computer assisted and audit tools and techniques

35
Computer Assisted and Audit Tools and Techniques Drs. Haryono, Ak. M.Com & Dimas M. Widiantoro, SE., S.Kom., M.Sc. Pics from : http://www.pragroup.ca/Services/InformationTechnology/tabid/70/Defaul t.aspx

Upload: ursa-schmidt

Post on 01-Jan-2016

49 views

Category:

Documents


4 download

DESCRIPTION

Pics from : http ://www.pragroup.ca/Services/InformationTechnology/tabid/70/Default.aspx. Computer Assisted and Audit Tools and Techniques. Drs. Haryono , Ak . M.Com & Dimas M. Widiantoro, SE., S.Kom ., M.Sc. Agenda. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Computer Assisted and Audit Tools and Techniques

Computer Assisted and Audit Tools and Techniques

Drs. Haryono, Ak. M.Com & Dimas M. Widiantoro, SE., S.Kom.,

M.Sc.

Pics from : http://www.pragroup.ca/Services/InformationTechnology/tabid/70/Default.aspx

Page 2: Computer Assisted and Audit Tools and Techniques
Page 3: Computer Assisted and Audit Tools and Techniques

Agenda

• This chapter discusses data extraction tools that are used to analyze the data processed by an application rather than the application itself.

• By analyzing data retrieved from computer files, the auditor can make inferences about the presence and functionality of controls in the application that processed the data.

Page 4: Computer Assisted and Audit Tools and Techniques

List of Agenda

• Definition• Data structures• EAM• GAS• ACL Software

Page 5: Computer Assisted and Audit Tools and Techniques

Definition

• What is CAAT? • Computer Assisted Auditing Techniques

Techniques and computer programs that are developed to audit electronic data.

• Computer Assisted Audit Techniques, with respect to the Information technology audit process.

Page 6: Computer Assisted and Audit Tools and Techniques

Example of CAAT

• http://www.youtube.com/watch?v=ysLyBBN9Rj4

• http://www.youtube.com/watch?v=-_8J6LLbivs

Page 7: Computer Assisted and Audit Tools and Techniques

The Usage CAATTs• Auditors make extensive use of CAATTs in gathering

accounting data for testing application controls and in performing substantive tests.

Page 8: Computer Assisted and Audit Tools and Techniques

Data Extraction Software

• An important use of such software is in performing substantive tests.

• Most audit testing occurs in the substantive-testing phase of the audit.

• These procedures are called substantive tests because they are used to substantiate dollar amounts in account balances.

Page 9: Computer Assisted and Audit Tools and Techniques

Substantive test?

• Substantive procedures (or substantive tests) are those activities performed by the auditor to detect material misstatement or fraud at the assertion level.

Page 10: Computer Assisted and Audit Tools and Techniques

Substantive tests

• Include, but are not limited to, the following:– Determining the correct value of inventory– Determining the accuracy of prepayments and

accruals– Confirming accounts receivable with customers– Searching for unrecorded liabilities

Page 11: Computer Assisted and Audit Tools and Techniques

Substantive tests (Cont)

• In an IT environment, the records needed to perform such tests are stored in computer files and databases.

• Before substantive tests can be performed, the data need to be extracted from the host system and presented to the auditor in a usable format.

Page 12: Computer Assisted and Audit Tools and Techniques

Data Structures

• Consist of two fundamental component– Organization

• The way records are physically arranged on the secondary storage device.

– Sequential – Random

– Access Method • Technique used to locate records and to navigate

through the database of file.

Page 13: Computer Assisted and Audit Tools and Techniques

File Processing Operations

• Retrieve a record from the file based on its primary key

• Insert a record into a file• Update a record in the file• Read a complete list of records• Find the next record in the file• Scan a file for records with common secondary

keys• Delete a record from a file

Page 14: Computer Assisted and Audit Tools and Techniques

Sequential Structure

• Sequential storage and access method

Page 15: Computer Assisted and Audit Tools and Techniques

Indexed Structure

• Indexed Structure

Page 16: Computer Assisted and Audit Tools and Techniques

Weakness of Index

Page 17: Computer Assisted and Audit Tools and Techniques

Hashing Techniques

• Hashing Techniques

• A hashing structure employs an algorithm that converts the primary key of a record directly into a storage address. Hashing eliminates the need for a separate index. By calculating the address, rather than reading it from an index, records can be retrieved more quickly.

Page 18: Computer Assisted and Audit Tools and Techniques

Relational Database Structure, Concepts, and Terminology

• Relational databases are based on the indexed sequential file structure.

Page 19: Computer Assisted and Audit Tools and Techniques

• Accordingly, a system is relational if it:• 1. Represents data in the form of two-

dimensional tables.• 2. Supports the relational algebra functions of

restrict, project, and join.

Page 20: Computer Assisted and Audit Tools and Techniques

Data Extraction Software

• Two types:– embedded audit modules (EAM)– general audit software (GAS)

Page 21: Computer Assisted and Audit Tools and Techniques

Relational Database

Page 22: Computer Assisted and Audit Tools and Techniques

Linkages Relational Dtabase

Page 23: Computer Assisted and Audit Tools and Techniques

Anomalies Database

• This section deals with why database tables need to be normalized. In other words, why is it necessary for the organization’s database to form an elaborate network of normalized tables linked together like those illustrated in Figure below

• ? Why, instead, can we not simply consolidate the views of one user (or several) into a single common table from which all data needs may be met?

Page 24: Computer Assisted and Audit Tools and Techniques
Page 25: Computer Assisted and Audit Tools and Techniques
Page 26: Computer Assisted and Audit Tools and Techniques

• 1. All non-key (data) attributes in the table are dependent on (defined by) the primary key.

• 2. All non-key attributes are independent of the other non-key attributes.

Page 27: Computer Assisted and Audit Tools and Techniques
Page 28: Computer Assisted and Audit Tools and Techniques

Embedded Audit Module

• The objective of EAM is to identify important transactions while they are being processed and extract copies of them in real-time.

• An EAM is a specially programmed module embedded in a host application to capture predetermined transaction types for subsequent analysis.

Page 29: Computer Assisted and Audit Tools and Techniques

Embedded Audit Module (Cont)

• As the selected transaction is being processed by the host application, a copy of the transaction is stored in an audit file for subsequent review.

• The EAM approach allows selected transactions to be captured throughout the audit period, or at any time during the period, thus significantly reducing the amount of work the auditor must do to identify significant transactions for substantive testing.

Page 30: Computer Assisted and Audit Tools and Techniques

Embedded Audit Module (Cont)• To begin data capturing, the auditor specifies to the

EAM the parameters and materiality threshold of the transactions set to be captured.

• For example, let’s assume that the auditor establishes a $50,000 materiality threshold for transactions processed by a sales order processing system.

• Transactions equal to or greater than $50,000 will be copied to the audit file.

• From this set of transactions, the auditor may select a subset to be used for substantive tests.

Page 31: Computer Assisted and Audit Tools and Techniques

Risks in using EAM

• Operational efficiency: EAM may decrease operational performance because executing EAM incurs extra system overhead.

• Verifying EAM integrity: When application logic is modified, corresponding EAM logic may also need to be changed.

Page 32: Computer Assisted and Audit Tools and Techniques

Generalized Audit Software (GAS)

• Most widely used CAATT for IS auditing.• GAS allows auditors to access electronic coded

data files and perform various operations on their contents.

• Some of the more common uses for GAS are shown in page 274….

Page 33: Computer Assisted and Audit Tools and Techniques

GAS is popular

• GAS languages are easy to use and require little computer background on the part of the auditor.

• Many GAS products can be used on both mainframe and PC.

• Auditors can perform their tests independent of the computer service’s staff.

• GAS can be used to audit the data stored in most file structures and formats.

Page 34: Computer Assisted and Audit Tools and Techniques

ACL software

• Designed as a meta-language for auditors to access most data stored by electronic means and test them comprehensively

• Many of the problems associated with accessing complex data structures have been solved by ACL’s Open Data Base Connectivity (ODBC) interface.

• Definition of ODBC

Page 35: Computer Assisted and Audit Tools and Techniques

ODBC Illustration

Application ProgramMS SQL

Oracle

DB 2

ODBC-compliant DBMS

Driver

Driver

Driver

SQL commands