Information Systems Auditing (ISMT 350) week #3 Instructor: Professor J. Christopher Westland, PhD, CPA Time: Tue & Thur 10:30am-11:50amVenue: Rm. 2463Duration: 5 Sep – 7 Dec Text. Champlain, Auditing Information Systems (2nd ed.), Wiley, 2003 Contact: Office: 852 2358 7643 Email: westland@ust.hk Fax: 852 2358 2421 URL: http://teaching.ust.hk/~ismt350/ Course Topics Topic Readings Practicum Competency Case Study What is Information Systems (IS) Auditing? Industry Profile: The Job of the IS Auditor Identifying Computer Systems Chapter 1 Evaluating IT Benefits and Risks Jacksonville Jaguars IS Audit Programs and Computer Systems Inventory Chapter 2 The Job of the Staff Auditor A Day in the Life of Brent Dorsey IS Security Chapter 3 Recognizing Fraud The Anonymous Caller Utility Computing and IS Service Organizations Chapter 4 Evaluating a Prospective Audit Client Ocean Manufacturing Physical Security Chapters7 Inherent Risk and Control Risk Comptronix Corporation Logical Security Chapter 8 Evaluating the Internal Control Environment Easy Clean IS Operations Chapter 9 Fraud Risk and the Internal Control Environment Cendant Corporation Controls Assessment Chapter 10 IT-based vs. Manual Accounting Systems St James Clothiers Encryption and Cryptography Chapter 11 Materiality / Tolerable Misstatement Dell Computer New Challenges from the Internet: Privacy, Piracy, Viruses and so forth Course Wrap-up Information Systems and Audit Evidence Henrico Retail Logical Structure of the Course With Readings from the Text IS Auditing IS Components Ch. 1&2 Controls over IS Assets Ch. 7 & 8 Encryption Ch. 11 Current and Future Issues in IS Auditing Audit Components Ch 3&4 Procedural Controls Ch. 9 Audit Standards and Procedures Ch. 10 Forensics and Fraud Audits Ch. 12 Recap: Jacksonville Jaguars’ Spot® e-Cash Card Why use Cash? anonymity, divisibility usability portability, ease of use, time shifting, security, privacy, durability flexibility Why use an e-cash card? The Magnetic Stripe (Contact) Card Credit & debit cards Credit cards offer the major advantage of deferred payment Limitations initiate transfers from one store of value (e.g., a bank account) to another store of value (e.g., a retailer’s bank account). Diners Club issued the first credit card in Hong Kong in 1959. credit limits (lost sales) involve multiple parties (overhead costs and infrastructure) surcharge of between 3 percent and 5 percent (10 to 15 for Internet transactions) Debit cards enable the cardholder’s account to be immediately debited Contactless Cards Contactless implies that input/output is accomplished through a microscopic antenna rather than a physical plug Hong Kong light rail and bus companies use the contactless Octopus card The Octopus is a stored value/debit/credit card hybrid Golden Harvest Cinema card, and the Hospital Authority Patient card can hold customer information Smartcard Taxonomy Reloadable Electronic Purse System Biometrics: Think about e-card security Auditing & the Computer Inventory Transactions External Real World Entities and Events that Create and Destroy Value Internal Operations of the Firm The Physical World Transactions Corporate Law Analytical Tests Audit Report / Opinion Accounting Systems The Parallel (Logical) World of Accounting Ledgers: Databases Journal Entries Reports: Statistics Tests of Transactions Audit Program tation Attes Auditing Substantive Te sts 'Owned' Assets and Liabilities The Computer Inventory Step in Planning and Review Planning and review identifies audit areas by level of risk Relevant factors: Transaction size and volume Computers inside or outside firm Incentives to abuse system Error-prone Audit Objectives Reporting Risks (External Audit) Control Process Risks (Internal & External Audits) Asset Loss Risks (Internal Audits) Transaction Flows Business Application Systems Operating Systems (including DBMS, network and other special systems) Hardware Platform Physical and Logical Security Environment How Auditors Should Visualize Computer Systems Risks Presented by Computers Transaction flows are less visible Fraud is easier Computers do exactly what you tell them Audit samples require computer knowledge and access Transaction flows are much larger (good for the company, bad for the auditor) Audits grow bigger and bigger from year to year To err is human But, to really screw up you need a computer And there is more pressure to eat hours Environmental, physical and logical security problems grow exponentially Externally originated viruses and hacking are the major source of risk (10 years ago it was employees) Risks Presented by The Internet Transaction flows are External External copies of transactions on many Internet nodes Internet Service Providers for accounting systems require giving control to outsiders with different incentives Auditors do not have access to many (perhaps most) of the transaction audit trails Environmental, physical and logical security problems grow exponentially Externally originated viruses and hacking are the major source of risk (10 years ago it was employees) Risks Presented by Utility Computing Transaction flows are transported via the Internet External copies of transactions on many Internet nodes All corporate data is stored outside the physical control of the firm There are legal limits on the access to firm data, especially for 3rd parties (auditors) Audit samples may be impossible to obtain Transaction flows are intermingled between companies Environmental, physical and logical security problems grow exponentially Risks Posed by Transaction Traffic on The Internet Not only are Internet transaction flows external to the firm They tend to be clustered, and transactions are recorded on multiple servers (with multiple owners and sets of security controls) in the process Because anyone on the Internet theoretically has access to these transactions Automated agents can steal, alter or delete huge numbers of transactions Without leaving a trace in the audit trail Internet Traffic Internet connectivity (with backbone ISPs) Finding the Right Data: 19 degrees (and climbing) The Internet (size =N ) Degrees of Separation =. 35+2 log10 N Continental Drift The 4 Realms of the Internet (Andrei Broder, AltaVista, 1999) In(25%) Central Core (25%) Isolate d Is/ands Out (25% ) Corporate Sites The Dark Net 5% to 10% of the Internet is completely unreachable (Arbor Networks ) parts of the Net accessible from one provider but unreachable via one or more competitor Why? Failures and filter errors often result from misconfigured routers, the virtual traffic cops that direct Net activity. Net traffic may be blocked due to contractual disputes between providers Malicious use of dark address space. For example, some spammers use a pernicious technique whereby routes are announced and then immediately withdrawn around the time of a mass email transmission Emerging forms of computer use in accounting systems Computers in the Audit Program Analytical Review Internal Control Tests (Tests of Transactions; Mid-Year Tests) Tests for internal consistency of accounts, cross-sectional and over time Computer is a tool for accomplishing this and administration of audit Main tests of Computerized Accounting System Is it working as it should Are there risks? Are these well-controlled LOR / IC Memo Substantive Tests Account balances and transactions reside on the computer database Closing computer programs are highly error-prone Auditing = Statistics All three classes of procedures share a goal with Statistics Objective: use ‘data’ to guess what is ‘true’ Problems: Type I error: Auditor says F/S are Wrong when they are Fairly Stated Type II error: Auditor says F/S are Fairly Stated when they are Wrong Consequence of either: LAWSUITS Auditors increasingly use computers to prepare parallel sets of statistics for the firm’s transactions To be compared to the account balances Auditing Procedures These are formally laid out in the Audit Program The Planning and Risk Assessment phase of the Audit Writes the Audit Program Which is a sequence of Statistical Tests (Auditors call the sloppier of these ‘Judgment Tests’) Accounting Department in the early 1900s Accounting Department in the 1970s Accounting Department of today and the near future Practicum: A Day in the Life of Brent Dorsey What’s it like to be a staff auditor at a CPA firm Work vs. Family conflicts: What to do? How Auditing today is different than before the 1980s Prac·ti·cum (prăk-tĭ-kəm) noun Lessons in a specialized field of study designed to give students supervised practical application of previously studied theory Student Competence Case Study 1 Evaluating IT Benefits and Risks Jacksonville Jaguars 2 The Job of the Staff Auditor A Day in the Life of Brent Dorsey 3 Recognizing Fraud The Anonymous Caller 4 Evaluating a Prospective Audit Client Ocean Manufacturing 5 Inherent Risk and Control Risk Comptronix Corporation 6 Evaluating the Internal Control Environment Easy Clean 7 Fraud Risk and the Internal Control Environment Cendant Corporation 8 IT-based vs. Manual Accounting Systems St James Clothiers 9 Materiality / Tolerable Misstatement Dell Computer 10 Analytical Procedures as Substantive Tests Burlington Bees 11 Information Systems and Audit Evidence Henrico Retail Risk and Magnitude Where to look for accounting risk Industry Structure, c. 2006 Information Technology Market Operations & Accounting Search & Storage Tools Embedded Communications Total Employees (thousand) Annual Expenditures ($US billion) Major Suppliers 500 2000 US, India 1000. 5000 US 300 300 US, Germany 1500 700 US, Japan, Korea, Greater China 700 2000 4,000 10,000 US, Germany, Japan, Greater China GWP ~$45 trillion (Pop: 6 billion) US GDP ~$10 trillion (Pop: 300 million) Accounting Transaction Flows, c. 2006 Information Technology Market Transaction Flows $(000,000) Accounting Processing 20,000 Accounting Data Storage 10,000. Tools Embedded Communications 0 10 30,000 U.S. Contribution to GDP (in billions) from various industries shows why computer transaction flows have grown Information Technology, $534 Other, $2,989 Life Sciences, $712 Finance, $820 Manufacturing, $2,839 Services, $2,965 Hardware Taxonomy Central Processing Unit Cache Fast Memory Peripheral Processor (Video, Bus, Etc.) RAM / ROM Optical & Magnetic Media Slow Network Devices Software Taxonomy Operating Systems Specialized O/S Network O/S Utilities Database O/S Programming Languages, Tools & Environments Applications Utilities and Services Computer Controls (procedures) and Audit Steps (procedures) Control Concepts Controls are processes associated with a person or entity that is responsible for that process The same individuals with: Managerial Control Accountability Responsibility for the process Internal Controls Are processes that insure procedures operate as they should And produce accurate account values Cost-effective Controls Like any process, the benefit should exceed the cost The way to manage this Is to control high risk transaction flows Transactions that are error-prone Transaction flows where incentive to abuse is high Materiality: How much control or auditing is enough? Materiality is the maximum tolerable error allowable in financial reporting Audit reports will assert that the statements are ‘fairly stated’ if the error is less than some ‘material’ amount with a given degree of ‘confidence.’ Where we do have evidence from court proceedings ‘materiality’ has ranged from fractions of 1% to close to 30% and confidence limits have ranged from 99% to around 70% (generally closer to 70%) Materiality and Auditor Influence A recent survey of 170 chief financial officers by CFO Magazine found that 38% said auditors questioned their results in the past year Of those challenged, most refused to back down: (taken after Enron, WorldCom and numerous other audit scandals) 25% persuaded the auditor to agree to the practice in question, 32% convinced the auditor that the results were immaterial 43% made changes to win the auditor's approval Lynn Turner, former chief accountant at the Securities & Exchange Commission pointed out that an earlier CFO Magazine survey that had 17% of respondents admitting that CEOs pressured them to misrepresent results. Other Audit Considerations Sampling Computer inventory selected as “at risk” will be subject to detailed sampling Short History The earliest references to audit sampling appears in a program of audit procedures printed in 1917 by the US Federal Reserve that included some early references to sampling, such as selecting "a few book items" of inventory In 1955, the American Institute of Accountants (later to become the AICPA) published ‘A Case Study of the Extent of Audit Samples’, which summarized audit programs prepared by several CPAs to indicate the extent of audit sampling each considered necessary Sampling (Cont) Statistical Sampling and the Independent Auditor, issued by the AICPA's in 1962 concluded that statistical sampling was permitted under generally accepted auditing standards (GAAS). Relationship of Statistical Sampling to Generally Accepted Auditing Standards, in 1964 was later included as appendix A of Statement on Auditing Procedure (SAP) 54, The Auditor's Study and Evaluation of Internal Control which was, again, reused later as AU section 320 of Statement an Auditing Standards (SAS) 1, Codification of Auditing Standards and Procedures. Some of that material was extended in 1972 as appendix B of SAP 54. There were in addition to Statements on Auditing Procedure, SAP 33 and SAP 36 which gave tepid support to the use of statistics, but in general encouraged the continuation of what the practice called judgmental sampling – an ad hoc selection of samples that suffered from the biases and foibles that statistics were designed to control. In 1981, the AICPA rolled all of this into a single standard SAS 39, titled Audit Sampling which more or less repeats their position in the mid-1960s. SAS 47 discusses auditor risk and the murky concept of ‚materiality’ (the auditors dispersion or error statistic) in planning an audit. K SAS 55 and SAS 78 address internal control and control risk, but fail to provide objective procedures or formulas for assessing either Nowhere is Materiality unequivocally defined Assurance on Risk Assessment The AICPA’s Position Risk assessment services include identification and assessment of primary potential risks faced by a business or entity, independent assessment of risks identified by an entity, and evaluation of an entity's systems for identifying and limiting risks. Why? “Assessment and control of business risks has become increasingly important in recent years due to changes in information technology and related developments. Information technology has reduced the time available to react to environmental change, streamlined and altered the design of business processes, and changed the optimal form of organization. These developments have led to a de-layering and downsizing of businesses, resulting in fewer employees devoted to control activities, and empowering employees to make decisions. These changes affect traditional controls over information and safeguarding of assets. Types of Risk The AICPA’s Position 1. Business risk has been defined as "the threat that an event or action will adversely affect an organization's ability to achieve its business objectives and execute its strategies successfully" (The Economist Intelligence Unit 1995). A business faces many threats to achieving its objectives and to executing its strategies, and business risks can be classified in many ways. For example, one useful way is: 2. Strategic environment risks - threats from broad factors external to the business including changes in customers' tastes and preferences, creation of substitute products, or changes in the competitive environment, political arena, legal/regulatory rules, and capital availability, 3. Operating environment risks - threats from ineffective or inefficient business processes for acquiring, transforming, and marketing goods and services, as well as loss of physical, financial, information, intellectual, or market-based (such as a customer base) assets, loss of markets or market opportunities, and loss of reputation. 4. Information risks - threats from the use of poor quality information for operational, financial, or strategic decision making within the business and providing misleading information provided to outsiders. Incentives to misuse accounting transactions Steady replacement of paper with databases Steady replacement of meetings and travel with information networks Entry into Computer Crime Personal Background Motives Learning S kills to Commit Crime Un-premeditated Premeditated Choose "Best" Option Decision / Action Matrix Commit Crime Reaction to Chance Event Select Asset Don't Select • Face Penalties • Enjoy Rewards N/A Don't Commit • Too Hard • M onitored • Unfamilar • Not enough value Criminal Decisions Criminals specialize Criminals make simplifications in computing odds E.g., only 22% of robbers think of doing another crime (burglary being the most common choice) They tend to add (rather than multiply) their chances of being caught and punished Suggests that a few controls which are very effective Successful Security What assets are protected Why are they valuable To Whom are they valuable “Where” and when are they accessible How are they accessible The first three questions are answered by Risk Analysis The second three questions by Security Technique Formalizing the Risk Assessment Flowchart to identify risks Flowcharted Accounting System Review each transaction flow for: $ and # volume Incentive to abuse Error-proneness Control effectiveness on nsacti a r T Risk n High ctio a s ran kT s i hR Hig n tio c a s ran T k Ris h g Hi Risk Assessment Database Statistical Tests For each ‘risky’ transaction Mid-year, Internal Control tests will reveal the probability risk of a loss of size X for a transaction You may need last years audit papers Compute probable occurrence (frequency) Compute probable loss Identify needed control processes The ‘Incentive’ Test for each ‘risky’ transaction Personal Background Motives Learning S kills to Commit Crime Un-premeditated Premeditated Choose "Best" Option Decision / Action Matrix Commit Crime Reaction to Chance Event Select Asset Don't Select • Face Penalties • Enjoy Rewards N/A Don't Commit • Too Hard • M onitored • Unfamilar • Not enough value The Risk Assessment Database Asset (Ex 2.1) Risk Assessment (Ex. 2.2 with improvements) Asset Value ($000,000 to Owner)* Transaction Flow Description Total Annual Transaction Value Flow managed by Asset($000,000)* Cost of single occurrence ($) Expected Loss 100 100 10000 35 350 12250 Primary OS Owner Applicatio n Win XP Receiving Dock A/P 0.002 RM Received from Vendor 23 Theft Win XP Receiving Dock A/P 0.002 RM Received from Vendor 23 Obsolescence and spoilage Etc Etc Etc Etc Etc Etc Etc Etc Etc Etc Etc Etc Etc Etc Etc Etc Etc Etc Etc Etc Etc Etc Etc Etc Etc Etc Etc Etc Etc Etc Risk Description *Whether you list depends on Audit Materiality Probability of Occurrence (# per Year) Materiality Test Each row on the Risk Assessment database All expected losses that are material mark transaction flows: Should be compared with the materiality Which should be written up in the internal control letter For which audit tests should be expanded The audit program is typically written in detail at this point Mid-year tests are basically a sequence of ‘risky’ transaction audits Year end tests are modified based on whether an account is built up (in the case of nominal accounts) or represents (in real accounts) a risky transaction New Technologies: Radio Frequency Identification Tags RFID provides an essential link In autonomous, self-aware, intelligent devices Hardware, software and databases combine to automate the capture of new data New Tech New Tech Economics RFID IC chips are made on wafers, and each wafer yields about 25,000 chips. One wafer lot, consisting of 25 wafers, yields about 1.25 million chips. A manufacturer may produce 50 to 70 million chips per day, about 48 wafer lots. Therefore an order of 1.25 million chips could take about 2 hours to manufacture. A typical plant costs $1.5 billion to $2 billion.