Benefits of IT (5)
MCCAT
Risks of IT (6)
MCFOLA
What are the two IT risks of major concern to the auditor?
In what two ways may Data be processed?
Processing of Transaction (2)
The linking of computers (Network) may be done in what three different ways?
(Network Configurations)
Network Topology (5)
Topology refers to the shape of a network, or the network’s layout.
Electronic Ecommerce
(E-Commerce)
The conduct of business, generally involving the buying & selling of products, including billing & payment, using electronic communication (EDI) between the computers of different entities such as suppliers & customers.
What is Electronic Data Interchange (EDI)?
&
What are three special considerations related to EDI?
EDI is the electronic interchange of business information between suppliers & consumers using a standardized format.
Three special considerations related to EDI:
Computer/Internet Risks
Virus
Trojan Horse
Worm
Hoax Virus
Killer Application
Phishing
Firewall
Virus - a program with the ability to reproduce by modifying other programs to include a copy of itself.
Trojan Horse - is a purposefully hidden malicious or damaging code within an authorized computer program.
Worm - a program that duplicates itself over a network so as to infect many computers with viruses.
Hoax Virus - a widely distributed e-mail message warning of a virus that doesn’t exist.
Killer Application - simply refers to a program that is extremely useful, & is not anything dangerous.
Phishing - is the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private info that will be used for identity theft.
Firewall - a tool for establishing security which prevents unauthorized users from accessing data.
Controls
What are the 2 broad types of Controls?
Controls - in an operation of computer systems, management must focus on two broad types of controls:
General Controls
What are the 5 elements of General Control?
(Personnel,File Security,Contingency Planning,Computer Facilities,Acces Ctrls)
General Controls - these relates to the overall integrity of the system. Controls include policies, procedures, & practices established by management to provide reasonable assurance that specific objectives will be achieved.
Application Controls (Program Controls)
What are the 3 elements of Application Controls?
Application Controls - specific to individual programs & users
Application Controls - Input
Data can be verified in what 4 ways?
Form of Data Verified (4)
Application Controls - specific to individual programs & users
Application Controls - Input
Control Totals (3)
Application Controls - specific to individual programs & users
Parity Check
vs.
Echo Check
Parity & Echo checks are a type of Hardware Control whichis considered a General Control of a company.
Parity Check - A hardware control that makes certain that each byte has either an odd or even number of bits in the “1” or “on” position, depending on whether the machine is designed as odd or even parity, respectively.
Echo Check - A hardware control that has one computer re-transmit data back to the computer from which it originated to make certain that the data received matches the data transmitted.
Data Structure
Bit>Byte>Character>Field>Record>FIle>Database
Bit - A single switch is either 1 or 0
Byte - A group of 8 bits representing a character
Character - A letter, number, punctuation mark
Field - a group of related characters representing a unit of information (column)
Record - a collection of related info, many fields (rows)
File - a group of related records
Database - a collection of files
eXtensible Business Reporting Language (XBRL)
XBRL - is a specification for publishing financial information in the XML format. It is designed to provide a standard set of XML tags for exchanging accounting information & financial informations between companies & analysts.
What are the 5 Computer Assisted Audit Techniques (CAAT)?
TESTED
Computer Assisted Audit Techniques (CAAT)
Test Data
An audit technique involving the use of data supplied by auditor being processed by client’s programs enabling the auditor to determine if outcomes match expectations & if all errors included in the data were properly identified & addressed by the client’s software.
Computer Assisted Audit Techniques (CAAT)
Controlled Reprocessing
An audit technique involving the use of the auditor’s computers to run the client’s data using the client’s programs to make certain that the results are the same as those derived by the client & verifying that all data given to the auditor represents all data processed by the client.
Computer Assisted Audit Techniques (CAAT)
Integrated Test Facility
An audit technique in which data developed by the auditor is processed by the client’s programs as if it related to a separate division to determine if the client’s software provides the results tha the auditor knows should be reported.
Computer Assisted Audit Techniques (CAAT)
Transaction Tagging
An audit technique that involves flagging specific client transactions with some type of tag & tracing the processing of them through the client’s programs to determine if the programs are processing the transactions correctly.
Computer Assisted Audit Techniques (CAAT)
Parallel Simulation
An audit technique in which the client’s data is processed using the auditor’s programs to determine if the results are the same as those reported by the client.
“Auditing Around the Computer”
A means of testing whether or not a computer system is functioning properly by examining the data input & the printed output to see if the output reflects appropriate results.