Part-4-1A-Auditing-Computer-Based-IS-Risk-Based-Audit-Approach

studied byStudied by 0 people
0.0(0)
Get a hint
Hint


The Risk-Based Audit Approach

1 / 35

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

36 Terms

1


The Risk-Based Audit Approach

is a four-step approach to internal control evaluation that provides a logical framework for carrying out an audit.

provides auditors with a clear understanding of the errors and irregularities that can occur and the related risks and exposures.

This understanding provides a basis for developing recommendations to management on how the AIS control system should be improved.

New cards
2

Four steps of Risk-Based Audit Approach

Determine the threats (errors and irregularities) facing the accounting information system

New cards
3

Four steps of Risk-Based Audit Approach

Identify control procedures implemented to minimize each threat by preventing or detecting such errors and irregularities.

New cards
4

Four steps of Risk-Based Audit Approach

Evaluate the control procedures

New cards
5

Four steps of Risk-Based Audit Approach

Evaluate weakness (errors and irregularities not covered by control procedures) to determine their effect on the nature, timing, or extent of auditing procedures and client suggestions.

New cards
6


The Information System Audits

The purpose of an information system audit is to review and evaluate the internal controls that protect the system.

New cards
7

Security provisions protect computer equipment, programs, communications, and data from unauthorized access, modification, or destruction

When performing an information system audit, auditors should ascertain that the following objectives are met:

New cards
8

Program development and acquisition are performed in accordance with the management’s general and specific authorization

When performing an information system audit, auditors should ascertain that the following objectives are met:

New cards
9

Program modifications have management’s authorization and approval

When performing an information system audit, auditors should ascertain that the following objectives are met:

New cards
10

Processing of transactions, files, reports, and other computer records is accurate and complete.

When performing an information system audit, auditors should ascertain that the following objectives are met:

New cards
11

Source data that are inaccurate or improperly authorized are identified and handled according to prescribed managerial policies.

When performing an information system audit, auditors should ascertain that the following objectives are met:

New cards
12

Computer data files are accurate, complete and confidential.

When performing an information system audit, auditors should ascertain that the following objectives are met:

New cards
13

Overall Security

Program Development and Acquisition

Program Modification

Computer Processing

Source Data

Data Files

Each description includes an audit plan to accomplish the objective, as well as the techniques and procedures to carry out the plan.

New cards
14

Information System coponents and audit objectives

knowt flashcard image
New cards
15

Accidental or intentional damage to system assets

Unauthorized access, disclosure, or modification of data and programs

Theft.

Interruption of crucial business activities.

OBJECTIVE 1: OVERALL SECURITY

Types of security errors and fraud faced by companies:

New cards
16

OBJECTIVE 1: OVERALL SECURITY

Control procedures to minimize security errors and fraud

<p></p>
New cards
17

Inspecting computer sites.

Interviewing personnel.

Reviewing policies and procedures.

Examining access logs, insurance policies, and the disaster recovery plan.

OBJECTIVE 1: OVERALL SECURITY

Audit Procedures: Systems Review

New cards
18

OBJECTIVE 1: OVERALL SECURITY

Audit Procedures: Tests of Controls


<p><span><br></span></p>
New cards
19

OBJECTIVE 1: OVERALL SECURITY

Compensating Controls

<p></p>
New cards
20

OBJECTIVE 2: PROGRAM DEVELOPMENT AND ACQUISITION

knowt flashcard image
New cards
21

Two things can go wrong in program development:

  • Inadvertent errors due to careless programming or misunderstanding specifications; or

  • Deliberate insertion of unauthorized instructions into the programs.

OBJECTIVE 2: PROGRAM DEVELOPMENT AND ACQUISITION

Types of errors and fraud:

New cards
22

The preceding problems can be controlled by requiring:

  • Management and user authorization and approval

  • Thorough testing

  • Proper documentation

OBJECTIVE 2: PROGRAM DEVELOPMENT AND ACQUISITION

Control procedures:

New cards
23

OBJECTIVE 2: PROGRAM DEVELOPMENT AND ACQUISITION

Audit Procedures: Systems Review

knowt flashcard image
New cards
24

OBJECTIVE 2: PROGRAM DEVELOPMENT AND ACQUISITION

Audit Procedures: Tests of Controls

knowt flashcard image
New cards
25

OBJECTIVE 2: PROGRAM DEVELOPMENT AND ACQUISITION

Compensating Controls

knowt flashcard image
New cards
26

OBJECTIVE 3: PROGRAM MODIFICATION

knowt flashcard image
New cards
27

OBJECTIVE 3 : PROGRAM MODIFICATION

Types of Errors and Fraud

Same that can occur during program development:

  • Inadvertent programming errors

  • Unauthorized programming code

New cards
28

OBJECTIVE 3 : PROGRAM MODIFICATION

Control Procedures

knowt flashcard image
New cards
29

OBJECTIVE 3 : PROGRAM MODIFICATION

Audit Procedures: System Review

knowt flashcard image
New cards
30

OBJECTIVE 3 : PROGRAM MODIFICATION

Audit Procedures: Tests of Controls

knowt flashcard image
New cards
31

OBJECTIVE 3 : PROGRAM MODIFICATION

Audit Procedures: Tests of Controls

knowt flashcard image
New cards
32

Reprocessing and Parallel simulation

Two additional techniques detect unauthorized program changes:

New cards
33

Reprocessing

On a surprise basis, the auditor uses a verified copy of the source code to reprocess data and compare that output with the company’s data.

Discrepancies are investigated.

New cards
34

Parallel simulation

Like reprocessing except that the auditor writes his own program instead of using verified source code.

Can be used to test a program during the implementation process.

New cards
35

OBJECTIVE 3 : PROGRAM MODIFICATION

Audit Procedures: Tests of Controls

knowt flashcard image
New cards
36

OBJECTIVE 3 : PROGRAM MODIFICATION

Compensating Controls

knowt flashcard image
New cards

Explore top notes

note Note
studied byStudied by 137 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 37 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 28 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 87 people
Updated ... ago
4.5 Stars(4)
note Note
studied byStudied by 26 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 31 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 204 people
Updated ... ago
5.0 Stars(3)

Explore top flashcards

flashcards Flashcard44 terms
studied byStudied by 36 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard22 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard124 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard35 terms
studied byStudied by 30 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard37 terms
studied byStudied by 22 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard88 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard128 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard351 terms
studied byStudied by 1126 people
Updated ... ago
4.7 Stars(12)