Computer Aided Audit Technique
Computer Aided Audit Technique
Computer Aided Audit Technique
INTRODUCTION TO INFORMATION
SYSTEMS AUDIT
Computer Aided
Audit Technique
Objectives
Continous Auditing
Audit Productivity Tools
Computer-Assisted Audit Techniques (CAATs)
Computer Forensics Methods and Techniques
2
Benefits of Audit Automation
Risk
Increase audit productivity Assessment
and coverage
Audit
Reporting
Schedule
Provide responsiveness to
the change
Audit
Analysis
Better knowledge Program
management
Audit Tests
3
What Is Continuous Auditing?
Continous Auditing
a methodology or framework that enables auditors (external and
internal) to provide written results on the subject matter using
one or a series of reports issued simultaneously.
Continuous monitoring
allows an organization to observe the performance of one or
many processes, systems or types of data. similar to executive
information systems.
Continous Assurance :
result of the combination of continous auditing and audit
oversight of continous monitoring
4
Continuum of Continuous
Auditing
5
Conceptual Model
6
Managment effort and audit
activity relationship
7
KEY STEPS TO IMPLEMENTING
CONTINUOUS AUDITING
8
KEY STEPS TO IMPLEMENTING
CONTINUOUS AUDITING
10
KEY STEPS TO IMPLEMENTING
CONTINUOUS AUDITING
Two categories
Audit productivity tools: automate the audit
function and integrate information gathered
Computer-assisted audit tools (CAATs): tools for
substantive audit tests such as data and control
evaluation
Appropriate use and application of CAATTs
relies on appropriate training, sharing of
experiences, and supervision.
13
Audit productivity tools
15
CAATs
16
General Audit Software
Dasar-Dasar Audit SI
Application Testing
Judgmental sampling
Select the sample based on the auditor’s experience
Item of audit interests
• Specify criteria based on amount, time, region, etc.
Statistical sampling
Random selection
Representative of the population
Various methods
• Random number samplings :
– Items are randomly selected from a population so that each
item has an equal chance of being selected. 19
Data Analysis
Transaction tagging:
Follow a selected transaction through the entire
application (e.g., Trace function)
Snapshot
Examine selected variables
Check the value before and after a certain process
Integrated test facility
Create a fictitious entity, such as a customer, within
the context of the regular application
Process test transaction together with live inputs 21
Computer Forensics
22
Computer Forensics:
Challenges
Advancement of encryption
Maintaining credible certifications and industry
standards
More standards need to be developed
Hiding data
Various data storage media
Change file extension
Requires high degree of patience and perseverance
23