A Study on Chinese Online Audit Techniques(China)

advertisement
A Study on Chinese Online Audit Techniques
By Ms. Cao Hongze Ph.D
IT Center of CNAO
Fulfilling manual audit and PC audit cannot meet demands of audit
works in modern times with the rapid development of IT and economic
globalization. It’s an unassailable trend that applying network computer
techniques to audit supervision because of popularization of network
application in different industries and institutions. Promotion of national
IT systems and e-Government, increasing proportion of financial,
accounting and economic management information transmission via
networks, bring challenges to audit works as well as create opportunities
for auditors to apply audit work using networks.
CNAO is dedicated in researching, realizing, popularizing and
applying online audit supervision techniques and attempts to change the
ways of audit work in recent years. According to online audit logic flow
(shown in Fig.1), online audit supervision techniques can be divided four
aspects as below:
Auditor
Auditee
Data Collection
Technique
Networking
Technique
Data Processing
Technique
Collection
Transmission
Processing
Security Technique
Fig.1 Distribution of online audit techniques in audit logic flow
1
1、Construction techniques of audit networks
In order to implement audit supervision in the networks, network
techniques must be adopted to build up auditing networks to obtain
auditees’ information and data.
Construction method of auditing networks has direct relation with
physical distance between auditors and auditees, and networks
environment under which auditors and auditees coexist. No matter what
degree the online audit has developed to, it is inevitable that auditors have
to perform field audit. Even using online audit techniques, there are two
types, field online audit and distance online audit.
Field online audit is the audit using LAN existed in auditees to
directly or indirectly connect database being audited. The LAN
commonly has broadband condition, and it has been a standard
configuration of LAN that backbone 1000M and 10/l00M access to
desktop.
Distance online audit is the audit using the uniform platform of
national e-Government or national public communication data network,
to directly or indirectly connect database being audited. The uniform
national e-Government network under construction has broadband, the
renting band of national public communication data networks is restricted
by cost or local network environment, maybe has different instance, such
as 56Kbps, 64kbps, 2Mbps and 10Mbps.
2
Reliable transmission of audit data is directly influenced and
restricted by audit networking methods. It is a safe, reliable and relative
simple transmission method when auditees’ data are fully collected
through networks in field online audit. In distance online audit especially
when network band is insufficient, the data obtained through network are
some essential data, such as increment data and query result data etc. And
saving data are obtained by using other methods.
2、Auditees’ data collection techniques
There are some experiences about collecting auditees’ data in single
computer audit work. The primary characteristic of collecting auditees’
data in online audit supervision is the sub-real-time character of time
efficiency. So auditors should not depend on monthly backup data, or
yearly backup data of auditee, the data must be timely collected in the
auditees’ information systems.
Collecting auditees’ data includes techniques in five aspects:
1. Setting prepositive computers. It should be cautious that auditors
directly operate auditees’ database since it will bring audit risk. Audit
prepositive computers can be set at auditees, and all auditors’ query
quests are carried through prepositive computers; When network band is
insufficient the data auditors at long distance obtained through network
are increment data or query data, and data processing prepositive
computers whose access belongs to auditors are set at auditees. The
3
configure of prepositive computers are different according to auditees’
data quantity. The program compiled by auditors is set in a computer in
the auditees’ information system in the administration organizations
which are daily supervised, and this computer is equivalent to a soft
prepositive computers; PC servers with appropriate performance are set
according to the need of data quantity in data concentration organizations.
2 . Extension
of
PC
servers.
Renting
national
public
communication data networks will be adopted while distance online audit
is performed in data concentration organizations. The information sent by
auditors through networks are query information, and real query
processing are performed at auditees. The audit prepositive computers
should have powerful processing ability in order to meet needs of remote
massive data query. The type-selected and tie-in experiments should be
carried out in order to resolve compatibility between hardware PC server
and relative extension database while using server extension techniques
to resolve processing ability problem.
3.Data transfer from large-sized and medium-sized computers to PC
server. Large-sized and medium-sized computers are chosen to process,
store data in data highly concentration organizations’ information systems,
and it’s operation system and type of database are different with PC used
by auditors. Conversion mid products whose batch import and export
performance are appropriate should be bought or researched.
4
4.Audit models in prepositive computers. Audit models installed in
prepositive computers includes: periodically detecting auditees’ data
variance trigged by time; selectively collecting data; synchronously
increasing data( includes local and foreign); verifying integrality of
data; auto audit and pre-alarming new data according to searching
conditions set by system.
5.Data conversion clearance. Auditees’ original data should be
converted to data clearance suited to auditors needs, generally includes:
data type conversion, date and time format conversion, code conversion,
value conversion. Conversion tools for common used goods finance
software should be developed for administration organizations which are
daily supervised by using online audit. Data conversion tools should be
developed for data highly concentration organizations respectively.
3、Auditors’ data processing techniques
The main methods of data processing are browse, selection,
comparison and check when auditors use computers to audit electric data
managed by computers. Audit method of online audit has no distinct
differences with that of single computer audit. However, data processing
methods, processing time and quantities of online audit have notable
differences with that of single computer audit. Data processing of
auditors includes four aspects techniques as below:
1.Data storage. Data obtained by auditors increase massively under
5
the condition of online audit. It should be paid more attention since it
makes a good basis for mastering auditees’ situations and also provides
convenience to support other audit projects and to carry out industry audit
analysis. To improve efficiency of audit supervision under IT
environment, online storage and near-line storage are adopted in auditors
data storage.
2.Audit model. The keys of improving audit efficiency are to collect
auditors’ experience and found audit models. The technique problem
should be resolved at computer stage is to develop tools which can
conveniently and directly convert auditors’ experience to audit models.
3.Audit platform. Since works of data concentration organizations
are complex, the audit operation platforms should be customized. Audit
platform development is mainly used to administration organizations
audit in order to simplify auditors’ studying of audit software. The main
functions of audit platform include: audit projects management, providing
common audit methods such as query, compositor, statistic, summary and
grouping, audit documents generation, external data interface.
4. Parallel processing. Since online audit of data concentration
organizations must face massive data, the constructed audit system is
unpractical if it has not data processing methods with high speed and
large batch. Comparing to small machines, server extension has many
advantages such as small investment in one time, strong expansion ability
6
and abundant technicians. Therefore, sever extension technique should be
adopted at auditors’ data processing.
4、Security techniques of online audit
The security of online audit is necessary in order to avoid audit risks
and to protect interests of auditees. According to the flow of audit data,
security techniques of online audit can be divided to four aspects:
1.Security of data collection. It is forbidden that auditors directly
operate auditees’ database; Strong insulation methods should be adopted
while converting data from auditee to prepositive computers of auditor in
order to prevent auditors access auditees’ information system; Strong
insulation methods should be adopted while non-converting data;
Authorization control mechanism must be found to prevent illegal data
collection; Deploy anti-virus, anti-hacker software at auditees’ prepositive
computers.
2.Security of data transmission. Security of data transmission
should be settled by auditee under the condition of filed online audit in
LAN. Security of data transmission should be settled by platform under
the condition of distance online audit on the uniform e-Government
platform and Auditors should focus on transmission security after
entering buildings. The key of data transmission security is distance
online audit that rent national public communication data networks and
mainly resolve data integrity, no leakage and not to be intercepted and
7
captured.
3.Security of data storage. Accumulative massive data are important
assets of auditors. Methods about computer physical security are suit to
protect data storage security. The primary techniques that resolve security
of online audit data storage are: economic and rational backup; data
recover in moderate time; disaster toleration with moderate strength;
preventing illegal capture; preventing erasing; preventing deny; log.
4 . Security management system.
A perfect system include
computer room management, terminal authorization approve, data backup,
supervision, audit model, log management.
At present, under network environment ,CNAO has made successful
online audit experiments over auditees with different data quantity
management at different network linking conditions. CNAO has decided
that online audit will be the main content of the Second Phase of Golden
Audit Project and it’s aim is to basically implement “three changes”,
namely “change from mere post audit to post audit combined with
mid-term audit, from mere static audit to static audit combined with
mobile audit, from mere field online audit to field online audit combined
with distance online audit” .
Thanks!
8
Download