriented Programming using C++
Object Oriented Programming using C++Object Oriented Programming using C++
Object Oriented Programming using C++
 

Recently uploaded

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
JezreelCabil2
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 

Recently uploaded (20)

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 

Information system audit

  • 1. INFORMATION SYSTEM AUDIT-II CHP 1. APPLICATION CONTROL FRAMEWORK MR JAYANT DALVI
  • 2. APPLICATION CONTROL FRAMEWORK • controls related to individual business process or application systems which includes data edits, segregation of business functions, transaction maintenance and error reporting • objectives: 1) Input data is accurate, complete, authorized and correct 2) Data should be processed in accurate time. 3) Data should be stored accurately and completely 4) Outputs should be accurate and complete 5) A record should be maintained to track process of data from input to output and storage
  • 3. TYPES OF APPLICATION CONTROLS • Input Controls: used to check data integrity • Processing Controls: to ensure processing is complete, accurate and authorized • Output Controls: to compare output results with predicted results by checking output with input • Integrity Controls: to ensure data processing and storing it to remain consistend and correct • Management Trail: enables mgmt to identify transactions and events by tracking them from source to output and vice versa
  • 4. 1) INPUT CONTROLS • are designed to provide reasonable assurance that input data forwarding for processing should be complete, proper, authorized, accurate and translated into machine readable form. • Classes of Input Controls: 1) Source Document Control: controls in system uses source documents and periodically audit source document 2) Data Coding Control: checks on data integrity during processing 3) Batch Controls: handles large volume of transaction data 4) Validation Controls: detect errors in data before processing 5) Input Error Correction: to ensure immediate correction to be done before processing data
  • 5. Types of Input Control • Limit Check: used to identify field values that exceeds preset limit ensure only data within limit should be entered into and accepted by system • Range check: accept input between lower and upper limits • Numeric check: ensure only numbers should be entered. • Alphabetic check: ensure only alphabets should be entered • Validity check: compare entered field value with preset value • Field check: ensure data entered should be in field format • Password: ensure password enterd should be in given conditions • Data check: no blank data should be entered • Missing Data check: complete data should be entered • Special character check: special characters(dashes between date, account nos or phone nos) should be properly entered
  • 6. Components of Input Control • Control environment: provides discipline and structure for financial reporting • Risk Assessment: identify and analyse risks to achieve reporting objectives • Control activities: policies, procedures and practices to ensure financial reporting objectives are achieved and risk mitigation strategies are carried out • Information and Communication: communicate control responsibilities for financial reporting to employees. • Monitoring: employees monitors customised procedures or standard checklists
  • 7. Elements of Input Control Components • Control Environment: organizational structure, delegation of authority, HR, Ethical values, Accounting officer/authority participation • Risk Assessment: Objective and risk identification, Risk evaluation and response, fraud risk. • Control activities: authorisation of transactions and segregation of duties, information systems, physical controls, risk assessment, selection and development of control activities. • Information and communication: origin of information and processing, internal control information and communication • Monitoring: Ongoing monitoring, critical process evaluations, deficiency reporting,
  • 8. Data Input Design Source Document Design: Guidelines • Titles, Headings, Notes and Instructions,Fields, MCQs to questions,Tick marks, Spaces for answer Data-entry Screen Design: Guidelines 1) Screen Organization 2) fields(textboxes) should near or below caption 3) Caption Design: structure, size, font type, display density, format, alignment, justification, spacing 4) Tabbing and Skipping: avoid automatic skipping and tabbing 5) Color: seperate areas on display, indicate changed status 6) Response Time: it is interval that elapses betn entry of data item and systems indication it is ready to accept a new data item 7) Display rate: rate at which characters or images on screen 8) Prompting and Help: advice
  • 9. 2) OUTPUT CONTROLS • Determine content and ways, data to be presented to user • they are designed to provide reasonable assurance that processing results are accurate and distributed to authorized personnel only. • Issues of Output control: 1) Inference control: - used to prevent compromise of statistical database: user can only get statistics not values of data - restriction control: provide limited data to user 2) Batch Output production and distribution controls: - provide output in batch to users and are controlled to ensure that accurate, complete, timely output to provide to user - control of it includes storage security, no access to unautorized users,
  • 10. 3) Online Output Production and Distribution controls: - ouput provided electronically for gaining access to system for user -provide output to users and are controlled to ensure that accurate, complete, timely output to provide to user - Implementation of control: online output should be accurate, authorized and complete, output should be distributed to proper network address, preserve privacy of output transmitted, data checks by intended user,. 4) Audit Trails: For auditing following questions to be check- What output was presented to user, Who received the output, when output was received, what actions were subseqently taken with output,
  • 11. 3) Database Controls • controls security and integrity of database. • while auditing the controls of database, auditor should check following controls should be implemented and maintained to ensure database integrity and availability: - Definition standards and access controls - Data backup and recovery procedures - updation of database by authorised person - handle concurrent access problems - ensure accuracy, completeness and consistency of data and relationships - checkpoints to minimize the loss and database reorganizations - Monitor databse performance and capacity planning
  • 12. • Database Security: 1) Access Control: only authorized person can access the database 2) Inference Control: prevent extraction of private information from publicly available statistical databases 3) Flow Control: control the flow of data to authorized persons only. 4) Data encryption: encrypt the data for security purpose Database Administrator is main central authority for managing database systems.
  • 13. 4) PROCESSING CONTROLS - ensure that incoming data should be processed - processing controls include Data validation, Editing procedures, Data file control procedures - Data validation is used to identify data errors, incomplete or missing data and inconsistencies among related data items. - Editing procedures are preventive controls designed to keep bad data out of our database. - Data validation edits and controls are: Sequence check, limit check, range and validity check, reasonableness and existence check, table lookups, key verification, check digit, completeness and duplicate check. - Data file controls are: parity checking, transactions logs, file maintenance and updating authorization
  • 14. 5) Testing Controls • controls to be tested: test of controls must be performed in audit of financial statements, evidence is necessary to support audits control risk assessment. • Testing design effectiveness: auditor should test design effectiveness of controls by determining satisfy company's control objectives and prevent or detect error or faults. • Testing operating effectiveness: determine whether control is operating as designed and whether the person performing control possesses necessary authority and competence to perform the contro effectively. It includes: enquiry of appropriate personnel, observe company's operations, inspect documentation and re-performance of control. • Nature of test controls: provide appropriate evidence depends to large degree on nature of control to be tested i.e enquiry, observation, inspection of documentation, and reperformance of control.
  • 15. • Extent of test of controls: affects frequency of performance of control, length of time, expected rate of deviation, reliability of the audit, nature of control during audit period. • Timing of test controls: related to when evidence about operating effectivness of controls is obtained and period of time to which it applies. • Audit evidence obtained in past audit: factors to determine nature and materiality of misstatements, inherent risk associated with related account, changes in volume or nature of transactions, errored accounts, competence of personnel, individual or automated performance, complexity of control, planned degree of reliance
  • 16. 6) DATA CODE CONTROL • identity of person who was source of data and who entered the data into system. • time and date when data was captured. • no of keying errors and read errors by scanning device. • details of transaction • updation of account or record • identify physical device used to enter the data
  • 17. 7) Communication Control • establish requirements regarding designing and implementing appropriate responses to risk of material misstatement. • objective of auditor is to address the risks of material misstatement through overall audit response and audit procedures • types of audit responses: 1) responses that have overall effect on how the audit is conducted 2) responses involving the nature, timing and extent of audit procedures to be performed
  • 18. Advantages and Disadvantages of ACF • Advantages: 1) Reliability 2) Benchmarking 3) Time and Cost Saving Disadvantage: 1) low degree of assurance of audit with respect to cost benefit analysis 2) no guarantee of achievement of organizational and strategic objectives