IT (Computer) Auditing Flashcards
List some controls that can be put in place/built in hardware and systems software.
- Parity check. 2. Echo check. 3. Diagnostic routines. 4. Boundary protection.
List the IT duties that should be segregated (in connection with “organization and operation”).
- Systems analyst 2. Programmer 3. Operator 4. Librarian 5. Security.
List the types of physical safeguards used to protect the data files.
- File labels 2. File protection rings 3. File protection plans.
List some internal control implications associated with an IT environment.
- Segregation of duties may be undermined (a disadvantage) 2. Audit trail may be lacking (a disadvantage) 3. Computer processing is uniform (an advantage).
Define “general controls.”
Controls that have pervasive effects on all the specific computer processing applications.
List the five categories of general controls.
- Organization and operation 2. Systems development and documentation 3. Hardware and systems software 4. Access 5. Data and procedures.
What is the purpose of missing data checks?
To determine whether there are any omissions from fields in which data should have been present.
Define “record count.”
A counting mechanism in an IT system that keeps track of the number of records processed to determine that the appropriate number was accounted for.
What is the purpose of validity checks?
To determine whether the data under review are recognized as legitimate possibilities.
Define “check digit.”
An arithmetic manipulation of a numeric field that captures the information content of that field and then gets “tacked” onto the end of that numeric field.
What is the purpose of limit tests?
To determine whether the data under review are all within some predetermined range.
What is the objective of input application controls?
To ensure that the input of data is accurate and as authorized.
List the three types of control totals.
- Batch totals 2. Hash totals 3. Record count.
Define “hash totals.”
An arbitrary total that has no meaningful interpretation outside the context in which it was created. It is used only to validate the integrity of that data that is being examined.
List some examples of logic checks.
- Limit tests 2. Validity checks 3. Missing data checks 4. Check digits.