WEEK 9: AUDITING Computer-based Flashcards
steps in audit process
- audit planning ( inherent, control, detection )
- collection of audit evidence ( observing reviewing etc.)
- evaluation of evidence ( use credible analysis methods)
- communication of results
reasons for audit planning
To identify areas of risk ofmaterial misstatements
To design audit procedures (audit strategy) to address those risks and to obtain sufficient appropriate evidence
To help keep audit costs reasonable
To avoid misunderstandings with the client
Auditing objectives
- Ensure security provisions protect computer equipment, programs, communications, and data from unauthorized access, modification, or destruction.
- Program development and acquisition are performed in accordance with management’s general and specific authorization.
- Program modifications have management’s authorization and approval.
- Processing of transactions, files, reports, and other computer records is accurate and complete.
- Source data that are inaccurate or improperly authorized are identified and handled according to prescribed managerial policies.
- Computer data files are accurate, complete, and confidential.
what is the objective of risk based approach
ensures risk and opportunities are considered
key components of risk based approach
- identification and detection of risks
- assessment and classification of risk ( significant/ insignificant)
- designing and implementing further audit procedures to respond to these risks
- issuing appropriate audit report in a manner to reduce the audit risk to acceptable level
calculating audit risk
audit risk = IRCRDR
CR = Control risk IR= Inherent risk DR= Detection risk
what is a compensating control?
control that is designed to satisfy the requirement for some other control deemed too difficult
Are there lots of controls and stuff you need to read over in the slides for this section ?
yes :(((