Chapters 1 To 12 - Revision - Final
Chapters 1 To 12 - Revision - Final
Chapters 1 To 12 - Revision - Final
IT Auditing, Hall, 4e
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
Controlling and Auditing Data
Management Systems
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
Access Controls
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
Backup Controls in the
Database Environment
o Since data sharing is a fundamental objective of the database
approach, environment is vulnerable to damage from individual
users.
o Four needed backup and recovery features:
o Backup feature makes a periodic backup of entire database which is
stored in a secure, remote location.
o Transaction log provides an audit trail of all processed transactions.
o Checkpoint facility suspends all processing while system reconciles
transaction log and database change log against the database.
o Recovery module uses logs and backup files to restart the system
after a failure.
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
Audit Procedures for Testing
Database Access Controls
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
Systems Development Life Cycle
(SDLC)
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
Controlling and Auditing the SDLC
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
Controlling and Auditing the SDLC
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
Controlling and Auditing the SDLC
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
Controlling and Auditing
System Maintenance
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
Controlling and Auditing
the SDLC – Audit Objectives
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
Controlling and Auditing the
SDLC- Audit Procedures
o Identify unauthorized changes:
o Reconcile program version numbers.
o Confirm maintenance authorization.
o Identify application errors:
o Reconcile source code.
o Review test results.
o Retest the program.
o Test access to libraries:
o Review programmer authority tables.
o Test authority table.
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
Information Systems
Acquisition
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
Trends in Commercial Software
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
Commercial Systems
o Advantages:
o Can be implementation almost immediately once need is recognized.
o Cost is a fraction of cost of in-house development.
o Reliability since software is pretested and less likely to have errors
than in-house systems.
o Disadvantages:
o Firm is dependent on vendor for maintenance.
o When user needs are unique and complex, software may be too
general or inflexible.
o May be difficult or impossible to modify if user needs change.
o Company may satisfy some needs with commercial software and
develop other systems in-house.
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
Types of Turnkey Systems
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
Audit Risk
AR = IR x CR x DR
0.05 = 0.4*0.4*DR -> DR = 0.3125
If CR = 90% then DR = 0.1388
Control risk, which is the risk that the client's controls will not prevent or detect a material
misstatement;
Detection risk, which is the risk that the auditor will not detect a material misstatement.
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
The IT Audit
o First step is audit planning which includes the analysis of audit risk.
o Techniques for gathering evidence include questionnaires, management
interviews, reviewing system documentation and observing activities.
o Objective of tests of controls is to determine if adequate controls
are in place and functioning.
o Third phase focuses on financial data and a detailed investigation of
specific account balances and transactions through substantive
tests.
o Files may be extracted using Computer-Assisted-Audit Tools and
Techniques (CAATTs) software.
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or posted to a publicly accessible website, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website or school-approved learning management system for classroom use.
Internal control system comprises policies, practices, and
procedures to achieve different broad objectives.
objectives.
Two general types of risk exist when networks communicate with each other–risks
from subversive threats and risks from equipment failure.
Subversive threats include interception of information transmitted between sender
and receiver, computer hackers gaining unauthorized access to the organization’s
network, and denial-of-service attacks from remote locations on the Internet.
network, and denial-of-service attacks from remote locations on the Internet.
Methods for controlling these risks include firewalls, encryption, digital
signatures, digital certificates, message transaction logs, and call-back devices.
Equipment failure can be the result of line errors. The problems can be minimized
with the help of echo checks, parity checks, and good backup control.
© 2016 Cengage Learning®. May not be scanned, copied or duplicated or
posted to a publicly accessible website, in whole or in part, except for use
as permitted in a license distributed with a certain product or service or
otherwise on a password-protected website or school-approved learning
management system for classroom use.
Risk based Audit approach steps