Auditing in A Cis Environment-Part 1
Auditing in A Cis Environment-Part 1
Auditing in A Cis Environment-Part 1
6. Describe the general control application control and user control activities in an IT
System.
INTRODUCTION
The term information technology (IT) generally refers to a wide variety of computer
hardware and software technology that are used to manage and control information. When
IT is organized to perform a specific task or organizational process, an information system
is created.
For small businesses, computer applications are frequently implemented by personnel within
uses department, using off-the-shelf software packages. The need for the client to employ
computer programmer for those applications in thus eliminated?
For large businesses they may use client server architecture (IT architecture) in which a
member of "client" computers are connected either to the corporate mainframe system or to
another "server" computer.
A more recent development is the use if cloud computing by companies of all sizes. Cloud
computing involves the use of IT services that are accessible over the Internet by subscription
or lease from IT service providers, such as Amazon Web Service.
Although IT has created some challenging problems for professional accountants, it also has
broadened the horizons of these professionals and expanded the range and value of the
services they offer. Technology is more than a tool for performing routine accounting tasks
with unprecedented speed and accuracy. It makes possible the development of information
that could not have been gathered in the past because of time and cost limitations. When a
client maintains accounting records with a complex and sophisticated IT-based system
auditors often find it helpful, and even necessary, to utilize technology IN performing many
auditing procedures. In addition, these systems make large amounts of data available to the
auditors to perform data analytics that can improve the effectiveness and efficiency of certain
audit procedures.
Major Components of an Information System
A typical information system records, processes, stores and disseminates information system
that consists of the methods and records established to record, process, summarize, and
report an entity's transactions and to maintain accountability for the related assets, liabilities,
and equity.
Generally, all information systems are comprised of the following major components:
1. Hardware - This refers to the computer and peripheral equipment for input, output
and storage of data.
2. Software - This refers to the series of programs that provide instructions for operating
the computer or tell the computer equipment what to do:
(2) Application software which is designed to perform specific tasks (e.g., payroll
application).
3. Data - This refers to the inputs and outputs of the computer system. Most
Accounting information systems are structured to store data in a
Database, which is an organized collection of data.
5. Procedures - These are policies and practices within a company for operating and
maintaining the information system.
6. Networks - These are the specialized hardware and software that allow different IT
devices to connect with each other to share data, software, and other
hardware resources.
Functions of an Information System
Regardless of the information system components used, the architecture or the business task
undertaken, information systems perform five fundamental functions briefly discussed below
1. Capture Input
Inputs are the data needed by the system. An information system must provide a mechanism
to capture input. Input can come from many different types of devices, including data entered
via a keyboard, a mouse, barcodes, RFID tags, scanning devices, or voice-enabled
applications such as Siri and Alexa.
2. Process
The transformation of input into output is called processing. Performing Process calculations,
validating information, updating records, and tracking raw materials are all examples of
processing.
3. Convey Output
Outputs are the result of processing the data. The most common types of output are hardcopy
(printed) reports, output that is displayed electronically (on-screen), and out that is used as
input for other information systems.
4. Collect Feedback
In order to determine whether the system is working as planned, feedback - data about the
performance of the system 1S collected.
5. Controls
Controls refer to the processes and procedures that restrict and monitor input, processing and
output to provide reasonable assurance that organizational objectives are being met, including
reliable financial reporting.
CHARACTERISTICS OF VARIOUS TYPES OF IT-BASED SYSTEMS
Batch processing
is a system in which like transactions are processed periodically as a group (e.g., payroll
transactions). This system does not provide up-to-the minute or real-time transaction
information.
is a system that allows immediate update or access to data, or instantaneous analysis of data.
is a processing method in which the IT system processes data immediately after it IS captured
and provide information to the uses on a timely basis. (OLTP examples include airline
reservation systems and banking systems)
IT information system that combine models and data in an attempt to solve non-structured
problems with extensive user involvement
Expert system
a computerized information system that guides decision processes within a well-defined area
and allows the making of decision comparable to those of an expert
Computer systems in different locations. Although data may be transmitted between the
computers periodically, such a system involves only limited communications among systems.
Contrast with distributed processing and centralized processing.
A network system in which multiple computers (clients) share the memory and other
capabilities of a larger computer (the server), or that of printers, database, and so on.
Local Area Network (LAN)
Cloud Computing
For example, an independent service provider may maintain databases for a client that can
be accessed in a number of locations by client personnel.
A system in which data are exchanged electronically between the computers of different
companies. In an EDI system, source documents are replaced with electronic. transactions
created in standard format.
AUDITOR'S RESPONSIBILITIES
The auditor's responsibilities with respect to internal control over IT systems remains the same
as with manual systems, that IS to obtain an understanding adequate (1) to aid in planning
the remainder of the audit and (2) to assess control risk. Yet, factors such as the following
may affect the study of internal control in that computer systems may:
I. Result in transaction trails that exist for short period of time or only in a computer readable
form;
2. Include program error that cause uniform mishandling of transactions - clerical error become
less frequent;
3. Include computer controls that need to be relied upon instead of segregation of functions;
5. Allow increased management supervisory potential resulting from more timely reports;
7. Include computer controls that affect the effectiveness of related manual control procedures
that use computer output.
INTERNAL CONTROL IN AN IT ENVIRONMENT
GENERAL CONTROLS
In an IT environment, general controls are those that systems, e.g., payroll, accounts payable,
and accounts affect multiple application receivable.
Five categories of general controls are presented in the AICPA audit guide.
(1) Controls
(2) Segregation of duties provides the control mechanism for maintaining an independent
processing environment, thus meeting the control objectives. In addition, by
organizationally segregating the IT department from the user departments, the key
functions within IT should be segregated to ensure maximum separation of duties.
The systems analyst is responsible for analyzing the present user environment and
requirements and
The analyst is in constant contact with the user department and the programming
staff to ensure the user's actual and ongoing needs are being met. A system
flowchart is one tool used by the analyst to define the system requirement.
(b) Applications programmer –
The applications programmer is responsible for writing, testing, and debugging the
application programs from the specifications (whether general or specific) provided
by the systems analyst. A program flowchart is one tool used by the applications
programmer to define the program logic.
(d) Operator -
The operator is responsible for the daily computer operations of bath the hardware
and the software. She/He mouths magnetic tapes on the tape drives, supervises
operations on the operator's console (a special CRT), accepts any required input.
and distributes any generated output.
The librarian is responsible for the custody of the removable media, i.e., magnetic
tapes or disks, and for the maintenance of program and system documentation.
The control group acts as liaison between users and the processing center. This
group records input data in a control log, follows the progress of processing,
distributes output and ensures compliance with control totals.
The network technician IS fast becoming the most powerful position in a MIS
organization. Using line monitoring equipment, they can see each key stroke made
by any user. This group most have strict accountability controls.
From an ideal standpoint, all of the key functions should be segregated; however,
in a small IT environment, many of the key functions are concentrated in a small
number of employees. In this situation, two key functions that should be segregated
are the applications programmer and the operator. When these functions are not
segregated, irregularities in IT can be perpetrated and concealed and the auditor
should not rely on the controls within IT.
The auditor's tests of controls (compliance test) of the organization and operation
controls should include inquiry, observation, discussion, and review of an
appropriate organization chart, responsibility for initiating and authorizing
transactions, discrepancies should be reported and the appropriate controls
recommended.
(1) Controls
(b) Each system must have written specifications which are reviewed and approved by
Management and by user departments.
(d) Management, users, and IT personnel must approve new systems before they are
placed into operation.
(e) All master and transaction tile conversion should be controlled to prevent
unauthorized changes and to verify the results on a 100% basis.
(f) After a new system is operating there should be proper approval of all program
changes.
(g) Proper documentation standards should exist to assure continuity of the system.
(2) Within IT - new systems are developed that either replace old systems or enhance
present systems. This environment requires unique controls to ensure that the
integrity of the overall system is maintained.
Two common controls over system change include the following:
All new systems being developed should flow through a documented process that
has specific control points where the overall direction of the system can be
evaluated and changes, if needed, can be made.
(1) Controls
(a) The auditor should be aware of control features inherent in the computer
hardware, operating system, and other supporting software and ensure that
they are utilized to the maximum possible extent.
(b) Systems software (e.g., the operating system) should be subjected to the same
control procedures as tissue applied to installation of and changes to
application programs.
(2) The reliability of IT hardware has increased dramatically over the last decade. This
is primarily due to the chip technology. However, it is also due to the controls built
into the mechanism to detect and prevent equipment failures.
The following are examples of such controls:
A special bit is added to each character stored in memory that can detect if the hardware loses
a bit during the internal movement of a character similar to a cheek digit.
Hardware or software supplied by the manufacturer to check the internal operations and
devices within the computer system. These routines are often activated when the system is
booted up.
D. Access controls
(1) Controls
(a) Access to program documentation should be limited to those persons who require it in the
performance or their duties.
(b) Access to data files and programs should be limited to those individuals authorized to
process data.
(c) Access to computer hardware should be limited to authorized individuals such computer
operators and their supervisors.
(2) Access to the IT environment
(a) Physical access controls
(1) Limited physical access –
The physical facility that houses IT equipment, files, and documentation should have
controls to limit access only to authorized individuals.
(2) limit look at once what the individual she/he is inside the can system. The system
should place restrictions on the level or information that u user can read and/or
change.
In a call back system the user dials up the system, identifies him/herself, and is
disconnected from the system. Then either:
(1) an individual manually looks up the authorized telephone number for the
individual or
(2) the system automatically looks up the authorized telephone number of that
individual, calls back the individual, and reestablishes communications.
They are new devices that are installed in the back of a microcomputer or stand
alone devices for larger systems. The board is programmed with a "key" that makes
data unreadable to anyone who might intercept a data transmission.
Access controls are tested by attempting to violate the system, either physically or
electronically, or reviewing any unauthorized access that has been recorded. The
auditor must use tests of controls (compliance tests) to ensure that all security
violations are followed up to ensure they are errors.
E. Data and procedural controls
(1) Controls
(b) A written manual of systems and procedures should be prepared for all computer
operations and should provide for management's general or specific authorization
to process transactions.
(c) Internal auditors (or another independent group in the organization; e.g., quality
assurance) should review and evaluate proposed systems at critical stages of
development and review and test computer processing activities.
A file protection ring is a processing control to ensure that an operator does not use a
magnetic tape as a tape to write on when it actually has critical information on it. If the
ring is on the tape, data can be written on the tape.
(f) Internal and external labels
External labels are paper labels attached to a reel of tape or other storage medium
which identify the file.
Internal labels perform the same function through the use of machine-readable
identification in the first record of a file. The use of labels allows the computer operator
to determine whether the correct file has been selected for processing. Trailer labels
are often used on the end of a magnetic tape file to maintain information on the number
of records processed.
These controls are tested mainly through identification, observation, and inquiry. While
some of these controls, such as protection rings and labels, arc easily implemented,
other controls, such as contingency processing, are more difficult and costly
implement. The auditor should determine that these controls are either present or that
management has accepted the related risks and that all exceptions are scrutinized.
APPLICATION CONTROLS
A. Input controls
(1) Controls
Information is pre-assigned a place and a format on the input form used. The form reduces
the possibility that computer input operators will miss or ignore input data recorded by
users. This control is used when a large quantity of repetitive data is inputted.
A total of one numerical field for all the records of a batch that normally would be added,
e.g., total sales pesos.
B. Processing controls
(1) Controls
(a) Controls totals should be produced and reconciled with input control totals --- proof of batch
totals.
(b) Control should prevent processing the wrong file and detect errors in file manipulation –
label checks.
(c) Limit and reasonableness checks should be incorporated into programs to prevent illogical
results such as reducing inventory to a negative value.
(d) Run-to-run totals should be verified at appropriate points in the processing cycle. This
ensures that records are not added or lost during the processing runs.
(2) Once the input has been accepted by the computer, processed through multiple steps.
Processing controls it usually is the integrity of the are essential to ensure
data through all of the Examples of processing controls that are established processing
steps. step and are revised or checked during processing include record counts, during
the input hash totals, and control totals.
Two additional controls that should be established are:
Individual transactions may be rejected during processing as a result of the error detection
controls in place. There should be complementary controls that ensure those records are
corrected and reentered into the system. Logging of error in a suspense file of "suspended"
transactions if often to control error resolution.
C. Output controls
(1) Controls - visual review the output should be done by the user of or an independent control
group:
(a) Output control totals should be reconciled with input and processing control totals.
(b) Output should be scanned and tested by comparison to original source documents.
(c) Systems output should be distributed only to authorized users.
(2) Prior to the release of output to the user, there should be appropriate controls in place to
ensure that processing was accomplished according to specifications. The following
controls are frequently used to maintain the integrity of processing:
The user of the application will frequently give the operator the expected
result of processing ahead of time to allow the operator to verify that processing was
completed properly and to notify the user if the totals did not agree.
time restraints and output page generation constraints are often automated within the
job being run to ensure that, if processing is being done in error, the job will not utilize
resources needlessly.
Following each job, the system provides technical codes indicating the perceived
success of the job run. The operator should be trained to recognize these codes and
take the appropriate action detailed in the operations run manual.
-End of Part 1-