control and audit information system
Post on 23-Jan-2018
333 Views
Preview:
TRANSCRIPT
LOGOwww.themegallery.com
oleh :
ARIF PRASETYO
11353100414
CONTROL AND AUDIT INFORMATION SYSTEM
Dosen Pengampu : M. Jasman, S.Kom, M.InfoSys
LOGOwww.themegallery.com
Control & Audit
by Vishnu Ap Audit is a process checks are carried out systematically to find out
how the actual implementation of quality applied. The audit results will be in the
documentation and periodic evaluation. Meanwhile, according to Frans m. Royan
Audit aims to facilitate owners to control and avoid fraud and manipulation of data.
While understanding the information systems audit is an inspection activities
performed by an internal audit of the company in collecting evidence and
evaluating control of the company to achieve the company's objectives and in
accordance with the specified criteria.
control is also called a system control means (A control is a system) in other words,
is a set of interrelated components that relate to work together to accomplish a
purpose or goal, legality / validity of an activity (unlawful events), and inspection.
LOGOwww.themegallery.com
5 Accounting Information Systems Audit Cycle
1. Revienue Cycle (sales and cloction)
2. Expenditure Cycle (about how to buy goods)
3. Production Cycle (How to produce Goods)
4. HRM
5. General Regent and Reporting System
LOGOwww.themegallery.com
Internal audit
Internal audit is independent appraisal function to examine and evaluate the
activities and as a service for an organization. internal auditor perform a
variety of activities, including financial, operational, compliance and audit
fraud. Auditors can work for your organization or tasks can be outsourced.
Independence is self-imposed, but the auditor representing the interests of the
organization.
LOGOwww.themegallery.com
External vs. Internal Auditor
The external auditors are outsiders while internal auditors representing
the interests of the organization. Internal auditors often cooperate with
and assist the external auditors in some aspects of the financial audit.
Extent of cooperation depends on the independence and competence of
the internal audit staff. external auditors may rely in part on evidence
gathered by the internal audit department is organizationally independent
and reports to the audit committee of the board of directors.
LOGOwww.themegallery.com
The role of the Audit Committee
Subcommittee of the board of directors
• Usually three external members.
• SOX requires at least one member must be a "financial expert".
Functioning as an independent "check and balance" to the
internal audit function.
SOX mandates that external auditors report to the audit
committee:
• the employee committee and auditor fire and resolve disputes.
LOGOwww.themegallery.com
Auditing standards
statements of management and auditing purposes:
1. The existence or occurrence; Completeness; Rights and obligations; Valuation
or Allocation; Presentation and Disclosure.
2. The auditor develops auditing purposes and to design audit procedures based
on this statement.
3. Auditor search for material evidence corroborating the statement.
4. The auditor should determine whether internal control deficiencies and material
misstatement.
5. The auditor should communicate the results of their tests, including an audit
opinion.
LOGO
Audit risk
The probability that the auditor will make ineligible opinions (net) of the financial statements are,
in fact, a material misstatement. the inherent risk (IR) is associated with the unique
characteristics of the client's business or industry. control risk (CR) is the possibility of
controlling structure is flawed because the control does not exist or is inadequate to prevent or
detect errors. Detection risk (DR) is the auditor is willing to take the risk that errors are not
detected or prevented by the control structure will not be detected by the auditor. components
of audit risk in the model used to define the scope, nature and timing of substantive testing:
audit risk model: AR = IR x CR x DR
If the risk is acceptable audit is 5%, the risk of detection will depend on the planned control
structure.
The stronger the internal control structure, the lower the risk control and less substantive testing
the auditor should do.
substantive testing is labor intensive audit costs and time-consuming, which encourages and cause
interference.
management interests are served by a strong internal control structure.
www.themegallery.com
LOGO
Internal control
Management is required by law to establish and maintain an adequate system of internal controls.
A brief history of the law of internal control:
1. SEC Acts of 1933 and 1934.
2. Copyright law of 1976.
3. Foreign Corrupt Practices (FCPA) in 1977 requires companies registered with the SEC to:
• Keep records sufficient and fairly reflect the transactions and the company's financial position.
• Maintain internal control systems which provide reasonable assurance that organizational goals
are met.
Committee of Sponsoring Organizations - 1992
• Sarbanes-Oxley Act of 2002 (SOX) requires management of public companies to implement an
adequate system of internal controls over their financial reporting process. Under Section 302:
• Managers should state the organization's internal controls quarterly and annually.
• external auditors must perform certain procedures quarterly to identify modifications that control
material can affect financial reporting.
Section 404 requires management of public companies to access the effectiveness of internal
controls in their annual reports.
LOGOwww.themegallery.com
Internal Control System
internal control system consists of policies, practices and
procedures to achieve four broad objectives:
Safeguard company assets.
Ensure the accuracy and reliability of accounting records and
information.
Promoting efficiency in operations.
Measuring compliance with prescribed policies and procedures
management.
LOGOwww.themegallery.com
Internal Control System
internal control system consists of policies, practices and
procedures to achieve four broad objectives:
Safeguard company assets.
Ensure the accuracy and reliability of accounting records and
information.
Promoting efficiency in operations.
Measuring compliance with prescribed policies and procedures
management.
LOGOwww.themegallery.com
Modifying Principles
management's responsibility to make laws by SOX.
Goals must be achieved regardless of the data processing method used.
Each system has limitations on its effectiveness including: the possibility of
error, circumvention, overriding management and changing conditions.
The system should provide reasonable assurance that the broad objectives are
met.
Costs to achieve improved control should not be greater than the benefits.
Cost of material weaknesses corrected offset by gains.
LOGOwww.themegallery.com
PDC Model
passive preventive control techniques designed to reduce the frequency of
undesirable events occurred.
more cost effective than detect and fix problems after they occur.
is a detective control devices, techniques and procedures to identify and
expose the undesirable events that pass preventive controls.
corrective controls to correct problems identified.
LOGOwww.themegallery.com
IT Governance
Part of the corporate governance focusing on resource
management and strategic IT assessment.
key object to reduce risk and ensure investment in IT
resources add value to the corporation.
All of the company's stakeholders must be active
participants in key IT decisions.
LOGOwww.themegallery.com
Control IT Governance
COSO (Committee Of Sponsoring Organitation) was first made in 1992. Three
issues of IT governance is handled by SOX and the COSO internal control
framework:
• the organizational structure of the IT function.
• computer operations center.
• disaster recovery planning.
LOGOwww.themegallery.com
There are 5 parts of COSO, namely:
1. Control environment
2. The risk factors
3. The information communication
4. monitoring
5. control activity, in control of this activity there are two categories, namely
• in IT
• physically
The purpose of control is to avoid the occurrence of Error, Froud (thieves), Acess and
Nischip.
In 2001 there kasun EROM, which occurred between the public transport games.
Sabban Oxcly has made rule of law sourch in 2002, 4 times in a year perform an audit.
For membagun a company needs to be held to protect preventive control, detective and
corrective controls to mendekteksi control to fix.
LOGOwww.themegallery.com
Audit Data Base
Access to data resources controlled by a database
management system (DBMS).
Centralize the organization's data into a common database
shared by a community of users.
All users have access to the data they need to overcome the
problem of flat-file.
Deletion of data storage problem: There is no data
redundancy.
Elimination of the problem of updating the data: Single
update procedure eliminates a problem of information.
Abolition of duty-dependency problems User data is limited
only by the legitimacy of the access needs.
LOGO
Physical database
the lowest level and the only one in the physical form.
Sports magnetic disk coated metal that makes a logical collection of files and
records.
data structure of bricks and mortar database.
Allows records to be located, stored, and retrieved.
Two components: organization and access methods.
File organization refers to the way records are physically arranged in the
storage device - either sequential or random.
access method is a program used to search for records and to navigate through
the database.
www.themegallery.com
LOGO
Terminology database
Entity: Organization Anything want to capture data about.
Record Type: physical representation of database entities.
Genesis: In relation to the number of records is represented by a particular
record type.
Attributes: Defining entities with values different (ie each employee has a
different name).
Database: Set the type of record that organizations need to support their
business processes.
www.themegallery.com
LOGO
AUDIT INFORMATION SYSTEM BASED ON COBITFRAMEWORK
www.themegallery.com
Control Objectives for Information and releated
Technology, or in short COBIT is a standard guide
information technology management practices. COBIT IT
governance is designed as a tool that helps in pemahamaan
and manage the risks, benefits and evaluation related to IT.
Standards issued by the COBIT IT govermance Institute
which is part of ISACA. COBIT 4.0 is the latest version ..
LOGOwww.themegallery.com
COBIT Framework consists of 34 high-level control objective,
which each IT grouped in four Primary Domain:
LOGO
1. Planning and Organization
Includes strategies and tactics regarding the identification of how IT can best contribute
to the achievement of the organization's business objectives, forming a good
organization with good technology infrastructure anyway.
PO1 Difene a strategic information technology plan
PO2 difine the information archicture
PO3 Determine the technological direction
PO4 Difene the IT organization and releationship
PO5 Manage the investment in information technology
PO6 Communicate management aims and direction
PO7 Manage human resources
PO8 Ensure compliance with external requirements
PO9 Assess risks
PO10 Manage Projects
PO11 Manage quality
www.themegallery.com
LOGOwww.themegallery.com
2. Acquisition and Implementation
Identifikassi Ti solution later in implementassikan and
integrated into business processes to realize the IT strategy.
AI1 Identity automated solutions
AI2 Acquire and maintain application software
AI3 Acquire and maintain technology infrastructure
AI4 Develop and maintain IT procedure
AI5 Install and accredit systems
AI6 Manage Changes
LOGOwww.themegallery.com
3. Delivery and Support
Domain associated with the desired storage service, which consists of the operating
system and the security aspects of business continuity up to the procurement
training.
DS1 Define and manage service levels
DS2 manage third-party service
DS3 manage performance and capacity
DS4 Ensure continuous service
DS5 Ensure system security
DS6 Identify and allocate costs
DS7 Educate and train users
DS8 Assist and advise costumers
DS9 manage the configuration
DS10 manage problems and incidents
DS11 manage the data
DS12 Manage facilities
DS13 Manage Operations
LOGOwww.themegallery.com
4. Monitoring
All IT processes need to be assessed regularly and periodically bagaimmana
kesesuiananya the quality and control requirements.
M1 monitor the process
M2 Assess internal control adequacy
M3 obatin independent assuarance
M4 Provide for independent audit
top related