a i s class 15 outline
play

A.I.S. Class 15: Outline I Questions relating to REA I Learning - PowerPoint PPT Presentation

A.I.S. Class 15: Outline I Questions relating to REA I Learning Objectives for Chapter 10 I Controls I Misstatements I Internal Control Structure I Control Objectives and Audit Objectives I COBIT I Group Work for Chapter 10 Dr. Peter R Gillett


  1. A.I.S. Class 15: Outline I Questions relating to REA I Learning Objectives for Chapter 10 I Controls I Misstatements I Internal Control Structure I Control Objectives and Audit Objectives I COBIT I Group Work for Chapter 10 Dr. Peter R Gillett October 25, 2000 1

  2. Questions relating to REA ? Dr. Peter R Gillett October 25, 2000 2

  3. Mid-Term Review I How many people would plan to attend a Mid-Term Review at F 7:40 – 9:30 p.m. F Thursday, October 26 F Beck Auditorium F Covering flowcharts, REA, Chapters 8 & 9 ? Dr. Peter R Gillett October 25, 2000 3

  4. Learning Objectives for Chapter 10 I After studying this chapter you should be able to: N provide a definition of controls N explain the concepts of exposure and reasonable assurance as they relate to controls N explain the difference between preventive, detective, and corrective controls N describe and discuss a number of risks that could be found in computer based systems N discuss Statement on Auditing Standards (SAS) No. 55 and its implications for controls in information systems N provide a basic distinction between general and application controls as categories of controls Dr. Peter R Gillett October 25, 2000 4

  5. Learning Objectives for Chapter 10 N describe general control procedures for database oriented systems environments N describe application controls that can be incorporated into a database AIS N indicate some control procedures that can be instituted only in on line database systems N explain how entity integrity and referential integrity contribute to better control in a database AIS N explain the hierarchical nature of the relationship between the control environment, the accounting system, general and application control procedures N briefly describe the COBIT control framework released by the Information Systems Audit and Control Association Dr. Peter R Gillett October 25, 2000 5

  6. Controls I Controls are mechanisms to prevent or detect errors and irregularities I Risk is the likelihood that an information system will experience errors or irregularities I Exposure is the amount of loss that could occur if a risk is realized I Controls are designed to provide reasonable assurance that data are error free Dr. Peter R Gillett October 25, 2000 6

  7. Controls I Preventive v. detective I Manual v. programmed I General v. application I Key controls I Compensating controls Dr. Peter R Gillett October 25, 2000 7

  8. Misstatements I Errors F unintentional mistakes I Irregularities F intentional alteration or misstatement of data I Fraud (defalcation) I Management fraud Dr. Peter R Gillett October 25, 2000 8

  9. Exposures and Risks I Exposures N Erroneous record keeping N Unacceptable accounting N Business interruption N Erroneous management decisions N Fraud and embezzlement N Statutory sanctions N Excessive costs N Loss or destruction of assets N Competitive disadvantage Dr. Peter R Gillett October 25, 2000 9

  10. Exposures and Risks I Risks N Errors in data N Irregularities in data N Loss of data N Natural disasters N Computer crime Dr. Peter R Gillett October 25, 2000 10

  11. General Systems Model I Every system has F Inputs F Processes F Outputs F Boundary F Environment I Control systems F Sensors F Standards F Control comparisons F Activating units Dr. Peter R Gillett October 25, 2000 11

  12. Internal Control Structure I SAS 55, COSO, SAS 78 F Internal Control is a process effected by an entity’s board of directors, and other personnel, that is designed to provide reasonable assurance regarding the achievement of objectives in the following categories: N effectiveness and efficiency of operations N reliability of financial reporting N compliance with applicable laws and regulations Dr. Peter R Gillett October 25, 2000 12

  13. Internal Control Structure I SAS 55, COSO, SAS 78 F Control Environment F Risk Assessment F Information System and Communication F Control Activities F Monitoring Dr. Peter R Gillett October 25, 2000 13

  14. Control Environment I Integrity and ethical values I Commitment to competence I Board of directors or audit committee I Management’s philosophy and operating style I Organizational structure I Assignment of authority and responsibility I Human resource policies and practices Dr. Peter R Gillett October 25, 2000 14

  15. Risk Assessment I Risk assessment for financial reporting is the identification, analysis, and management of risks relevant to the preparation of financial statements that are fairly presented in conformity with GAAP Dr. Peter R Gillett October 25, 2000 15

  16. Risk Assessment I Risks may arise from N Changes in the operating environment N New personnel N New or revamped information systems N Rapid growth N New technology N New lines, products or activities N Corporate restructuring N Foreign operations N Accounting pronouncements Dr. Peter R Gillett October 25, 2000 16

  17. Information System I Procedures aimed at identifying, assembling, analyzing, classifying recording and reporting an entity’s transactions I Maintain accountability for the related assets and liabilities Dr. Peter R Gillett October 25, 2000 17

  18. Control Activities I Policies and guidelines that management has established to provide reasonable assurance that specific entity objectives will be met F Adequate separation of duties F Proper authorization of transactions F Adequate documents and records F Physical control over assets and records F Independent checks on performance Dr. Peter R Gillett October 25, 2000 18

  19. Control Activities I General control procedures F Organizational controls F Systems development and amendment F Hardware and systems software controls F Security and access controls F Operations controls F Data backup and recovery Dr. Peter R Gillett October 25, 2000 19

  20. Control Activities I Application control procedures F Input controls N field tests N range tests N length tests N validity tests N valid combinations tests N closed loop verification N completeness tests N prompting N system generated data N entity integrity N referential integrity Dr. Peter R Gillett October 25, 2000 20

  21. Control Activities I Application control procedures F Processing controls N internal label tests N sequence checks N control total verification F Output controls F User control procedures Dr. Peter R Gillett October 25, 2000 21

  22. Control Objectives I Validity I Completeness I Timeliness I Authorization I Valuation I Classification I Posting and summarization Dr. Peter R Gillett October 25, 2000 22

  23. Audit Objectives I Validity I Completeness I Cutoff I Ownership I Valuation I Classification I Detail tie-in I Mechanical accuracy I Disclosure Dr. Peter R Gillett October 25, 2000 23

  24. Management Assertions I SAS 31 - five categories of assertions F Existence or occurrence F Completeness F Rights and obligations F Valuation or allocation F Presentation and disclosure Dr. Peter R Gillett October 25, 2000 24

  25. Monitoring I A process that assesses the quality of internal control over time I It involves assessment by appropriate personnel of the design and operation of controls on a timely basis and the taking of necessary action Dr. Peter R Gillett October 25, 2000 25

  26. COBIT I C ontrol O bjectives for I nformation and related T echnology I Information Systems Audit and Control Association I Management “best practices” I 34 high level control objectives I IT processes in four domains F Planning & organization F Acquisition & implementation F Delivery & support F Monitoring Dr. Peter R Gillett October 25, 2000 26

  27. Group Work for Chapter 10 I Discussion Questions I Problems 6 & 7 Dr. Peter R Gillett October 25, 2000 27

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend