Part-4-1A-Auditing-Computer-Based-IS-Risk-Based-Audit-Approach

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/35

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:10 PM on 3/15/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

36 Terms

1
New cards


The Risk-Based Audit Approach

is a four-step approach to internal control evaluation that provides a logical framework for carrying out an audit.

provides auditors with a clear understanding of the errors and irregularities that can occur and the related risks and exposures.

This understanding provides a basis for developing recommendations to management on how the AIS control system should be improved.

2
New cards

Four steps of Risk-Based Audit Approach

Determine the threats (errors and irregularities) facing the accounting information system

3
New cards

Four steps of Risk-Based Audit Approach

Identify control procedures implemented to minimize each threat by preventing or detecting such errors and irregularities.

4
New cards

Four steps of Risk-Based Audit Approach

Evaluate the control procedures

5
New cards

Four steps of Risk-Based Audit Approach

Evaluate weakness (errors and irregularities not covered by control procedures) to determine their effect on the nature, timing, or extent of auditing procedures and client suggestions.

6
New cards


The Information System Audits

The purpose of an information system audit is to review and evaluate the internal controls that protect the system.

7
New cards

Security provisions protect computer equipment, programs, communications, and data from unauthorized access, modification, or destruction

When performing an information system audit, auditors should ascertain that the following objectives are met:

8
New cards

Program development and acquisition are performed in accordance with the management’s general and specific authorization

When performing an information system audit, auditors should ascertain that the following objectives are met:

9
New cards

Program modifications have management’s authorization and approval

When performing an information system audit, auditors should ascertain that the following objectives are met:

10
New cards

Processing of transactions, files, reports, and other computer records is accurate and complete.

When performing an information system audit, auditors should ascertain that the following objectives are met:

11
New cards

Source data that are inaccurate or improperly authorized are identified and handled according to prescribed managerial policies.

When performing an information system audit, auditors should ascertain that the following objectives are met:

12
New cards

Computer data files are accurate, complete and confidential.

When performing an information system audit, auditors should ascertain that the following objectives are met:

13
New cards

Overall Security

Program Development and Acquisition

Program Modification

Computer Processing

Source Data

Data Files

Each description includes an audit plan to accomplish the objective, as well as the techniques and procedures to carry out the plan.

14
New cards

Information System coponents and audit objectives

knowt flashcard image
15
New cards

Accidental or intentional damage to system assets

Unauthorized access, disclosure, or modification of data and programs

Theft.

Interruption of crucial business activities.

OBJECTIVE 1: OVERALL SECURITY

Types of security errors and fraud faced by companies:

16
New cards

OBJECTIVE 1: OVERALL SECURITY

Control procedures to minimize security errors and fraud

<p></p>
17
New cards

Inspecting computer sites.

Interviewing personnel.

Reviewing policies and procedures.

Examining access logs, insurance policies, and the disaster recovery plan.

OBJECTIVE 1: OVERALL SECURITY

Audit Procedures: Systems Review

18
New cards

OBJECTIVE 1: OVERALL SECURITY

Audit Procedures: Tests of Controls


<p><span><br></span></p>
19
New cards

OBJECTIVE 1: OVERALL SECURITY

Compensating Controls

<p></p>
20
New cards

OBJECTIVE 2: PROGRAM DEVELOPMENT AND ACQUISITION

knowt flashcard image
21
New cards

Two things can go wrong in program development:

  • Inadvertent errors due to careless programming or misunderstanding specifications; or

  • Deliberate insertion of unauthorized instructions into the programs.

OBJECTIVE 2: PROGRAM DEVELOPMENT AND ACQUISITION

Types of errors and fraud:

22
New cards

The preceding problems can be controlled by requiring:

  • Management and user authorization and approval

  • Thorough testing

  • Proper documentation

OBJECTIVE 2: PROGRAM DEVELOPMENT AND ACQUISITION

Control procedures:

23
New cards

OBJECTIVE 2: PROGRAM DEVELOPMENT AND ACQUISITION

Audit Procedures: Systems Review

knowt flashcard image
24
New cards

OBJECTIVE 2: PROGRAM DEVELOPMENT AND ACQUISITION

Audit Procedures: Tests of Controls

knowt flashcard image
25
New cards

OBJECTIVE 2: PROGRAM DEVELOPMENT AND ACQUISITION

Compensating Controls

knowt flashcard image
26
New cards

OBJECTIVE 3: PROGRAM MODIFICATION

knowt flashcard image
27
New cards

OBJECTIVE 3 : PROGRAM MODIFICATION

Types of Errors and Fraud

Same that can occur during program development:

  • Inadvertent programming errors

  • Unauthorized programming code

28
New cards

OBJECTIVE 3 : PROGRAM MODIFICATION

Control Procedures

knowt flashcard image
29
New cards

OBJECTIVE 3 : PROGRAM MODIFICATION

Audit Procedures: System Review

knowt flashcard image
30
New cards

OBJECTIVE 3 : PROGRAM MODIFICATION

Audit Procedures: Tests of Controls

knowt flashcard image
31
New cards

OBJECTIVE 3 : PROGRAM MODIFICATION

Audit Procedures: Tests of Controls

knowt flashcard image
32
New cards

Reprocessing and Parallel simulation

Two additional techniques detect unauthorized program changes:

33
New cards

Reprocessing

On a surprise basis, the auditor uses a verified copy of the source code to reprocess data and compare that output with the company’s data.

Discrepancies are investigated.

34
New cards

Parallel simulation

Like reprocessing except that the auditor writes his own program instead of using verified source code.

Can be used to test a program during the implementation process.

35
New cards

OBJECTIVE 3 : PROGRAM MODIFICATION

Audit Procedures: Tests of Controls

knowt flashcard image
36
New cards

OBJECTIVE 3 : PROGRAM MODIFICATION

Compensating Controls

knowt flashcard image