In: Accounting
A. Gita Rani Sdn Bhd (GR) is a plastic manufacturer,
which operates from a large production facility, where it
undertakes continuous production 24 hours a day, seven days a week.
The company’s production facility includes two warehouses, where
the company’s raw materials and finished goods are stored. GR’s
year end is 31 December. GR is finalizing the arrangements for the
year-end inventory count, which is to be undertaken on 31 December
2019. The finished plastic bottle are stored in the first
warehouse. The second warehouse is for storing large piles of raw
materials, such as silicon, used in the manufacture of
plastic.
Required:
For the audit of the inventory cycle and year-end inventory balance
of GR Sdn Bhd:
i. Describe four (4) audit procedures that could be carried out
using computer-assisted audit techniques (CAATs)
ii. Explain four (4) potential advantage and drawbacks of using CAATs.
B. An audit client is in the process of creating an online web -based sales ordering system for customers to purchase products using online payment method. Identify three risks related to an online sales system that management should consider. For each risk identify an internal control that could be implemented to reduce that risk.
C. Evaluate the risks associated with network systems
and database systems to those associated with centralized IT
functions.
A)
i. Computer Assisted Audit Techniques :-
ii. Computer Assisted Audit Techniques potentials advantages and drawback
1. Advantages :
2. Disadvantages :
B )
An online sales ordering system poses many potential risks for an audit client. Risks that may exist include: 1.Customer data is susceptible to interception by unauthorized third parties.
2.The client company’s data, programs, and hardware are susceptible to potential interception or sabotage by external parties.
3 . An unauthorized third party may attempt to transact business with the client company.
These risks can be addressed by the use of firewalls, encryption techniques, anddigital signatures. A firewall is a system of hardware and software that monitors and controls the flow of e-commerce communications by channeling all network connections through a control gateway. A firewall protects data, programs, and other IT resources from external users accessing the system through networks, such as the Internet. Encryption techniques are based on computer programs that transform a standard message into a coded (encrypted) form. One key (the public key) is used for encoding the message and the other key (the private key) is used to decode the message. Encryption techniques protect the security of electronic communication during the transmission process. Finally, the use of digital signatures can enhance internal controls over the online sales order system by authenticating the validity of customers and other trading partners whoconduct business with the client company.
Internal controls can be used to mitigate many of the risks associated with e-commerce activities. In accordance to this, “Risk Assessments and Internal Control,” the auditor considers the control environment and control procedures the entity has applied to its ecommerce activities to the extent they are relevant to the financial statement assertions. In some circumstances, for example when electronic commerce systems are highly automated, when transaction volumes are high, or when electronic evidence comprising the audit trail is not retained, the auditor may determine that it is not possible to reduce audit risk to an acceptably low level by using only substantive procedures. CAATs are often used in such circumstances.
C)
Compare the risks associated with network systems and database systems to those associated with centralized IT functions.
Because many companies that operate in a network environment decentralize their network servers across the organization, there is an increased risk for a lackof security and lack of overall management of the network operations. The decentralization may lead to a lack of standardized equipment and procedures. In many instances responsibility for purchasing equipment and software, maintenance, administration, and physical security often resides with key user groups rather than with a centralized IT function. Also, network-related softwareoften lacks the security features, including segregation of duties, typically available in traditionally centralized environments because of the ready access tosoftware and data by multiple users. In database management systems where many applications share the same data, controls can often be strengthened as data are more centralized and duplicate files can be eliminated. However, there are also increased risks in some cases given that multiple users, including individuals outside accounting, access and update data files. Without proper database administration and access controls, risks of unauthorized, inaccurate, and incomplete data files increase. Centralization of data also increases the needto properly back up data information on a regular basis.