Page 143 - DCOM509_ADVANCED_AUDITING
P. 143

Advanced Auditing




                    Notes             Auditors can also use high-level languages (such as SQL in a relational database system) to
                                       select data that satisfy certain criteria and format this data for reporting purposes. However,
                                       such  high-level  languages  may  not  have statistical  sampling  capabilities.  Auditors
                                       overcome such difficulties by using macros, which allow writing programmes to perform
                                       a particular function and then invoke these programmes with a single command.
                                   8.4.3 Concurrent Auditing Techniques


                                   Concurrent auditing techniques were developed in 1960s and 1970s to address problems related
                                   with computer based information systems particularly disappearing paper-based audit trails
                                   and  secondly continuous  monitoring required  by advanced systems. There  are four  major
                                   concurrent audit techniques:

                                      Integrated Test Facility: This technique involves establishing a dummy entity on application
                                       system files  and  processing  audit  test  data against  the  entity  to  verify  processing
                                       authenticity, accuracy and completeness. However, it requires two major design decisions
                                       for the system one, what method will be used to enter data and two what method will be
                                       adopted to remove its effects. For this, one may either tag the dummy (ITF) transaction
                                       and application system may be programmed to recognize this tagged transaction. Then
                                       system may prepare two updates one for their master files record and other for dummy
                                       entity. The second method is designing new test data (with a key field to denote it is ITF
                                       transaction) and entering into the application system. The effects of ITF entries can be
                                       removed either by modifying application system (so that it recognizes such transactions
                                       and ignores them in any processing that may effect users); or submitting additional input
                                       that reverses the effect of ITF transactions or to submit trivial entries so that effect of ITF
                                       transactions on output is minimal (this is simple however, users will have to be advised of
                                       ITF testing.
                                      Snapshot/Extended Record:  This  technique  involves  software  taking  “pictures”  (or
                                       snapshots) of a transaction as it flows through application system. For this auditors embed
                                       the software in application where they deem material processing occurs. For this auditors
                                       must decide where to locate snapshot points, when they will capture the snapshots and
                                       regarding reporting of the snapshot data that is captured. The embedded software must
                                       provide sufficient identification and time stamp information of each transaction to enable
                                       auditors to determine the transaction for which it applies and the sequence of changes as
                                       they occur. A reporting system must also be designed and implemented to present data in
                                       a meaningful way. A modification of this technique is extended record technique in which
                                       a single record is constructed built up from the images captured at each point. This has the
                                       advantage of having all information in one place and facilitates audit evaluation. These
                                       techniques can be used in conjunction with ITF technique.
                                      System Control  Audit Review  File (SCARF):  This involves  embedding audit  software
                                       modules within host application system for continuous monitoring of system’s transactions.
                                       The information is written to a special audit file SCARF master file. Auditors them examine
                                       the information contained on this file to see if some aspects need follow up.
                                      Continuous and intermittent Simulation (CIS): This (CIS) technique can be used whenever
                                       application systems use a database management system (DBMS). CIS uses DBMS to trap
                                       exceptions of interest to auditor and application system is left intact. When application
                                       system invokes services provided by DBMS, DBMS indicates to CIS that a service is required.
                                       CIS then determines whether it wants to examine activities carried out by DBMS on behalf
                                       of application system or not. The main advantage of CIS is that it does not require any
                                       modification to application system.





          138                               LOVELY PROFESSIONAL UNIVERSITY
   138   139   140   141   142   143   144   145   146   147   148