Department of Business and Social Studies
Department of Business and Social Studies
Purpose:
Expected Learning Outcomes of the Course:
By the end of the course, students should be able to:-
Course Content:
Course Outline
TABLE OF CONTENTS
Page
COURSE OUTLINE.............................................................................................................i
TABLE OF CONTENTS.....................................................................................................iv
CHAPTER ONE: Introduction………………….................................................................1
1.1 Project………………………………………………………………………………………………1
1.2 Project Plan………………………………………………………………………………………..1
1.3 Project Planning…………………………………………………………………………………..2
1.3.1 National Plans………………………………………………………………………….3
1.3.2 Sectoral Plans…………………………………………………………………………..3
1.4 Project Management……………………………………………………………………………...3
1.5 History of Project Management…………………………………………………………………5
Review Questions………………………………………………………………………………………6
References for further reading……………………………………………………………………….6
ii
4.3 Availability and Supply………………………………………………………………………….37
4.4 Costs of Raw Materials and Suppliers………………………………………………………...40
Review Questions……………………………………………………………………………………..42
References for further reading……………………………………………………………………...42
iii
CHAPTER EIGHT: Financial and Economic Analysis…………………………………80
8.1 Total investment costs…………………………………………………………………………...80
8.2 Production Costs…………………………………………………………………………………85
8.3 Marketing costs…………………………………………………………………………………..86
8.4 Project cash flows………………………………………………………………………………..87
8.5 Financial Evaluation…………………………………………………………………………….88
8.5.1 Basic assumptions underline cash flow discounting in financial evaluation...88
8.5.2 Methods of Financial Evaluation…………………………………………………..88
8.5.2.1 Net Present Value (NPV) Method……………………………………….88
8.5.2.2 Internal Rate of Return (IRR)……………………………………………89
8.5.2.3 Profitability Index (PI)/present value index (PVI)/benefit-cost
ratio……………………………………………………………………….……….…92
8.5.2.4 Discounted Payback period……………………………….………….….93
Review Questions……………………………………………………………………………….........94
References for further reading………………………………………………………………….…..94
iv
CHAPTER ONE: INTRODUCTION TO INFORMATION SYSTEMS AUDIT
Learning Objectives
The evaluation of obtained evidence determines if the orgs assets and other interests
are actually safeguared.
In summary IS audits:
Evaluate the orgs ability to protect its information assets; in other words CIA
breaches are catered for.
Validity : The org gets a valid and accurate information on the status of
information as a corporate resource.
1
Diagnostic : The diagnostic element of an audit allows for strong points and weak
points (or ―gaps‖) to be identified. This information can be used to build on the
strong points and to eliminate the weak ones.
In the same manner, an information audit can help to focus staff members’
attention on the value and benefits of the use of information as a corporate
resource
By the time the information audit has been completed, these staff members will
have a better understanding and picture of information and its role in the
organization
Ineffective IT strategies, policies and practices (including a lack of policies for use of
Information and Communication Technology (ICT) resources,Internet usage policies,
Security practices etc.)
2
Evidence is obtained
Systems and applications – An audit used to verify that systems and applications are
appropriate, are efficient, reliable and adequate to meet orgs objectives.
Systems Development – An audit used to verify that systems under development meet
objectives set out at each phase of development.
The tasks needed to process the transactions are subdivided so that fraud requires
collusion.
Operational Audit: evaluates internal control structure in a given process or area e.g.
an application.
Integrated Audit: combination of financial and operational audit. It also assess overall
objectives of an org relating to financial information and asset protection.
Specialized audits : specialized reviews of work performed by third parties, this is due
to increasing dependence on out-sourcing
3
Phases of the Information Systems Audit
1. Establish terms of engagement
2. Preliminary review
Get the orgs strategy and business model and the extend to which IS are beneficial.
4
Representative decisions include the following:
An orgs risk exposure may change as a result of various changes including adoption of
new technologies.
In addition, the planning stage identifies required resources. These include human,
financial, technical, and physical. It is necessary to decide if the audit will be
conducted using company personnel or will be outsourced. The decisions in this phase
of the planning stage are interrelated in that, for example, outsourcing requires greater
financial outlay but fewer physical resources.
An understand of internal controls helps the auditor assess the level of risk exposure.
The report will help management decide on the way forward with regard to the set
objectives.
5
Review Questions
i) Define a the following terms:
a) IS Audit
b) An IS auditor
c) Segregation of duties
d) IS audit planning
ii) Describe the different phases of an IS audit.
iii) Distinguish between an IS auditor and an IT auditor.
6
CHAPTER TWO: Audit Planning
Learning Objectives
By the end of this chapter the learner should be able to:
Define the terms materiality and internal controls.
Explain why audit planning is important.
Describe the tasks involved in audit planning
Evaluate the different audit planning steps.
Discuss the different categories of control.
2.2 Tasks
There are five (5) tasks within the IS audit planning:
Develop and implement a risk-based IS audit strategy for the organization in
compliance with IS audit standards, guidelines and best practices.
Plan specific audits to ensure that IT and business systems are protected and
controlled.
Plan how to conduct audits in accordance with IS audit standards, guidelines
and best practices to meet planned audit objectives.
How to communicate emerging issues, potential risks and audit results to key
stakeholders.
Advise on the implementation of risk management and control practices within the
organization while maintaining independence
7
2. Knowledge of IS auditing practices and techniques
8
meet the standards when completing information systems auditing work, but
do not set requirements.
2.3.2 Materiality
An auditing concept regarding the importance of an item of information with regard to
its impact or effect on the functioning of the entity being audited.
Materiality is judged in terms of its inherent nature, impact (influence) value, use
value, and the circumstances (context) in which it occurs. Opposite of triviality.
The aggregate level of error acceptable to management, the IT auditor, and appropriate
regulatory agencies.
The potential for the cumulative effect of small errors or weaknesses to become
material.
While establishing materiality, the auditor may audit non-financial items such as
physical access controls, logical access controls, and systems for personnel
management, manufacturing control, design, quality control, and password generation.
While planning the audit work to meet the audit objectives, the auditor should identify
relevant control objectives and determine, based on materiality, which controls should
be examined. Internal control objectives are placed by management and identifies
what the management strives to achieve through their internal controls.
Where financial transactions are not processed, the following identifies some measures
the auditor should consider when assessing materiality:
2.3.2.1 Measures
Criticality of the business processes supported by the system or operation.
9
The auditor evaluates the organization‘s control structure by understanding the organization‘s
five interrelated control components
The board of directors and senior management are responsible for establishing the
appropriate culture to facilitate an effective and efficient internal control system and
for continuously monitoring its effectiveness though each individual within an
organization must take part in this process.
Control Activities Consists of the policies and procedures that ensure employees
carry out management‘s directions. Types of control activities an organization must
implement are preventative controls (controls intended to stop an error from
occurring), detective controls (controls intended to detect if an error has occurred), and
mitigating controls (control activities that can mitigate the risks associated with a key
control not operating effectively).
Authorization of input
Output authorization
Reliability of processes
Backup/recovery
Two Things
There are two key aspects that a control needs to address, what you want to achieve
(objectives) and what you want to avoid (risk). Not only do internal controls address
10
business/operational objectives, but need to address undesired events through
preventing, detecting, and correcting undesired events.
2.5.2 Categories
Controls are generally categorized into 3 major classifications:
Detective: Controls that detect and report the occurrence of an error, omission
or malicious act..
General Controls
Application controls
General controls include controls over data centre operations, system software
acquisition and maintenance, access security, and application system development and
maintenance.
11
2.6.1 General controls
They create the environment in which the application systems and application controls
operate. Examples:
12
(iv) Output control
(v) Master/Standing Data File control
(vi) Audit requirements
i) Whether the data processed are genuine, complete, accurate and not provisional?
System information including start up time, stop time, restarts, recovery etc.
Review Questions
i) How does the IS Audit planning objectives differ from IS audit control
objectives?
ii) State the objectives of IS audit planning
13
iii) Discuss how IS audit controls can be achieved.
iv) Describe the stages of the IS audit planning?
14
CHAPTER THREE: Risk Assessment
Learning Objectives
By the end of this chapter the learner should be able to:
Define the term risk, threat and threat source.
Describe the different types of risk and their relationships.
Explain why risk management is important
Assess the impact of risk.
3.0 Risk
Risk is the potential harm that may arise from some current process or from some
future event.
From the IT security perspective, risk management is the process of understanding and
responding to factors that may lead to a failure in the confidentiality, integrity or
availability of an information system.
3.1.3 Threat-Source: Either (1) intent and method targeted at the intentional exploitation of
a vulnerability or (2) a situation and method that may accidentally trigger a
vulnerability.
15
• Human Threats—threats caused by human beings, including both
unintentional (inadvertent data entry) and deliberate actions (network based attacks,
virus infection, unauthorized access)
• Environmental Threats—power failure, pollution, chemicals, water damage
3.2.1 Identifying Vulnerabilities
Vulnerabilities can be identified by numerous means. Different risk management
schemes offer different methodologies for identifying vulnerabilities. In general, start
with commonly available vulnerability lists or control areas.
Then, working with the system owners or other individuals with knowledge of the
system or organization, start to identify the vulnerabilities that apply to the system.
3.2.2 Tools
While the following tools and techniques are typically used to evaluate the
effectiveness of controls, they can also be used to identify vulnerabilities:
16
Impact is best defined in terms of impact upon availability,impact upon integrity and
impact upon confidentiality.
Low.
Moderate.
Severe.
For example, systems that are part of an Intranet/extranet and may have
external access to the Internet.
The system architecture with the topological layout plus a list of all nodes,
hardware and software.
and avoidance.
3.4.1 Mitigation
fixing the flaw or providing some type of compensatory control to reduce the
likelihood or impact associated with the flaw.
3.4.2 Transference
Transference is the process of allowing another party to accept the risk on your behalf.
Risk is transferred from the individual to a pool of insurance holders, including the
insurance company.
Note that this does not decrease the likelihood or fix any flaws, but it does reduce the
overall impact (primarily financial) on the organization.
3.4.3 Acceptance
17
Acceptance is the practice of simply allowing the system to operate with a known risk.
Many low risks are simply accepted. Risks that have an extremely high cost to
mitigate are also often accepted.
Often risks are accepted that should not have been accepted, and then when the
penetration occurs, the IT security personnel are held responsible. Typically, business
managers, not IT security personnel, are the ones authorized to accept risk on behalf of
an organization.
3.4.4 Avoidance
Avoidance is the practice of removing the vulnerable aspect of the system or even the
system itself.
For instance, during a risk assessment, a website was uncovered that let vendors view
their invoices, using a vendor ID embedded in the HTML file name as the
identification and no authentication or authorization per vendor. When notified about
the web pages and the risk to the organization, management decided to remove the
web pages and provide vendor invoices via another mechanism. In this case, the risk
was avoided by removing the vulnerable web pages.
18
The risk that a material error exists that will not be prevented or detected in a timely
manner by the internal controls system.OR
The risk that internal controls will fail to prevent or detect material misstatement
For example, the control risk associated with manual reviews of computer logs can be
high because activities requiring investigation are often easily missed, owing to the
volume of logged information. The control risk associated with computerized data
validation procedures is ordinarily low if the processes are consistently applied.
Depends on the design and execution of controls:
Audit Risk = risk that internal controls will FAIL to prevent or detect misstatement
High CR means high risk controls will fail
Low CR means low risk controls will fail
If CR is high, auditor will not rely much on controls
If CR is low, auditor can rely on ICS and reduce other types of testing
19
3.6 Designing materiality
Materiality as "the magnitude of an omission or misstatement of information that, in
the light of surrounding circumstances, makes it probable that the judgment of a
reasonable person relying on the information would have been changed or influenced
by the omission or misstatement."
There is an inverse relationship between materiality and the level of audit risk, that is
the higher the materiality level, the lower the audit risk and vice versa. Auditors take
into account the inverse relationship between materiality and audit risk when
determining the nature, timing and extent of audit procedures.
Review Questions
Define the following terms, risk, materiality, vulnerability, threat source
Describe some of the factors to consider when determining materiality.
Explain any FOUR methods of managing risk in IS audit.
Why is risk management important to an organization.
20
CHAPTER FOUR: Performing the Audit
Learning Objectives
By the end of this chapter the learner should be able to:
Define the term audit sampling, evidence and CAATs
Distinguish the various audit sampling techniques and CAATs techniques
Evaluate the benefits of audit sampling
Explain the difference between compliance testing and substantive testing
Describe the rules of evidence and the techniques for gathering evidence.
4.1.0 Sampling
Audit sampling is the testing of less than 100% of the items within a population to
obtain and evaluate evidence about some characteristic of that population, in order to
form a conclusion concerning the population.
21
Multistage samples – sampling on several levels, a user takes samples from
sevaral locations and then takes another sample from the sampled items.
4.2. Methods
Within the two general approaches are two primary methods of sampling:
Attribute sampling - Generally applied in compliance testing situations and deals with
the presence or absence of the attribute and provides conclusions that are expressed in
rates of incidence.
The auditor is attempting to determine the operating effectiveness of a control
procedure in terms of deviations from the prescribed internal control.
22
Variable sampling - Generally applied in substantive testing situations and deals
with population characteristics that vary, such as dollars and weights, and provides
conclusions related to deviations from the norm.
Specify:
23
An IS auditor might develop a substantive test to determine if the tape library
inventory records are stated correctly. To perform this test, the IS auditor might take a
thorough inventory or might use a statistical sample, which will allow the IS auditor to
develop a conclusion regarding the accuracy of the entire inventory.
There is a direct correlation between the level of internal controls and the amount of
substantive testing required. If the results of testing controls (compliance tests) reveal
the presence of adequate internal controls, then the IS auditor is justified in
minimizing the substantive procedures. Conversely, if the testing of control reveals
weaknesses in controls that may raise doubts about the completeness, accuracy or
validity of the accounts, substantive testing can alleviate those doubts.
4.4.1. Confidence
Confidence is also important in determining sample size.
24
The greater the confidence, the larger the sample size.
So if we want to be 95 percent confident that the estimated accounts receivable
balance falls within 10 percent of the true value, we will need a larger sample than if
we only needed to be 80 percent confidence.
4.5. Sampling risk
Sampling risk is the probability that the sample results are not representative of the
entire population and thus the auditor‘s conclusion is different to that which would be
reached if the whole population was examined.
This may result in:
(a) ‗the risk of incorrect rejection‘ (also called Alpha risk) which arises when the
sample indicates a higher level of errors than is actually the case. This situation is
usually resolved by additional audit work being performed. This risk affects audit
efficiency but should not affect the validity of the resulting audit conclusion;
(b)‗the risk of incorrect acceptance’ (also called Beta risk) when material error is not
detected in a population because the sample failed to select sufficient items
containing errors. This risk, which affects audit effectiveness, can be quantified
using statistical sampling techniques. Although it is possible that an unqualified
auditors‘ report could be issued inappropriately, such errors should be detected by
other complementary audit procedures (assuming that the sample size is appropriate to
the level of detection risk).
25
Evidence is any information used by the IS auditor to determine whether the entity or
data being audited follows the established audit criteria or objectives. It may include
the auditor‘s observations, notes taken from interviews, material extracted from
correspondence and internal documentation or the results of audit test procedures.
Some evidence is more reliable than others.
26
The observation of processes is a key audit technique for many types of
reviews. The IS auditor should be unobtrusive while making observations and should
document everything in sufficient detail to be able to present it, if required, as audit
evidence at a later date.
Analyze Test Results To:
Determine specific causes of variances
Identify regional or statewide trends
Assess actual or potential impacts
27
Tests of general controls, for example, testing the set-up or configuration of the
operating system or access procedures to the program libraries or by using code
comparison software to check that the version of the program in use is the version
approved by management ;
Sampling programs to extract data for audit testing
Re performing calculations performed by the entity‘s accounting systems.
4.7.3Advantages
Reduced level of audit risk
• Greater independence from the auditee
• Broader and more consistent audit coverage
• Faster availability of information
• Improved exception identification
• Greater flexibility of run times
28
• Greater opportunity to quantify internal control weaknesses
• Enhanced sampling
• Cost savings over time
Review Questions
i) A number of factors could have a strong influence on the type statistical methods
used and the qualities of results, describe them
ii) Discuss the objectives of audit sampling
iii) Explain the rationale for using CAATs
iv) Why is it necessary to evaluate the reliability of audit evidence?
References for further Reading
29
CHAPTER FIVE: PREPARING AUDIT REPORTS
Learning Objectives
At the end of this lesson, the learner should be able to;
Explain what an audit report is.
Describe the different types of audit reports.
Evaluate the benefits of an audit report.
30
very similar to an unqualified or ―clean opinion‖, but the report states that there
exists a certain exception which is otherwise misstated. The two types of situations
which would cause an auditor to issue this opinion over the Unqualified opinion
are:
5.1.2.1 Single deviation from IS standards – this type of qualification occurs when one or
more areas do not conform with ISA standards (e.g. are misstated), but do not affect
the rest of the report.
5.1.2.2 Limitation of scope - this type of qualification occurs when the auditor could not
audit one or more areas as planned, and therefore it could not be verified, the rest of
the areas were audited and they conform standards. Examples of this include an
auditor not being able to observe and test a company‘s inventory system. If the auditor
audited the rest of the information systems and is reasonably sure that they conform
with standards, then the auditor simply states that the information systems are fairly
represented, with the exception of the inventory system which could not be audited
An Adverse Opinion is issued when the auditor determines that the information
systems of an auditee are materially misstated and, when considered as a whole, do
not conform with ISA.
It is considered the opposite of an unqualified or clean opinion, essentially stating
that the information contained is materially incorrect, unreliable, and inaccurate.
5.1.4 Disclaimer of Opinion report
A Disclaimer of Opinion, commonly referred to simply as a Disclaimer, is issued
when the auditor could not form, and consequently refuses to present, an opinion
on the financial statements. This type of report is issued when the auditor tried to
audit an entity but could not complete the work due to various reasons and does
not issue an opinion.
Although this type of opinion is rarely used, the most common examples where
disclaimers are issued include audits where the auditee willfully hides or refuses to
provide evidence and information to the auditor in significant areas of the audit,
where the auditee is facing significant legal and litigation issues in which the
outcome is uncertain (usually government investigations), and where the auditee
has going concern issues (the auditee may not continue operating in the near future
Review Questions
i) Define an audit report
ii) Discuss the key issues that one must consider when preparing audit reports
iii) Describe benefits of an audit report
31
CHAPTER SIX: INFORMATION TECHNOLOGY AUDIT & FORENSIC
TECHNIQUES
Learning Objectives
6.0 INTRODUCTION
Forensic Computing is the process of identifying, preserving, analyzing, and presenting
digital evidence in a manner that is legally acceptable in a court of law
Our interest is in …
Identifying and preserving evidence,
―post-mortem‖ system analysis to determine extent and nature of attack, and
the forensic framework
32
Auditors often do not look for fraud
Contain damage
Begin documentation
33
Analyze copy of digital files
Identify perpetrator(s)
Maintain chain-of-custody
Investigation: A process that develops and tests hypotheses to answer questions about
events that occurred
Resolve signature
Profile detection
Anomalous detection
Complaints
System monitoring
34
Audit analysis
6.4.2 Preservation
Goal: Preserve the state of as many digital objects as possible and document the crime
scene.
Methods:
Unplug (best)
Do nothing
If possible freeze the system such that the current memory, swap files, and even CPU
registers are saved or documented
Material Relevance, how well it relates to the issue being investigated. The
more material, the more helpful.
35
Evidence Independence, the provider should not have any gain or loss by
providing the evidence.
Authentic
Admissible
Reliable
Believable
Must be complete
36
Auditor may violate rules of evidence
Network state
Running processes
Disk
CD-ROMs, printouts
Approved methods
Approved software
Approved hardware
Legal authority
Lossless compression
Sampling
Data reduction
Recovery techniques
37
6.4.5 Examination
Involves :
Preservation
Traceability
Validation Techniques
Filtering techniques
Pattern matching
6.4.6 Analysis
Involves
Preservation
Traceability
Statistical
Protocols
Data mining
Timeline
6.4.7 Presentation
Involves
Documentation
Expert testimony
Clarification
Recommended countermeasure
Statistical interpretation
38
IT Forensic Techniques are used to capture and analyze electronic data and develop theories.
6.5.1 Approach
A formalized approach
Allows repeatability
Data recovery
Data integrity
Data extraction
Forensic Analysis
Monitoring
39
PsFile - shows files opened remotely
Sampling
Benford Analysis
40
An Example of an End-to-End Investigation
41
6.9 The Role of Policies in forensics
They define the actions you can take
The employee must acknowledge that he or she read them, understands them and will
comply with them
42
6.9.1 Forensic Response Control
Incident Response Planning …
Identify needs and objectives
Identify resources
Train
Monitor
Team response
Freeze scene
Begin documentation
Protect chain-of-custody
Review Questions
i) Define the term forensic computing, evidence, forensic protocol.
ii) Describe the forensic investigative framework.
iii) What are challenges facing forensic investigations.
iv) Explain the role of policy in forensics.
v) Has forensic investigation had a breakthrough in detecting crime?discuss,
43
CHAPTER SEVEN: COBIT
Learning Objectives:
By the end of this chapter the learner should be able to:
Define the term COBIT
Explain the uses of COBIT the various domains, processes and resources used.
Describe the benefits of COBIT
7.0 Introduction
COBIT – Control Objectives for Information and related Technology
COBIT development started in 1994 with first version published in 1996 by ISACA
(Information Systems Audit and Control Association) http://www.isaca.org
Control Objectives
44
The Framework’s Principles
45
7.2 IT Resources
Data : Data objects in their widest sense, i.e., external and internal,
structured and non-structured, graphics, sound, etc.
46
Technology : covers hardware, operating systems, database management
systems, networking, multimedia, etc..
Monitor & Evaluate – regular assessment over time for quality and compliance with
control requirements
47
Domains and processes
A Domain contains the relationships of each individual processes
48
7.4 COBIT Process Descriptions
COBIT does offer detailed descriptions for all 34 processes.
The Process Descriptions:
Provide a basis of expert knowledge from which the enterprise may decide is
relevant to their organization
Value Delivery – executing the value proposition throughout the delivery cycle
49
Risk Management – requires risk awareness by senior corporate officers, compliance
requirements, transparency
50
Business oriented solutions
Process focused
Metrics driven
IT Managers
Ensure that all applicable IT control objectives in the development project have
been addressed
Review Questions
i) Define the term COBIT
ii) Who are the users of COBIT
iii) What are the benefits of using COBIT
iv) Describe the various domains of COBIT
51
52