Tuesday, March 12, 2019
Audit Proposal Essay
There atomic number 18 mevery different types of inspects including internal, external, and training technology. Companies should be acquainted(predicate) with the types of audits that whitethorn possibly be used on an Accounting culture System (AIS). Knowing the different types of audits and where they ar used entrust swear stunned a company be ready for an audit and make the bear upon much smoother. There are some circumstances where auditing done a computer is non always beneficial. Auditors want to make sure they are completing their audits fully and appropriately to the best of their abilities.Types of audits used for distri preciselyively butt againstAttestation, SAS 70, SAS 94, and Findings and Recommendations are four main types of Information Technology (IT) audits. If Kudler wants the attendant to appropriate assurance for each part of the system, an certification audit could be used. An attestation audit can assist Kudler by issuing reports on examinations , reviews, or agreed-upon procedures. An attestation audit can provide Kudler with independent assurance on the reliability or validity of instruction related to the four systems chthonian review (KPMG, 2011). A Findings and Recommendations audit can provide Kudler with other information about each system. This kind of audit allows the following system implementations, credentials reviews, infobase application reviews, project management, IT infrastructure, and IT internal audit services.If Kudler chooses to use the Findings and Recommendations audit, this type allow for not produce an opinion, only a summary of the audit for each of the systems (Hunton, Bryant, & Bagranoff, 2004). An SAS 70 audit is to provide assurance about the in force(p)ness and institution of the companys internal controls around a service provided to others. Kudler is not a serviceprovider. However, Kudler does transmit data to the Electronic Payment glade House for automatic submission of the credit card transactions to the applicable fiscal institutions. An SAS 70 could be beneficial be bear it is a way to demonstrate that adequate controls are in place to value the consumer through e-commerce. SAS 94 audits are performed with a financial statement audit and focus on the invitees AIS. It addresses the effect of IT on internal controls in a financial statement audit. Kudler go out need a much broader sound judgement than an SAS 94.Most appropriate audit for each cognitive operationThere are galore(postnominal) routes to perform an IT audit. This audit is internal and bequeath look at both Information Technology General Controls (ITGC) and Application Controls. Specifically, the audit willing focus on these categories systems and applications, information touch on facilities, management of IT and enterprise architecture, client/server, telecommunications, and intranets/extranets. The audit style will be via Findings and Recommendations as management will have to consi der recommendations and the ultimate decision to make changes according to antecedency and budget. The audit will verify the systems and applications for efficiency and controls to ensure validity, integrity, and security of data and transactions. Kudler will need the completion of an audit on information processing facilities to assess physical conditions of the main housing units and the offsite locations to support the companys Disaster Recoery Plan (DRP).This type of audit will appreciate the organizational structure and procedures to ensure that an efficient, controlled environment is in place. These relate to any telecommunication controls between client and server, the entire network, and any servers communicating eternally including firewalls. Auditors will assess two types of controls security controls and approaching controls. Each of these types should include all three sub-controls preventive, detective, and corrective. The AIS has an imperative need for controls to a ddress any risks that may exist for every process and transaction. Security access controls are in place to protect data from being stolen, lost, or damaged. Access controls protect data from being released to non-authorized users, hackers, and other intruders.How the audits are conductedKudler will conduct an information system audit by examining and evaluatingtheir present hardware and software. They will to a fault bear witness their IT controls, systems security, risk management, and the adequacy of their current systems. They can carry out their marketing audit by evaluating the effectiveness of their marketing program and examining its capabilities. It will evaluate their functions in respect to their goals, mission, vision, and their values of Kudler, which is done externally. Kudler will break down their faculty, and their deficiencies will be identified. Another suggestion is equipment be audited, the maintenance, and an examination to stop if its being operated at the designed levels, safety set-up, security, and access issues. Their audit will be done by an external auditor who will examine their accounts, vouchers to support, financial information tests, evaluation of their financial statements, and also examine the internal control and make comments for improvements.Events that prevent reliance on auditing through the computer Using computer-based accounting systems does have its disadvantages, such as current laws pertaining to confidentiality, the requirement to protect against the loss of data through power failures, the transmitting of viruses, and the abundance of opportunities for hackers to steal data. Computer fraud is also a major(ip) worry the need to initiate internal controls for all those who have access to the businesss information, particularly confidential customer information. An event that Kudler may run into with the need of stronger controls is a security breach, which entails stolen data. Kudler management can be held li able for the loss of personal customer data (University of Phoenix realistic Organization Portal, 2013).Another event is a computer-based system with feeble controls over the data input procedures and processing, this requires the need for more thorough testing of financial transactions. The incorrect input of data can not only cause misrepresentation of financial statements in the form of incorrect asset valuations but because a mistake in data entry will overtake Kudler false analytical data such as sales and inventory. Lastly, an auditor will have to assume that auditing through the use of their computer-based method that their central processing unit and other hardware are operating properly (Bargnoff, N.A., Simkin, M.G, & Strand, C., 2008).ConclusionIt is fundamental for companies to stay positive throughout the audit process. There are many different audit processes such as Attestation, SAS70, andSAS94 which are all effective audit strategies that may be used when auditing the company. Companies being audited should be familiar with these audit processes as well as how the audits are conducted to ensure that the process will be as smooth and stress free as possible.ReferencesBargnoff, N.A., Simkin, M.G, & Strand, C. (2008). Core Concepts of Accounting Information Systems (10th ed.). The KPMG Survey of Corporate Responsibility reporting 2013. 2014 KPMG International Cooperative. Retrieved July 10, 2013 from http//www.kpmg.com/global/en/issuesandinsights/articlespublications/corporate-responsibility University of Phoenix Virtual Organization (2013). Kudler ticket Foods Intranet. Retrieved from https//ecampus.phoenix.edu/secure/aapd/CIST/VOP/Business/Kudler2/intranet/index.asp
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment