Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 55 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
55
Dung lượng
724,5 KB
Nội dung
Chapter 12: Information Technology Auditing Introduction The Audit Function The Information Technology Auditor’s Toolkit Auditing Computerized AccountingInformationSystemsInformation Technology Auditing Today Chapter 12-1 Introduction Audits of AISs Ensure controls are functioning properly Confirm additional controls not necessary Nature of Auditing Internal and external auditing IT Audit and financial audit Tools of an IT auditor Chapter 12-2 The Audit Function Internal versus External Auditing Information Technology Auditing Evaluating the Effectiveness of InformationSystems Controls Chapter 12-3 Internal Auditing Responsibility of Performance Company’s own employees External of the department being audited Evaluation of: Employee compliance with policies and procedures Effectiveness of operations Compliance with external laws and regulations Reliability of financial reports Internal controls Chapter 12-4 External Auditing Responsibility of Performance Those outside the organization Accountants working for independent CPA Audit Purpose Performance of the attest function Evaluate the accuracy and fairness of the financial statements relative to GAAP Chapter 12-5 Information Technology Auditing Function Evaluate computer’s role in achieving audit and control objectives Assurance Provided Data andinformation are reliable, confidential, secure, and available Safeguarding assets, data integrity, and operational effectiveness Chapter 12-6 The Components of an IT Audit Chapter 12-7 The IT Audit Process Computer-Assisted Audit Techniques (CAAT) Use of computer processes to perform audit functions Performing substantive tests Approaches Auditing through the computer Auditing with the computer Chapter 12-8 The IT Audit Process Chapter 12-9 Careers in IT Auditing Background Accounting skills Informationsystems or computer science skills Certified Information System Auditor (CISA) Successfully complete examination Experience requirements Comply with Code of Professional Ethics Continuing professional education Comply with standards Chapter 12-10 Study Break #4 Continuous auditing: A.Has been talked about for years but will never catch on B.Will likely become popular if organizations adopt XBRL in their financial reporting C.Does not include techniques such as embedded audit modules D.Will never allow IT auditors to provide some types of assurance on a real-time basis Chapter 12-41 Study Break #4 - Answer Continuous auditing: A.Has been talked about for years but will never catch on B.Will likely become popular if organizations adopt XBRL in their financial reporting C.Does not include techniques such as embedded audit modules D.Will never allow IT auditors to provide some types of assurance on a real-time basis Chapter 12-42 IT Auditing Today Auditing for Fraud: Statement on Auditing Standards No 99 The Sarbanes-Oxley Act of 2002 Auditing Standard No (AS5) Third Party andInformationSystems Reliability Assurances Chapter 12-43 IT Governance Overview Process of using IT resources effectively Efficient, responsible, strategic use of IT Objectives Using IT strategically to fulfill mission of organization Ensure effective management of IT Chapter 12-44 Auditing for Fraud: Statement on Auditing Standard No 99 Overview Supersedes SAS No 82 Provides more guidance to prevent and deter fraud Fraud Triangle Motive for committing fraud Opportunity that allows fraud to occur Rationalization by individual Chapter 12-45 Fraud Triangle Chapter 12-46 The Sarbanes-Oxley Act of 2002 Overview Limits services that auditors can provide clients while they are conducting audits Groups of Compliance Requirements Audit committee/corporate governance requirements Certification, disclosure, and internal control Financial statement reporting rules Executive reporting and conduct Chapter 12-47 The Sarbanes-Oxley Act of 2002 Section 302 CEOs and CFOs are required to certify the financial statements Internal controls and disclosures are adequate Section 404 CEOs and CFOs assess and attest to the effectiveness of internal controls Chapter 12-48 Key Provisions of SOX Chapter 12-49 Key Provisions of SOX Chapter 12-50 Auditing Standard No (AS5) Purpose PCAOB guidance Focus on most critical controls Rebalancing of Auditor’s Work Internal auditors help to advise board of directors External auditors reduce redundant testing Chapter 12-51 Third Party andInformationSystems Reliability Assurances Growth of Electronic Commerce Area of growing risk Security and privacy concerns Difficult to audit AICPA Trust Services CPA WebTrust SysTrust Chapter 12-52 Third Party andInformationSystems Reliability Assurances Principles of Trust Services Security Availability Processing integrity Online privacy Confidentiality Chapter 12-53 Copyright Copyright 2012 John Wiley & Sons, Inc All rights reserved Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc The purchaser may make backup copies for his/her own use only and not for distribution or resale The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein Chapter 12-54 Chapter12Chapter 12-55 ... Data and information are reliable, confidential, secure, and available Safeguarding assets, data integrity, and operational effectiveness Chapter 12- 6 The Components of an IT Audit Chapter 12- 7... with the computer Chapter 12- 8 The IT Audit Process Chapter 12- 9 Careers in IT Auditing Background Accounting skills Information systems or computer science skills Certified Information System... with standards Chapter 12- 10 CISA Exam Components Chapter 12- 11 Careers in IT Auditing Certified Information Security Manager (CISM) Business orientation Understand risk management and security