The Phases of an Audit 1 (Nrupa)

6
TEST DATA Test data – Sample of data that are created and used for the purpose of testing the application system.It is costlier to test the entire program or system. Hence, auditors should concentrate on those parts of the program where the payoffs will be the highest. 1. Test data need to be designed before they are put to use. 2. Two approaches of test data designs are – black box testing (specification based) and white  box testing (program based). 3. Black box testing seeks to determine whether the application outputs what is supposed to. This is found through interaction with users, understanding the functional specifications. 4. White box testing focuses on finding if there are any defective execution paths in a  program. This is done through selecting those parts of the program that deem to be material from the viewpoint of an audit. Test Data Techniques Test data techniques are methods of conducting audit procedures by entering data (for example, a sample of transactions) into the co mputer system, and comparing the results obtained with predetermined results. Examples of this are outlined below: 1. Test data can be developed by the auditor to test specific controls in computer programs, such as on-line password and data ac cess controls. 2. Test data in the form of test transactions can be selected from previously processed transactions or can be created by the auditor to test specific programmed procedures of the computer program. These test transactions are generally processed separately from normal  processing. 1. Test data in the form of test transactions can be used in a “live” mode, where a dummy unit (for example, a department or employee) is e stablished to which test transactions are  posted during normal processing. This technique, when integrated into normal processing so as to operate on a continuous basis over a period of time, is known as an “integrated test facility” (ITF). When using this technique, the auditor should ensure that the impact of test transactions is subsequently eliminated from the computer files.

Transcript of The Phases of an Audit 1 (Nrupa)

Page 1: The Phases of an Audit 1 (Nrupa)

8/4/2019 The Phases of an Audit 1 (Nrupa)

http://slidepdf.com/reader/full/the-phases-of-an-audit-1-nrupa 1/6

TEST DATA

Test data – Sample of data that are created and used for the purpose of testing the

application system.It is costlier to test the entire program or system. Hence, auditors shouldconcentrate on those parts of the program where the payoffs will be the highest.

1. Test data need to be designed before they are put to use.

2. Two approaches of test data designs are – black box testing (specification based) and white

 box testing (program based).

3. Black box testing seeks to determine whether the application outputs what is supposed to.

This is found through interaction with users, understanding the functional specifications.

4. White box testing focuses on finding if there are any defective execution paths in a

 program. This is done through selecting those parts of the program that deem to be material

from the viewpoint of an audit.

Test Data Techniques

Test data techniques are methods of conducting audit procedures by entering data (for 

example, a sample of transactions) into the computer system, and comparing the results obtained

with predetermined results. Examples of this are outlined below:

1. Test data can be developed by the auditor to test specific controls in computer programs,

such as on-line password and data access controls.

2. Test data in the form of test transactions can be selected from previously processed

transactions or can be created by the auditor to test specific programmed procedures of the

computer program. These test transactions are generally processed separately from normal

 processing.

1. Test data in the form of test transactions can be used in a “live” mode, where a dummy

unit (for example, a department or employee) is established to which test transactions are

 posted during normal processing. This technique, when integrated into normal processing so

as to operate on a continuous basis over a period of time, is known as an “integrated test

facility” (ITF). When using this technique, the auditor should ensure that the impact of test

transactions is subsequently eliminated from the computer files.

Page 2: The Phases of an Audit 1 (Nrupa)

8/4/2019 The Phases of an Audit 1 (Nrupa)

http://slidepdf.com/reader/full/the-phases-of-an-audit-1-nrupa 2/6

Test Data Checking

The test data that are utilized to execute transactions for the purpose of analyzing the

system need to qualify the following checks-Have the methods for creating test data beenappropriate for this system? Has sufficient test data been developed to adequately test the

application software?

Further the success of these tests directly influence these queries as, Have all the testing

techniques indicated in the test plan been scheduled for execution during testing phase? Have

the expected results from testing been determined? Has a process been established to

determine variance / deviation between expected results and actual results? Have both the

expected and actual results been documented when there’s a deviation between the two?

Audit procedures to control test data applications may include – 

1. Controlling the sequence of submissions of test data where it spans several processing

cycles

2. Performing test runs containing small amounts of test data before submitting the main

audit test data

3. Predicting the results of the test data and comparing it with the actual test data output,for the individual transactions and in total

4. Confirming that the current version of the programs was used to process the test data;

and

5. Testing whether the programs used to process the test data were the programs the entity

used throughout the applicable audit period.

Test data generation

Page 3: The Phases of an Audit 1 (Nrupa)

8/4/2019 The Phases of an Audit 1 (Nrupa)

http://slidepdf.com/reader/full/the-phases-of-an-audit-1-nrupa 3/6

Test data are designed through test tools such as correctness proof, data flow analysis and

control flow analysis.

The stream of data that are generated by these tools is called as the test data pack.

PARALLEL PROCESSING

1. Parallel processing is a concept associated with the operating system and

microprocessor. The processor’s time and capabilities are shared amongst competing

 processes on a time-sharing basis by the operating system.

2. In a multiprogramming (given as parallel programming) system, multiple programs

submitted by users were each allowed using.

3. The processor for a short time. To users it appeared that all the programs were executing

at the same time.

4. Parallel processing may be taken to mean Parallel simulation in the light of the topic

 being discussed.

5. Parallel simulation, imitates the application under review. It must be written to perform

the same steps as the application so that results can be compared

6. If the “real” system and the parallel yield the same output, then you would have

confidence that the “real” system is OK.

THE PHASES OF AN AUDIT 

The planning phase

 

1. Gathering information: To be able to evaluate the security of a system the auditor first

of all has to gain adequate knowledge of the system being evaluated. Some information

needed in this connection could be e.g :

The purpose of the system

The structure of the system

Security policies and plans

Information about the organization and its procedures

Page 4: The Phases of an Audit 1 (Nrupa)

8/4/2019 The Phases of an Audit 1 (Nrupa)

http://slidepdf.com/reader/full/the-phases-of-an-audit-1-nrupa 4/6

2. Risk assessment: After gaining an understanding of the entity’s operations, the auditor 

must assess the risk associated with this entity, as well as the audit of it. The risk 

assessment will determine the extent of the audit of this entity, as well as which areas the

audit should focus on.

Above we have taken for granted that a database system is the area of focus for the audit. In real life this would be determined from a risk assessment. If we

choose to concentrate on a database system, the risk assessment might also help guide us

as to how we approach this audit. One approach might be to start the audit by focusing on

the applications used in connections with the database. Another approach could be to start

 by focusing on the database itself and evaluate controls independent from each individual

application.

 Evaluating and testing controls

During this phase the auditor should obtain detailed information on policies and

 procedures of importance to the internal controls in the areas being evaluated. The auditor 

needs to perform tests of these control activities to determine if they are operating

effectively. FISCAM identifies six categories of controls that the auditor should consider.

These are briefly:

 Entity wide security program: FISCAM emphasizes the importance of an entity

wide program for security planning and management as the foundation of a

security structure for a company. The program should establish the frame work 

and a continuing cycle for risk assessment, the development and implementation

of effective security procedures, and the monitoring of the effectiveness of these

 procedures.

 Access control: These controls limit or detect access to computer resources. As

the focus of this paper ,the audit of this category of controls is described in more

detail in section 9.3

Page 5: The Phases of an Audit 1 (Nrupa)

8/4/2019 The Phases of an Audit 1 (Nrupa)

http://slidepdf.com/reader/full/the-phases-of-an-audit-1-nrupa 5/6

 Application software development and change controls: An entity should have

 procedures and policies that prevent unauthorized programs, or modifications to

an existing program from being implemented.

 System software controls: The auditor need to evaluate controls that limits and

monitor access to the powerful programs and sensitive files that control the

computer hardware and secure applications supported by the systems.

 Segregation of duties: These controls are defined as the policies, procedures, and

an organizational structure established so that one individual cannot control key

aspects of computer- related operations and thereby conduct unauthorized actions

or gain unauthorized access to assets or records.

 Service continuity: These controls help to ensure that when unexpected events

occur, critical operations continue without interruption or are promptly resumed

and critical and sensitive data are protected.

  Reporting phase

During this phase the auditor will draw conclusions on the controls that have been

evaluated, and the effects on the entity as whole. The auditor would make a report to

 present his conclusion. The manner and recipient of the report would be dependent on

the situation and the auditor’s role in relation to the auditee.

Page 6: The Phases of an Audit 1 (Nrupa)

8/4/2019 The Phases of an Audit 1 (Nrupa)

http://slidepdf.com/reader/full/the-phases-of-an-audit-1-nrupa 6/6

CONCLUSION 

An auditor should evaluate a wide range of controls when conducting an audit of 

a database system, and it has only been possible to cover some of them in this paper.

The paper should illustrate that Oracle databases, while not unbreakable as claimed in

Oracles advertising, contain a wide array of possibilities to implement a secure system.

How secure the system will be in practice, does however as always depend on how the

system is implemented and specific procedures established by the entity.