Lesson Four
Lesson Four
Lesson Four
(1) High speed - In a CIS environment information can be generated very quickly. Even
complex reports in specific report format can be generated for audit purposes without
much loss of time. These cuts down the time enabling the auditor to extend their
analytical review for under coverage with high speed of operation, the Auditor can
expand their substantive procedures for collection of more evidence in support of their
judgement.
(2) Low clerical error - Computerised operation being a systematic and sequential
programmed course of action the changes of commission of error is considerably
reduced. Clerical error is highly minimised.
(6) Impact of poor system - If system analysis and designs falls short of expected
standard of performance, a computerised information system environment may do more
harm to integrated business operation than good. Thus, care has to be taken in adopting
manual operations switch-over to computerised operations for ensuring performance
quality standards.
(3) Use of loose-leaf stationeries - Bound hand written records as used in manual
accounting processes are replaced by loose-leaf machine written records in electronic
medium. In a computerised information system, magnetic tapes, floppy disks, diskettes,
printouts replace the traditional records. This necessarily require proper control over such
records to prevent their unauthorised us, destruction or substitution.
Recent Changes
The growth and development in the field of information technology is a fast paced one
and unless the auditors are alert to such developments and take pre- emptive action in
upgrading their knowledge, they may find difficulty in coping with such advancement.
Following are a few instance of the recent changes which the may need to be addressed in
discharging their responsibilities in such environment:
a. Mainframes are substituted by mini/micro users.
b. There is a shift from proprietary operating system to more universal ones like
UNIX, LINUX, programming in 'C' etc.
c. Relational Date Base Management (RDBMS) are increasingly being used.
d. The methodology adopted for systems development is becoming crucial and
CASE (Computer Aided Software Engineering) tools are being used by many
organisation.
e. End user computing is on the increase resulting in decentralized data processing.
f. The need for data communication and networking is increasing.
g. Common business documents are getting replaced by paperless electronic data
interface (EDI).
h. Conventional data entry giving way to scanner, digitized image processes, voice
recognition system etc.
It is obvious, that to follow this approach the auditor needs to have sufficient knowledge
of computers to plan, direct-supervise and review the work performed.
The areas covered in an audit will concentrate on the following controls:
(1) Input controls,
(2) Processing control,
(3) Storage control,
(4) Output control and
(5) Data transmission control.
The auditor will also need to be satisfied that there are adequate controls over the
prevention of unauthorised access to the computer and the computerised database. The
auditors task will also involve consideration of the separation of functions between staff
involves in transaction processing and the computerised system and ensuring that
adequate supervision of personnel is administered.
The process of auditing is not a straight forward flow of work from start to finish to be
completed by satisfying oneself against a standard checklist or a list of questions. It
involves exposure, experiences and application of knowledge and expertise to differing
circumstances.
No two information system is same. From the view point of analysis of computerised
information system, the auditors need not only have adequacy on knowledge regarding
information requirement and computer data security they must also get exposed to system
analysis and design so as to facilitate post implementation audit.
Types of Computer Systems
There is large variety of computer systems applicable to accounting and other type of
information processing. The nature and type of system affect the various types of controls
for its efficient and effective functioning Computer System may be broadly classified as
under:
1. System configuration, and
2. Processing systems.
SYSTEMS CONFIGURATION
System configuration may be classified as:
(1) Large system computers - In large system computers, the processing task of multiple
user is performed on a single centralised computer, i.e., all inputs move directly from the
terminal to central processors and after processing goes back to users from central
processors. All the terminals in these systems were called 'dumb terminals' as these
terminals were not capable of processing data on their own and casually serve only as
input/output terminals. With time, these systems have become more efficient and
sophisticated. In many instances dumb terminals have given way to intelligent terminals
i.e., allowing data processing at local levels.
(2) Stand alone personal computers - A stand alone system is one that is not connected
to or does not communicate with another computer system. Computing is done by an
individual at a time. All input data and its processing takes place on the machine itself.
Many small business rely on personal computers for all their accounting functions.
The networks can also be classified on the basis of areas covered. Software resources
include:
(1) Local area network - In a local area network (LAN), two or more computers located
within a small well-defined area such as room, office or campus are connected through
cables. One of the computers acts as the server; it stores the program and data files
centrally. These programs and data files can be accessed by the other computers forming
part of the LAN. LAN provide the additional advantage of sharing programs, data and
physical resources like hard disks peripherals.
(2) Wide area network - Networks that employ public telecommunications facilities to
provide users with access to the resources of centrally located computers. A WAN uses
the public switched telephone network, high speed fibre optic cable, ratio links or the
internet. When a LAN extends in the metropolitan area using the WAN technology, it is
called Metropolitan Area Network (MAN).
WAN uses modem to connect computers over telephone lines (PSTN) PSTN system
transfer analog signals. Therefore, public telephone systems are not appropriate to
connect computers. Modems are used to convert analog signals into digital and vice
versa.
(3) Distributed data processing - The term has been used to cover many varieties of
computer system. It consists of hardware located at least two geographically distinct sites
connected electronically by telecommunications where processing / data storage occur at
two or more than one sites. The main computer and the decentralised units communicate
via communication links. A more integrated connection occur with 'cooperative
processing where processing is handled by two cooperating geographically distinct
processors. One processor send the output of its processing to another for completion.
The system becomes more complex, where operating system of both machines is
different. Cooperative operating system may be required under such situation.
(2) On Line Processing System - One line processing refers to processing of individual
transactions as they occur from their point of origin as opposed to accumulating them into
batches. This is possible by direct access devices such as magnetic disk and number of
terminals connected to and controlled by central processors. In this way, various
departments in a company can be connected to the processor by cables.
Apart from transaction processing and file updating, inquires are also handled by the on-
line processing system. On-line processing ensures that the records are in a updated status
at any time whereas this is not so with batch processing, but the fact remains that online
processing is costly.
(3) Interactive Processing - Under this processing mode, a continuous dialogue exists
between the user and the computer. It is also called 'transaction driven' processing as
transactions dealt with completely on an individual basis through all the relevant
processing operations before dealing with the next transaction occur and enquiries to be
dealt with on an immediate response basis.
(4) On-line real time processing - The term ' Real Time' refers to the technique of
updating files with transaction data immediately after the occurrence of the event. Real
time system is basically on-line system with one speciality in enquiry processing. The
response of the system to the enquiry itself is used to control the activity. The response of
a real time system is one type of feed back control system. The response time would
naturally differ from one activity to another. Real time system usually operates in multi-
programming and multi-processing. This increases both availability and reliability of the
system. CPU's in real time systems should possess the capability of 'Program Interrupts'.
These are temporary stoppage of halts in the execution of a program so that more urgent
message can be handled on priority. Some computer systems are dedicated to real time
operations and others are designed to operate in both batch and real time modes so that
they can also serve as stand by units to each other.
(5) Time Sharing - A time-sharing allows access to a CPU and files through many
remote terminals. Multiprogramming is the method of implementing time shared
operations. In transaction processing, time sharing occurs when a computer processes
transactions of more than one entity.
(6) Service Bureau - A service bureau is a company that processes transaction for other
entities. Such units may handle the computer processing for small companies that singly
do not have sufficient transactions to justify the acquisition of a computer.
(i) Knowledge Base - This includes data, knowledge, relationships, rules of thumb to and
decision rules used by experts to solve a particular type of problem. A knowledge base is
the computer equivalent of all the knowledge and insight that an expert or a group of
experts develop through years of experience in their field.
(ii) Inference Engine - This program contain the logic and reasoning mechanisms that
stimulate the expert system logic process and deliver advice. It uses data obtained from
both the knowledge base and the user to make associations and inference, forms its
conclusion and recommends a course of action.
(iii) Use interface - This program allows the user to design, create, update, use and
communicate with the expert system.
(iv) Explanation Facility - This facility provides the user with an explanation of the
logic the expert system use to arrive.
(v) Knowledge acquisition Facility – Building a knowledge base (also called knowledge
engineering), involves both a human expert and a know ledge engineer. The knowledge
engineer is responsible for extracting an individuals expertise and using the knowledge
acquisition facility to enter into the knowledge base.
(7) Integrated File System - These systems update many files simultaneously as
transaction is processed. Processing of a sales order updates the accounts receivable
control accounts and the related subsidiary ledger is also updated and the sales control
and sales details are also posted as the sales order is processed.
Integrated data base system contains a set of interrelated master files that are integrated in
order to reduce data redundancy. The software used to control input processing and
output is referred to as Data Based Management System (DBMS) which handles the
storage, retrieval, updating and maintenance of the data in the data base. Integrated files
are most commonly associated with OLRT (on-line real time) system and pose the
greatest challenge to the Auditor's. Controls within these systems are harder to test and
assess due to the danger of file destruction.
Files may be physically stored on disk in the following way:
'Sequentially' records are physically ordered by some field (e.g., employee
number).
'Randomly' records are stored at a physical address computed by an algorithm
working on a field value.
'Indexed' records are physically stored randomly with a sequentially ordered
index field (e.g. by customer) and a pointer to the physical location of each
record.
'Indexed Sequential' records are physically stored sequentially ordered by some
field together with an index which provides access by some possibly other field.
If files are required to be processed sequentially, then they may be stored sequentially.
The sequential update of an employee master file by time sheet data is an example.
However, if individuals records are required to be accessed from time to time by some
field e.g. employee name, then one of the other storage method may be used.
(1) Separation of Duties - In a manual system, different persons are responsible for
carrying out function like initiating, recording of transaction, safeguarding of assets, does
not always apply in a computer system. For example, in a computer system, a program
may carryout reconciliation of vendor invoice against a receipt document and also
prepares a cheque payable to creditors. Such operation through a program will be
considered as incompatible functions in a manual system.
In minicomputer and microcomputer environments, separation of incompatible function
could be even more difficult. Some such forms, allows, users to change programs and
data entry without providing a record of these changes. Thus, it becomes difficult to
determine whether incompatible function have been performed by system users.
(5) Adequate Documents and Records - In a manual system, adequate documents and
records are required to provide an audit trail of activities within the system. In computer
system, document support might not be necessary to initiate, execute and records some
transaction. The task of a visible audit trail is not a problem for auditors; provided the
systems have been designed to maintain a record of all events and that they are easily
accessible. In well-designed computer systems, audit trails are more extensive than those
maintained in manual systems unfortunately not all computer systems are well designed.
This creates a serious control problem.
(6) Physical Control over Assets and Records - Physical access to assets and records is
critical in both manual systems and computer system. In a computer system the
information system assets and records may be concentrated at a single site. The
concentration of information systems assets and record also increases the losses that can
arise from computer abuse or disaster. If the organisation does not have another suitable
backup, it might be unable to continue operations.
Once components have been identified, auditors must evaluate their reliability with
respect to each type of error or irregularity that might occur. The reliability of a
component is a function of the controls that act on the component. A control is stated to
be a set of activities designed to prevent, detect or correct errors or irregularities that
affect the reliability of the components. The set of all control activities performed in a
system constitutes the control subsystem within a system. Its function is to establish
execute modify and maintain control activities so that the reliability of the system in
maintained at an acceptable level. In a computer system many different types of controls
are used to enhance component reliability. Major classes of control that the auditor must
evaluate are:
(1) Authenticity Controls - Authenticity control are exercised to verify the identify of
the individuals or process involved in a system (e.g. password control, personal
identification numbers, digital signatures)
(2) Accuracy Control - Accuracy control ensure the correctness of data and processes in
a system (e.g. program validation cheek that a numeric field contains only numeric,
overflow checks, control totals, hash total etc.)
(7) Existence Controls - Existence controls attempt to ensure the ongoing avail ability of
all system resources (e.g., database dump and logs for recovery purposes duplicate
hardware, preventive maintenance, check point and restart control)
(8) Asset Safeguarding Controls - Asset safeguarding control attempt to ensure that all
resources within a system are protected from destruction or corruption (e.g. physical
barriers, libraries etc.)
(9) Effectiveness Controls - Effectiveness control attempt to ensure that systems achieve
their goals. (E.g. monitoring of user satisfaction, post audits, periodic cost benefit
analysis etc.)
(10) Efficiency Controls - Efficiency controls attempt to ensure that a system uses
minimum resources to achieve its goals.
(2) Application System Development and Maintenance Control - Control are designed
to provide reasonable assurance that systems are developed and maintained in an
authorised and efficient manner, to establish control over:
a) Testing, conversion, implementation and documentation of new revised system.
b) Changes made to application system.
c) Access to system documentation.
d) Acquisition of application system from third parties.
(3) Computer Operation Controls - Designed to control the operation of the system and
to provide reasonable assurance that:
a) The systems are used for authorised purposes only.
b) Access to computer operation is restricted to authorised personnel.
c) Only authorised programs are to be used.
d) Processing errors are detected and corrected.
(4) System Software Control - Controls are designed to provide reasonable assurance
that system software is acquired or developed in an authorised and efficient manner
including:
a. Authorisation, approval, testing, implementation and documentation of new
system software and system software modification.
b. Restriction of access to system software and documentation to authorised
personnel.
(6) Control Over Input - Control are designed to provide reasonable assurance that:
a. Transactions are properly authorised before being processed by the computer.
b. Transactions are accurately converted into machine readable from and
recorded in the computer data files.
c. Transaction are not lost, added, duplicated or improperly changed.
d. Incorrect transactions are rejected, corrected and if necessary, resubmitted on
a timely basis.
(7) Control over Processing and Computer Data Files - Controls are designed to
provide reasonable assurance that:
a) Transactions including system generated transactions are properly
processed by the computer.
b) Transaction are not lost, added duplicated or improperly changed.
c) Processing errors are identified and corrected on a timely basis.