13. IT Systems Flashcards

1
Q

What are preventive controls?

A

These are designed to stop errors or irregularities from occurring in the first place.
For example:
Authorization of transactions,
Physical and logical access to restrict unauthorized access,
Training of employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are detective controls?

A

These are designed to identify errors or irregularities that may have occurred.
For example:
Review of system logs,
Reconciliations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are corrective controls?

A

These are designed to correct errors or irregularities that have been detected.
For example:
Disciplinary mechanism,
policies and procedures for reporting errors to correct them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are IT General Controls?

A

IT General Controls are policies and procedures that relate to many or all applications. They support effective functioning of application controls by ensuring continued proper operations of IT system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain importance of IT General Controls for Auditor?

A

Auditor first tests ITGC to assess control risk of IT system as whole. If control risk as whole is assessed low only then he will test application controls to decide if he can rely on specific system and reduce substantive testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are application controls?

A

Application controls apply to processing of individual application. For example: Sales application or payroll application in accounting. These controls ensure that input transactions are authorized, transactions are processed and output is timely and confidentially distributed.
These can either be manual or computerized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is objective of development and acquisition of IT Systems?

A

To ensure computer based information system and application are developed in consistency with entity’s objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is objective of documentation and testing of changes to program?

A

To ensure proper development, documentation, testing, training and approval of program changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does prevention and detection of unauthorized changes do?

A

The objective is to ensure that unauthorized persons do not make changes in the program or new programs are not introduced without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does using correct version of programs and data files do?

A

There may be several versions of a program at any time. These controls ensure that correct version of the program is used.
Examples include:
training, job scheduling, reviews by management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is access controls to prevent unauthorized access to data files?
Also explain physical access control?

A

To prevent unauthorized access to resources.
Physical access controls are used to prevent or detect unauthorized access to hardware.
Examples include:
Fences and door-locks, Finger-print readers, Identification badges, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is ensure continuity of operations?

A

To ensure continuity of operations in the event of disaster for example: in case of physical damage to computer equipment or if data is corrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain Categories of IT Application Controls?

A

Input controls: To ensure that input data is authorized and valid.
Controls over processing: To ensure that correct number of transactions has been processed and that they have all been fully and accurately processed.
Controls over output: To ensure that output reports are distributed to authorized personnel, output is not lost and privacy is not violated.
Controls over master file and standing data: To ensure that data held on master files and standing files is accurate and complete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is auditing around computers?

A

Auditing around computers means that client’s internal software is not audited. Auditor agrees inputs of the system with output and compares actual output with expected output.
This method increases the audit risk because:
Auditor has no direct evidence that programs are working correctly.
If differences are found between input to the system and output from the system, it may be difficult or even impossible to determine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain auditing through computers?

A

It means that the auditor uses various techniques to evaluate client’s computerized information system to determine reliability of its operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is CAAT?

A

Computer Assisted Audit Techniques are use of computer techniques by auditor to perform audit procedures and obtain evidence. CAATs are often used when processing is electronic and paper audit trail is not available.
There are two types of CAATS:
1. Test Data
2. Audit softwares.

17
Q

Explain advantages and disadvantages of CAAT?

A

Advantages:
1. Auditors are able to check the accuracy and completeness of processing of transactions.
2. Enable auditors to test large volume of data accurately.
3. Reduce efforts on routine work.
Disadvantages:
Cost can be expensive.

18
Q

Define test data?

A

Test Data is a set of dummy transactions developed by the auditor and processed by client’s IT system. After processing, auditor compares actual results with expected results to determine whether controls are operating effectively. Their principle objective is testing of controls.
Test data can be used in any area of financial statements to test client’s system of internal control.

19
Q

What is the problem with use of test data?

A

It provides evidence about operation of controls only at the time when test data is processed.
Only way to remove this problem is to use Embedded Audit Facilities.

20
Q

Define Audit softwares?

A

Audit softwares are computer programs used by the auditor to extract and interrogate financial information in client’s IT System for use in audit work e.g. Microsoft Excel. Their principal objective is substantive testing.

21
Q

What are the problems with use of audit softwares?

A
  1. High set up cost.
  2. if accounting system is changed, software may not be compatible with new system.
  3. checking the original files may increase risk of files being corrupted.
22
Q

When to use:

Oval, Rectangle and Diamond?

A

Oval: To show starting and ending points of the process.
Rectangular Box: Shows individual activity or step in the process.
Diamond: To show decision points. These are in YES / NO form. Each decision must show possible course of action.

23
Q

What are they used for:

Arrow, Circle, Pentagon?

A

Arrow: Indicates directional flow of the process.
Circle: Indicates that a particular step is connected within the page.
Pentagon: It is used to link a particular step of the process to another page or part of the flow chart. Letters are used to show continuation.