0% found this document useful (0 votes)
287 views56 pages

Department of Business and Social Studies

This document outlines the course content and objectives for BIT 4108: Project Analysis and Management. The course covers various aspects of project planning, implementation, and evaluation over 10 chapters. Students will learn about project cycles, market analysis, resource planning, financial analysis, and monitoring project performance. The goal is for students to understand how to develop, manage and assess projects upon completion of the course.

Uploaded by

Muriithi Murage
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
287 views56 pages

Department of Business and Social Studies

This document outlines the course content and objectives for BIT 4108: Project Analysis and Management. The course covers various aspects of project planning, implementation, and evaluation over 10 chapters. Students will learn about project cycles, market analysis, resource planning, financial analysis, and monitoring project performance. The goal is for students to understand how to develop, manage and assess projects upon completion of the course.

Uploaded by

Muriithi Murage
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 56

DEPARTMENT OF BUSINESS AND SOCIAL STUDIES

BIT 4108: INFORMATION SYSTEMS AUDIT


BIT 4108: PROJECT ANALYSIS AND MANAGEMENT
Contact hours: 42

Purpose:
Expected Learning Outcomes of the Course:
By the end of the course, students should be able to:-

Course Content:

Course Outline

TABLE OF CONTENTS
Page
COURSE OUTLINE.............................................................................................................i
TABLE OF CONTENTS.....................................................................................................iv
CHAPTER ONE: Introduction………………….................................................................1
1.1 Project………………………………………………………………………………………………1
1.2 Project Plan………………………………………………………………………………………..1
1.3 Project Planning…………………………………………………………………………………..2
1.3.1 National Plans………………………………………………………………………….3
1.3.2 Sectoral Plans…………………………………………………………………………..3
1.4 Project Management……………………………………………………………………………...3
1.5 History of Project Management…………………………………………………………………5
Review Questions………………………………………………………………………………………6
References for further reading……………………………………………………………………….6

CHAPTER TWO: Project Cycle……………………………………………………………7


2.1 The Warren C. Baum (World Bank) Project Cycle…………………………………………...7
2.2.1 The UNIDO Project Cycle: New Industrial Projects……………………………………..11
2.2.2 Rehabilitation and Expansion Projects……………………………………………………..18
Review Questions……………………………………………………………………………………..21
References for further reading……………………………………………………………………...21

CHAPTER THREE: Market and Demand Analysis……………………………………..22


3.1 Situational Analysis and Specification of Objectives……………………………………….22
3.2 Collection of Secondary Information………………………………………………………….23
3.3 Conduct of Market Survey……………………………………………………………………...24
3.4 Characterization of Market…………………………………………………………………….25
3.5 Demand Forecasting……………………………………………………………………………26
3.6 Market planning…………………………………………………………………………………29
Review Questions…………………………………………………………………………………….30
References for further reading……………………………………………………………………..30

CHAPTER FOUR: Raw Materials and Supplies Study………………………………….31


4.1 Classification of Raw Materials and Supplies……………………………………………….33
4.2 Specification of Requirements………………………………………………………………….34

ii
4.3 Availability and Supply………………………………………………………………………….37
4.4 Costs of Raw Materials and Suppliers………………………………………………………...40
Review Questions……………………………………………………………………………………..42
References for further reading……………………………………………………………………...42

CHAPTER FIVE: Location Analysis……………………………………………………..43


5.1 The Natural Environment……………………………………………………………………….44
5.2 Environment Impact Assessment……………………………………………………………….44
5.2.1 Objectives of Environmental Impact Assessment………………………………...46
5.2.3 Phase and Structure of Environmental Impact Assessment……………………46
5.2.4 The Assessment Process……………………………………………………………..47
5.2.5 Methodologies and Tools……………………………………………………………48
5.2.6 The following basic steps should be observed when performing
environmental impact assessment…………………………………………………50
5.2.7 Cost-benefits analysis of environment impacts…………………………………..51
5.2.8 Assessment of environment costs and benefits…………………………………...52
5.2.9 Environment Parameters……………………………………………………………52
5.3 Socio-economic policies………………………………………………………………………..53
5.4 Infrastructural conditions………………………………………………………………………53
5.5 Resources or market orientation………………………………………………………………54
5.6 Assessment of location………………………………………………………………………….54
5.7 Site selection……………………………………………………………………………………..55
5.8 Requirements and relevant factors……………………………………………………………55
Review Questions……………………………………………………………………………………56
References for further reading……………………………………………………………………..56

CHAPTER SIX: Production Program and Plant Capacity……………………………...57


6.1 Production program…………………………………………………………………………….57
6.1.1 Determination of the production program……………………………………..58
6.1.2 Plant capacity………………………………………………………………………58
6.2 Technology and Engineering Study…………………………………………………………...61
6.2.1 Definition of technology……………………………………………………………..61
6.2.2 Selection of Technology……………………………………………………………..62
6.3 Civil Works……………………………………………………………………………………….67
Review Questions…………………………………………………………………………………….67
References for further reading……………………………………………………………………..68

CHAPTER SEVEN: Human Resource and Organization……………………………….69


7.1 Categories and Functions………………………………………………………………………70
7.2 Socio-Economic and Cultural Environment………………………………………………….70
7.3 Project Related Requirements………………………………………………………………….71
7.4 Organizational Set-Up…………………………………………………………………………..72
7.5 Availability and Recruitment…………………………………………………………………...75
Review Questions…………………………………………………………………………………….79
References for further reading……………………………………………………………………..79

iii
CHAPTER EIGHT: Financial and Economic Analysis…………………………………80
8.1 Total investment costs…………………………………………………………………………...80
8.2 Production Costs…………………………………………………………………………………85
8.3 Marketing costs…………………………………………………………………………………..86
8.4 Project cash flows………………………………………………………………………………..87
8.5 Financial Evaluation…………………………………………………………………………….88
8.5.1 Basic assumptions underline cash flow discounting in financial evaluation...88
8.5.2 Methods of Financial Evaluation…………………………………………………..88
8.5.2.1 Net Present Value (NPV) Method……………………………………….88
8.5.2.2 Internal Rate of Return (IRR)……………………………………………89
8.5.2.3 Profitability Index (PI)/present value index (PVI)/benefit-cost
ratio……………………………………………………………………….……….…92
8.5.2.4 Discounted Payback period……………………………….………….….93
Review Questions……………………………………………………………………………….........94
References for further reading………………………………………………………………….…..94

CHAPTER NINE: Project Document……………………………………………………..95


9.1 Preliminary Section of the project document…………………………………………………95
9.2 The Main Body of the Project Document……………………………………………………...95
Review Questions……………………………………………………………………………………100
References for further reading…………………………………………………………………….100

CHAPTER TEN: Project Monitoring and Evaluation………………………………….101


10.1 Performance Indicators……………………………………………………………………...101
10.2 The Logical Framework Approach………………………………………………………...102
10.3 Theory-Based Evaluation…………………………………………………………………...103
10.4 Formal Surveys……………………………………………………………………………….104
10.5 Rapid Appraisal Methods……………………………………………………………………105
10.6 Participatory Methods……………………………………………………………………….106
10.7 Public Expenditure Tracking Surveys……………………………………………………..108
10.8 Cost-Benefit and Cost-Effectiveness Analysis……………………………………………108
10.9 Impact Evaluation……………………………………………………………………………109
Review Questions…………………………………………………………………………………..112
References for further reading…………………………………………………………………...112
Appendix 1: Project Classification Codes........................................................................113
Appendix 2: Sample Test Papers………………………………………………………..117

iv
CHAPTER ONE: INTRODUCTION TO INFORMATION SYSTEMS AUDIT
Learning Objectives

By the end of this chapter the learner should be able to:


Define the term IS Audit
Describe the benefits of IS Audit
Explain the functions and elements of an IS Audit
Describe the Phases of an IT Audit
Classify audits

1.0 What is an IS Audit?


 An IS audit is the process of collecting and evaluating evidence of an org IS, practices
and operations with a view of establishing whether they are inline with organizational
goals.

 The evaluation of obtained evidence determines if the orgs assets and other interests
are actually safeguared.

 In summary IS audits:

-focus on the computer-based aspects of an organization‘s information system.


-assess the proper implementation, operation, and control of computer
resources
―‗…a process that examines how well the organization‘s information needs and deliverables
connect to the organizational mission, goals and objectives.‘ (St. Clair, 1997, quoted in
Henczel, 2001, p. xxii).

1.1 Why IS audit?


 Different from a financial audit where the primary focus is to evaluate whether
financial controls are adhered to.

 The primary goal of IS auditing is to :

 Evaluate a system‘s efficiency and performance.

 Evaluate the orgs ability to protect its information assets; in other words CIA
breaches are catered for.

1.2 Benefits of IS Audit


 Several benefits of IS audit exist, namely validity, diagnostic, feedback,
information and training benefits.

 Validity : The org gets a valid and accurate information on the status of
information as a corporate resource.

1
 Diagnostic : The diagnostic element of an audit allows for strong points and weak
points (or ―gaps‖) to be identified. This information can be used to build on the
strong points and to eliminate the weak ones.

 Feedback: The information audit is used to determine whether specific


information inputs deliver the expected/desired information outcomes.

 The information audit is therefore an instrument of evaluation and provides


information that can be used to plan and implement corrective actions

 Information : A communication audit focuses attention on the process of


communication in an organization and the improvement thereof.

 In the same manner, an information audit can help to focus staff members’
attention on the value and benefits of the use of information as a corporate
resource

 Training: An information audit provides the ideal opportunity to involve staff in


the auditing process and at the same time to teach them more about the
processes, philosophy and structures that support the usage of corporate
information resources.

 By the time the information audit has been completed, these staff members will
have a better understanding and picture of information and its role in the
organization

1.3 Functions of IS/IT Auditor


IT Auditor often is the translator of business risk, as it relates to the use of IT, to management,
someone who can check the technicalities well enough to understand the risk (not necessarily
manage the technology) and make a sound assessment and present risk-oriented advice to
management
 IT auditors review risks relating to IT systems and processes, some of them are:

 Inadequate information security (e.g. missing or out of date antivirus controls,


open computer ports, open systems without password or weak passwords etc.)

 Inefficient use of corporate resources, or poor governance (e.g. huge spending on


unnecessary IT projects like printing resources, storage devices, high power servers
and workstations etc.)

 Ineffective IT strategies, policies and practices (including a lack of policies for use of
Information and Communication Technology (ICT) resources,Internet usage policies,
Security practices etc.)

 IT-related frauds (including phishing, hacking etc)

1.4 Elements of an IT Audit


 Systematic procedures are used

2
 Evidence is obtained

 tests of internal controls

 substantive tests (financial systems)

 Determination of materiality for weaknesses found.

 Prepare audit report & audit opinion

1.6 Types of Audit Tests


 Tests of controls – tests to determine if appropriate internal controls are in place and
functioning effectively

 Systems and applications – An audit used to verify that systems and applications are
appropriate, are efficient, reliable and adequate to meet orgs objectives.

 Systems Development – An audit used to verify that systems under development meet
objectives set out at each phase of development.

 IT Governance – verifies that that IS structure and procedures to ensure an secure


environment (especially segregation of duties )for IS processing

1.6.1 Segregation of Duties


 Transaction authorization is separate from transaction processing.

 Asset custody is separate from record-keeping responsibilities.

 The tasks needed to process the transactions are subdivided so that fraud requires
collusion.

1.6.2 Classification of audits


 Financial audits: assessment of the correctness of an orgs financial statements to
confirm correctness and reliability.

 Operational Audit: evaluates internal control structure in a given process or area e.g.
an application.

 Integrated Audit: combination of financial and operational audit. It also assess overall
objectives of an org relating to financial information and asset protection.

 IS Audit : collects and evaluate evidence to determine whether IS adequately


safeguard assets, maintain data and system integrity and provide relevant and reliable
information to meet org goals.

 Specialized audits : specialized reviews of work performed by third parties, this is due
to increasing dependence on out-sourcing

1.7 Phases of an IT Audit

3
Phases of the Information Systems Audit
1. Establish terms of engagement

2. Preliminary review

3. Establish materiality and assess risks

4. Plan the audit

5. Consider internal controls

6. Perform audit process

7. Issue an audit report

1.7.1 Establish terms of Engagement


 Helps set the scope and objectives

 The engagement letter should address:

Responsibility( scope, independence, deliverables)


Authority (right to access information)
Accountability (auditees‘ rights, completion dates and reporting lines
1.7.2 Preliminary Review
 Initial review and evaluation of the area to be audited, and the audit plan preparation

 Get the orgs strategy and business model and the extend to which IS are beneficial.

 Identify financial application areas

 Prepare an audit plan

4
 Representative decisions include the following:

Will the entire organization be audited, or just certain representative or critical


groups? Will it include all offices, or just certain locations?
Will it cover all the information assets in the organization, or focus on
particular types of information, such as online resources or archives?
1.7.3 Risk assessment
 Assess the orgs business risks(threats to the orgs ability to achieve its objectives)

 An orgs risk exposure may change as a result of various changes including adoption of
new technologies.

 Analyze the mitigative measures in place to the risks identified.

1.7.4 Planning the audit


 The planning stage may well be the most important. During this stage, objectives are
established. It is critical to know what is to be accomplished with the audit, to
understand the organization, and to identify all the stakeholders.

 In addition, the planning stage identifies required resources. These include human,
financial, technical, and physical. It is necessary to decide if the audit will be
conducted using company personnel or will be outsourced. The decisions in this phase
of the planning stage are interrelated in that, for example, outsourcing requires greater
financial outlay but fewer physical resources.

1.7.5 Consider internal controls


 Auditors perform tests of controls to determine that the control policies, practices, and
procedures established by management are functioning as planned. This is known as
compliance testing.

 The auditor should consider information from previous audits

 An understand of internal controls helps the auditor assess the level of risk exposure.

1.7.6 Perform the audit


 Audit procedures are developed based on the auditors understanding of the
organization and its environment.

 Several procedures and frameworks can be used.

1.7.7 Issue an audit report


 Once audit procedures have been performed and results evaluated, the auditor will
issue an audit report based on the findings.

 The report will help management decide on the way forward with regard to the set
objectives.

5
Review Questions
i) Define a the following terms:
a) IS Audit
b) An IS auditor
c) Segregation of duties
d) IS audit planning
ii) Describe the different phases of an IS audit.
iii) Distinguish between an IS auditor and an IT auditor.

References for further reading


i) ,

6
CHAPTER TWO: Audit Planning
Learning Objectives
By the end of this chapter the learner should be able to:
Define the terms materiality and internal controls.
Explain why audit planning is important.
Describe the tasks involved in audit planning
Evaluate the different audit planning steps.
Discuss the different categories of control.

2.0 Audit Planning –Why?


 An auditor should plan his work to enable him to conduct an effective audit in
efficient and timely manner.

 Audit planning is required because it facilitates the following:

i. Ensure that appropriate attention is devoted to all important areas of audit.

ii. Ensures that potential problems are properly identified

iii. Ensure that work is completed expeditiously

2.1.Factors to be considered for audit planning


1. Complexity of audit.

2. Environment in which the organization operates.

3. Knowledge of area of business.

4. Discussion with top management.

2.2 Tasks
 There are five (5) tasks within the IS audit planning:
 Develop and implement a risk-based IS audit strategy for the organization in
compliance with IS audit standards, guidelines and best practices.
 Plan specific audits to ensure that IT and business systems are protected and
controlled.
 Plan how to conduct audits in accordance with IS audit standards, guidelines
and best practices to meet planned audit objectives.
 How to communicate emerging issues, potential risks and audit results to key
stakeholders.
Advise on the implementation of risk management and control practices within the
organization while maintaining independence

2.2.1 The TEN knowledge statements


1. Knowledge of IS Auditing Standards, Guidelines and Procedures and
Code of Professional Ethics

7
2. Knowledge of IS auditing practices and techniques

3. Knowledge of techniques to gather information and preserve evidence

4. Knowledge of the evidence life cycle

5. Knowledge of control objectives and controls related to IS

6. Knowledge of risk assessment in an audit context

7. Knowledge of audit planning and management techniques

8. Knowledge of reporting and communication techniques

9. Knowledge of control self-assessment (CSA)

10. Knowledge of continuous audit techniques

2.3.0 Audit Planning Steps


1. Gain an understanding of the business‘s mission, objectives, purpose and processes.

2. Identify stated contents (policies, standards, guidelines, procedures, and organization


structure)

3. Evaluate risk assessment and privacy impact analysis

4. Perform a risk analysis.

5. Conduct an internal control review.

6. Set the audit scope and audit objectives.

7. Develop the audit approach or audit strategy.

8. Assign personnel resources to audit and address engagement logistics.

2.3.1 ISACA IS Auditing Standards and Guidelines


 The framework for the ISACA IS Auditing Standards provides for multiple
levels, as follows:

 • Standards define mandatory requirements for IS auditing and reporting.

 • Guidelines provide guidance in applying IS Auditing Standards. The IS


auditor should consider them in determining how to achieve implementation of
the above standards, use professional judgment in their application and be
prepared to justify any departure.

 • Procedures provide examples of procedures an IS auditor might follow in an


audit engagement. The procedure documents provide information on how to

8
meet the standards when completing information systems auditing work, but
do not set requirements.

2.3.2 Materiality
 An auditing concept regarding the importance of an item of information with regard to
its impact or effect on the functioning of the entity being audited.

 Materiality is judged in terms of its inherent nature, impact (influence) value, use
value, and the circumstances (context) in which it occurs. Opposite of triviality.

 In assessing materiality, the IT auditor should consider:

 The aggregate level of error acceptable to management, the IT auditor, and appropriate
regulatory agencies.

 The potential for the cumulative effect of small errors or weaknesses to become
material.

 While establishing materiality, the auditor may audit non-financial items such as
physical access controls, logical access controls, and systems for personnel
management, manufacturing control, design, quality control, and password generation.

 While planning the audit work to meet the audit objectives, the auditor should identify
relevant control objectives and determine, based on materiality, which controls should
be examined. Internal control objectives are placed by management and identifies
what the management strives to achieve through their internal controls.

 Where financial transactions are not processed, the following identifies some measures
the auditor should consider when assessing materiality:

2.3.2.1 Measures
 Criticality of the business processes supported by the system or operation.

 Cost of the system or operation (hardware, software, third-party services)

 Potential cost of errors.

 Number of accesses/transactions/inquiries processed per period.

 Penalties for failure to comply with legal and contractual requirements.

2.4. Evaluation of Internal Controls


 Policies, procedures, practices and organizational structures implemented to reduce
risks are referred to as internal controls.

 Internal controls are developed to provide reasonable assurance that an organization‘s


business objectives will be achieved and undesired risk events will be prevented, or
detected and corrected, based on either compliance or management-initiated concerns.

9
The auditor evaluates the organization‘s control structure by understanding the organization‘s
five interrelated control components

2.5. Control components


 Control Environment Provides the foundation for the other components.
Encompasses such factors as management‘s philosophy and operating style.

 The board of directors and senior management are responsible for establishing the
appropriate culture to facilitate an effective and efficient internal control system and
for continuously monitoring its effectiveness though each individual within an
organization must take part in this process.

 Risk Assessment Consists of risk identification and analysis.

 Control Activities Consists of the policies and procedures that ensure employees
carry out management‘s directions. Types of control activities an organization must
implement are preventative controls (controls intended to stop an error from
occurring), detective controls (controls intended to detect if an error has occurred), and
mitigating controls (control activities that can mitigate the risks associated with a key
control not operating effectively).

 Information and Communication Ensures the organization obtains pertinent


information, and then communicates it throughout the organization.

 Monitoring Reviewing the output generated by control activities and conducting


special evaluations.

2.5.1 Internal Control Objectives


 Safeguarding of information technology assets

 Compliance to corporate policies or legal requirements

 Authorization of input

 Accuracy and completeness of processing of transactions

 Output authorization

 Reliability of processes

 Backup/recovery

 Efficiency and economy of operations

Two Things
 There are two key aspects that a control needs to address, what you want to achieve
(objectives) and what you want to avoid (risk). Not only do internal controls address

10
business/operational objectives, but need to address undesired events through
preventing, detecting, and correcting undesired events.

2.5.2 Categories
 Controls are generally categorized into 3 major classifications:

 Preventive: These controls are to deter problems before they arise.

 Detective: Controls that detect and report the occurrence of an error, omission
or malicious act..

 Corrective: These controls minimize the impact of a threat, remedy problems


discovered by detective controls, identify the cause of a problem.

2.5.3. IS Control Objectives


Control objectives in an information systems environment remain unchanged from
those of a manual environment. However, control features may be different. The
internal control objectives, thus need, to be addressed in a manner specific to IS-
related processes.
 Safeguarding assets

• Assuring the integrity of general operating system environments

• Assuring the integrity of sensitive and critical application system environments


through:

– Authorization of the input


– Accuracy and completeness of processing of transactions
– Reliability of overall information processing activities
– Accuracy, completeness and security of the output
– Database integrity
• Ensuring the efficiency and effectiveness of operations

• Complying with requirements, policies and procedures, and applicable laws

• Developing business continuity and disaster recovery plans

• Developing an incident response plan

2.6.0 Types of controls


 Information system controls are broadly classified into two broad categories:

 General Controls

 Application controls

 General controls include controls over data centre operations, system software
acquisition and maintenance, access security, and application system development and
maintenance.

11
2.6.1 General controls
 They create the environment in which the application systems and application controls
operate. Examples:

 IT policies, standards, and guidelines pertaining to IT security and information


protection, application software development and change controls, segregation
of duties, service continuity planning, IT project management, etc.

2.6.1.1 Factors to consider


 The following points should be covered while reviewing these controls:

(i) Obtain a list of hardware including, computer, ancillary and terminal


equipment in use indicating model, performance details and check the existence of this
equipment.
(ii) Obtain an organizational chart which is up-to-date and see how the
computer fits into the overall Organization;
(iii) Obtain an up-to-date staff organization chart of the computer department showing
the relative responsibilities and authorities and note any changes on review;
(iv) Obtain job specification (role definition) for senior computer staff and supervisors
of the ancillary section and note any changes;
(v) Obtain the details of standards and norms fixed for each of the functions like data
control, data preparation, system operation and verify their implementation.
(vi) Whether manuals are maintained and kept up-to-date specifying the control
procedures and whether they are enforced in practice through a 'test check'

2.6.2 Application controls


 Application controls pertain to specific computer applications. They include controls
that help to:

 Ensure the proper authorization, completeness, accuracy, and validity of


transactions, maintenance, and other types of data input. Examples include
system edit checks of the format of entered data to help prevent possible
invalid input, system enforced transaction controls that prevent users from
performing transactions that are not part of their normal duties.

 Before getting on to evaluation of application controls, it will be necessary for an


auditor to secure a reasonable understanding of the system. For this purpose, a brief
description of the application should be prepared;

(i) Indicating the major transactions,


(ii) Describing the transaction flow and main output,
(iii) Indicating the major files maintained and
(iv) Providing approximate figures for transaction volumes.
 Application Control requirements may be divided into:

(i) Documentation standards


(ii) Input control
(iii) Processing control

12
(iv) Output control
(v) Master/Standing Data File control
(vi) Audit requirements

2.6.2.1 Factors to consider


 Audit of an application system which is operational involves verification of
input/output controls, processing controls and audit trail. Evidence may be obtained on
the following points in the course of audit to come to a reasonable conclusion
regarding existence of controls and their adequacy:

i) Whether the data processed are genuine, complete, accurate and not provisional?

(ii) Whether expected output is produced and distributed on time?


(iii) Whether application programs process the data as intended and accurately?
(iv) Whether a complete audit trail is available for tracing back a transaction from the final
result to the initial input?
(v) Whether the data and changes to it are authorized by appropriate authority both in the
user and computer departments?

2.6.3 Audit trail


 Objective of audit trail is to obtain sufficient evidence matter regarding the reliability
and integrity of the application system. To achieve this, the audit trail should contain
enough information to allow management, the auditor and the user:

(i) To recreate processing action;


(ii) To verify summary totals and
(iii) To trace the sources of intentional and unintentional errors.
 The audit trail should include the following information:

 System information including start up time, stop time, restarts, recovery etc.

 Transaction information including input items which change the database,


control totals and rejected items (relevant to database applications).

 Communication information including terminal log-on/off, password use,


security violation, network changes and transmission statistics (relevant to
transaction processing i.e. TP applications).

Review Questions
i) How does the IS Audit planning objectives differ from IS audit control
objectives?
ii) State the objectives of IS audit planning

13
iii) Discuss how IS audit controls can be achieved.
iv) Describe the stages of the IS audit planning?

References further reading

14
CHAPTER THREE: Risk Assessment
Learning Objectives
By the end of this chapter the learner should be able to:
Define the term risk, threat and threat source.
Describe the different types of risk and their relationships.
Explain why risk management is important
Assess the impact of risk.

3.0 Risk
 Risk is the potential harm that may arise from some current process or from some
future event.

 From the IT security perspective, risk management is the process of understanding and
responding to factors that may lead to a failure in the confidentiality, integrity or
availability of an information system.

3.1.1Risk is a function of the likelihood of a given threat-source’s exercising a particular


potential vulnerability, and the resulting impact of that adverse event on the organization.

3.1.2Threat: The potential for a threat source to exercise (accidentally trigger or


intentionally exploit) a specific vulnerability.

3.1.3 Threat-Source: Either (1) intent and method targeted at the intentional exploitation of
a vulnerability or (2) a situation and method that may accidentally trigger a
vulnerability.

3.1.4 Vulnerability: A flaw or weakness in system security procedures, design,


implementation, or internal controls that could be exercised (accidentally triggered or
intentionally exploited) and result in a security breach or a violation of the system‘s security
policy.

3.1.5 Threat vs threat sources


The threat is merely the potential for the exercise of a particular vulnerability. Threats in
themselves are not actions. Threats must be coupled with threat-sources to become dangerous

3.2How Is Risk Assessed?


 Risk is assessed by identifying threats and vulnerabilities, then determining the
likelihood and impact for each risk.

 Threats should include the threat-source to ensure accurate assessment.

 Some common threat-sources include:

• Natural Threats—floods, earthquakes, hurricanes

15
• Human Threats—threats caused by human beings, including both
unintentional (inadvertent data entry) and deliberate actions (network based attacks,
virus infection, unauthorized access)
• Environmental Threats—power failure, pollution, chemicals, water damage
3.2.1 Identifying Vulnerabilities
 Vulnerabilities can be identified by numerous means. Different risk management
schemes offer different methodologies for identifying vulnerabilities. In general, start
with commonly available vulnerability lists or control areas.

 Then, working with the system owners or other individuals with knowledge of the
system or organization, start to identify the vulnerabilities that apply to the system.

3.2.2 Tools
 While the following tools and techniques are typically used to evaluate the
effectiveness of controls, they can also be used to identify vulnerabilities:

 Vulnerability Scanners – Software that can examine an operating system, network


application or code for known flaws by comparing the system (or system responses to
known stimuli) to a database of flaw signatures.

 Penetration Testing – An attempt by human security analysts to exercise threats


against the system. This includes operational vulnerabilities, such as social
engineering

 Audit of Operational and Management Controls – A thorough review of


operational and management controls by comparing the current documentation to best
practices (such as ISO stnds) and by comparing actual practices against current
documented processes.

3.2.2.1 Relating Threats to Vulnerabilities


 One of the more difficult activities in the risk management process is to relate a threat
to a vulnerability. Nonetheless, establishing these relationships is a mandatory activity,
since risk is defined as the exercise of a threat against a vulnerability. This is often
called threat-vulnerability (T-V) pairing.

3.3 Defining Likelihood


 Determining likelihood is fairly straightforward. It is the probability that a threat
caused by a threat-source will occur against a vulnerability. In order to ensure that risk
assessments are consistent, it is an excellent idea to utilize a standard definition of
likelihood on all risk assessments.

3.3.1Sample Likelihood Definitions


Low 0-25% chance of successful exercise of threat during a one-year period.
Moderate 26-75% chance of successful exercise of threat during a one-year period.
High 76-100% chance of successful exercise of threat during a one-year period.
3.3.2 Defining Impact

16
 Impact is best defined in terms of impact upon availability,impact upon integrity and
impact upon confidentiality.

 Impact can be:

 Low.

 Moderate.

 Severe.

3.3.2.1 Issues to consider in the risk assessment process


 Identifying mission-critical information systems:

 For example, systems that are part of an Intranet/extranet and may have
external access to the Internet.

 This process also involves a through review of the organisation‘s security


programs such as firewalls.

 The system architecture with the topological layout plus a list of all nodes,
hardware and software.

3.4 Managing risk


 There are four basic strategies for managing risk: mitigation, transference, acceptance

and avoidance.
3.4.1 Mitigation

 Mitigation is the most commonly considered risk management strategy. Mitigation


involves

 fixing the flaw or providing some type of compensatory control to reduce the
likelihood or impact associated with the flaw.

 A common mitigation for a technical security flaw is to install a patch provided


by the vendor. Sometimes the process of determining mitigation strategies is
called control analysis.

3.4.2 Transference
Transference is the process of allowing another party to accept the risk on your behalf.
Risk is transferred from the individual to a pool of insurance holders, including the
insurance company.
Note that this does not decrease the likelihood or fix any flaws, but it does reduce the
overall impact (primarily financial) on the organization.

3.4.3 Acceptance

17
Acceptance is the practice of simply allowing the system to operate with a known risk.
Many low risks are simply accepted. Risks that have an extremely high cost to
mitigate are also often accepted.
Often risks are accepted that should not have been accepted, and then when the
penetration occurs, the IT security personnel are held responsible. Typically, business
managers, not IT security personnel, are the ones authorized to accept risk on behalf of
an organization.
3.4.4 Avoidance
Avoidance is the practice of removing the vulnerable aspect of the system or even the
system itself.
For instance, during a risk assessment, a website was uncovered that let vendors view
their invoices, using a vendor ID embedded in the HTML file name as the
identification and no authentication or authorization per vendor. When notified about
the web pages and the risk to the organization, management decided to remove the
web pages and provide vendor invoices via another mechanism. In this case, the risk
was avoided by removing the vulnerable web pages.

3.5 Audit Risk


 Audit risk can be defined as the risk that the information/financial report may contain
material error that may go undetected during the course of the audit.
 The risk that the auditor will incorrectly issue an unqualified opinion
 Several types of audit risks:
 Inherent risk
 Control risk
 Detection risk
 Overall audit risk

3.5.1 Inherent risk


 The risk that an error exists that could be material or significant when combined with
other errors encountered during the audit, assuming that there are no related
compensating controls.
 Inherent risk can also be categorized as the susceptibility to a material misstatement in
the absence of related controls. For example, complex calculations are more likely to
be misstated than simple ones and cash is more likely to be stolen than an inventory of
coal. Inherent risks exist independent of an audit and can occur because of the nature
of the business.
 Inherent risk is:
 Higher in complex transactions
 Higher where items are more naturally prone to fraud
 Based in part on prior experience
 Industry and management pressures
 Inherent risk cannot be changed by the auditor – it just is

3.5.2 Control risk

18
 The risk that a material error exists that will not be prevented or detected in a timely
manner by the internal controls system.OR
 The risk that internal controls will fail to prevent or detect material misstatement
 For example, the control risk associated with manual reviews of computer logs can be
high because activities requiring investigation are often easily missed, owing to the
volume of logged information. The control risk associated with computerized data
validation procedures is ordinarily low if the processes are consistently applied.
 Depends on the design and execution of controls:
 Audit Risk = risk that internal controls will FAIL to prevent or detect misstatement
 High CR means high risk controls will fail
 Low CR means low risk controls will fail
 If CR is high, auditor will not rely much on controls
 If CR is low, auditor can rely on ICS and reduce other types of testing

3.5.3 Detection risk


 The risk that an IS auditor uses an inadequate test procedure and concludes that
material errors do not exist when, in fact, they do. Failure of audit tests.
 Detection of an error would not be determined during the risk assessment phase of an
audit. However, identifying detection risk would better evaluate and assess the
auditor‘s ability to test, identify and recommend the correction of material errors as
the result of a test.
 Detection risk is:
 A function of the types of tests the auditor does.
 Depends on nature, timing, and extent of audit.
 This is the only risk element that can be controlled by the auditor

3.5.4 Overall audit risk


 The combination of the individual categories of audit risks assessed for each specific
control objective.
 An objective in formulating the audit approach is to limit the audit risk in the area
under scrutiny so the overall audit risk is at a sufficiently low level at the completion
of the examination. Another objective is to assess and control those risks to achieve
the desired level of assurance as efficiently as possible.

3.5.4.1 Interrelationship of Risks


 IF IR and CR are high, then DR should be low (lots of testing)
 If IR is high and CR is low then DR can be higher, because controls offset high IR
 If IR is low and CR is low then DR can be high
 If IR is low but CR is high then Somewhat indicative of fraud. DR should be very low

3.5.4.2 Keep Things Open


 Control risk assessment must be backed up by control testing results.
 If tests show weaker controls, CR is higher, thus DR needs to be lower.

19
3.6 Designing materiality
 Materiality as "the magnitude of an omission or misstatement of information that, in
the light of surrounding circumstances, makes it probable that the judgment of a
reasonable person relying on the information would have been changed or influenced
by the omission or misstatement."
 There is an inverse relationship between materiality and the level of audit risk, that is
the higher the materiality level, the lower the audit risk and vice versa. Auditors take
into account the inverse relationship between materiality and audit risk when
determining the nature, timing and extent of audit procedures.

3.6.1 How it is determined


 In an audit of an information system, the auditor's judgment as to matters that are
material to users of this system is based on consideration of the needs of users as a
group.
 The evaluation of whether a misstatement could influence decisions of users, and
therefore be material, involves consideration of the characteristics of those users.
Users are assumed to:

3.6.2 User characteristics


 Have an appropriate knowledge of IS and activities.
 Recognize the uncertainties inherent in the measurement of amounts based on the use
of estimates, judgment, and the consideration of future events.
 Make appropriate economic decisions on the basis of the information given by an
expert.

Review Questions
Define the following terms, risk, materiality, vulnerability, threat source
Describe some of the factors to consider when determining materiality.
Explain any FOUR methods of managing risk in IS audit.
Why is risk management important to an organization.

References for further Reading

20
CHAPTER FOUR: Performing the Audit
Learning Objectives
By the end of this chapter the learner should be able to:
Define the term audit sampling, evidence and CAATs
Distinguish the various audit sampling techniques and CAATs techniques
Evaluate the benefits of audit sampling
Explain the difference between compliance testing and substantive testing
Describe the rules of evidence and the techniques for gathering evidence.

4.1.0 Sampling
 Audit sampling is the testing of less than 100% of the items within a population to
obtain and evaluate evidence about some characteristic of that population, in order to
form a conclusion concerning the population.

4.1.1 Statistics as an Audit Tool


 Auditors use inferential statistics to draw conclusions about populations based on
samples of data.
 Why do auditors use samples—usually too costly and time-consuming to examine
entire ―universe‖

4.1.2. Requirements of Audit Sampling Plans


 When planning the sample consider:
 The relationship of the sample to the relevant audit objective.
 Materiality or the maximum tolerable misstatement or deviation rate.
 Allowable sampling risk.
 Characteristics of the population.
 Select sample items in such a manner that they can be expected to be representative of
the population
 Sample results should be projected to the population
 Items that cannot be audited should be treated as misstatements or deviations in
evaluating the sample results.
 Nature and cause of misstatements or deviations should be evaluated

4.1.3. Sampling Techniques


 Sampling techniques include:
 Non –statistical (Judgment) sampling: subjective selection of sample size and
items (target high-risk transactions)
 Statistical sampling techniques:
 Random sampling: each item has equal probability
 Cluster sampling: randomly selected clusters. Items in the cluster are
smpled.
 Systematic sampling: random start and then take every nth item

21
 Multistage samples – sampling on several levels, a user takes samples from
sevaral locations and then takes another sample from the sampled items.

4.1.3.1 Statistical vs Non-statistical


 Statistical sampling involves the use of techniques from which mathematically
constructed conclusions regarding the population can be drawn.
 Non-statistical sampling is not statistically based, and results should not be
extrapolated over the population as the sample is unlikely to be representative of the
population.
 The difference between statistical and non-statistical sampling is that statistical
sampling allows the user to measure the sampling risk associated with the
procedure. Statistical sampling applies the laws of probability to determine the
percent likelihood that the sample does not accurately reflect the population.
 In essence, the laws of probability say that large, relatively homogeneous populations
have similar distributions and other features so that if a random sample is taken, it will
consistently reflect the population within certain limits. In order for the sample to be a
―statistical" sample, the results must be evaluated and calculations made that tell the
user how likely it is that the sample results are within a given range of the actual
population.
 A properly designed non-statistical sample can provide results that are accurate and
effective, but will not measure the sampling risk.
 Generally, the decision to apply a statistical or non-statistical sampling application to a
particular audit test is a matter of cost effectiveness. Statistical applications usually
require more training for auditors and more time to apply.

4.2. Methods
 Within the two general approaches are two primary methods of sampling:
 Attribute sampling - Generally applied in compliance testing situations and deals with
the presence or absence of the attribute and provides conclusions that are expressed in
rates of incidence.
 The auditor is attempting to determine the operating effectiveness of a control
procedure in terms of deviations from the prescribed internal control.

4.2.1 Discovery Sampling


 A modified case of attributes sampling
 Purpose is to detect at least one deviation (i.e. critical deviations)
 Useful in fraud detection
 Auditor risk and deviation assessments:
 Risk of assessing control risk too low (i.e. 5%)
 Tolerable rate (normally set very low, i.e. < 2%)
 Expected deviation rate is generally set at 0

4.2.2 Variable sampling

22
 Variable sampling - Generally applied in substantive testing situations and deals
with population characteristics that vary, such as dollars and weights, and provides
conclusions related to deviations from the norm.

4.3 Planning the tests


 Determine the objective of the test

 Define the attributes and deviation conditions

 Define the population to be sampled

 Specify:

 The risk of assessing control risk too low

 The tolerable deviation rate

 The estimated population deviation rate

 Determine the sample size

 Select the sample

 Test the sample items

 Evaluate the sample results

 Document the sampling procedure

4.3. Types of tests


 There is a difference between choosing a sample for the purpose of testing an
organization‘s compliance with control procedures and choosing a sample to evaluate
the integrity of individual transactions, data or other information. The former
procedures are called compliance tests and the latter are called substantive tests.

4.3.1 Compliance Testing


Auditors perform tests of controls to determine that the control policies, practices, and
procedures established by management are functioning as planned.
 For example, if the IS auditor is concerned about whether program library controls are
working properly, the IS auditor might select a sample of programs to determine if the
source and object versions are the same. The broad objective of any compliance test is
to provide IS auditors with reasonable assurance that the particular control on
which the IS auditor plans to rely is operating as the IS auditor perceived in the
preliminary evaluation.

4.3.2. Substantive Testing


Substantive testing is the direct verification of a process, whether it generates required
results. Examples would include reconciling a bank account and confirming accounts
receivable.

23
 An IS auditor might develop a substantive test to determine if the tape library
inventory records are stated correctly. To perform this test, the IS auditor might take a
thorough inventory or might use a statistical sample, which will allow the IS auditor to
develop a conclusion regarding the accuracy of the entire inventory.
 There is a direct correlation between the level of internal controls and the amount of
substantive testing required. If the results of testing controls (compliance tests) reveal
the presence of adequate internal controls, then the IS auditor is justified in
minimizing the substantive procedures. Conversely, if the testing of control reveals
weaknesses in controls that may raise doubts about the completeness, accuracy or
validity of the accounts, substantive testing can alleviate those doubts.

4.3.2.1Select Test Methods


Three methods for testing controls to determine if they are working :
1. DOCUMENT ANALYSIS – Review records, forms, or other documents
2. OBSERVATION – Watch the control being performed in practice
3. INTERVIEW – Elicit information from those performing that control

4.3.2.2 Areas to audit


 An IS auditor can audit several areas where controls apply, of course guided by
materiality of the chosen sample:
 Around the computer
 Through the computer
 With the computer
Auditing Around the Computer
The auditor ignores computer processing. Instead, the auditor selects source
documents that have been input into the system and summarizes them manually to see
if they match the output of computer processing.
Auditing With The Computer
The utilization of the computer by an auditor to perform some audit work that would
otherwise have to be done manually
Auditing Through the Computer
The process of reviewing and evaluating the internal controls in an electronic data
processing system e.g. using an internal measuring instrument

4.4. Materiality and Precision


 Materiality and precision are related concepts that also affect sample size.
 Materiality—a 10 percent misstatement in the accounts receivable balance is probably
material; but a 10 percent misstatement in the office supplies account balance might
not be.
 If testing accounts receivable balances, we‘ll need to look at a larger sample if we
want to have an estimate that falls within 10 percent, than if our desired precision was
only 20 percent.

4.4.1. Confidence
 Confidence is also important in determining sample size.

24
 The greater the confidence, the larger the sample size.
 So if we want to be 95 percent confident that the estimated accounts receivable
balance falls within 10 percent of the true value, we will need a larger sample than if
we only needed to be 80 percent confidence.
4.5. Sampling risk
 Sampling risk is the probability that the sample results are not representative of the
entire population and thus the auditor‘s conclusion is different to that which would be
reached if the whole population was examined.
 This may result in:
(a) ‗the risk of incorrect rejection‘ (also called Alpha risk) which arises when the
sample indicates a higher level of errors than is actually the case. This situation is
usually resolved by additional audit work being performed. This risk affects audit
efficiency but should not affect the validity of the resulting audit conclusion;
(b)‗the risk of incorrect acceptance’ (also called Beta risk) when material error is not
detected in a population because the sample failed to select sufficient items
containing errors. This risk, which affects audit effectiveness, can be quantified
using statistical sampling techniques. Although it is possible that an unqualified
auditors‘ report could be issued inappropriately, such errors should be detected by
other complementary audit procedures (assuming that the sample size is appropriate to
the level of detection risk).

 Sampling risk is frequently expressed as a %. For example, 5% means that there is a 1


in 20 chance of material error going undetected (this is the risk accepted by many
audit firms for any specific audit tests). Risk can also be expressed in terms of
confidence levels (assurance required) and reliability factors.
4.6. Evidence

25
 Evidence is any information used by the IS auditor to determine whether the entity or
data being audited follows the established audit criteria or objectives. It may include
the auditor‘s observations, notes taken from interviews, material extracted from
correspondence and internal documentation or the results of audit test procedures.
Some evidence is more reliable than others.

4.6.1. Rules of evidence


 Determinants for evaluating the reliability of audit evidence include:
 Independence of the provider of the evidence: Evidence obtained from outside
sources is more reliable than from within the organization. This is why confirmation
letters are used for verification of accounts receivable balances.
 Qualification of the individual providing the information or evidence: Whether the
providers of information or evidence are inside or outside of the organization, the IS
auditor should always consider the qualifications of the persons providing the
information.
 Objectivity of the evidence: Objective evidence is more reliable than evidence that
requires considerable judgment or interpretation. An IS auditor‘s count of a cash fund
is direct, objective evidence, but his analysis of the efficiency of an application, based
upon discussions with certain personnel, may not be objective audit evidence.
 Timing of evidence—The IS auditor should consider the time during which
information exists or is available in determining the nature, timing and extent of
substantive testing and, if applicable, compliance testing. For example, audit evidence
processed by electronic data interchange (EDI), document image processing (DIP) and
dynamic systems such as spreadsheets may not be retrievable after a specified period
of time if changes to the files are not controlled or the files are not backed up

4.6.2. Techniques for evidence gathering


 Review information systems organization structures :The IS auditor should
understand general organizational controls and be able to evaluate these controls in the
organization under audit.
 Review IS policies and procedures
The IS auditor should review whether appropriate policies and procedures are
in place, determine whether personnel understand the implemented policies and
procedures, and ensure that they are being followed.
 Reviewing information systems standards
The IS auditor should understand the existing standards in place within the
organization.
 Review information systems documentation
A first step in reviewing the documentation for an information system is to
understand the existing documentation in place within the organization. The IS auditor
should look for a minimum level of information systems documentation.
 Interviewing appropriate personnel
The purpose of such interviews is to gather audit evidence. Personnel
interviews are discovery in nature and should never be accusatory.
 Observing processes and employee performance

26
The observation of processes is a key audit technique for many types of
reviews. The IS auditor should be unobtrusive while making observations and should
document everything in sufficient detail to be able to present it, if required, as audit
evidence at a later date.
Analyze Test Results To:
Determine specific causes of variances
Identify regional or statewide trends
Assess actual or potential impacts

4.6.3Areas with Weak Controls


Weak controls may not show up immediately but certain signs point to this deficiency:
 Inability to meet management‘s deadlines for supplying information
 Incorrect or unclear information
 Unusually high employee turnover
 Crowded, poorly organized files, requiring extra effort to locate material
 Poor employee morale

4.7. Computer Assisted Audit Techniques (CAATs)


 CAATs are computer programs and data that the auditor uses as part of the audit
procedures to process data of audit significance, contained in an entity‘s information
systems
CAATs may be used in performing various auditing procedures, including the
following:
 Tests of details of transactions and balances, for example, the use of audit software for
recalculating interest or the extraction of invoices over a certain value from computer
records
 Analytical procedures, for example, identifying inconsistencies or significant
fluctuations

27
 Tests of general controls, for example, testing the set-up or configuration of the
operating system or access procedures to the program libraries or by using code
comparison software to check that the version of the program in use is the version
approved by management ;
 Sampling programs to extract data for audit testing
 Re performing calculations performed by the entity‘s accounting systems.

4.7.1 Types of CAAT SW


 Generalized audit software (ACL, IDEA, etc.) - provides an independent
means to gain access to data for analysis. The effective and efficient use of the
software requires and understanding of its capabilities and limitations.
Generalized audit software (GAS) refers to standard software that has the
capability to directly read and access data from various database platforms, flat
file systems and ASCII formats. IS auditors can directly access the data stored
in a computer and perform various types of mathematical computations and
statistical analysis.
 Utility software - is a subset of software, such as database management
systems report generators, that provide evidence to the auditors about system
control effectiveness.
 Test data - involve the auditors using a sample set of data to assess whether
logic errors exist in a program and whether the program meets its objectives.
 Application software for continuous online audits - review of an application
system will provide information about internal controls built in the system.
 Audit expert systems - give direction and valuable information to all levels of
auditors while carrying out the audit because the query-based system is built
on the knowledge base of the senior auditors or managers.

4.7.2 Need for CAATs


 The audit findings and conclusions are to be supported by appropriate analysis and
interpretation of the evidence. Today‘s information processing environments pose a
stiff challenge to the IS auditor to collect sufficient, relevant and useful evidence since
the evidence exists on magnetic media and can only be examined using CAATs.
 With systems having different hardware and software environments, different data
structure, record formats, processing functions, etc., it is almost impossible for the IS
auditors to collect evidence without a software tool to collect and analyze the records.

4.7.3Advantages
 Reduced level of audit risk
 • Greater independence from the auditee
 • Broader and more consistent audit coverage
 • Faster availability of information
 • Improved exception identification
 • Greater flexibility of run times

28
 • Greater opportunity to quantify internal control weaknesses
 • Enhanced sampling
 • Cost savings over time

Review Questions
i) A number of factors could have a strong influence on the type statistical methods
used and the qualities of results, describe them
ii) Discuss the objectives of audit sampling
iii) Explain the rationale for using CAATs
iv) Why is it necessary to evaluate the reliability of audit evidence?
References for further Reading

29
CHAPTER FIVE: PREPARING AUDIT REPORTS
Learning Objectives
At the end of this lesson, the learner should be able to;
Explain what an audit report is.
Describe the different types of audit reports.
Evaluate the benefits of an audit report.

5.0Preparing Audit Reports


Introduction
 The Auditor's report is a formal opinion, or issued by an auditor as a result of an audit
or evaluation performed on a company.
 The report is subsequently provided to a ―user‖ (such as an individual, a group of
persons, a company etc) as an assurance service in order for the user to make decisions
based on the results of the audit.
 Upon the performance of the audit test, the Information Systems Auditor is required to
produce and appropriate report communicating the results of the IS Audit. An IS Audit
report should:
 Identify an organization, intended recipients and any restrictions on circulation.
 State the scope, objectives, period of coverage, nature, timing and the extend
of the audit work.
 State findings, conclusions, recommendations and any reservations,
qualifications and limitations.
 Provide audit evidence.

5.1 Types of reports


 There are four common types of auditor‘s reports, each one presenting a different
situation encountered during the auditor‘s work.
 Unqualified Opinion report
 Qualified Opinion report
 Adverse Opinion report
 Disclaimer of Opinion report
5.1.1 Unqualified opinion report
 This type of report is issued by an auditor when the information systems presented are
free of material misstatements and are in accordance with the Generally Accepted IS
Audit Principles, which in other words means that the company‘s information systems
and operations are fairly presented. It is the best type of report an auditee may receive
from an external auditor.
5.1.2 Qualified Opinion report
A Qualified Opinion report is issued when the auditor encountered one of two
types of situations which do not comply with generally accepted auditing
principles, however the rest of the controls are fairly intact. This type of opinion is

30
very similar to an unqualified or ―clean opinion‖, but the report states that there
exists a certain exception which is otherwise misstated. The two types of situations
which would cause an auditor to issue this opinion over the Unqualified opinion
are:
5.1.2.1 Single deviation from IS standards – this type of qualification occurs when one or
more areas do not conform with ISA standards (e.g. are misstated), but do not affect
the rest of the report.
5.1.2.2 Limitation of scope - this type of qualification occurs when the auditor could not
audit one or more areas as planned, and therefore it could not be verified, the rest of
the areas were audited and they conform standards. Examples of this include an
auditor not being able to observe and test a company‘s inventory system. If the auditor
audited the rest of the information systems and is reasonably sure that they conform
with standards, then the auditor simply states that the information systems are fairly
represented, with the exception of the inventory system which could not be audited

5.1.3 Adverse Opinion report

An Adverse Opinion is issued when the auditor determines that the information
systems of an auditee are materially misstated and, when considered as a whole, do
not conform with ISA.
It is considered the opposite of an unqualified or clean opinion, essentially stating
that the information contained is materially incorrect, unreliable, and inaccurate.
5.1.4 Disclaimer of Opinion report
A Disclaimer of Opinion, commonly referred to simply as a Disclaimer, is issued
when the auditor could not form, and consequently refuses to present, an opinion
on the financial statements. This type of report is issued when the auditor tried to
audit an entity but could not complete the work due to various reasons and does
not issue an opinion.
Although this type of opinion is rarely used, the most common examples where
disclaimers are issued include audits where the auditee willfully hides or refuses to
provide evidence and information to the auditor in significant areas of the audit,
where the auditee is facing significant legal and litigation issues in which the
outcome is uncertain (usually government investigations), and where the auditee
has going concern issues (the auditee may not continue operating in the near future

Review Questions
i) Define an audit report
ii) Discuss the key issues that one must consider when preparing audit reports
iii) Describe benefits of an audit report

References for further Reading

31
CHAPTER SIX: INFORMATION TECHNOLOGY AUDIT & FORENSIC
TECHNIQUES

Learning Objectives

By the end of this chapter the learner should be able to:


i) Define the term forensic computing, evidence
ii) Explain the challenges to IT forensic computing
iii) Describe the steps followed in a digital forensic investigative frame work.
iv) Explain the various tools used in forensic computing.

6.0 INTRODUCTION
Forensic Computing is the process of identifying, preserving, analyzing, and presenting
digital evidence in a manner that is legally acceptable in a court of law
Our interest is in …
 Identifying and preserving evidence,
 ―post-mortem‖ system analysis to determine extent and nature of attack, and
 the forensic framework

6.1 Challenge IT Forensic Techniques to Organizations


Forensic Audit
Used to discover information about a possible crime. To understand fraud
 Gather evidence about the existence of fraud
 Identify and respond to fraud risks
 Document and communicate findings
 Incorporate a technology focus

6.1.1 Network Fraud


 Companies now highly reliant on networks
 Networks increasingly vulnerable to attacks
 Viruses, Trojans, Rootkits can add backdoors
 Social Engineering including Phishing and Pharming
 Confidential and proprietary information can be compromised
 Can create a corporate liability

6.1.2 Security Challenges


 Technology expanding and becoming more sophisticated
 Processes evolving and integrating with technologies
 People under trained
 Policies outdated
 Organizations at risk

6.2 Challenges of IT Forensic Techniques to Auditors


 Majority of fraud is uncovered by chance

32
 Auditors often do not look for fraud

 Prosecution requires evidence

 Value of IT assets growing

6.2.1 Knowledge, Skills, Abilities: Needs


Auditor‘s need KSAs to …
 Build a digital audit trail

 Collect ―usable‖ courtroom electronic evidence

 Trace an unauthorized system user

 Recommend or review security policies

 Understand computer fraud techniques

 Analyze and valuate incurred losses

6.2.2 Immediate Concerns


 What is level of certainty that a problem exists?

 Is this a criminal act?

 Can the system be isolated?

 Is the intrusion internal or external?

 Are suspects known?

 Is extent of loss/damage known?

6.2.3 Immediate Response


 Shut down computer (pull plug)

 Bit-stream mirror-image of data

 Begin a traceback to identify possible log locations

 Contact system administrators on intermediate sites to request log preservation

 Contain damage

 Collect local logs

 Begin documentation

6.2.4 Continuing Investigation


 Implement measures to stop further loss

 Communicate to management and audit committee regularly

33
 Analyze copy of digital files

 Ascertain level and nature of loss

 Identify perpetrator(s)

 Develop theories about motives

 Maintain chain-of-custody

6.3 Digital Crime Scene Investigation


Goal: Determine what fraud events occurred
by using digital evidence.
 Incident/Crime: An event that violates a policy or law

 Investigation: A process that develops and tests hypotheses to answer questions about
events that occurred

6.4 Framework for an Investigative Process for Digital Forensics


6.4.1Identification
 Event/crime detection

 Resolve signature

 Profile detection

 Anomalous detection

 Complaints

 System monitoring

34
 Audit analysis

6.4.2 Preservation
 Goal: Preserve the state of as many digital objects as possible and document the crime
scene.

 Methods:

 Shut system down

 Unplug (best)

 Do nothing

 Bag and tag

6.4.3 Documenting the Scene


 Note time, date, persons present

 Photograph and video the scene

 Draw a layout of the scene

 Search for notes (passwords) that might be useful

 If possible freeze the system such that the current memory, swap files, and even CPU
registers are saved or documented

6.4.3.1 Types of evidence


 Direct Evidence: proves existence without inference of presumption e.g. a testimony
from an eyewitness or written documents.

 Indirect evidence: use a hypothesis to make a claim based on inference and


presumption.

 Often a chain of circumstances will lead to a claim. Also called circumstantial


evidence.

6.4.3.2 Grading evidence


 Four xteristics are used to grade evidence:

 Material Relevance, how well it relates to the issue being investigated. The
more material, the more helpful.

 Evidence objectivity, ability to be accepted and undrestood with little


judgement. The more more judgement, the less objective.

 Competency of the evidence provider, evidence from a person directly


involved is better.

35
 Evidence Independence, the provider should not have any gain or loss by
providing the evidence.

6.4.3.3 Rules of Evidence


 Complete

 Authentic

 Admissible

 Reliable

 Believable

6.4.3.4 Requirements for Evidence


Computer logs …
 Must not be modifiable

 Must be complete

 Appropriate retention rules

6.4.3.5 Timing of evidence


 Particularly important when dealing with digital evidence, which may be available
only during a limited window of time before it is overwritten or deleted.

6.4.3. 6 Problems with Digital Evidence


 Timing essential – electronic evidence volatile

36
 Auditor may violate rules of evidence

 NEVER work directly on the evidence

 Skills needed to recover deleted data or encrypted data

6.4.3.7 Technology for gathering evidence


 Magnetic disks contain data after deletion

 Overwritten data may still be salvaged

 Memory still contains data after switch-off

 Swap files and temporary files store data

 Most OS‘s perform extensive logging (so do network routers)

6.4.3.8 Order of Volatility


 Preserve most volatile evidence first

 Registers, caches, peripheral memory

 Memory (kernel, physical)

 Network state

 Running processes

 Disk

 Floppies, backup media

 CD-ROMs, printouts

6.4.4 Collecting Evidence


 Must use:

 Approved methods

 Approved software

 Approved hardware

 Legal authority

 Lossless compression

 Sampling

 Data reduction

 Recovery techniques

37
6.4.5 Examination
 Involves :

 Preservation

 Traceability

 Validation Techniques

 Filtering techniques

 Pattern matching

 Hidden data discovery

 Hidden data extraction

6.4.6 Analysis
 Involves

 Preservation

 Traceability

 Statistical

 Protocols

 Data mining

 Timeline

6.4.7 Presentation

Involves
 Documentation

 Expert testimony

 Clarification

 Mission impact statement

 Recommended countermeasure

 Statistical interpretation

6.5 Digital Forensic Investigation Process


A process that uses science and technology to examine digital objects and that develops and
tests theories, which can be entered into a court of law, to answer questions about events that
occurred.

38
IT Forensic Techniques are used to capture and analyze electronic data and develop theories.
6.5.1 Approach
 A formalized approach

 Has specific rules, structure and vocabulary

 Allows repeatability

 May be used to verify a process

6.6 Forensic Tools


Forensic Software Tools are used for …
 Data imaging

 Data recovery

 Data integrity

 Data extraction

 Forensic Analysis

 Monitoring

6.7 Process/System Analysis Tools


 sysinternals tools for Windows

 FileMon – shows filesystem activity in real time

 PSMon – watch process/thread creation in real time

39
 PsFile - shows files opened remotely

 PsKill - kill processes by name or process ID

 PsInfo - list information about a system

 PsList - list detailed information about processes

6.7.1 Process/System Analysis Tools


 PsLoggedOn - see who's logged on locally and via sharing

 PsLogList - dump event log records

 PsPasswd - changes account passwords

 PsService - view and control services

 PsSuspend - suspends processes

 Handle – shows which files are opened by which processes

 RegMon – see registry activity in real time

 ListDLLs – show loaded DLLs

6.7.2 Audit Command Language


ACL is a computer data extraction and analytical audit tool with audit capabilities …
 Statistics

 Duplicates and Gaps

 Stratify and Classify

 Sampling

 Benford Analysis

6.8 Developing a Forensic Protocol


 The response plan must include a coordinated effort that integrates a number of
organizational areas and possibly external areas

 Response to fraud events must have top priority

 Key players must exist at all major organizational locations

6.8.1 End-to-End Forensic Analysis


First rule of end-to-end forensic digital analysis
 Primary evidence must always be corroborated by at least one other piece of relevant
primary evidence to be considered a valid part of the evidence chain. Evidence that
does not fit this description, but does serve to corroborate some other piece of
evidence without itself being corroborated, is considered to be secondary evidence.

40
An Example of an End-to-End Investigation

41
6.9 The Role of Policies in forensics
 They define the actions you can take

 They must be clear and simple to understand

 The employee must acknowledge that he or she read them, understands them and will
comply with them

 They can‘t violate law

42
6.9.1 Forensic Response Control
Incident Response Planning …
 Identify needs and objectives

 Identify resources

 Create policies, procedures

 Create a forensic protocol

 Acquire needed skills

 Train

 Monitor

6.9.2 Forensic Protocol


 First responder triggers alert

 Team response

 Freeze scene

 Begin documentation

 Auditors begin analysis

 Protect chain-of-custody

 Reconstruct events and develop theories

 Communicate results of analysis

Review Questions
i) Define the term forensic computing, evidence, forensic protocol.
ii) Describe the forensic investigative framework.
iii) What are challenges facing forensic investigations.
iv) Explain the role of policy in forensics.
v) Has forensic investigation had a breakthrough in detecting crime?discuss,

References for further Reading

43
CHAPTER SEVEN: COBIT
Learning Objectives:
By the end of this chapter the learner should be able to:
Define the term COBIT
Explain the uses of COBIT the various domains, processes and resources used.
Describe the benefits of COBIT

7.0 Introduction
 COBIT – Control Objectives for Information and related Technology

 COBIT development started in 1994 with first version published in 1996 by ISACA
(Information Systems Audit and Control Association) http://www.isaca.org

 Supports IT governance by providing a comprehensive description of the control


objectives for IT processes

 Created to provide a set of measures, indicators, processes and best practices

 Generic control objectives for each IT process

 Framework to align IT governance with business requirements

 Management Guidelines for alignment

 Control Objectives

 Set metrics (―Goal Indicators- KGIs‖ and ―Performance Indicators – KPIs‖)

 Assess ―as-is‖ and ―to-be‖ capability using maturity models

7.1 COBIT Target Groups


 COBIT is primarily intended for management, business users of IT and auditors

 Main target groups

 Managers – holding executive responsibility for operation of the enterprise.

 End users – provide assurance of security and controls

 Auditors – independent assurance of quality and controls

 Business and IT consultants – bring knowledge and advice

 IT Service Management Professionals – provides a framework covering


complete lifecycle of IT systems and services

44
The Framework’s Principles

45
7.2 IT Resources
 Data : Data objects in their widest sense, i.e., external and internal,
structured and non-structured, graphics, sound, etc.

 Application Systems : understood to be the sum of manual and


programmed procedures.

46
 Technology : covers hardware, operating systems, database management
systems, networking, multimedia, etc..

 Facilities : Resources to house and support information systems.

 People : Staff skills, awareness and productivity to plan, organize,


acquire, deliver, support and monitor information systems and services.

7.3 COBIT Domains


 Plan & Organize – concerned with identification of the way IT can best contribute to
the achievement of business objectives

 Acquire and Implement – acquiring, implementing or development of IT Solutions to


be integrated into business process

 Deliver & Support – delivery of required services including traditional operations,


security, and training

 Monitor & Evaluate – regular assessment over time for quality and compliance with
control requirements

7.3.1 COBIT Processes within Domains


 Each of the previous Domains are composed of processes(34):

47
Domains and processes
 A Domain contains the relationships of each individual processes

 For example: Plan and Organize

48
7.4 COBIT Process Descriptions
 COBIT does offer detailed descriptions for all 34 processes.
 The Process Descriptions:

 contain the inputs, outputs, responsibilities, metrics and goals

 Provide a basis of expert knowledge from which the enterprise may decide is
relevant to their organization

 Diagrams with relationships to other processes are also illustrated

7.5 COBIT as an IT Governance Framework


 COBIT provides a framework to control IT and supports the following 5
requirements for an IT control framework

 Providing a sharper business focus

 Ensuring a process orientation

 Having a general acceptability among organizations

 Defining a common language

 Helping to meet regulatory requirements

7.5.1 IT Governance Focus Areas


 Strategic Alignment – focus on ensuring the linkage of business and IT plans

 Value Delivery – executing the value proposition throughout the delivery cycle

49
 Risk Management – requires risk awareness by senior corporate officers, compliance
requirements, transparency

 Resource Management – optimal investment in and management of critical


resources: people, applications, information and infrastructure

 Performance Measurement – tracks and monitors strategy implementation

7.6 Why Should an Organization Adopt COBIT?


 Attention on Corporate IT Governance

 Linking IT to business requirements

 Organize IT activities into a generally accepted process model

 Clear ownership and responsibilties, based on process orientation

 Shared understanding among stakeholders

 Identifying the major IT resources to be leveraged

 Defining management control objectives

 Specific need for control of IT resources

50
 Business oriented solutions

 Process focused

 Metrics driven

7.7 Who needs COBIT?


 Management needs COBIT

 To evaluate IT investment decisions

 To balance risk and control of investment in an often unpredictable IT


environment

 To benchmark existing and future IT environment

 IT Managers

 To provide the IT services that business requires to support business strategy

 To use as baseline model to be benchmark against with various standards (ISO,


FFIEC, SOX etc.)

 Users need COBIT

 To obtain assurance on security and controls of products and services provided


by internal and third-parties

 Developers Need COBIT

 Ensure that all applicable IT control objectives in the development project have
been addressed

 IS Information Security Officer & Auditors

 To substantiate opinions to management on internal controls

 To answer the question: What minimum controls are necessary?

Review Questions
i) Define the term COBIT
ii) Who are the users of COBIT
iii) What are the benefits of using COBIT
iv) Describe the various domains of COBIT

51
52

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy