Overview Audit On Computerized Information System Environment
Overview Audit On Computerized Information System Environment
Environment
BS Accountancy (Mabini Colleges)
4.1 Introduction
Information Technology throughout the world has revolutionized and dramatically changed the manner in
which the business is conducted today. Computerization has a significant effect on organization control,
flow of document information processing and so on. Auditing in a CIS environment even though has
not changed the fundamental nature of auditing, it has definitely caused substantial changes in the
method of evidence collection and evaluation. This also requires auditors to become knowledge about
computer environment (Hardware, software etc.) and keep pace with rapidly changing technology, even
to the extent of using sophisticated Audit software. Students are advised to study the technical issue
relating to Information Technology from the study material of paper 6.
In the Black box approach or Auditing around the computer, the Auditor concentrates on input and
output and ignores the specifics of how computer process the data or transactions. If input matches the
output, the auditor assumes that the processing of transaction/data must have been correct.
In testing, say, Payroll Application, the auditor might first examine selected time cards for hours worked
and employee earning cards for rates and then trace these to the payroll summary output and finally compare
hours, rates and extensions. The comparison of inputs and outputs may be done manually with the
assistance of the computer. The computer assisted approach has the advantage of permitting the
auditor to make more comparisons
Compare with
Client Output
Predetermined Output
The processes and controls surrounding the subject are not only subject to audit but also the
processing controls operating over this process are investigated. In order to help the auditor to gain access to
these processes computer Audit software may be used. These packages may typically contain:
(a) interactive enquiry facilities to interrogate files.
(b) facilities to analyze computer security logs for unusual usage of the computer.
(c) the ability to compare source and object (compiled) program codes in order to detect
dissimilarities.
(d) the facility to execute and observe the computer treatment of "live transaction" by moving through
the processing as it occurs.
(e) the generation of test data.
(f) the generation of aids showing the logs of application programs. The actual controls and the higher level
control will be evaluated and then subjected to compliance testing and, if necessary,
substantive testing before an audit report is produced.