15 - III: IT auditing Flashcards

1
Q

Is the objective different compared to the non-IT auditing?

A

No.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are disadvantages?

A

Segregation of duties, lack of audit trails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Advantage?

A

Uniform processing of transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If IT is a major part in the entity, are substantive procedures alone sufficient to obtain sufficient appropriate audit evidence?

A

Maybe no. The auditor may not be able to limit audit risk to acceptable level if evidence is only available in IT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are 2 major categories of computer-related controls?

A
  1. General controls - widespread impact on various specific applications.
  2. Application controls - affect particular data processing tasks (ex: payroll, cash disbursement, so on).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are 5 categories of general controls?

A
  1. Organization and operation.
  2. Systems development, maintenance, and documentation.
  3. Hardware and software (built-in controls).
  4. Access.
  5. Data and procedures.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

General controls: what is the emphasis on organization and operation? What are 5 examples of duties?

A

Segregation of duties within the company and IT dept.
System analyst: design the system,
Programmer: develops the code to run the system
Operator: actually run the system.
Librarian: keeps trac of programs and data.
Security: safeguards system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

General controls: what must be done in systems development and doc?

A

Must adequately doc the initial system.

Must doc any changes - all changes must be authorized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

General controls: what are checks/functions under hardware and software?

A
  • Parity check: interaction between hardware components.
  • Echo check: transmission over phone lines.
  • Diagnostic routines: affecting hardware.
  • Boundary protection: separating multiple jobs.
  • Operating system: built into systems software.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

General controls: what is data and procedures?

A

Physical safeguards to protect the data files.
File labels - internal and external labels to avoid misuse.
File protection rings - protect magnetic tapes.
File protection plans - backup plans to provide for data recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Application controls: What are 3 types and 2 emphasis for audit?

A

Input, processing, output.

Accuracy and authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Application: Input: what are procedures to prevent errors?

A
Preprinted forms.
Keypunch verification/duplication.
Control totals.
Logic checks
Error resolution procedures.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application: Input: What are 3 control totals and which one is meaningful?

A
Hash totals (not meaningful).
Record count.
Batch totals (meaningful).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Application: Input: What are 4 types of logic checks?

A

Limit tests - within predetermined rage.
Validity check - a legitimate code (ex: M or F).
Missing data checks - any omissions?
Check digits - an arithmetic manipulation (added on at the end of a numeric field).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Application: Processing: procedure to prepare for case of crash? Other to prevent errors?

A

Checkpoint/restart for long applications.
Logic checks - limit on processing time (upper limit).
Internal/external labels.
Control totals.
Error resolution procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Application: Output: procedures?

A

Logic checks - output limits: upper limit for printing time or the maximum # of pages permitted.
Control totals.
Error resolution procedures.

17
Q

What can audit software be used for?

A

Substantive audit purposes to access electronic files, perform routine tasks, data mining, etc.

18
Q

What are 2 types of audit softwares?

A
  1. Generalized audit software: expensive, but can be used for multiple clients.
  2. Customized audit software: less expensive, but can be used only for one client.
19
Q

What are 3 types to test I/C (after the fact)?

A
  • Test data: include known errors and check the result.
  • Integrated test facility: dummy division.
  • Parallel simulation: run, compare output w/ client’s result.
20
Q

What are 2 types to test I/C (during process)?

A
  • Tagging: electronic tag attached to data and observe the process.
  • Embedded audit modules (built-in audit routines) and audit hooks (built in points where an audit module can be added later).
21
Q

What is hardware?

A

The central processing units and related equip.

22
Q

What is software?

A
  • Operating system: runs hardware.

* Compiler: converts the source program (particular language) into machine readable form (object program).

23
Q

What are 2 types of transaction processing modes?

A

Bath processing: periodic processing.

Online (in direct communication w/CPU) - real time (updated immediately) processing.

24
Q

What is distributed systems?

A

A network of remote computers linked to the main system (host server). Each location has input, processing output.

25
Q

What are 2 structures of data base system?

A

Hierarchical and relational.

26
Q

What are 3 types of networks?

A
  • Local area network (LAN): interconnected throughout a building/campus.
  • Wide are network (WAN):interconnected throughout a whole city or country.
  • Value added network (VAN): an independent network that facilities EDI (electronic data interchange) transactions between buyers and seller.
27
Q

Does paperwork exist for electronic commerce?

A

no.

28
Q

Electronic commerce: what is point-to-point (point of sale)?

A

Involves direct computer-to-computer communication.

29
Q

What is a concern for internet-based? What did AICPA develop to address security issues?

A

Security.

WebTrust