Uploaded by Alexander Bako

B202176B ISA individual Assignment BAKO ALEXANDER ANESU

advertisement
BINDURA UNIVERSITY OF SCIENCE EDUCATION
FACULTY OF SCIENCE AND ENGINEERING
DEPARTMENT OF COMPUTER SCIENCE
STUDENT NAME
:
BAKO ALEXANDER ANESU
REGISTRATION NUMBER
:
B202176B
PROGRAMME
:
SOFTWARE ENGINEERING
COURSE CODE
:
LECTURER
LEVEL
ASSIGNMENT
SWE213
:
Mr. MUSARIWA
:
2.2
:
2
Question 3
a) Audit planning" means developing a general strategy and a detailed approach for the
expected nature, timing and extent of the audit. The auditor plans to perform the audit in an
efficient and timely manner. In simple words, developing an overall strategy for the effective
conduct and scope of the examination. In establishing the overall audit strategy, the auditor
should identify the characteristics of the engagement that define its scope, ascertain the
reporting objectives of the engagement in order to plan the timing of the audit and the nature
of the communications required. The audit planning process have the following vital
activities carried out in order to plan a successful audit.
Firstly, it is essential to understand the business process or function to be audited. If not
familiar with it, thoroughly research the process or function to fully understand the subject
matter. Review internal procedures, search the internet for resources, and seek help from
subject matter experts. This means if an auditor is contracted to audit a financial accounts of
an organization then that person should have some expertise in accounts in order to undertake
the audit, if not the auditor is expected to do some research about the audit area. This is
initiative is supported by ISACA standards which encourages professionals only to take
responsibility in work that they have the skills in. Within the same motive, the contracted
auditor can even hire a specialist in accounts auditing to help where special kills are required
to come up with purely informing audit reports and recommendations.
Establish communication ways to the auditee and maintain pen communications throughout
the planning process is another important activity. The sooner the audit team reaches out to
the auditee, the better. There is a certain amount of trepidation involved in any audit.
Working with an auditee prior to the audit helps ease concerns the auditee may have.
Communicating in person is always preferable. If this is not possible, telephone calls are the
next best thing. Avoid communicating by email if possible. This will help the auditor to
remain in line with what the client really want and the auditor can also communicate his/her
views from a professional point of view based on the audit works.
The auditor also conducts walk through armed with a working understanding of the process
or function, conduct a face-to-face walk through with the auditee. Identify key business
objectives, methods employed to meet objectives, and applicable rules or regulations. A
walkthrough may include a tour of facilities. You may gather background information
relative to the nature, purpose, volume, size, or complexity of automated systems, processes,
or organizational structure. You might scan documents or records for general condition. All
these activities provide opportunities to interface with the auditee and build rapport before
the formal entrance conference.
Crucially mapping risks to the organization, Process, or function is also important. The
auditor asks the auditee what his concerns are, within the audit works through research and
interviews, identify risks to meeting business objectives and controls employed to mitigate
those risks. Rate risks with the auditee based on probability of occurrence and potential
impact. Consider control design, gaps, or mitigating factors to determine if the control system
effectively mitigates risks.
Finally, obtaining data prior to fieldwork, this has become a principal focus recently. It
emphasizes in initial requests for information. Data analytics is performed before beginning
of field work. Identifying anomalies to confirm a condition or weakness early helps us target
testing and optimize sample selections.
Conclusively, audit planning is the audit phase in which we can best influence audit results.
It is a key but too easily overlooked component of the audit process. It is something that
needs to be emphasized and institutionalized into a habit. This habit ultimately leads to audit
success.
b) Economy - obtaining the appropriate quantity and quality of resources at the lowest cost
possible; optimizing the resources (inputs) which an organization has.
Efficiency - maximizing the output generated from units of resource used; optimizing the
process by which inputs are turned into outputs. This can often be measured in terms of the
cost of providing a service per unit of resource used, per unit of output, or per beneficiary
served (in the context of a service).
Effectiveness - the relationship between the organization’s intended and actual results
(outputs); the extent to which it achieves its objectives.
c) An audit aims to establish whether information systems are safeguarding corporate assets,
maintaining the integrity of stored and communicated data, supporting corporate objectives
effectively, and operating efficiently. The complexity and number of parts that make up
today's information systems combine to generate a business solution. Only until each
component of an information system has been analyzed and safeguarded can assurances be
obtained about it. The strength of the chain as a whole depends on the proverbial weakest
link. The main components of an IS audit can be grouped generally into:
 Physical and environmental review—This includes physical security, power supply,
air conditioning, humidity control, and other environmental factors.
 System administration review—This includes a security review of the operating
systems, database management systems, all system administration procedures, and
compliance.
 Application software review—The business application could be payroll, invoicing, a
web-based customer order processing system, or an enterprise resource planning
system that actually runs the business. Review of such application software includes
access control and authorizations, validations, error and exception handling, business
process flows within the application software, and complementary manual controls



and procedures. Additionally, a review of the system development lifecycle should be
completed.
Network security review—Review of internal and external connections to the system,
perimeter security, firewall review, router access control lists, port scanning, and
intrusion detection are some typical areas of coverage.
Business continuity review—This includes the existence and maintenance of faulttolerant and redundant hardware, backup procedures and storage, and documented
and tested disaster recovery/business continuity plan.
Data integrity review—The purpose of this is the scrutiny of live data to verify the
adequacy of controls and impact of weaknesses, as noticed from any of the above
reviews. Such substantive testing can be done using generalized audit software (e.g.,
computer-assisted audit techniques).
All these elements need to be addressed to present to management a clear assessment of the
system. For example, application software may be well designed and implemented with all the
security features, but the default super-user password in the operating system used on the server
may not have been changed, thereby allowing someone to access the data files directly. Such a
situation negates whatever security is built into the application. Likewise, firewalls and technical
system security may have been implemented very well, but the role definitions and access
controls within the application software may have been so poorly designed and implemented that
by using their user IDs, employees may get to see critical and sensitive information far beyond
their roles.
d) Obtaining an understanding of the entity and its environment is an essential aspect of
performing an audit in accordance with ISAs. In particular, that understanding establishes a
frame of reference within which the auditor plans the audit and exercises professional
judgment about assessing risks of material misstatement of the financial statements and
responding to those risks throughout the audit.
An understanding of the entity and its environment, including its internal control, is a
continuous, dynamic process of gathering, updating and analyzing information throughout
the audit. As described in ISA 500, audit procedures to obtain an understanding are referred
to as “risk assessment procedures” because some of the information obtained by performing
such procedures may be used by the auditor as audit evidence to support assessments of the
risks of material misstatement. In addition, in performing risk assessment procedures, the
auditor may obtain audit evidence about classes of transactions, account balances, or
disclosures and related assertions and about the operating effectiveness of controls, even
though such audit procedures were not specifically planned as substantive procedures or as
tests of controls. The auditor also may choose to perform substantive procedures or tests of
controls concurrently with risk assessment procedures because it is efficient to do so.
The auditor should perform the following risk assessment procedures to obtain an
understanding of the entity and its environment, including its internal control. This includes
inquiries of management and others within the entity, analytical procedures, observation and
inspection. The auditor is not required to perform all the risk assessment procedures
described above for each aspect of the understanding. However, all the risk assessment
procedures are performed by the auditor in the course of obtaining the required
understanding.
In addition, reviewing information obtained from external sources such as reports by
analysts, banks, or rating agencies, trade and economic journals or regulatory or financial
publications may also be useful in obtaining information about the entity.
When the auditor intends to use information about the entity and its environment obtained in
prior periods, the auditor should determine whether changes have occurred that may affect
the relevance of such information in the current audit. For continuing engagements, the
auditor’s previous experience with the entity contributes to the understanding of the entity.
For example, audit procedures performed in previous audits ordinarily provide audit evidence
about the entity’s organizational structure, business and controls, as well as information
about past misstatements and whether or not they were corrected on a timely basis, which
assists the auditor in assessing risks of material misstatement in the current audit. However,
such information may have been rendered irrelevant by changes in the entity or its
environment. The auditor makes inquiries and performs other appropriate audit procedures,
such as walk-throughs of systems, to determine whether changes have occurred that may
affect the relevance of such information.
Question 4a
Advantages of outsourcing the audit function
 It can also provide greater value for money depending upon the situation or
circumstances in the business organization.

A proper and advanced technology will be used by the Internal Auditing outsourcer that
the internal audit section of the business firm may lack. They are provided with all the
latest innovations in the techniques of auditing and also given the opportunity of benchmarking by the outsourcer.

More cost and time effective, freeing up internal resources. Outsourced internal audits
often take much less time to perform with greater effectiveness and efficiency.

The organization is benefited from the access to experts and specialists that can also help
in providing a key insight for achieving the goals of the business.
Drawbacks of outsourcing the auditing Function.

The people of the business organization can be a bit non-cooperative and non-receptive to
some external outsourcer or internal Auditing Service provider.

The outsourcer will be on a disadvantage of lack of internal knowledge about the
organizations culture and working environment. It will take some time to get used to the
whole processes and the system of the entity.

If Internal Auditing is outsourced, then there is a chance that the opportunities for internal
promotions may be reduced or disappear significantly with time as Internal Audit is used
as a ground for training often.

A risk of confusion will always prevail over accountability and responsibility.
Question 4b
i)
Auditing around the computer is one of the methods of evaluating a client's computer
controls. It picks source documents randomly and verifies the outputs with the inputs.
This method can only exist when controls over the computer system are non-existent. In
other words, the audit team doesn’t inspect IT system controls. Instead, they obtain
source documentation from the system thus system reports and compare that information
to the financial statements. Unless the audit team has specific IT knowledge, this is the
route most audit teams take as its less complex. It is more often known as black box
audit approach. Most often this approach is used either because processing done by the
computer is too simple e.g. casting, sorting and the auditor is already aware of the
software’s reliability. Examples of the audit is an audit of financial statements of a
company, in which the auditor will conduct audits to assess the financial statements that
the data is relevant, accurate, complete and fairly presented. Auditor issued the results
correctly and will be even better if it comes from an independent opinion.
ii)
Auditing through the computer focuses on the computer and its programs directly in the
audit for example submits data for processing and analyze results to determine the
processing reliability and accuracy of the computer program and on-line data entry,
system designed with elimination or reduction of printouts and real-time updating. It is
mostly used when there are no source documents or program reports present to be
evaluated. From the example above the auditor will not only check accuracy of the figure
but will also probably check the accounting software of the organization to be certain on
its reliability. These techniques focus on testing automated processing steps,
programming logic, edit routines and programmed controls. The approach assumes that,
if the processing programs are soundly developed and incorporate adequate edit routines
and programmed checks, then errors and irregularities are not likely to slip by undetected.
If these programs are functioning as designed, the outputs can reasonably be accepted as
reliable. The auditing through the computer approach is particularly appropriate for
testing controls in the complex IT systems emphasized in SAS No. 94. This approach
embraces a family of techniques including test data, parallel simulation, integrated test
facility and embedded audit module. In a survey conducted by the authors, only 26 of 91
responding Fortune 500 firms, or 28.6 percent, indicated that auditing through the
computer techniques were used in an audit of the purchase function, usually a highly
automated and complex IT application.
iii)
The auditing with the computer approach embraces a variety of techniques and often is
referred to as computer-assisted audit techniques (CAATs). CAATs involve using
computers, often a microcomputer, to aid auditors. Although the utilization of CAATs
has radically improved the capabilities and effectiveness of auditors, they are primarily
used to perform substantive tests. One widely used CAAT, known as general audit
software (GAS), is frequently employed to perform substantive tests and may be used for
limited testing of controls. For example, GAS can be used to test the functioning of
complex algorithms in computer programs, but it requires extensive experience in using
the software. In contrast, the auditing through the computer techniques are designed
specifically to test automated controls, and some techniques do not require extensive IT
experience
Question 4c
Principle 1:

Meeting Stakeholder Needs—Enterprises exist to create value for their stakeholders by
maintaining a balance between the realization of benefits and the optimization of risk and
use of resources. COBIT 5 provides all of the required processes and other enablers to
support business value creation through the use of IT. Because every enterprise has
different objectives, an enterprise can customize COBIT 5 to suit its own context through
the goals cascade, translating high-level enterprise goals into manageable, specific, ITrelated goals and mapping these to specific processes and practices.
Principle 2:

Covering the Enterprise End-to-end—COBIT 5 integrates governance of enterprise IT
into enterprise governance. It covers all functions and processes within the enterprise. It
does not focus only on the IT function, but treats information and related technologies as
assets that need to be dealt with just like any other asset by everyone in the enterprise. It
considers all IT-related governance and management enablers to be enterprise wide and
end-to-end thus inclusive of everything and everyone internal and external, that is
relevant to governance and management of enterprise information and related IT.
Principle 3:

Applying a Single, Integrated Framework—There are many IT-related standards and
good practices, each providing guidance on a subset of IT activities. COBIT 5 aligns with
other relevant standards and frameworks at a high level, and thus can serve as the
overarching framework for governance and management of enterprise IT.
Principle 4:

Enabling a Holistic Approach—Efficient and effective governance and management of
enterprise IT require a holistic approach, taking into account several interacting
components. COBIT 5 defines a set of enablers to support the implementation of a
comprehensive governance and management system for enterprise IT. Enablers are
broadly defined as anything that can help to achieve the objectives of the enterprise. The
COBIT 5 framework defines some categories of enablers which are principles, policies
and frameworks, processes, organizational structures, culture, ethics and behavior,
information Services, Infrastructure and applications, skills and competencies
Principle 5:

Separating governance from management—The COBIT 5 framework makes a clear
distinction between governance and management. These two disciplines encompass
different types of activities, require different organizational structures and serve different
purposes. COBIT 5’s view on this key distinction between governance and management,
governance ensures that stakeholder needs, conditions and options are evaluated to
determine balanced, agreed-on enterprise objectives to be achieved, setting direction
through prioritization and decision making and monitoring performance and compliance
against agreed-on direction and objectives.
Together, these five principles enable the enterprise to build an effective governance and
management framework that optimizes information and technology investment and use for
the benefit of stakeholders.
Question 4d
i)
Data

Data auditing is the assessment of data for quality throughout its lifecycle to ensure its
accuracy and efficacy for specific usage.

Data performance is measured and issues are identified for remediation.

Data auditing results in better data quality, which enables enhanced analytics to improve
operations.
ii)
Application systems

Application System means a collection of Hardware and Software products designed to
meet all of the requirements of a certain market for a specific type of exchange.

An application system is designed to ensure that an application's transactions and the data
it outputs are secure, accurate and valid.
iii)
Technology

One of the biggest benefits of using technology and data analytics in the audit is the
elimination of constraints that sampling places on an engagement analytics in the audit is
the elimination of constraints that sampling places on an engagement.

Data analytics gives practitioners the ability to analyze an entire population of data for
anomalies, trends, and areas of risk

The use of key technologies such as advanced analytics, adaptable artificial intelligence
and virtualization all of which help auditors boost productivity, efficiency and deliver a
better audit.
iv)
Facilities

A facility audit (or inventory) is a comprehensive review of a facility's assets.

Facility audits are a standard method for establishing baseline information about the
components, policies, and procedures of a new or existing facility.

The purpose of routine facility audits is to perform a comprehensive review of all assets
in a facility.

They aim to provide you with information about all the policies, procedures, and
components of a facility, regardless of whether it is new or has been in operation for a
while. Facility audits take time and effort.
v)
People.

They are responsible for performing audits of the information technology governance
structure, general and data application controls, data.

These people include system analysts, programmers, data entry operators, data providers,
users, vendors of hardware, software and services, computer security specialists and PC
users.
Question 4e
Control Environment
How has management put into place policies and procedures that guide the organization?
What kind of tone has management set in the organization so that everyone knows that they
are supposed to make sure that your controls are operating effectively and are achieving the
results that they expect?
Risk Assessment
How does your organization assess risk in order to identify the things that threaten the
achievement of their objectives?
Information and Communication
How does management communicate to their internal and external users what is expected of
them? How do you make sure that you receive acknowledgement from those people that they
understand what you’re asking them to do?
Monitoring Activities
How does management oversee the functioning of the entire organization? How do you
identify when things aren’t working correctly and correct those deficiencies as quickly as you
possibly can?
Existing Control Activities
What are the controls that you currently have in place? Were they in place and operating
effectively over a period of time?
Question 9a.
i)
The recommendation that your department be responsible for the pre-audit of supplier's
invoices.
Accept



ii)
This is because the department team is responsible for evaluating operational
procedures.
This is because the department team is responsible for risk management
This is because the department team is responsible for control functions
The request that you make suggestions during system development.
accept



it helps to know the increase or decrease in accounts payable system
helps provide a data accurate system
helps to adapt to economic changes
iii. The request that you assist in the installation of the system and approve the system after
making a final review
accept



it helps to know what you want to achieve.
you can ensure that quality is maintained
product of release can be finalized as per client’s requirements
b. Explain preventive, detective and corrective controls.
Preventive controls



They are proactive in that they attempt to prevent undesirable events from occurring.
Preventive controls, on the other hand, are designed to keep errors and irregularities
from occurring in the first place.
Examples of preventative controls include policies, standards, processes, procedures,
encryption, firewalls, and physical barriers.
Detective controls




They are designed to detect errors or irregularities that may have occurred.
Detective controls provide evidence that an error or irregularity has occurred.
These controls may also be referred to as mitigating controls. They help to reduce risk
associated with a failure to implement preventive controls.
Some examples of detective controls are internal audits, reconciliations, financial
reporting, financial statements, and physical inventories
Corrective controls



They are put in place when errors or irregularities have been detected.
Examples of common corrective controls include disciplinary actions, blocking
access or transactions when fraud is detected, fire-activated sprinkler systems, and
software patches.
Corrective controls are designed to correct errors or irregularities that have been
detected.
c)
i) Confidentiality
 Confidential information means any information that the auditor receives in the
course of conducting the audit, and which pertain explicitly to the business of the
client, as well as any other information that can be reasonably deemed confidential
information from the client's position.
 The Confidentiality Principle states that Principle Internal auditors respect the value
and ownership of information they receive and do not disclose information without
appropriate authority unless there is a legal or professional obligation to do so.
ii) Integrity
 it is the quality of being honest and having strong moral principles.



The integrity of internal auditors establishes trust and thus provides the basis for
reliance on their judgment.
Integrity is the core value of a Code of Ethics.
Auditors have a duty to adhere to high standards of behavior e.g. honesty in the
course of their work and in their relationships whether it be personal or with the staff
of audited entities.
iii) Availability
 it is the quality of being able to be used.
 The availability principle refers to the accessibility of the system, products or services
as stipulated by a contract or service level agreement (SLA). As such, the minimum
acceptable performance level for system availability is set by both parties
iv) Reliability
 Reliability is defined as the probability that a product, system, or service will perform
its intended function adequately for a specified period of time, or will operate in a
defined environment without failure
 The reliability of evidence depends on the nature and source of the evidence and the
circumstances under which it is obtained.
 For example, evidence obtained from a knowledgeable source that is independent of
the company is more reliable than evidence obtained only from internal company
sources
v) Compliance with legal and regulatory requirements.
 Regulatory compliance is an organization's adherence to laws, regulations, guidelines
and specifications relevant to its business processes.
 regulatory compliance is when a business follows state, federal, and international
laws and regulations relevant to its operations.
 The specific requirements can vary, depending largely on the industry and type of
business.
Question 10a.
Specific audit procedures that can be recommended include:
1. Testing the effectiveness of specific internal controls by analyzing transactions and testing
reconciliations. This helps to see whether the controls are properly detecting or preventing
material errors.
2. Reviewing policies and procedures to ensure they are properly documented and followed.
Strong internal controls are critical in safeguarding the organizations assets. Tis also
minimizes fraud. It improves effectiveness and efficiency of the business processes.
3. Analyzing financial statements to identify any anomalies or errors. It enhances the
reliability of financial reports. it also ensures that financial statements are free from major
misstatements.
4. Conducting interviews with key personnel to assess their understanding of internal
controls and their level of compliance. This helps in accuracy of information. It also aids in
additional analysis of information.
5. Performing a physical inventory count to ensure that physical inventory quantities match
the recorded amounts. This enables an organization to know that it has sufficient resources.
b. Differentiate Business Continuity Planning from Disaster Recovery Planning.
Business Continuity Planning focuses on maintaining essential business operations during
and after a disruptive event, while Disaster Recovery Planning focuses on restoring key IT
systems and infrastructure after a disruptive event. Business Continuity Planning is a broader
approach that includes Disaster Recovery Planning as one of the strategies to ensure
continuity of operations. Business continuity focuses on keeping business operational during
a disaster. Disaster recovery focuses on restoring data access and infrastructure after a
disaster.
Download