670 likes | 4.94k Views
Advantages and Disadvantages of Technology. Reduced human involvementUnauthorized access exposes confidential information and changes programmingLoss of data (all centralized)Reduced segregation of dutiesLack of traditional authorizationNeed for IT experience. General Internal Controls over In
E N D
1. Advantages and Disadvantages of Technology Computer controls replace manual controls
Higher quality information available faster
Hardware and software and therefore all the companys information is a risk when computer malfunctions
Loss of hard copy audit trail
Systematic vs random errors (make the same error every time.
2. Advantages and Disadvantages of Technology Reduced human involvement
Unauthorized access exposes confidential information and changes programming
Loss of data (all centralized)
Reduced segregation of duties
Lack of traditional authorization
Need for IT experience
3. General Internal Controls over Information Technology General Controls
relate to all aspects of the IT function
administration of the IT function
segregation of IT duties
systems development
physical and online security
backup and contingency planning
hardware controls
4. General Controls Administration of the IT Function
Must be given importance in organization
Chief Information Officer
IT steering Committees
5. General Controls Segregation of IT duties
Separate custody, authorization, record-keeping in traditional controls
Separate IT Management, Systems Development, Operations, Data Control
6. IT Functions IT Management
CIO
Security Administrator
System Development
Systems Analysts
Programmers
cannot have access to input data or operations
(use test copies of programs and data)
7. IT Functions Operations
Computer Operators- Day to day operations
execute jobs according to schedule
monitoring computer consoles for messages on efficiency and malfunctions
Librarian
Maintains programs and transaction files
Network administrator
planning, implementing and maintaining network
8. IT Functions Data Control
Data input/output control verify quality of input and reasonableness of output
Database administrator controls operation and access security of shared databases
9. General Controls Systems Development
Controls = system development methodology procedures
Involve IT and non IT personnel in development
testing of software
Pilot testing- one part of organization
Parallel testing - both systems operate
10. General Controls Physical and Online Security
Physical control over computer equipment restricts access to hardware, software, backup files, hard drives, CDs, thumb drives, laptops etc.
keypad entry
badge-entry systems
security cameras
security personnel
11. General Controls Physical and Online Security (cont.)
Online access controls
User IDs
passwords
key cards
bio-id
12. General Controls Backup and Contingency Planning
Several copies of backup, some stored off premises
battery backups for temporary power outages
13. General Controls Hardware Controls
Built into computer equipment to detect and report equipment failures
Someone must review and act on these reports
14. Application Controls Exist to satisfy the 6 transaction related audit objectives
Existence
Completeness
Accuracy
Classifications
Timing
Posting/Summarization
15. Application Controls Performed by people
Performed by computers
16. Application Controls Input Controls- Entering Data
Design of screens
Pull-down lists
Valid combinations
Batch totals
Record counts
17. Application Controls Processing Controls
Validation
Sequence Test
Math
Reasonableness
Completeness
18. Application Controls Output Controls
Review by human eyes for reasonableness
19. Audit Process and IT General Controls are the most important
auditors evaluate General Controls first
Use Flow charts, manuals, interviews, change request forms, testing results to understand systems
20. Audit Process and IT Controls Application controls may reduce control risk and need for evidence
reduce sample size
use software to test controls
21. Audit Process and IT For less complex systems we can audit around the computer
test documents before input and reports after output as if it was done manually
22. Audit Process and IT For more Complex systems we Audit through the computer
Test Data Approach - Auditors data, clients system
All relevant conditions
Programs must be the same all year
Eliminate test data when done
Parallel simulation- Auditor software, client data using Generalized Audit software (ACL or IDEA)
23. Audit Process and IT For more Complex systems we Audit through the computer (continued)
Embedded Audit Module - Auditor software and client data (software embedded all year in client system) real time parallel simulation.
24. PC Environments General Controls less effective in smaller companies
Auditors audit around the computer
Access is a greater risk
Loss of data (viruses)
25. Network Environments LAN - Local area networks
single or small cluster of buildings
WAN - wide area networks
larger regions including global
Network risks
lack of security
26. Network Environments Internal Controls over Financial Reporting
network configuration
network software
Access controls
Change controls
27. Database Management Systems Database Management System = storage of data for multiple uses
reduce data redundancy
control data
integrated information (cost reduction)
Risks
Improper Access
loss of data
28. E-Commerce Systems Linking your network to outside networks for business purposes increases risk
firewall (filters data) hardware and software
encryption techniques- change message into code
use decryption program to decode
Public key to code, private key to decode
Digital signatures- verify source of public key
29. Outsourcing IT Application Service Providers (ASPs) and Computer service centers
Difficulty in obtaining understanding of internal controls of the service center
Rely on report done on Service Center by other auditors
report on controls placed in operation
report on controls placed in operations and tests of operating effectiveness