CH 11
CH 11
11-1
Chapter 11
Information Technology Auditing
Introduction
The Audit Function
The IT Auditor’s Toolkit
Auditing the Computerized AIS
Information Technology Auditing Today
Chapter
11-2
Introduction
Chapter
11-3
Introduction
Chapter
11-5
The Audit Function
Question
An IT auditor
a. must be an external auditor.
b. must be an internal auditor.
c. can be either an internal or external auditor.
d. must be a certified public accountant.
Chapter
11-6
Internal Auditing
Chapter
11-11
The Information Technology
Audit Process
Computer-assisted audit techniques
(CAATs) are used
when controls are weak for substantive testing of
transactions and
account balances.
when controls are strong for compliance testing to
ensure controls are
in place and
working as prescribed.
Chapter
11-12
The Information Technology
Audit Process
Chapter
11-13
Careers in Information
Systems Auditing
Chapter
11-14
Careers in Information
Systems Auditing
Chapter
11-15
Careers in Information
Systems Auditing
Chapter
11-18
Risk Assessment
Chapter
11-19
Risk Assessment
Chapter
11-22
Guidance in Reviewing and
Evaluating IT Controls
Chapter
11-23
Guidance in Reviewing and
Evaluating IT Controls
Question
COBIT is
a. a control framework developed by the Institute of Internal
Auditors.
b. a control framework developed specifically for organizations
involved in e-business.
c. an internal control model that covers both automated
and manual systems.
d. an internal control framework and model that encompasses an
organization’s IT governance and information technologies.
Chapter
11-24
The Information Technology
Auditor’s Toolkit
IT auditors need to have
the technical skills to understand the vulnerabilities in
hardware and software
use of appropriate software to do their jobs
general-use software such as
word processing programs,
spreadsheet software, and
database management systems.
generalized audit software (GAS), and
automated workpaper software.
Chapter
11-25
The Information Technology
Auditor’s Toolkit
people skills
to work as a team
to interact with clients and other auditors,
to interview many people constantly for evaluation
Chapter
11-26
Auditing with the Computer
Chapter
11-27
General-Use Software
Chapter
11-28
Generalized Audit Software
Question
Which of the following is not true with respect to generalized audit
software (GAS)?
a. They require auditors to rewrite processing programs
frequently while reviewing computer files.
b. They are specifically tailored to auditor tasks.
c. They may be used for specific application areas, such as
accounts receivable and inventory.
d. They allow auditors to manipulate files to extract
and compare data.
Chapter
11-30
Automated Workpaper Software
Chapter
11-31
People skills
Chapter
11-33
Auditing the Computerized AIS
Chapter
11-34
Objectives of an Information
Systems Audit
Chapter
11-36
Auditing Computerized AIS-
Auditing Around the Computer
Chapter
11-37
Auditing Computerized AIS-
Auditing Through the Computer
Chapter
11-40
Testing Computer Programs -
Integrated Test Facility
Chapter
11-41
Testing Computer Programs -
Parallel Simulation
Parallel simulation
eliminates the need to prepare a
set of test data,
can be very time-consuming and
thus cost-prohibitive
usually involves replicating only
certain critical functions of a program.
Chapter
11-43
Validating Computer Programs
Auditors
must validate any program presented to them
to thwart a clever programmer’s dishonest program
Procedures that assist in program validation are
tests of program change control
procedures to protect against unauthorized
program changes
begins with an inspection of the documentation
includes program authorization forms to be filled
ensures accountability and adequate
supervisory controls
Chapter
11-44
Validating Computer Programs
program comparison
guards against unauthorized program tampering
performs certain control total tests of program
authenticity
using a test of length
using a comparison program
Chapter
11-45
Validating Computer Programs
Question
Chapter
11-46
Review of Systems Software
Chapter
11-47
Review of Systems Software
Chapter
11-48
Validating Users and Access
Privileges
The IT auditor
needs to verify that the software parameters are set appropriately
must make sure that IT staff are using them appropriately
needs to make sure that all users
are valid and
each has access privileges appropriate to their job
transaction tagging
tags with a special identifier for certain transactions
snapshot technique
examination of the way transactions are processed
continuous and intermittent simulation
embedding of an audit module in a DBMS
Chapter
11-51
Information Technology
Auditing Today
Chapter
11-52
Information Technology
Governance
Chapter
11-54
Auditing for Fraud—Statement
on Auditing Standards No. 99
Chapter
11-55
Auditing for Fraud—Statement
on Auditing Standards No. 99
Question
With respect to changes in IT auditing today, which of the
following is not true?
a. IT governance, which ties IT to organizational strategy, is
increasingly important.
b. Section 404 of the Sarbanes-Oxley Act of 2002 created an increase
in demand for both IT auditors and internal auditors.
c. IT auditors are concerned only with supporting financial auditors
and should not investigate fraud cases.
d. Third-party assurance seals may provide some comfort to e-business
customers regarding the security of online transactions.
Chapter
11-56
The Sarbanes-Oxley Act of 2002
Chapter
11-60
Third-Party Assurance
Copyright 2005 John Wiley & Sons, Inc. All rights reserved.
Reproduction or translation of this work beyond that permitted in
Section 117 of the 1976 United States Copyright Act without the
express written permission of the copyright owner is unlawful.
Request for further information should be addressed to the
Permissions Department, John Wiley & Sons, Inc. The purchaser
may make backup copies for his/her own use only and not for distribution
or resale. The Publisher assumes no responsibility for errors, omissions,
or damages, caused by the use of these programs or from the use of the
information contained herein.
Chapter
11-62
Chapter 11
Chapter
11-63