October 25, 2000
- Dr. Peter R Gillett
1
A.I.S. Class 15: Outline I Questions relating to REA I Learning - - PowerPoint PPT Presentation
A.I.S. Class 15: Outline I Questions relating to REA I Learning Objectives for Chapter 10 I Controls I Misstatements I Internal Control Structure I Control Objectives and Audit Objectives I COBIT I Group Work for Chapter 10 Dr. Peter R Gillett
October 25, 2000
1
October 25, 2000
2
October 25, 2000
3
F 7:40 – 9:30 p.m. F Thursday, October 26 F Beck Auditorium F Covering flowcharts, REA, Chapters 8 & 9
October 25, 2000
4
I After studying this chapter you should be able to:
N provide a definition of controls N explain the concepts of exposure and reasonable
assurance as they relate to controls
N explain the difference between preventive, detective, and
corrective controls
N describe and discuss a number of risks that could be
found in computer based systems
N discuss Statement on Auditing Standards (SAS) No. 55
and its implications for controls in information systems
N provide a basic distinction between general and
application controls as categories of controls
October 25, 2000
5
N describe general control procedures for database
N describe application controls that can be incorporated
into a database AIS
N indicate some control procedures that can be instituted
N explain how entity integrity and referential integrity
contribute to better control in a database AIS
N explain the hierarchical nature of the relationship
between the control environment, the accounting system, general and application control procedures
N briefly describe the COBIT control framework released
by the Information Systems Audit and Control Association
October 25, 2000
6
October 25, 2000
7
October 25, 2000
8
F unintentional mistakes
F intentional alteration or misstatement of data
October 25, 2000
9
N Erroneous record keeping N Unacceptable accounting N Business interruption N Erroneous management decisions N Fraud and embezzlement N Statutory sanctions N Excessive costs N Loss or destruction of assets N Competitive disadvantage
October 25, 2000
10
NErrors in data NIrregularities in data NLoss of data NNatural disasters NComputer crime
October 25, 2000
11
I Every system has
F Inputs F Processes F Outputs F Boundary F Environment
I Control systems
F Sensors F Standards F Control comparisons F Activating units
October 25, 2000
12
F Internal Control is a process effected by an entity’s
N effectiveness and efficiency of operations N reliability of financial reporting N compliance with applicable laws and regulations
October 25, 2000
13
October 25, 2000
14
October 25, 2000
15
October 25, 2000
16
N Changes in the operating environment N New personnel N New or revamped information systems N Rapid growth N New technology N New lines, products or activities N Corporate restructuring N Foreign operations N Accounting pronouncements
October 25, 2000
17
October 25, 2000
18
F Adequate separation of duties F Proper authorization of transactions F Adequate documents and records F Physical control over assets and records F Independent checks on performance
October 25, 2000
19
F Organizational controls F Systems development and amendment F Hardware and systems software controls F Security and access controls F Operations controls F Data backup and recovery
October 25, 2000
20
F Input controls
N field tests N range tests N length tests N validity tests N valid combinations tests N closed loop verification N completeness tests N prompting N system generated data N entity integrity N referential integrity
October 25, 2000
21
F Processing controls
Ninternal label tests Nsequence checks Ncontrol total verification
F Output controls F User control procedures
October 25, 2000
22
October 25, 2000
23
October 25, 2000
24
F Existence or occurrence F Completeness F Rights and obligations F Valuation or allocation F Presentation and disclosure
October 25, 2000
25
October 25, 2000
26
I Control Objectives for Information and related
I Information Systems Audit and Control Association I Management “best practices” I 34 high level control objectives I IT processes in four domains
F Planning & organization F Acquisition & implementation F Delivery & support F Monitoring
October 25, 2000
27