Você está na página 1de 3

COMP 3- CHAPTER 15 Substantive testing detailed examination of

account balances and transactions


Section 302in quarterly and annual financial
statements, management must: Organizational Structure IC

certify the internal controls (IC) over Audit objective verify that individuals in
financial reporting incompatible areas are segregated to minimize
risk while promoting operational efficiency
state responsibility for IC design
IC, especially segregation of duties, affected by
provide reasonable assurance as to the which of two organizational structures applies:
reliability of the financial reporting
process Centralized model

disclose any recent material changes in Distributed model


IC
Segregation of Duties
Section 404in the annual report on IC
effectiveness, management must: Transaction authorization is separate from
transaction processing.
state responsibility for establishing and
maintaining adequate financial Asset custody is separate from record-keeping
reporting IC responsibilities.

assess IC effectiveness The tasks needed to process the transactions


are subdivided so that fraud requires collusion.
reference the external auditors
attestation report on managements IC Disaster Recovery Planning
assessment
Disaster recovery plans (DRP) identify:
provide explicit conclusions on the
effectiveness of financial reporting IC actions before, during, and after the
identify the framework management disaster
used to conduct their IC assessment, disaster recovery team
e.g., COBIT
priorities for restoring critical
IT Controls & Financial Reporting applications
COSO identifies two groups of IT controls: Audit objective verify that DRP is adequate
Application controls apply to specific and feasible for dealing with disasters
applications and programs, and ensure data Disaster Recovery Planning
validity, completeness and accuracy
Second-Site Backups
General controls apply to all systems and
address IT governance and infrastructure, Empty shell - involves two or more user
security of operating systems and databases, organizations that buy or lease a building and
and application and program acquisition and remodel it into a computer site, but without
development computer equipment
SOX Audit Implications Recovery operations center - a completely
equipped site; very costly and typically shared
Pre-SOX, audits did not require IC tests. Only among many companies
required to be familiar with clients IC. Audit
consisted primarily of substantive tests Internally provided backup - companies with
multiple data processing centers may create
SOX radically expanded scope of audit.Issue internal excess capacity
new audit opinion on managements IC
assessment. Required to test IC affecting Benefits of IT Outsourcing
financial information, especially IC to prevent
fraud. Collect documentation of managements Improved core business processes
IC tests and interview management on IC
changes Improved IT performance

Types of Audit Tests Reduced IT costs

Tests of controls tests to determine if Risks of IT Outsourcing


appropriate IC are in place and functioning Failure to perform
effectively
Vendor exploitation Control risk the likelihood that the control
structure is flawed because controls are either
Costs exceed benefits absent or inadequate to prevent or detect
errors in the accounts
Reduced security
Detection risk the risk that errors not
Loss of strategic advantage
detected or prevented by the control structure
External Financial Audit - An independent will also not be detected by the auditor.
attestation by a professional (CPA) regarding the
Computer Fraud Schemes
faithful representation of the financial statements
Theft, misuse, or misappropriation of assets by
Three phases of a financial audit:
altering computer-readable records and files
familiarization with client firm
Theft, misuse, or misappropriation of assets by
evaluation and testing of internal altering logic of computer software
controls
Theft or illegal use of computer-readable
assessment of reliability of financial information
data
Theft, corruption, illegal copying or intentional
Generally Accepted Accounting Standards destruction of software

Theft, misuse, or misappropriation of computer


hardware

Data Collection Fraud

This aspect of the system is the most


vulnerable because it is relatively easy to
change data as it is being entered into the
system.

Also, the GIGO (garbage in, garbage out)


principle reminds us that if the input data is
inaccurate, processing will result in inaccurate
External versus Internal Auditing
output.
External auditors represent the interests of
Data Processing Fraud
third party stakeholders
Program Frauds
Internal auditors serve an independent
appraisal function within the organization altering programs to allow illegal access to
and/or manipulation of data files
IT audit - is a critical component of all external and
internal audits. destroying programs with a virus
Elements of an IT Audit Operations Frauds
Systematic procedures are used misuse of company computer resources, such
as using the computer for personal business
Evidence is obtained: tests of internal controls
and substantive tests Database Management Fraud
Determination of materiality for weaknesses Altering, deleting, corrupting, destroying, or
found stealing an organizations data
Prepare audit report & audit opinion Oftentimes conducted by disgruntled or ex-
employee
Audit Risk - is... the probability the auditor will
issue an unqualified (clean) opinion when in fact Information Generation Fraud
the financial statements are materially misstated.
Stealing, misdirecting, or misusing computer output
Three Components of Audit Risk
Scavenging- searching through the trash cans on the
Inherent risk associated with the unique computer center for discarded output (the output
characteristics of the business or industry of the should be shredded, but frequently is not)
client

Você também pode gostar