Matakuliah : A0214/Audit Sistem Informasi Tahun : 2007 Pertemuan 7-8 AUDITING INFORMATION TECHNOLOGY USING COMPUTER ASSISTED AUDIT TOOLS AND TECHNIQUES Bina Nusantara AUDIT CYCLE Bina Nusantara Auditor Productivity Tools • • • • • Bina Nusantara Planning and tracking the annual audit schedule Documentation and presentations Communication and data transfer Resource management Data management Using CAATs in Audit Process • Used to evaluate the integrity of an application, determine compliance with procedures, and continuously monitor processing result. • Examples – Audit Command Language (ACL) – Interactive Data Extraction and Analysis (IDEA) Bina Nusantara Functionality of CAATs • • • • • • • • • • Bina Nusantara Avoidance of a sampling error by addressing 100% of population Stratification of data Aging of the transactions and data Recalculation (reperformance) Exceptions identification Fraud detections (via isolated variances) Extraction of the subsets of data Linkage of data for analysis Identification of duplicate transactions Audit trail analysis • • • • • • • • • Bina Nusantara TECHNICAL SKILLS AND TOOLS Generalized Audit Software Application Testing Designing Tests of Controls Data Analysis Compliance Testing Continuous Monitoring Application Controls Audit Functions Sampling Generalized Audit Software • • • • • • Bina Nusantara Analyze and compare files Select specific records for examination Conduct random samples Validate calculations Prepare confirmation letters Analyze aging of transaction files Application Testing • Submitting a set of test data that will produce known results if the application functions properly • Developing independent programs to reperform the logic of the application • Evaluating the results of the application Bina Nusantara Application Controls • Spreadsheet Controls – – – – – – – – Bina Nusantara Analysis Source of data Design review Documentation Verification of logic Extent of training Extent of audit Support commitment Application Controls • Database Controls – – – – – – – Bina Nusantara Referential integrity Transaction integrity Entity integrity Value constraints Concurrent update protection Backup and recovery protection Testing protection Audit Functions • • • • Bina Nusantara Items of Audit Interest Audit Mathematics Data Analysis System Validation Sampling • Types of sampling – Judgmental sampling – Statistical sampling • Applied technique if any change to the characteristics or attributes of the population under review: – Random attribute sampling – Variable sampling techniques Bina Nusantara Sampling Process Steps: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Bina Nusantara Determine the objective of the test Define the population Determine the confidence level Determine the precision Determine the expected standard deviation Compute the sample size Document the sampling procedure Select the audit samples Evaluate the sample results Reach an overall conclusion based on the sampling. Computer Forensics Methods and Techniques • The IT auditor can work in the field of computer forensics or work side by side with a computer forensics specialist, supplying insight into a particular system or network. • Computer forensic specialists gather evidence against the individual who has committed a crime in several ways. Bina Nusantara
© Copyright 2026 Paperzz