AT - AUDIT IN A COMPUTERIZED ENVIRONMENT Flashcards

1
Q

What are the characteristics of a Computer Information System?

A
  1. Vulnerability of data and program storage media - Information on computer can easily be changed, leaving no trace of the original content.
  2. Consistency of performance - computer processes transactions uniformly
  3. Lack of visible transaction trails - data can be entered directly without supporting documents
  4. Ease of Access to Data and Computer Program - may be accessed/altered by unauthorized persons.
  5. Concentration of Duties - functions that are normally segregated in manual processing are combined in a CIS environment. A properly programmed computer has no tendency/motivation to commit irregularities or conceal its errors.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two internal control procedures in a CIS environment?

A
  1. General Controls

2. Application Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is General Control? What are its components?

A

General Control are those control policies and procedures that relate to the OVERALL COMPUTER INFORMATION SYSTEM (CIS), which includes:

  1. ) Monitoring Controls
  2. ) Organizational controls
  3. ) Systems development and documentation controls
  4. ) Access Controls
  5. ) Data Recovery Controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are monitoring controls under general controls?

A

It is designed to ensure that CIS controls are working effectively as planned by periodic evaluation of the adequacy and effectiveness of the overall CIS operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are organizational controls under general controls?

A

It includes the segregation between the user and CIS department and segregation of duties within the CIS department.

  1. ) User department initiates transactions, CIS processes these transactions
  2. ) Functions within the CIS are segregated - as a minimum, SYSTEMS DEVELOPMENT AND COMPUTER OPERATIONS MUST BE SEGREGATED, and COMPUTER OPERATORS SHOULD NOT PARTICIPATE IN THE PROGRAM DESIGN.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Discuss the components of a CIS department.

A

CIS director - exercises control over CIS operations

SYSTEMS DEVELOPMENT
1. Systems analyst - designs new systems evaluates and improves existing systems and prepares specifications for programmers.

  1. Programmer - Guided by specifications of the System Analyst, he writes a program and prepares the computer operating instructions

OPERATIONS
1. Computer operator - Uses the program prepared by the programmer to process transactions

  1. Data entry operator - Prepares and verifies input data for processing

OTHER FUNCTIONS
1. Librarian - maintains custody of systems documentation,programs and files

  1. Control Group - reviews all input procedures, monitors processing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are systems development and documentation controls under general controls?

A

It tests and modifies programs, if needed, by the CIS and user department. It also maintains adequate systems documentation in order to facilitate the use of the program as well as changes that may be made later into the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are data recovery controls under general controls?

A

It provides for the MAINTENANCE OF BACK-UP FILES AND OFF-SITE STORAGE PROCEDURES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are access controls under general controls?

A

It involves adequate security controls to protect equipment, files and programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Application controls?

A

Application controls are those policies and procedures that relate to the SPECIFIC USE OF THE SYSTEM. It is designed to PROVIDE REASONABLE ASSURANCE THAT ALL TRANSACTIONS ARE AUTHORIZED, PROCESSED COMPLETELY ACCURATELY ON A TIMELY BASIS. Its components are:

  1. ) Controls over input
  2. ) Controls over processing
  3. Controls over output
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are controls over input? Give examples and explain each.

A

Controls over input are designed to provide reasonable assurance that DATA SUBMITTED FOR PROCESSING ARE COMPLETE, AUTHORIZED, AND ACCURATELY TRANSLATED INTO MACHINE READABLE FORM. It includes:

  1. Key verification - requires data to be entered twice to ensure no key entry errors are made.
  2. Field check - Ensures that input data agree with the required field (Ex: must contain 10 numbers for SSS)
  3. Validity check - information entered are compared with those in the master file to determine the authenticity of the input (EX : 1 for male, 2 for female, 3 is a wrong input)
  4. Self-checking digit - mathematically calculated digit to detect common transitional errors in data submitted for processing
  5. Limit check - ensures that data for processing DOES NOT EXCEED A PRE-DETERMINED LIMIT OR A REASONABLE AMOUNT
  6. Control totals - Ensures the completeness of data submitted for processing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are controls over processing?

A

Processing controls are designed to provide reasonable assurance that INPUT DATA ARE PROCESSED ACCURATELY AND THAT DATA ARE NOT LOST.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are controls over output?

A

Output controls are designed to provide reasonable assurance that results processed are complete accurate and that the outputs are DISTRIBUTED TO AUTHORIZED PERSONNEL ONLY.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the auditor’s choices when he wants to test the application controls?

A
  1. Audit around the computer

2. CAAT (Computer Assisted Audit Techniques)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is auditing around the computer?

A

It involves examination of documents and reports to determine the reliability of the system. Input data are simply reconciled with output data to verify the accuracy of processing. It is also known as “BLACK BOX APPROACH” It can only be used when there are visible input documents and detailed output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Computer Assisted Audit Techniques?

A

CAAT aka “WHITE BOX APPROACH” is used when no visible evidence is available. CAAT are computer programs which the auditor uses to process data of audit significance. Common CAAT include:

  1. Test Data
  2. Integrated Test Facility
  3. Parallel Simulation
  4. Snapshots
  5. Systems control audit review files (SCARF)
17
Q

What is test data?

A

Test data technique is designed to test the effectiveness of internal control procedures which are incorporated in the client’s computer program.

The auditor PREPARES TEST DATA THAT CONSISTS OF VALID AND INVALID CONDITIONS and enters these into the auditee’s computer program. The auditor should know how the output should look like, assuming the client’s program functions effectively. The expected output and actual output are then compared to determine the reliability of the program.

Its disadvantage is that the AUDITOR DOES NOT HAVE AN ASSURANCE THAT THE PROGRAM TESTED IS THE SAME PROGRAM THE AUDITEE USED THROUGHOUT THE ACCOUNTING PERIOD.

18
Q

What is integrated test facility?

A

ITF integrates the processing of test data with the actual processing of ordinary transactions WITHOUT MANAGEMENT BEING AWARE OF THE TESTING PROCESS. The auditor creates dummy/fictitious accounts in testing within the auditee’s computer system.

Its disadvantage is that it may CONTAMINATE THE MASTER FILE.

19
Q

What is parallel simulation?

A

Parallel simulation requires the auditor to WRITE A PROGRAM THAT SIMULATES KEY FEATURES/PROCESSES OF THE PROGRAM UNDER REVIEW. The simulated program is then used to REPROCESS TRANSACTIONS PREVIOUSLY PROCESSED BY THE CLIENT’S PROGRAM. The auditor then compares the results obtained. Parallel simulation can be done by using either:

  1. Generalized audit software - consists of generally available computer packages designed to perform common audit tasks
  2. Purpose-written programs - designed to perform audit tasks in specific circumstances.
20
Q

What are snapshots?

A

Snapshots is an audit technique which involves taking a picture of a transaction as it flows through the computer systems, permitting the auditor to track data and evaluate the computer processes applied to the data.

21
Q

What is SCARF?

A

Systems control audit review files is a technique involving embedding audit software modules within an application system to provide continuous monitoring of the systems transactions. The information collected is sent to a special computer file that the auditor can examine.