Assignment Audit
Assignment Audit
COURSE Auditing
Student details
Name ID
Class: DIA6E
Acknowledgement
Assalamualaikum W.B.T, first and foremost we want to thank Allah SWT for giving us the
chance and strength to finish this Assignment 1 during this semester. No doubt there are
problems faced throughout the journey to finish this assignment but God willing we can
solve them all.
Moreover, we wish to express our gratitude to Sir Helmi Hamid, our Auditing lecturer
for providing us the opportunity to work on this assignment to test our understanding in
chapter one until three of Auditing course. Not to forget the guidance and encouragement
gave for us to carry on the assignment. Alas, helping us in enhancing our group work
morale and preparing us in workforce after study.
We also sincerely want to thank our parents and friend for support and
encouragement they give throughout the process of completing the assignment. Not to
forget the group member, thank you for the collaboration, idea contribution, energy and
time spend given only to complete the assignment and task. We hope nothing but success
of our Assignment 1 outcome.
Table of content
2
No Content Page
11 Reference 20
3
Auditing (ISA) and how it is different from Malaysian Approved Standards
of Auditing (MASA).
Auditing standards are broad rules that help auditors perform their professional
obligations while conducting an audit of historical financial accounts. Consideration is given
to professional attributes such as competence and independence, as well as reporting
obligations and proof. This International Standard on Auditing (ISA) addresses the auditor's
role to detect and evaluate the risks of substantial misstatement in the financial statements
by knowing the company, its environment, and its internal control. The auditor's objective is
to identify and assess the risks of material misstatement, whether due to fraud or error, at
the financial statement and assertion levels, by understanding the entity and its
environment, including the entity's internal control, thereby establishing a foundation for
designing and implementing responses to the assessed risks of material misstatement
4
them do the same. A positive declaration indicating the audit was conducted in accordance
with Malaysian Approved Standards on Auditing must be included in an audit report (MASA).
Any breach or failure to comply with Malaysian Approved Standards on Auditing (MASA) may
result in disciplinary action against the member or members implicated.
5
A company's internal control system consists of the policies and procedures designed to
offer a reasonable level of assurance that the entity's stated goals will be achieved.
Typically, the owner-manager of a small firm oversees and actively engages in all business
activities.
a) Environment control: The control environment is the basis for all other aspects,
including moral value, management knowledge, employee integrity, and managerial
direction.
b) Risk evaluation: both internal and external risks must be considered after the
establishment of the objective. After doing a risk assessment, management must
determine how risk management connects to each objective.
c) Controlling activities: The management builds a controlling activities structure for all
objectives to avoid risk. These are steps that are to be implemented by personnel.
6
a) Adequate Documents and Records
In a manual system, sufficient documentation and records are necessary to create an audit
trail of system actions. In a computer system, document support for initiating, executing,
and recording a transaction may not be required. Auditors may simply create a visual audit
trail if the systems are built to preserve a record of all occurrences and to make that record
readily accessible. In properly designed computer systems, audit trails are more
comprehensive than in manual systems; nevertheless, not all computer systems are
structured correctly. This causes a significant control issue.
Personnel in the formation system who are skilled, competent, well-trained, and experienced
have been in short supply. Since the person responsible for the creation, implementation,
operation, and maintenance of the organization's computer information system is often
endowed with extensive authority, knowledgeable and trustworthy employees are in high
demand. Unfortunately, the lack of skilled workers compelled many organisations to settle
for subpar personnel. In addition, it is not always simple for organisations to evaluate the
competency and honesty of their system personnel. The typical for this workforce has been
a high turnover rate. Some information systems employees lack a well-developed moral
compass, while others delight in undermining controls.
7
Checks from a third-party aid in detecting mistakes and anomalies. If a programme code is
permitted, correct, and complete in a computer system, the system will always follow the
specified processes in the absence of hardware or system software faults. Consequently,
independent checks on the success of programmes are often of little value. Rather, the
focus of control moves to verifying the integrity of programmed code. Auditors must now
analyze the controls created for programme creation, modification, and maintenance.
An organised hierarchy of authority and responsibility is a crucial control in both manual and
digital environments. Due to the fact that certain resources in a computer system are shared
across several users, it may be challenging to create a clear chain of authority and
accountability. For example, one of the goals of a database management system is to
provide multiple users with access to the same data, thereby reducing the control problems
associated with maintaining redundant data. However, when multiple users have access to
the same data and the data integrity is somehow compromised, it is not always easy to
determine who is responsible for corrupting the data and who is responsible for identifying
and correcting the error. Some organisation designated a single user as the data owner.
8
AUDITING AROUND THE COMPUTER AUDITING THROUGH THE COMPUTER
Auditors frequently use this strategy when Another way auditors can use when auditing
working with smaller firms, such as those a corporate setting where computerised
that follow industry standards. It's also a systems are more complicated and the
viable option if the client's system is based computer creates information internally
on a single PC and the computer is only through automatic procedures is to
used to replace human records with few, if comprehend and interrogate the
any, automated procedures. The client's management information system (MIS).
programme has been recognised as well-
tested and error-free, indicating that it is
standard software.
Techniques involving the use of computers Select transactions are manually processed,
to process transactions and records with and the results are compared against
faults and exceptions to ensure that computer output.
programme controls are working properly.
The storage of financial data is softcopy or The storage of financial data is printed data
visibility data storage. storage or hardcopy
Procedures for auditing around the Procedures for auditing through the
computer is performing test of control and computer is in obtaining understanding
substantive test. accounting and internal control
9
Inquiry could be a straightforward testing approach that uses touchpoint interview-
style queries for specific verification. as a result of the accuracy and honesty of the
respondent confirm the standard of the data obtained through the investigation, it's
thought-about a weaker sort of evidence. Auditors use the inquiry approach to interview
management, accountants, and different key personnel within the organization to collect
relevant information. to make sure that the organization is doing what's necessary to avoid
risk, the auditor will give information on the operation of the business and therefore the
correct documentation of economic transactions. For example, the auditor might invite the
situation of the company' monetary associated information security records. as a result of
this approach is usually employed in conjunction with different a lot of reliable methods, the
responses are thought-about by the tax assessor however not accepted as validation for the
creation of additional assessment criteria.
Next comes the examination or review of the evidence. This testing technique helps
auditors confirm whether or not manual managements are frequently performed and
properly recorded. Inspections are often wont to guarantee control measures are being
followed and to check specific aspects of policies and processes. For example, an auditor
may check whether regular backups are scheduled or whether or not information
categorization procedures are in place. In these situations, the auditor will use the review to
make sure that the management was properly designed and is functioning properly. He or
she checks that the forms are stuffed out correctly.Inspection of written documentation and
records reminiscent of traveller logs, worker handbooks and system databases is an element
of the proof review method.
Last however not least, auditors can use computer-assisted auditing techniques
(CAATs) to perform essential process or check application controls. If validation and process
rules for routine transactions are enforced in application programs, this procedure is needed
in demanding IT systems. Keeping legal entity files in a very machine-readable format may
also be helpful for main proceedings. samples of CAATs are generalized audit code, custom
10
audit software, check data, parallel simulation, integrated test facility, and coincidental audit
procedures. This testing approach is usually wont to examine giant amounts of information
or a sample of compiled data.CAAT tests run a script on a complete ledger, spreadsheet, or
info mistreatment specific software to appear for patterns, anomalies, and probably deceitful
entries.
11
Preparation of audit documents must include adequate information to facilitate
comprehension of its purpose, origin, and findings. Document working papers must include
finished dictionaries, flowcharts, decision tables, and narrative memos. There are three
methods used by auditors to record their comprehension of internal control: nerratives,
flowcharts, and internal control questions.
12
Control activities
Risk assessments
13
tangible non-current assets expenditure?
14
Does meeting content between buyer-
director is recorded or documented?
Monitoring
15
Does any deficiency happened is reported to
the management?
16
9. Different types of subsequent events as stated under ISA 560 –
Subsequent Events.
17
existed at the date of the financial arose after the date of the financial
statements statements
Auditor should perform procedures After the date of the audit report, the
designed to obtain sufficient appropriate auditor has no further obligation to
audit evidence that all events up to the undertake processes or conduct
date of the auditor’s report that may investigations into the financial statements.
require adjustment or disclosure have been Upon becoming aware of an amendment,
identified. the auditor should discuss it with
management and examine its impact on
audit findings.
Auditors are liable for completing these After the date of the financial statement,
procedures right up until the day that they they are no longer required to carry out the
sign the audit report, which is their final procedures but should they become aware
obligation in this regard. of any major later developments, they are
obligated to take appropriate action.
Appendix
18
Reference
19
1. Sha, T. (2021, July 2). Malaysian approved standard auditing. Padlet.
Retrieved May 26, 2022, from https://padlet.com/pritisya2318/3l8vow88m4cq
2. International Standard on auditing 560 subsequent events contents - IFAC.
(n.d.). Retrieved May 25, 2022, from
https://www.ifac.org/system/files/downloads/a030-2010-iaasb-handbook-isa-
560.pdf
3. Hara, M. C. (n.d.). Session 10: Completion and review - ppt download.
SlidePlayer. Retrieved May 26, 2022, from
https://slideplayer.com/slide/15750899/
4. No Author. (2019). 2019-20 Internal Control Questionnaire and Assessment.
Florida Department of Economic Opportunity
5. https://www.accaglobal.com, A. C. C. A.-. (n.d.). Auditing in a computer-
based environment. F8 Audit and Assurance | ACCA Qualification | Students |
ACCA Global. Retrieved May 24, 2022, from
https://www.accaglobal.com/in/en/student/exam-support-resources/fundame
ntals-exams-study-resources/f8/technical-articles/auditing-computer-
environment.html
6. Ikram, N. (2017, December 20). Differentiation between auditing through
computer and around computer. Academia.edu. Retrieved May 22, 2022, from
https://www.academia.edu/35478638/Differentiation_between_auditing_thro
ugh_computer_and_around_computer
20