Auditing & IT Flashcards

1
Q

INTERNAL CONTROL FOR IT

A

Auditing Internal Control in a company’s IT environment helps to:

  • Plan the rest of audit
    • Looks for shorter audit trails that may expire
    • Problem with Auditing IT: less documentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

INTERNAL CONTROL FOR IT

A

Assess the level of Control Risk:

  • Unauthorized access to systems or data is more difficult to catch
  • Systems access controls adds another layer to separation of duties analysis
  • Focus should be on the general controls
  • Any new systems developments
  • Current systems changes
    • Program/Data access changes
    • Program/Data access changes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Audit of IT is NOT required

A
  • Audit of IT is NOT required when Controls are redundant to another department
  • The system doesn’t appear to be reliable, and testing controls wouldn’t be an efficient use of time
  • Costs > Benefit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Audit of IT

A

Audit of IT can be performed without directly interacting with the system if:

  • System isn’t complex/complicated
  • System output is detailed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Database Admin

A
  • Maintains Database
  • Restricts Access
  • Responsible for IT Internal Control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Systems Analyst

A
  • Recommends changes or upgrades
  • Liaison between IT and users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Librarian

A
  • Responsible for Disc storage
  • Holds System Documentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Generalized Audit Software

A
  • Uses computer speed to quickly sort data and files, which leads to a more efficient audit
  • Compatible with different client IT systems
  • Extracts evidence from client databases
  • Tests data without auditor needing to spend time learning the IT system in detail
  • Client-tailored or commercially produced
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Structured Query Language (SQL)

A
  • Relational Database
  • Group of related spreadsheets
  • Retrieves information through Queries
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Definition Language

A
  • Defines a database
  • Gives information on database structure
  • Maintains tables
  • Can be joined together
  • Establishes database constraints

Data definition language is used to define a database, including creating, altering, and deleting tables and establishing various constraints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Manipulation Language

A
  • Data Manipulation Language (DML)
  • Auditor needs information, so client uses DML to get the information needed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Control Language

A
  • Controls a database
  • Restricts access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Check Digits

A
  • Check Digits
  • Makes it more difficult for a fraudulent account to be set up or go undetected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Code Review

A
  • Tests a program’s processing logic
  • Advantageous because auditor gains a greater understanding of the program
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Limit Test

A

Examines data and looks for reasonableness using upper and lower limits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Test Data Method

A
  • Auditor processes data with client’s computer
  • Fake transactions are used to test program control procedures
  • Each control needs to only be tested once
  • Problem - Fake data could combine with real data
17
Q

Operating systems logs

A

Auditor can review logs to see which applications were run and by whom

18
Q

Access Security Software

A
  • Helpful in online environments
  • Restricts computer access
  • May use encryption
19
Q

Library Management Software

A

Logs any changes to system/applications etc

20
Q

Embedded Audit Modules

A
  • Embedded Audit Modules
  • Enable continuous monitoring in an audit environment that is changing
  • Weakness: requires implementation into the system design
  • Collects information based on some criteria and can be analyzed at a later time (necessary because the audit environment is continually changing)
21
Q

Audit Hook

A

Application instruction that gives auditor controlover the application to grab transactions for analysis

22
Q

Transaction tagging

A

Auditor tags transactions and traces them through the system

23
Q

Extended records

A

Adds audit data to financial records to assist in audit trail creation

24
Q

Real Time Processing

A
  • Destroys prior data when updated
  • aka “Destructive Updating
  • Requires well-documented Audit Trail
25
Q

Requires well-documented Audit Trail

A

If the auditor only audits the outputs of a computer system and doesn’t also audit the software applications, an error in the applications could be missed

26
Q

Compiler

A

Software that translates source program (similar to English) into a language that the computer can understand

27
Q

Parallel Simulation

A
  • Client data is processed using Generalized Audit Software (GAS)
  • Sample size can be expanded without significantly increasing the audit cost
  • GAS output compared to client output
28
Q
A
29
Q

Data manipulation language

A

Data manipulation language is composed of commands used to maintain and query a database, including updating, inserting in, modifying and querying (asking for data)

30
Q

Data control language

A

Data control language is composed of commands used to control a database, including controlling which users have various privileges (e.g., who is able to read from and write to various portions of the database)

31
Q
A
32
Q

Five Trust Services Principles

A

Five Trust Services principles are

  • Security
  • Availability
  • Processing Integrity
  • Online Privacy
  • Confidentiality
33
Q

IT on Internal Control

A

The following factors related to control activities may impact an auditor’s consideration of the effect of IT on internal control.

a. Information processing. Two areas in which control activities can be affected by computer processing are authorization of transactions and the maintenance of adequate documents and records. Authorization procedures in many computer systems are a part of the computer program. Thus, there is increased potential for unauthorized individuals to gain access to sensitive accounting information. Concerning the maintenance of adequate documentary evidence, auditors must be aware that the traditional audit trail may not be available due to the fact that the IT system does not provide a hard copy of source documents.
b. Segregation of duties. Adequate controls must be established within the IT department to compensate for the lack of segregation of duties that would normally be available in a manual system.
c. Physical controls. In an IT department, access to assets is often possible through the computer system. As such, the need for enhanced physical controls is of great importance in an IT environment. It is also important to have adequate backup for computer files, as their destruction or damage could result in significant problems for a business entity.