Part 4A and B

studied byStudied by 5 people
5.0(1)
Get a hint
Hint

It is a four-step approach to internal control evaluation that provides a logical framework for carrying out an audit.

1 / 40

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

41 Terms

1

It is a four-step approach to internal control evaluation that provides a logical framework for carrying out an audit.

Risk-based approach

New cards
2

Four (4) steps in Risk-based audit approach

  1. Determine the threats (errors and irregularities) facing the accounting information system

  2. Identify control procedures implemented to minimize each threat by preventing or detecting such errors and irregularities

  3. Evaluate the control procedures

  4. Evaluate weakness to determine their effect on the nature, timing, or extent of auditing procedures and client suggestions.

New cards
3

Its purpose it to review and evaluate the internal controls that protect the system.

Information System Audit

New cards
4

When performing an information system audit, auditors should ascertain that the following objectives are met:

  • Security provisions protect computer equipment, programs, communications, and data from unauthorized access, modification, or destruction

  • Program development and acquisition are performed in accordance with the management’s general and specific authorization

  • Program modifications have management’s authorization and approval

New cards
5

Six objectives and information system components

OPPSD

  • Overall Security

  • Program Development and Acquisition

  • Program Modification

  • Computer Processing

  • Source Data

  • Data Files

New cards
6

Types of security errors and fraud faced by companies (Overall Security)

  • Accidental or intentional damage to system assets

  • Unauthorized access, disclosure, or modification of data and programs

  • Theft

  • Interruption of crucial business activities

New cards
7

If security controls are seriously deficient, the organization faces substantial risks, so these controls mitigate the risks.

Compensating controls

New cards
8

Type of errors and fraud (Program Development and Acquisition)

  • Inadvertent errors due to careless programming or misunderstanding specifications, or

  • Deliberate insertion of unauthorized instructions into the programs

New cards
9

Control Procedures (Program Development and Acquisition)

  • Management and user authorization and approval

  • Thorough testing

  • Proper documentation

New cards
10

One way to test logical access controls is to try to break into a system (True or False)

True

New cards
11

Compensating controls are not likely to be enough, so auditors should strongly recommend that security weaknesses be corrected (T/F)

True

New cards
12

The auditor’s role in systems development should be limited to an ______________ review of system development activities.

Independent

New cards
13

The auditor should be involved in system development to make sure that the system is working properly (T/F)

False (Should not be involved to maintain objectivity)

New cards
14

During the system review, the auditor gain an understanding of development procedures by discussing with them.

  • Management

  • Users

  • IS personnel

New cards
15

Strong processing controls can sometimes compensate for inadequate development controls (T/F)

True

New cards
16

Type of Errors and Fraud (Program Modification)

  • Inadvertent programming errors

  • Unauthorized programming code

New cards
17

During the change process, the developmental version of the program must be kept separate from the ____________________

product version

New cards
18

The auditor can use this to test for unauthorized program changes and to compare the current version of the program with the original program

source code

New cards
19

Two additional techniques to detect unauthorized program changes

  1. Reprocessing

  2. Parallel simulation

New cards
20

On a surprise basis, the auditor uses a verified copy of the source code to reprocess data and compare that output with the company’s data

Reprocessing

New cards
21

The auditor writes his own program instead of using verified source code

Parallel Simulation

New cards
22

Types of Errors and Fraud (Computer Processing)

  • Fail to detect erroneous input

  • Improperly correct input errors

  • Process erroneous input

  • Improperly distribute or disclose output

New cards
23

Specialized techniques that allow the auditor to use the computer to test processing controls:

  • Processing test data

  • Using concurrent audit techniques

  • Analyzing program logic

New cards
24

It involves testing a program by processing a hypothetical series of valid and invalid transactions

Processing Test Data

New cards
25

It automatically prepares test data based on program specifications

Test Data Generator Program

New cards
26

Auditors can use this technique to continually monitor the system and collect audit evidence while live data are processed during regular operating hours. Millions of dollars of transactions can be processed in an online system without leaving a satisfactory audit trail

Concurrent Audit Techniques

New cards
27

These are segments of program code that:

  • Perform audit functions

  • Report test results to the auditor, and

  • Store collected evidence for audit review

Embedded audit modules

New cards
28

Five concurrent audit techniques

  1. Integrated Test Facility (ITF) Technique

  2. A snapshot technique

  3. A System Control Audit Review File (SCARF)

  4. Audit hooks

  5. Continuous and intermittent simulation (CIS)

New cards
29

This technique places a small set of fictitious records in the master files

ITF technique

New cards
30

This technique examines the way transactions are processed. Audit modules in the program record these transactions and their master file records before and after processing.

Snapshot

New cards
31

This technique uses embedded audit modules to continuously monitor transaction activity and collect data on transactions with special audit significance.

System Control Audit Review File (SCARF)

New cards
32

This technique is audit routines that flag suspicious transactions.

Audit hooks

New cards
33

This embeds an audit module in a database management system like those of SCARF

Continuous and Intermittent Simulation (CIS)

New cards
34

It interprets program source code and generate a corresponding flowchart

Automated Flowcharting Programs

New cards
35

It generates a decision table that represents a program logic.

Automated Decision Table Program

New cards
36

It search programs for specified variable names or character combinations

Scanning Routines

New cards
37

It identifies unexecuted program code

Mapping Programs

New cards
38

It sequentially prints all program steps executed during a program run.

Program Tracing

New cards
39

Types of Errors and Fraud (Source Data Computer Processing)

  • Inaccurate source data

  • Unauthorized source data

New cards
40

It shows the control procedures applied to each field of an input record

Matrix

New cards
41

It is a comprehensive, systematic, and effective means of evaluating internal controls in an AIS.

Auditing-by-objectives

New cards

Explore top notes

note Note
studied byStudied by 4 people
... ago
5.0(1)
note Note
studied byStudied by 19 people
... ago
5.0(2)
note Note
studied byStudied by 27 people
... ago
4.0(1)
note Note
studied byStudied by 24 people
... ago
5.0(2)
note Note
studied byStudied by 44 people
... ago
5.0(1)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 15 people
... ago
5.0(1)
note Note
studied byStudied by 138 people
... ago
5.0(2)

Explore top flashcards

flashcards Flashcard (179)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (37)
studied byStudied by 9 people
... ago
4.0(1)
flashcards Flashcard (22)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (41)
studied byStudied by 43 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 10 people
... ago
5.0(1)
flashcards Flashcard (33)
studied byStudied by 30 people
... ago
5.0(2)
flashcards Flashcard (20)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 3 people
... ago
5.0(1)
robot