33
Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology Auditing Today

Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Embed Size (px)

Citation preview

Page 1: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Chapter 12Information Technology Auditing

Introduction

The Audit Function

The IT Auditor’s Toolkit

Auditing the Computerized AIS

Information Technology Auditing Today

Page 2: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

The Audit Function

The function of an auditis to examine and to give assurance.will differ according to the subject under

examination.can be internal, or externalalways involves the accounting information

systems

Information technology auditing discusses

internal auditing,External auditing, andIT auditing.

Page 3: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Internal Auditing

An internal audit, which preserves its objectivity

is carried out by company personnel reporting to

the Audit Committee of the Board of Directors (preferable)

Top management (on departmental efficiency audits)

is external to the corporate department ordivision being audited

concerns compliance to company policies & procedures

involves an evaluation of internal controls and fraud

tests for efficiency, effectiveness and economy

Cynthia Cooper – WorldCom internal auditor and whistleblower

Page 4: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

External Auditing

The external audit is carried out by

independent accountants has the attest function as its

chief purpose confirming the fairness of financial

statements in all material respects

Has a secondary purpose - to test that internal controls are strong and can be relied on to catch errors and fraud (the stronger the controls, the smaller the audit risk, and the less work an auditor has to do).

Page 5: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Management

Stakeholders

Auditor

Information

A raised eyebrow indicates

professional skepticism

? ?

The Attest

Function

?

Page 6: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

66

Information Risk

Page 7: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

The IT Audit

The IT audit function encompasses

Page 8: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Careers in Information Systems Auditing

The demand for IT auditors is growing increasing use of computer-based AISssystems becoming more technologically

complex passing of the Sarbanes-Oxley bill

IT auditing requires a variety of skills, combining

accounting and information systems or computer science

skills.

Page 9: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

The Information Technology Auditor’s Toolkit

IT auditors need to have the technical skills to understand the

vulnerabilities in hardware and software use of appropriate software to do their jobs general-use software such as

word processing programs, spreadsheet software, and database management systems.

generalized audit software (GAS), and automated workpaper software.

Page 10: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

The Information Technology Auditor’s Toolkit

people skills to work as a team to interact with clients and other auditors, to interview many people constantly for evaluation can’t just be a technical nerd!

Page 11: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Careers in Information Systems Auditing

Information systems auditorsmay be internal or external can obtain professional certification as a

Certified Information Systems Auditor (CISA) Pass exam Five years of experience (some exceptions) 40 hours of CPE/year

can also acquire certification as Certified Information Security Managers (CISM)

Page 12: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

General-Use Software

Auditors use general-use software as productivity tools to improve their work such asspreadsheets and database management systems (e.g. Access)

Auditors often use structured query language (SQL) to retrieve a client’s data and display these data for audit purposes.

Page 13: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Generalized Audit Software

Generalized audit software (GAS) packagesare specifically tailored to auditor taskshave been developed in-house in large firms, orare available from various software suppliersautomates working papers, trial balances, and

statistical sampling and analysisExamples of GAS are

Audit Command Language (ACL) Interactive Data Extraction Analysis (IDEA) FAST! (Financial Audit Systems Technology)

Page 14: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Auditing Computerized AIS-Auditing Around the Computer

Auditing around the computer Compares output with input; assumes that

accurate output verifies proper processing operations

pays little or no attention to the controlprocedures within the IT environment

is generally not an effective approach toauditing in a computerized environment.

CPTR

Page 15: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Five techniques to audit a computerized AIS are:

use of test data (or deck), integrated test facility, and parallel simulation to test programs,

use of audit techniques to validate computer programs,

use of logs and specialized control software toreview systems software,

use of documentation and CAATs to validateuser accounts and access privileges, and

use of embedded audit modules to achievecontinuous auditing.

Auditing Computerized AIS-Auditing Through the

ComputerCPTR

Page 16: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Testing ComputerPrograms - Test Data (test deck)

The auditor’s responsibility is todevelop test data (or test deck from deck of cards)

that tests the range of exception situations arrange the data in preparation for processingcompare output with a predetermined set of

answersinvestigate further if the results do not agree

Test data (or test deck, named from punch card days)

can check if program edit test controls are in place and working

can be developed using software programs called test data generators

But may contaminate real data with fake data

CPTR

Page 17: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Testing Computer Programs -Integrated Test Facility

An integrated test facility (ITF) establishes a fictitious entity such as a

department, branch, customer, or employee,

enters transactions for that entity, and observes how these transactions are

processed. is effective in evaluating integrated online

systems and complex programming logic, and

aims to audit an AIS in an operational setting.

May contaminate real data with fake data.

CPTR

Page 18: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Testing Computer Programs -Parallel Simulation

In parallel simulation, the auditoruses live input data, rather than test data, in

aseparate program, which

is written or controlled by the auditor simulates all or some of the operations of

the real program that is actually in use. needs to understand the client system, should possess sufficient technical

knowledge, andshould know how to predict the results

CPTR

CPTR

Page 19: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Testing Computer Programs -Parallel Simulation

Parallel simulation eliminates the need to prepare a

set of test data,can be very time-consuming and costly usually involves replicating only

certain critical functions of a programBut reduces the chance of contaminating

real data with fake data

CPTR

CPTR

Page 20: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Validating Computer ProgramsAuditors must validate any program presented to them

to thwart a clever programmer’s dishonest program

Procedures that assist in program validation are 1. tests of program change control

begins with an inspection of the documentation includes program authorization forms to be filled ensures accountability and adequate supervisory controls

2. program comparison guards against unauthorized program tampering performs certain control total tests of program

authenticity using a test of length using a comparison program

Page 21: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Review of Systems Software

Systems software includes operating system software (e.g. Windows,

Linux) utility programs, program library software, and access control software.

Page 22: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Review of Systems Software

Auditors should first review systems software documentation.Next, auditors should review incident reports, which list events that are

unusual or interrupt operations security violations (such as unauthorized access

attempts), hardware failures, and software failures

Page 23: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Validating Users and Access Privileges

The IT auditor needs to verify that the software parameters are set appropriately (passwords, etc.) must make sure that IT staff are using them appropriately needs to ensure all users

are valid and have access privileges appropriate to their jobs

There are a variety of auditor software tools which can scan settings and access logs

Page 24: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Password Parameters

Page 25: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Continuous ApproachContinuous auditing can be achieved by embedded audit modules or audit hooks

application subroutines capture data for audit purposes

exception reporting mechanisms reject certain transactions

that fall outside preset limitstransaction tagging tags transactions with a special identifiers

snapshot technique Examines how transactions are processed

(e.g. macro, step-by-step)

Page 26: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Continuous Auditing – Spreadsheet Errors

Page 27: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Continuous Auditing – Spreadsheet Errors

Sleuthing With Excel

Excel 2010 and newer Formula Auditing: On the top menu of Excel, go to Formulas, see Formula Auditing section. Perform the error checking function to find and correct the formula errors. You can also display Precedent and Dependent arrows to show the formula pattern among the cells.

Data Validation: On the top menu of Excel, go to Data and then under the Data Tools section, go to Data Validation. Use the validation tool to verify data as it is being entered. For example, highlight the payrate range and set the data validation decimal feature between $7.50 and $40.00. From this point on, any data entered in the payrate range that does not fall between these two values will be flagged.

Page 28: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Benford’s LawPhysicist Frank Benford figured out the probability that certain digits form part of financial numbers. For example, the numeral 1 should occur as the first digit in any multiple-digit number about 31% of the time, while 9 should occur as the first digit only 5% of the time. As you can see below, the numbers in digit 1,2,5,6 & 7 are suspicious.

Page 29: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

The Sarbanes-Oxley Act of 2002

In 2002, Congress passed the Sarbanes-Oxley Act, which was response to the accounting scandals of Enron, Worldcom, etc. As Congress studied these frauds, it realized that one of the big problems was a weakness in internal controls.

Sen. Paul Sarbanes

Representative Mike Oxley

Page 30: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

The Sarbanes-Oxley Act of 2002

Some important provisions of SOX for auditors are Section 201 – prohibits public accounting firms from offering most nonaudit services to clients at the same time they are conducting audits (conflict of interest). Section 302 – requiring CFOs and CEOs to certify that their company’s financial statements are accurate and complete Section 404 – requiring both the CEO and CFO to attest to their organization’s internal controls over financial reporting

Page 31: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Third-Party Assurance

Internet systems and web sites are a source of risk for many companies, need specialized audits of these systems, have created a market for third-party

assurance services, which is limited to data privacy.

Page 32: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Third-Party Assurance

The AICPA introduced Trust Services an assurance service.

The principles of Trust Services are security, availability, processing integrity, online privacy, and confidentiality.

Page 33: Chapter 12 Information Technology Auditing Introduction The Audit Function The IT Auditor’s Toolkit Auditing the Computerized AIS Information Technology

Privacy Issues

Have a privacy policy for your websiteHave an audit done by professionals

who provide a privacy seal Truste BBB Online Webtrust