Chapter 7 Characteristics of CIS Environment Part 1 2
Chapter 7 Characteristics of CIS Environment Part 1 2
General Controls
Application Controls
General Controls
Organizational Controls
Systems Development and Documentation Control
Access Controls
Data Recovery Controls
Monitoring Controls
General Controls
1. Organizational Controls
OTHER FUNCTIONS
3. Access Control
• Data recovery is the process of restoring data that has been lost,
accidentally deleted, corrupted or made inaccessible. In
enterprise IT, data recovery typically refers to the restoration
of data to a desktop, laptop, server or external storage system
from a backup
General Controls
5. Monitoring Controls
General Controls
Application Controls
Transaction Processing in CIS Environment
Process
Input
(User)
(Computer/ Output
Program)
Application Controls
Input Controls
Processing Control
Output Control
Application Controls
1. Input Controls
Key Verification
Field Check
Integrity test/ Validity Check
Self Checking Digit/Check Digit
Limit Check
Control Totals /Batch Input Totals
Financial Totals
Hash Totals
Record Counts
Batch Processing vs Real time processing
Batch Processing vs Real time processing
Application Controls
2. Processing Controls
Integrity test/ Validity Check (input control)
Sequence Test
Input Control totals verification (Input control)
Label Check
Limit and Reasonable checks (input control)
Matching Control
Application Controls
3. Output Controls
Visual review of the output
Output comparison to original documents
Output distribution control (authorized people
only)
Methods for Audit Computerized Information System (CIS)
I. Program Testing
a. Historical Audit Techniques
CONTROLLED REPROCESSING
Client’s
Program
Copy
Auditing through the computer
CAATs - Computer-Assisted Auditing Techniques
I. Program Testing
a. Historical Audit Techniques
b. Continuous Audit techniques
II. Program Analysis
III. Review of operating system and other system
software
Auditing through the computer
I. Program Testing
b. Continuous audit techniques (Concurrent Auditing)
Audit Modules
Systems control audit review files (SCARFs)
Audit Hooks
Transaction tagging
Extended records
Audit Modules
This technique attaches additional audit data which would not otherwise
be saved to regular historic records and thereby helps to provide a more
complete audit trail
Auditing through the computer
Code Review
Comparison Programs
Program Tracing and Mapping
Flowcharting software
Snapshot
Code Review
This involves
actual analysis of
the logic of the
program’s
processing
routines.
Comparison Programs
Programs that
allow the auditor
to compare
computerized
files
Program tracing and mapping
Tracing is a technique in
which each instruction
executed is listed along
with control information
impacting that instruction.
Mapping identifies sections
of code that can be
“entered” and thus are
executable.
Flowcharting software
Used to produce a
flowchart of a
program’s logic and
may be used both
in mainframe and
microcomputer
environments.
Snapshots
Snaps (pictures)
are taken when a
transaction
moves through
the various stages
in the application
system
Auditing through the computer
These logs that track particular functions (job). The auditor may
be able to use them to review the work processed, to determine
whether unauthorized applications were processed and to
determine that authorized applications were processed properly
Library Management Software
Text retrieval systems allow the user to view any text that is
available in an electronic format.
Text Retrieval Systems
Word Processing Software