Chapter 5
Chapter 5
Auditing IT Using
Computer- Assisted Audit
Tools and Techniques
103
104 Information Technology Control and Audit
Auditor Productivity
Tools
The core of the audit process is analyzing controls to determine if they are adequate or
need improve- ment. Many of the tasks associated with performing an audit, such
as planning, developing, and documenting, although necessary, take time away
from doing the actual analysis work. Thus, the need for automating the auditing
functions. In addition, computer systems are highly complex and testing through
the computer provides greater evidence of the functioning of controls.
Mainframe, client/server, and all forms of personal computers are an integral part of
the audit processes. Technology is used as part of the audit process for the
following activities:
■ Planning and tracking the annual audit schedule using spreadsheets, database, and project
management software
■ Documentation and presentations using word processing, flowcharting,
and graphics and
video software
■Communication and data transfer using electronic connectivity and a centralized server
or distributed resources
■Resource management using online work papers review and e-
mail
■ Data management using database, groupware, and intranet
software
■Reports and correspondence using word processing, video software, conferencing
software, collaborative writing, file sharing, and notation techniques
Data
Management
Establishing electronic connectivity provides audit personnel with the capability to
access and input data into a central data repository or knowledge base. The
central data repository can archive historical risk, audit schedule, and budget
data that can be accessed electronically by all authorized users throughout the
audit group, regardless of physical location. Database applications can be
developed to automatically consolidate data input electronically from all
audit functions.
Through the use of databases, audit management can centrally monitor and
have immediate access to critical activity such as audit schedule status, field audit
status, fraud or shortage activity, and training and development progress.
Database applications can automatically consolidate function- wide data and
generate local and consolidated status and trending reports. Auditors
can produce more effective products by leveraging off the knowledge of
other auditors by having access to function-wide data. The database can
contain information such as risk areas, audit programs, findings, corrective
action, industry standards, best practices, and lessons learned. This
information could be available for research whenever needed. Online
storage of information will allow auditors to do text and word searches to
find specific information in voluminous documents (e.g., insurance
code).
It helps auditors to research an audit area to determine prior risk
areas and functional testing approaches, identify related or
interrelated areas, and review local or organization-wide
corrective action. In addition to historical data, a repository
provides a platform for interactive activities such as electronic
bulletin boards. Audit personnel (and others, if
authorized) can post new information or update old information.
that time will not be wasted "reinventing
the wheel." Building a central
knowledge base facilitates A central
repository provides immediate access
to historical data (e.g., prior audit
programs) so
■Information Technology Control and Audit
applying lessons learned and increases the level of understanding about the
business environment throughout the entire organization.
Resource
Management
Another challenge for audit managers is to manage a remote workforce.
Whether an auditor is working on a local audit or out in the field,
managers need to be able to provide guidance and review work in progress.
Managers need to provide feedback while the auditor is on location in case
follow-up action is necessary.
A distributed workforce requires a very informed and responsive management team that can
gather and disseminate information quickly. Important information can be
rapidly gathered and disseminated function-wide through e-mail and
internal electronic b-boards. Supervisors can pro- vide immediate feedback
and direction on audit projects through online review of electronic work
papers.
Groupwar
e
Groupware is a specialized tool or assembly of compatible tools that enables
business teams to work faster, share more information, communicate more
effectively, and do a better job of com- pleting tasks. Groupware systems create a
collaborative work environment. Today, we are seeing desktop conferencing,
videoconferencing, coauthoring features and applications, e-mail and b-boards,
meeting support systems, paging and voice applications, workflow
systems, and group and subgroup calendars as examples of groupware
products and support systems. A popular early groupware application is Lotus
Notes. Lotus Notes is a client/server application development plat- form. It is designed
to enhance group productivity by allowing users to share information, while also
allowing individuals to customize private views of the information. Notes differ from
tradi- tional relational database software through its use of document-oriented
databases. In Notes, a document is defined as an object containing text, graphics, video,
and audio objects or any other kind of rich-text data. The ongoing work on Web 2.0
hopes to bring the next generation of group- ware into use and practice.
Groupware is "a natural" for automating the audit function. These products use
database fea- tures and workflow processing that can be used to store and
integrate information gathered and used in the audit process. For example, risk
assessment information feeds audit planning, and audit results feed audit reporting
and update the risk assessment model. There are several products on the
market that use groupware products such as Lotus Notes or Microsoft Office to
automate the audit process.
id
52 is
in
can
and
pro-
work
eams to
of com- re
seeing
mail and
a very
important
role in the performance of
audit work.
Of the more recent SASS, SAS 104
through SAS 111 require the auditor
and the organization to
carefully
assess the risks of material
misstatement (RMM) of the
financial statements and what
actions the organization is taking to
reduce their risks. The AICPA's
Information Technology membership
sections developed their guide, "IT
Considerations in Risked Based
Auditing: A Strategic Overview" to
help auditors implement these
standards. These standards can
help cli- ants to identify control
weaknesses and reduce the amount of
substantive procedures required due to
a
greater reliance on controls and
the use of CAATTs. Of these
SASS (104-111), there is greater
emphasis related to the impact of IT on
five of them: 106, 107, 108, 109, and
110.
and group
pular
early
pment
plat- ation,
while from
tradi- . In
Notes, a s or
any other
accura
cy
tion of
group-
se database
fea- on
gathered and
nning, and
audit
l products on
the utomate the
audit
rocess
Accountants
(AICPA) on
Technology on the
dit." This SAS does not
nts but states, "It is
not orming only
substantive peration of
controls, it is to test and
evaluate is not
Also, as mentioned earlier, there may be situations where the auditor may be
required to con- duct tests and evaluate IT controls and perform
substantive tests to obtain sufficient information and evidence
regarding financial statement assertions. If the auditor is using SAS 107
(Audit Risk and Materiality in Conducting an Audit), the auditor will look
at audit risk and materiality as the basis for the audit approach to be
used. Examples of some of these situations can be
Applications or systems involving electronic data interchange
(EDI) and financial transactions
■ Electronic payment systems that transmit electronic
transactions from one company net- work to another
and
■ Decision support systems that involve automatic reasoning or
artificial intelligence or heu- ristic scenarios where they support
decision making within the organization processes have financial
implications Applicationsthat use technology such as neural
network to assess financial conditions using ratio application in
calculation of credit worthiness
■In systems where enterprise resource architecture
is used to integrate the enterprise resource planning
systems, blending legacy data with newer support systems
■In systems that provide electronic services of
all types to customers, especially where the IT
system initiates bills for services rendered and processes the billing
transaction
Computer programs that perform complex
calculations involving money or resulting in a
financial decision, present or future, such as
reorder points, commissions, retirement or pen-
sion funds, and collection of accounts
108 Information Technology Control and Audit
Flowcharting
Techniques
Emphasis on developing an understanding of client accounting
systems is particularly appropriate during the application analysis
phase of an audit engagement. It is important for the auditor to
understand the relationship of each application to the conduct of
the client company's business. Even where a computer plays a
critical role, the auditor should avoid having audit activities become
too technical and detailed too soon.
110 Information Technology Control and
Audit
Flowcharting as an Analysis
Tool
As illustrated in Exhibit 5.2, for a computer auditor, flowcharts represent a
method for identifying and evaluating control strengths and weaknesses within a
system under examination. It can be time consuming to build an understanding of
strengths and weaknesses within a system to be audited. However, identification of
strengths and weaknesses often is crucial because the entire direction of the remainder of
an audit is toward substantiating and determining the effect of iden- tified control weaknesses.
For example, SAS 109 requires the auditor gain an understanding of the entity and its environ-
ment and determine those controls relevant to the audit. The auditor must have an
understanding of the nature and complexity of the systems that are part of the
control environment being audited. One way of gaining that understanding is through
any existing documentation which may provide a visual illustration of the system
under review and any interaction with other systems. Any existing documen- tation
(flowcharts, systems charts, flow diagrams, etc.) provides a benchmark for the
auditor's review.
As a step toward building the needed understanding of control weaknesses, the audit
staff should develop a flow diagram of all information processed. The flow
diagrams, or audit data flow diagrams, as depicted in Exhibits 5.1 and 5.2, should
encompass all information processed, from source documents to final outputs.
Either automated or manual techniques can be used in prepar- ing these audit
data flow diagrams. With either approach, the process leads to the evaluation of a
number of elements of a system, including the following:
■ Quality of system
documentation
Adequacy of manual or automated controls over
documents
■Effectiveness of processing by computer programs (i.e., whether the
processing is necessary or redundant and whether the processing
sequence is proper)
■ Usefulness of outputs, including
reports and stored files
Auditing IT Using Computer-Assisted
Audit Tools and Techniques☐ 111
Purchasin
g
(Submitted
by any
authorized
buyer)
Account
payable
(central)
General
Shippin
g
Receiving
accounting
(central)
(Applies to each of (Applies
to each of the 10 warehouses)
the 10 warehouses)
Tran
PO's
issues
Invoices
code
File
D
maintenance
Shipments
Receipt
s
Tran code H
Tran
cod
e
AS 400
Tran
code
PDA's
E,F,G
OCR
PC
A, B, C
PC
PC
light
pen
Edit
Edit
reports
PDA's
Notebooks
Edit
messages
Initial
edits
Initial
edits
messages
Error
suspens
e file
Initial
edits
Clean
PO
transaction
Any
vendor
Clean
online
Clean
invoices
file
shipmen
ts
vendor
invoices
Online
Update
updat
e
payabl
e
Online
Open
inventory
Upda
te
and receive
updat
e
Payabl
e
inventory
file
Inventor
y
open POS
Inventory
file
file
Open PO
file
General
Authorized
ledger
database
Repor
t
report
program
inquiry
A/P
A/P trial
listin
g
balance
Financial
statements
Originatio
n
Document
Personnel
Personnel
Payrol
l
IT
Report
Recipient
s
Division A
Promotion
data entry
operator
Keyed to
personnel
systems
Displa
y
transaction
No
Transaction
correct?
Yes
Personnel
system
Employe
e
update file
Special form
7
W2 form
Life insurance
change
Personnel
clerk
Personnel
clerk
Health
insurance
change
Payroll
master
change sheet
Data entry
operator
Payrol
l
master
change
transaction
Personnel
clerk
corrects transactions
Pay clerk
division A
5
3
Edit errors
PA02 BS
sort and list
6
Nonmatch
update
Payro
ll
Upda
te
master
Notes
1. No transmittal document
2. Transmittal document, but no control exhibited
change
transaction
PA02 BS sort
and list
update
Updat
e
listing
Each source document, by title and identification number, with copies of the
forms attached
Point of origin for each source
document
Each operating unit or office through which data
are processed
■Destination of each copy of the source document and the action applied to each
copy (filed, audited, entered into a computer, etc.)
■ Actions taken by each unit or office in which the data are processed (recorded in
books of account, unit prices or extensions added, control numbers recorded
and checked, etc.)
■Controls over the transfer of source documents between units or offices to assure that no
documents are lost, added, or changed (controls include record counts, control
totals, arith- metic totals of important data, etc.)
■Recipients of computer
outputs
These documents, along with the information developed in the previous tasks, should
enable the audit staff to prepare an audit data flow diagram identifying
d within the
system under
tles can be
deceptive. For ve?
Is the cost
accrued or f cost
changed during the
1 definitions. If a
data dic- itions. In
many instances, 1 in a
computer-processed
es of the
following:
rocessing as well as
corre-
ilty experienced in
con- iment on the
quality of
ocumentation accurate?
Evaluating the
Usefulness of
Reports
The audit staff should review the key or major outputs (such as edit listings,
error listings, and control of hours listings) of the application
system and determine if the outputs are
■ Accurate
■ Useful as intended
The auditor should confirm findings by interviewing the users of the output reports. One
appropriate technique might be the completion of a questionnaire
or survey, perhaps conducted by e-mail on user satisfaction with output
reports.
Appropriateness of Flowcharting
Techniques
A distinction should be noted between the use of systems flowcharts in computer
broader field of systems analysis. In recent years,
auditing and in the
systems analysts have begun to favor other methods of modeling
and documentation. Data flow diagrams, for example, are often preferred
over systems flowcharts for purposes of analysis. The
rationale is that data flow diagrams are process-oriented
and emphasize logical flows and transformations of data. By contrast,
systems flowcharts emphasize physical processing steps and
controls. It is just this type of control-oriented view,
however, that is the auditor's primary focus. Thus,
although the use of systems flowcharting may be
declining for systems development purposes, this
modeling tool remains important for computer auditors.
116 Information Technology Control and Audit
database
applications.
■ Analyzing the nature and progress of audit trails to the extent that they
exist and can b followed within individual applications
Sampli
ng
Some audit tools assist in defining sample size and selecting the sample. For
example, ACL, z audit analysis tool, will automatically calculate the
sample size and select a sample from the pop lation, and spreadsheet
applications will generate random numbers for selecting a sample. Ther are
two types of sampling techniques:
of
in
JW-
ters
iter-
TS OF
irts is
func-
uditor
in this
at may of
IT in 1
by the
accumu
ndations
Sampling
Method
Random number
sampling
Systematic sampling
(interval sampling)
Stratified
sampling
gagement
,
ll respon-
ال
opment of
pinion.
hould have
which major
st and can be
Descriptio
n
mple, ACL,
an from the
popu a
sample. There
Stop-or-go sampling
(sequential sampling)
d on the auditor's
graphic
region, or
Discovery
sampling
Dollar-unit sampling
(probability proportional to size)
Difference estimation
Ratio estimation
the application
of
population into similar groups and then
selects a random sample from the group.
The size of the sample will be determined by the combination of confidence level,
population value, materiality, and expected error rate.
Exhibit 5.3 lists various statistical sampling techniques. Again, the auditor must watch for
changes and updates to guidance in the use of sampling to
perform audit work within his profes- sion. A good example is SAS 111
(Amendment to the Statement on Auditing Standard No. 39, Audit Sampling).
SAS 111 addresses the concepts of establishing "tolerable deviation rates" when
sampling test of controls such as matching and authorization. It also
defines the appropriate use of dual-purpose sampling.
System
Validation
Auditing IT Using
Computer-Assisted Audit
Tools and Techniques ☐
119
Computer-
Assisted Audit
Tools and
Techniques for
Auditing applications require
specific and general
knowledge about hardware
and software, In addition,
familiarity with system
utilities helps in conducting
control and substantive
tests. For auditing
applications and data
integrity, there is a variety
of auditing tools that are
useful. There are tools
that analyze
spreadsheet logic and
calculations for
accuracy. There are
tools that analyze used
to analyze data produced
from most applications.
Again, all of the
information generated by
a database application and
produce a logical
flowchart. Finally,
generalized audit software
can be the use of CAATTS must
be evaluated.
Generalized
Audit
Software
Use of generalized audit
software makes it possible to
perform required functions
directly on
application
files. Audit
software can
be used to
Analyze and
compare files
Select specific
records for
examination Conduct
random samples Validate
calculations
Prepare
confirmation
letters
Analyze aging of
transaction files
Designing Tests of
Controls
Reproducing an application can be very time consuming if the application being
reviewed is fairly complex. The simulated application will need to be coded
and tested before being able to rely on the results. Consider only partially
duplicating the application logic to test key functions.
Data
Analysis
Organizations develop a wealth of information from their
transaction processing systems. Auditors can use this
information to gain an overall understanding of an area to identify
general trends and
pro-
auditing-around-the-computer approach is that it does not verify or validate
whether the gram
logic is correct. Also, this
method does not evaluate how the
application and their embed ded controls
respond to various types of
transactions (anomalies) that can
contain errors, Therefore, the
issuance of SAS 106 through 110 by the
AICPA helps support the importance of
CAATTS and its role in performing
audit procedures in response to
assessed risks and evaluating
the IT auditor must draw upon techniques
combined with tools to successfully test
and evaluate Certainly, when audits involve the
use of advanced technologies or complex
applications, the
application. The
techniques most commonly used
are shown in Exhibit 5.5. Again,
many of these techniques should be
embedded into the application for use by
auditors and security person- nel. These
techniques provide continuous audit and
evaluation of the application or systems
and
Technique
Integrated
test facility
Test data
Parallel simulation
Descriptio
n
Parallel simulation involves the separate maintenance of two presumably identical sets of programs.
The original set of programs is the production copy used in the
application under examination. The second set could be a copy
secured by auditors at the same time that the original version
was placed into production. As changes or modifications are
made to the production programs, the auditors make the same
updates to their copies. If no unauthorized alteration has taken
place, using the same inputs, comparing the results from each set of
programs should yield the same results. Another way is for the
auditor to develop pseudocode using higher-level languages
(Vbasic, SQL, JAVA, etc.) from the base documentation
following the process logic and requirements. For audit
purposes, both software applications (test versus actual) would
utilize same inputs and generate independent results that can be
compared to validate the internal processing steps.
Continuous
Systems
control audit
review file
Transaction tagging
Snapsh
ot
Client/
Computer-
Server
Name of Tool
Control
Assisted
Audit Tools
Contingency
Planning
and E-
Commerce
Data
Warehou
sing
Control Compliance
Suite,
X
X
RecoveryPAC, RecoveryPAC
Web,
X
X
Middleboro, MA
data into MS Excel and visually portray information for management or even
forecast trends with regard to workload, growth, and other IT operational
areas.
Should the IT auditor have the technical capability to "design, develop, and
implement" host routines to support audit function and activities, most
fourth-generation languages offer full support. Exhibit 5.7 outlines the capability
of the support available.
Product
MS Office
SQL
Perl
SAP
QBE
QMF
ACL
IDEA
Oracle
Fa
ct
ori
ng
H
u
m
a
n
Database
Support
XXXXXX IBM Environment
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
XXXX Server Environment
XXX Tool Available on PC
XMicro-to-Mainframe Link
X
X
X
X
Full PC Implementation
XXXXXX Query Language
XXX
XXXXX Report Generator
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
Screen Painter/Data Entry
XXXX Graphics Generator
XXXX Decision-Support
Tools
X
X
X
X
X
X
X
X
X
XX
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
XX
X
Χ
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
Subset for End Users
IT Professionals
Procedural
Language
Interface-to-Action
Diagrams
Well-Structured Code
Provable Specifications
Heavy-Duty
Computing
Full COBOL
Replacement
Environment
Application-Generation Function
Computer-Aided
Instruction
Computer-Aided
Thinking
Support
Database
Management
Standard DBMS
Package
Data Dictionary
Data-Modeling
Tool
sa pe so we duo Buisn
Exhibit 5.7 List of selected operational audit tools and techniques.
Product
Webmetrics 3.0
SAS C++
VS-Basic
DMS
SPSS
A
s
s
et
F
ac
to
ry
A
p
pl
ic
at
io
n
JAVA
Exhibit 5.7
Environment
Application-Generation Function
Human
Database
Factoring
Support
X
X
X
X
X
XX
X
X
X
X
X
XX
X
X
X
X
X
XX
X
X
X
XX
X
X
XXXXX
XXXX
XX
XXXX
XX
XXXXX
XX
X
XX
XX
X
X
X
X
X
IBM Environment
Server Environment
Tool Available on PC
Micro-to-Mainframe Link
Full PC Implementation
Query Language
Report Generator
Screen Painter/Data Entry
XXX Graphics Generator
X
X
X
XXXX
X
X
X
X
X
X
X
X
X
XXXX
XXXX
X
XX
X
X
X
XXXXX
X
X
XX
X
X
X
X
XX
Decision-Support Tools
Subset for End Users
IT Professionals
Procedural Language
Interface-to-Action Diagrams
Well-Structured Code
Provable Specifications
Heavy-Duty Computing
Full COBOL Replacement
Recommended for Information Centers
XXXX Help Facility
XX
XX
XX
X
X
X
XX
XXX
Computer-Aided Instruction
Computer-Aided Thinking
Support Database Management
Standard DBMS
Package
Data Dictionary Data-Modeling Tool
(Continued) List of selected operational audit tools and techniques.
126 Information Technology Control and Audit
App
licat
ion
Fa
cto
ry
As
se
t
JA
VA
X
X
XX
XX
XX
X
X
X
Exhibit 5.7 (Continued) List of selected operational audit tools and techniques.
Auditing IT Using
Computer-Assisted Audit
Tools and Techniques☐
127
The
methods
or
On reviewing an
organization's Website,
IT auditors can measure
download time,
transaction time,
connection attempts,
missing pages, missing
page components, and
broken links, which have
to be and availability of the
Website. In addition, IT
auditors have to be aware of
errors such as failed
tabulated. The IT auditor
should evaluate the
overall performance of
the organization's
Website by r preparing
comparative Web performance
statistics for several months. These
statistics should
be examined
for significant issues and
used in the assessment of
the overall performance of
the Website. Moreover, IT
auditors should review the
Web information to ensure
that all posted data are
current. It is impossible
for IT auditors to
manually perform a
Website audit. Manually
checking that all posted data
are current will be time
consuming. Discovering
broken links, miss- ing
pages, and page
components manually are
almost impossible. Thus,
IT auditors need
CAATT'S the CAATS
because it gives IT auditors the
following advantages on audits of
Websites: to
assist them in
performing this kind of
audit. Web analysis
software is appropriate to
be one of
Reduces the time to
complete audit analysis,
test, and reports
Increases audit coverage by reducing the
amount of time spent on manual processes
Provides quality audit services by having
a standard set of audit tools and
procedures Leverages the knowledge
gathered as a result of audit projects
to provide immediate metric/ data quality
feedback to management
Using Web analyst software as CAATS not only
benefits the IT auditors but also the
organiza- tions.
By having a good
and effective Website, an
organization will gain the following
benefits:
Reduced
advertising costs
Equal access to new
markets
■Increased sales
The objective of
developing Webmetrics is
to provide industries with
the current state-of-the
art technology that will allow improved usability of
Websites. Improved usability can
dramati
cally
Computer
Forensics
Computer forensics is the examination, analysis, testing, and evaluation of
computer-based material conducted to provide relevant and valid
information to a court of law. Computer forensics tools are increasingly
used to support law enforcement, computer security, and computer audir
investigations.
A good source for evaluating computer forensics tools is the Computer
Forensics Tool Testing (CFTT) Project Website at
http://www.cftt.nist.gov/. CFTT is a joint project of the NIST, the U.S.
Department of Justice's National Institute of Justice (NIJ), the Federal
Bureau of Investigation (FB), the Defense Computer Forensics Laboratory
(DCFL), the U.S. Customs Service, and others to develop programs for
testing computer forensics tools used in the investigation of crimes
involving
computers.
One tool recently reviewed by CFTT was EnCase Forensics by Guidance Software, Inc.
EnCase enables "noninvasive" computer forensic investigations, allowing
examiners to view relevant files including "deleted" files, file slack, and
unallocated space. Other valuable resources for experience in the use of
computer forensics tools and techniques would be those professional
associations or organizations that support this area. Some of those would be The
International High Technology Crime Investigators Association, Association of
Certified Fraud Examiners, the Institute of Internal Auditors, Federal Government's
Electronic Crimes Task Force, FBI Regional Computer Forensics Laboratory, and
Colloquium for Information Systems Security Education. Note that when
applying computer forensics techniques, one must be aware of the
investigative methodology, processes, and procedures that must be
followed to the letter to