SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Auditing Concepts
The Auditing Process
Definition:
American Accounting Association (AAA)
Auditing is a systematic process of objectively
obtaining and evaluating evidence regarding
assertions about economic actions and events to
ascertain the degree of correspondence between
those assertions and established criteria , and
communicating the results to interested users.
Explanation of the Definition
 Systematic process
 structured as a dynamic activity in a logical manner
 an unplanned approach to computer auditing may result in by-
passing important segments of processing or the related files
 Obtaining and evaluating evidence
 reliability of the control structure
• tests to verify whether the control function is working as prescribed
 contents of the files
• substantive testing coherency between files and company transactions
 Ascertain correspondence between assertion and
established criteria
 Communicating results to interested users
 other members of audit team , client
Security Audit and general Audit Schema
Audit
Security Manager External Auditor
Security Audit Company Audit
- security and privacy
- availability
- confidentiality
- accessibility
Accounting
system
Internal
Control System
- verification audit
approach
- controls within
IT-system
- IT systems
audit approach
IT-Audit
IT auditing
 Problems specific for computer auditing :
 Concentration of the data processing
 Data consultancy via computer or IT-personnel
 Data can be erased
 Data are very much compacted ( can be lost , stolen , ... )
 Basic documents disappear ( telephone , EDI , ... )
 Automated decisions
 More complexity
 More vulnerable ( network )
IT-audit: high degree of specialization , fast evolution
Understanding internal control structure
 Necessary to plan the audit
 identify the types of potential misstatements that could occur
 consider the factors that affect the risk of material misstatements
 design substantive tests
 The auditor must understand the three elements of the
internal control structure
 the control environment
 the accounting system
 the control procedures
Assessment of Control Risk
Purpose
The purpose of control risk assessment is to evaluate the
effectiveness of an entity’s internal control structure policies in
preventing or detecting material misstatements in the financial
statements.
Control Risk
 the likelihood that misstatements in accounting data will not be
prevented or detected and corrected
Control structure
 those policies and procedures established by the entity to
provide reasonable assurance that its established objectives
will be achieved
The Control Environment
The collective effect of various factors on establishing ,
enhancing, or mitigating the effectiveness of specific
policies and procedures.
 managers philosophy and operating style
 entity’s organizational structure
 functioning BoD and its committees (audit committee)
 methods of assigning authority and responsibility
 performance control and internal auditing methods
 personnel policies and practices
 various external factors
Reflects overall attitude, awareness and actions
concerning the importance of control
The Accounting System
 The accounting system consists of the methods and
records established to identify , assemble, analyze,
classify , record and report an entity’s transactions and
to maintain accountability for the related assets and
liabilities. It includes an ability to:

 identify and record all valid transactions
 describe the transactions in sufficient detail to permit proper
classification of transactions for financial reporting
 measure the value of transactions in a manner that permits
recording their proper monetary value
 determine the time period in which transactions occurred
 present properly the transactions and related disclosures in
financial statements
The Control Procedures
Those policies and procedures that management has
established to provide reasonable assurance that specific
entity objectives will be achieved. It includes provision for:
 proper authorization of transactions and activities
 segregation of duties
 design of adequate safeguards over access to and use of assets
and records
 independent checks on performance and proper valuation of
recorded amounts
Understand the Control Structure
In order to obtain an understanding of the control
structure , the auditor needs information about:
 the classes of transactions that are significant
 how the transactions are initiated
 the accounting records, supporting documents, machine-
readable information and specific accounts involved in the
processing and reporting of transactions
 the accounting processing involved from the initiation of
transactions, including how the computer is used to process
data
 the financial reporting process used to prepare the financial
statements , including accounting estimates and disclosures
Control Risk Assessment Conclusions
 If Control structure is weak
 additional audit effort in control structure area is inappropriate
 control risk is high
 significant substantive testing will be necessary
 If Control structure seems to be strong
 efficiency of audit might be improved if control risk can be as-
sessed at a low level , allowing reliance on the control structure
• tests of controls might demonstrate that they are functioning
properly and substantive testing can be reduced
• tests of controls might demonstrate that they are not functioning
properly and substantive testing cannot be reduced
Effects of IT on Accounting Control
Examples of effects:
 decentralized activities performed by several clerks may be
centralized into one computer program, omitting internal control
 with lack of documentation the audit trail may disappear
 although the total number of employees increases , there is
typically a decrease in human involvement in the actual processing
of accounting data invoking the loss of visual checking
 instead of random errors there are systematic errors
 specialized knowledge needed to audit effectively
 the IT-auditor must be involved in the early stages of system
design in order to build-in accounting controls
 problems for the auditor sometimes worse in smaller companies
 computer fraud ( unauthorized checks or policies, ... )
Audit Trail in an IT System
The audit trail are those records that enable a transaction
to be traced from its source forward to a summarized
total in a financial statement or the other way around.
The IT system can affect the audit trail in several ways:
 source documents filed in a difficult-to-access manner
 traditional source documents may be eliminated
 ledger summaries replaced by master files not showing
summarized values
 sometimes no standard transaction listing or journal
 paper reports only for exceptions
 always computer and programs needed to read data
 sequence of data and activities difficult to observe

Weitere ähnliche Inhalte

Was ist angesagt?

Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsSharing Slides Training
 
Common internal audit findings & how to avoid them
Common internal audit findings & how to avoid themCommon internal audit findings & how to avoid them
Common internal audit findings & how to avoid themSurajit Datta
 
COSO Framework Model
COSO Framework ModelCOSO Framework Model
COSO Framework ModelTownofAddison
 
Internal audit ratings guide
Internal audit ratings guideInternal audit ratings guide
Internal audit ratings guideCenapSerdarolu
 
Audit bab1 sem 6- Audit Approach
Audit bab1 sem 6- Audit ApproachAudit bab1 sem 6- Audit Approach
Audit bab1 sem 6- Audit ApproachNur Dalila Zamri
 
Audit Process: How to Successfully Plan Audit
Audit Process: How to Successfully Plan Audit Audit Process: How to Successfully Plan Audit
Audit Process: How to Successfully Plan Audit complianceonline123
 
Business continuity planning guide
Business continuity planning guideBusiness continuity planning guide
Business continuity planning guideCenapSerdarolu
 
Auditing application controls
Auditing application controlsAuditing application controls
Auditing application controlsCenapSerdarolu
 
Test of control
Test of controlTest of control
Test of controlVadivelM9
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Sharah Ayumi
 
Brief overview on Internal control (Audit)
Brief overview on Internal control (Audit)Brief overview on Internal control (Audit)
Brief overview on Internal control (Audit)Hisyam
 
Introduction to auditing, Meaning, Objects and Techniques
Introduction to auditing, Meaning, Objects and TechniquesIntroduction to auditing, Meaning, Objects and Techniques
Introduction to auditing, Meaning, Objects and Techniquesmack19921
 

Was ist angesagt? (20)

Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
 
Common internal audit findings & how to avoid them
Common internal audit findings & how to avoid themCommon internal audit findings & how to avoid them
Common internal audit findings & how to avoid them
 
COSO Framework Model
COSO Framework ModelCOSO Framework Model
COSO Framework Model
 
Risk Based Audit Approach
Risk Based Audit ApproachRisk Based Audit Approach
Risk Based Audit Approach
 
Risk assessment managment and risk based audit approach
Risk assessment managment and risk based audit approachRisk assessment managment and risk based audit approach
Risk assessment managment and risk based audit approach
 
Internal audit ratings guide
Internal audit ratings guideInternal audit ratings guide
Internal audit ratings guide
 
Audit bab1 sem 6- Audit Approach
Audit bab1 sem 6- Audit ApproachAudit bab1 sem 6- Audit Approach
Audit bab1 sem 6- Audit Approach
 
Audit Process: How to Successfully Plan Audit
Audit Process: How to Successfully Plan Audit Audit Process: How to Successfully Plan Audit
Audit Process: How to Successfully Plan Audit
 
Internal controls
Internal controlsInternal controls
Internal controls
 
Audit ratings guide
Audit ratings guideAudit ratings guide
Audit ratings guide
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 
Business continuity planning guide
Business continuity planning guideBusiness continuity planning guide
Business continuity planning guide
 
Auditing application controls
Auditing application controlsAuditing application controls
Auditing application controls
 
Test of control
Test of controlTest of control
Test of control
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
 
Brief overview on Internal control (Audit)
Brief overview on Internal control (Audit)Brief overview on Internal control (Audit)
Brief overview on Internal control (Audit)
 
Introduction to auditing, Meaning, Objects and Techniques
Introduction to auditing, Meaning, Objects and TechniquesIntroduction to auditing, Meaning, Objects and Techniques
Introduction to auditing, Meaning, Objects and Techniques
 
Lietrature review
Lietrature reviewLietrature review
Lietrature review
 
James hall ch 15
James hall ch 15James hall ch 15
James hall ch 15
 
Database auditing models
 Database auditing models  Database auditing models
Database auditing models
 

Ähnlich wie 1auditconcepts

Chapter 9Audit Risk AssessmentPrepared by Dr Phil Saj1.docx
Chapter 9Audit Risk AssessmentPrepared by Dr Phil Saj1.docxChapter 9Audit Risk AssessmentPrepared by Dr Phil Saj1.docx
Chapter 9Audit Risk AssessmentPrepared by Dr Phil Saj1.docxmccormicknadine86
 
auditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdfauditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdfowaissayyed0041
 
Internal control.. control env
Internal control.. control envInternal control.. control env
Internal control.. control envPhillys Sebastiane
 
Audits and Regulatory Compliance
Audits and Regulatory ComplianceAudits and Regulatory Compliance
Audits and Regulatory Compliancesomeshwar mankar
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Issharing notes123
 
Internal Audit - A Comprehensive Risk Management tool
Internal Audit  - A Comprehensive Risk Management toolInternal Audit  - A Comprehensive Risk Management tool
Internal Audit - A Comprehensive Risk Management toolRamesh Verma
 
Computerized Environment
Computerized EnvironmentComputerized Environment
Computerized EnvironmentVadivelM9
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditingMarc Vael
 
SEATA by TOMMY SEAH
SEATA by TOMMY SEAHSEATA by TOMMY SEAH
SEATA by TOMMY SEAHTommy Seah
 
Internal Audit Rating System Internal Audit Rating System
Internal Audit Rating System Internal Audit Rating SystemInternal Audit Rating System Internal Audit Rating System
Internal Audit Rating System Internal Audit Rating Systemedwardnjorogesic
 

Ähnlich wie 1auditconcepts (20)

Audit Risk Assessment Chapter 9
Audit Risk Assessment Chapter 9Audit Risk Assessment Chapter 9
Audit Risk Assessment Chapter 9
 
Chapter 9Audit Risk AssessmentPrepared by Dr Phil Saj1.docx
Chapter 9Audit Risk AssessmentPrepared by Dr Phil Saj1.docxChapter 9Audit Risk AssessmentPrepared by Dr Phil Saj1.docx
Chapter 9Audit Risk AssessmentPrepared by Dr Phil Saj1.docx
 
auditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdfauditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdf
 
Audit procedures
Audit proceduresAudit procedures
Audit procedures
 
Internal controls in an IT environment
Internal controls in an IT environment Internal controls in an IT environment
Internal controls in an IT environment
 
Internal control.. control env
Internal control.. control envInternal control.. control env
Internal control.. control env
 
Audit presentation
Audit presentationAudit presentation
Audit presentation
 
8. internal control new
8. internal control new8. internal control new
8. internal control new
 
Internal_audit
Internal_auditInternal_audit
Internal_audit
 
Audits and Regulatory Compliance
Audits and Regulatory ComplianceAudits and Regulatory Compliance
Audits and Regulatory Compliance
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
 
Internal Audit - A Comprehensive Risk Management tool
Internal Audit  - A Comprehensive Risk Management toolInternal Audit  - A Comprehensive Risk Management tool
Internal Audit - A Comprehensive Risk Management tool
 
Computerized Environment
Computerized EnvironmentComputerized Environment
Computerized Environment
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
 
SEATA by TOMMY SEAH
SEATA by TOMMY SEAHSEATA by TOMMY SEAH
SEATA by TOMMY SEAH
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Audit process
Audit processAudit process
Audit process
 
Internal control 1_ricc_revised
Internal control 1_ricc_revisedInternal control 1_ricc_revised
Internal control 1_ricc_revised
 
Internal Audit Rating System Internal Audit Rating System
Internal Audit Rating System Internal Audit Rating SystemInternal Audit Rating System Internal Audit Rating System
Internal Audit Rating System Internal Audit Rating System
 

Kürzlich hochgeladen

Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 

Kürzlich hochgeladen (20)

Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 

1auditconcepts

  • 2.
  • 3. The Auditing Process Definition: American Accounting Association (AAA) Auditing is a systematic process of objectively obtaining and evaluating evidence regarding assertions about economic actions and events to ascertain the degree of correspondence between those assertions and established criteria , and communicating the results to interested users.
  • 4. Explanation of the Definition  Systematic process  structured as a dynamic activity in a logical manner  an unplanned approach to computer auditing may result in by- passing important segments of processing or the related files  Obtaining and evaluating evidence  reliability of the control structure • tests to verify whether the control function is working as prescribed  contents of the files • substantive testing coherency between files and company transactions  Ascertain correspondence between assertion and established criteria  Communicating results to interested users  other members of audit team , client
  • 5. Security Audit and general Audit Schema Audit Security Manager External Auditor Security Audit Company Audit - security and privacy - availability - confidentiality - accessibility Accounting system Internal Control System - verification audit approach - controls within IT-system - IT systems audit approach IT-Audit
  • 6. IT auditing  Problems specific for computer auditing :  Concentration of the data processing  Data consultancy via computer or IT-personnel  Data can be erased  Data are very much compacted ( can be lost , stolen , ... )  Basic documents disappear ( telephone , EDI , ... )  Automated decisions  More complexity  More vulnerable ( network ) IT-audit: high degree of specialization , fast evolution
  • 7. Understanding internal control structure  Necessary to plan the audit  identify the types of potential misstatements that could occur  consider the factors that affect the risk of material misstatements  design substantive tests  The auditor must understand the three elements of the internal control structure  the control environment  the accounting system  the control procedures
  • 8. Assessment of Control Risk Purpose The purpose of control risk assessment is to evaluate the effectiveness of an entity’s internal control structure policies in preventing or detecting material misstatements in the financial statements. Control Risk  the likelihood that misstatements in accounting data will not be prevented or detected and corrected Control structure  those policies and procedures established by the entity to provide reasonable assurance that its established objectives will be achieved
  • 9. The Control Environment The collective effect of various factors on establishing , enhancing, or mitigating the effectiveness of specific policies and procedures.  managers philosophy and operating style  entity’s organizational structure  functioning BoD and its committees (audit committee)  methods of assigning authority and responsibility  performance control and internal auditing methods  personnel policies and practices  various external factors Reflects overall attitude, awareness and actions concerning the importance of control
  • 10. The Accounting System  The accounting system consists of the methods and records established to identify , assemble, analyze, classify , record and report an entity’s transactions and to maintain accountability for the related assets and liabilities. It includes an ability to:   identify and record all valid transactions  describe the transactions in sufficient detail to permit proper classification of transactions for financial reporting  measure the value of transactions in a manner that permits recording their proper monetary value  determine the time period in which transactions occurred  present properly the transactions and related disclosures in financial statements
  • 11. The Control Procedures Those policies and procedures that management has established to provide reasonable assurance that specific entity objectives will be achieved. It includes provision for:  proper authorization of transactions and activities  segregation of duties  design of adequate safeguards over access to and use of assets and records  independent checks on performance and proper valuation of recorded amounts
  • 12. Understand the Control Structure In order to obtain an understanding of the control structure , the auditor needs information about:  the classes of transactions that are significant  how the transactions are initiated  the accounting records, supporting documents, machine- readable information and specific accounts involved in the processing and reporting of transactions  the accounting processing involved from the initiation of transactions, including how the computer is used to process data  the financial reporting process used to prepare the financial statements , including accounting estimates and disclosures
  • 13. Control Risk Assessment Conclusions  If Control structure is weak  additional audit effort in control structure area is inappropriate  control risk is high  significant substantive testing will be necessary  If Control structure seems to be strong  efficiency of audit might be improved if control risk can be as- sessed at a low level , allowing reliance on the control structure • tests of controls might demonstrate that they are functioning properly and substantive testing can be reduced • tests of controls might demonstrate that they are not functioning properly and substantive testing cannot be reduced
  • 14. Effects of IT on Accounting Control Examples of effects:  decentralized activities performed by several clerks may be centralized into one computer program, omitting internal control  with lack of documentation the audit trail may disappear  although the total number of employees increases , there is typically a decrease in human involvement in the actual processing of accounting data invoking the loss of visual checking  instead of random errors there are systematic errors  specialized knowledge needed to audit effectively  the IT-auditor must be involved in the early stages of system design in order to build-in accounting controls  problems for the auditor sometimes worse in smaller companies  computer fraud ( unauthorized checks or policies, ... )
  • 15. Audit Trail in an IT System The audit trail are those records that enable a transaction to be traced from its source forward to a summarized total in a financial statement or the other way around. The IT system can affect the audit trail in several ways:  source documents filed in a difficult-to-access manner  traditional source documents may be eliminated  ledger summaries replaced by master files not showing summarized values  sometimes no standard transaction listing or journal  paper reports only for exceptions  always computer and programs needed to read data  sequence of data and activities difficult to observe