Question

In: Accounting

1. Explain how an information system audit supports a financial audit. 2. Explain an integrity control...

1. Explain how an information system audit supports a financial audit.

2. Explain an integrity control for for each of the following input, processing, and output.

3. Explain an example of defense in depth.

4. Explain the relationships between hashing, encryption, digital certificates, and digital signatures.

Solutions

Expert Solution

1) The overall objective of the financial audit is to give a reasonable assurance that financial statements are free from material mistatements and they give a true and fair view on financial statement. This is objective is achieving by obtainig sufficient and appropriate audit evidence.

With the role inceasing role of information systems, process of collecting and evaluating evidence revolves around the computer system. Safeguard of assets and integrity of data is very much depended upon sound information system. Information system audit gives an assurance to the financial auditors that all controls related information technology and automated controls are working effectively in the Company. Financial auditor relies upon the work of IT experts and accordingly give their opinion.

2) Integrity control for Input, Processing and Output

Input Control -: Batch control totals and document counts is the most commonly used control to check the date integrity. Batch Control tallies the total and no. of count from one accounting software to another software. It tracks whether two databases are correctly synchronised or not.

Processing Control -: Run-to-run control is a processing control used in teh organisations. The summation of one processing run is added to the processing of second run and final balance is confirmed from the figure in second run.

Output Control -: Proper authorisation of the output printed reports is very important data integrity control. This avoids the chance of manipulation that can be done with the output data.

3) Secure Network access is an example of defense in depth besides many other controls. It is a type of technical control which protects Company's software and network from outside intruders. Its almost like cybersecurity for the network to prevent data theft.

4) Hashing is the method used in the encrption. The meaning of hashing is that it is not possible to decode the information by using a predetermined key when we are using data through hash. While encryption can be said to be two way process. It includes varities of strategies of encode input such as numerical, semantic and digital characters. Both used aglorithms for the security of the confidential data.

Digital signature is a attachment in the document that ensures maintain data integrity and authtencity. While on the other hand digital certificate helps in providing security and authenticity to the holder of certificate. Both are used to maintain the authenticity of data.


Related Solutions

audit cycle Crossties of 1-Gather information about the client Internal control system 2-Testing the client internal...
audit cycle Crossties of 1-Gather information about the client Internal control system 2-Testing the client internal control system (Sufficiency and effectiveness) 3-Testing the financial statements. 4-Review and completion. 5-Communicate report explain each term
Audit of Internal Control Over Financial Reporting that is Integrated with an Audit of Financial Statements,"...
Audit of Internal Control Over Financial Reporting that is Integrated with an Audit of Financial Statements," provides a guide for auditors when performing integrated audits. by visiting PCAOB website How should the auditor determine which controls to test? How might the auditor use evidence obtained in the audit of the financial statements when concluding on the effectiveness of internal control over financial reporting?
the Audit Planning Process Internal control: 1. How does an Auditor use the Information form the...
the Audit Planning Process Internal control: 1. How does an Auditor use the Information form the Risk Assessment Procedures?
Explain what academic integrity is, and explain how you are prepared to meet the academic integrity...
Explain what academic integrity is, and explain how you are prepared to meet the academic integrity standards at your nursing school
1. Explain how information system achieves objective to support the activities of managers in organization? 2....
1. Explain how information system achieves objective to support the activities of managers in organization? 2. what is collaborative commerce? also explain what effect does it have on information organization and management? 3. Explain how it transforms organizations and management to address the end-user needs?
True or False 1. In an audit of internal control over financial reporting, if the auditor...
True or False 1. In an audit of internal control over financial reporting, if the auditor identifies only one material weakness, the auditor is required to issue an adverse opinion on the effectiveness of the client's internal control over financial reporting. 2. The auditor's client outsources parts of its accounting functions to an independent service provider. The auditor plans to reduce control risk for transactions processed and balances maintained by the service provider. A. Because the service provider is independent...
(a) Define 'tests of control' and explain the importance of tests of control in the audit...
(a) Define 'tests of control' and explain the importance of tests of control in the audit of a company. (b) You are an audit senior in Asenso Boateng & Co a firm providing audit and assurance services. One of your clients is an exclusive hotel called 'Rock City Hotel' situated in the centre of Airport City Accra. As part of your audit procedures you are assessing the controls surrounding payroll. You have read last year's audit file and have obtained...
Explain what an information security blueprint is, identify its major components, and explain how it supports...
Explain what an information security blueprint is, identify its major components, and explain how it supports the information security program
Financial contagion may results in lost integrity in the entire financial system. To prevent this from...
Financial contagion may results in lost integrity in the entire financial system. To prevent this from happening, the Fed may Select one: a. consult with private deposit insurance programs to cover the losses of insolvent banks. b. forgive banks liabilities. c. act as the lender of last resort to decrease the money supply. d. act as the lender of last resort to make short-term emergency loans, as needed. How do central bank policies affect interest rates? Select one: a. When...
2- Explain system thinking and how management information system (MIS) solve issues with information silos Facebook...
2- Explain system thinking and how management information system (MIS) solve issues with information silos Facebook entire worldwide organization? I HOPE O GET ANSWER WITH 300 WORDS OR CLOSE TO THAT!
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT