Question

The primary method to evaluate the effectiveness of an information system’s controls is from conducting an...

The primary method to evaluate the effectiveness of an information system’s controls is from conducting an information systems audit.

  • Discuss what all an information systems audit does.
  • Discuss what an audit trail is.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Information systems audit

An audit of information technology, or an audit of information systems, is a study of management controls within an architecture for information technology (IT). Assessing the evidence obtained defines whether the information systems secure property, preserve data integrity, and operate effectively to achieve the goals or objectives of the company.Such assessments may be performed in combination with an audit of financial statements, an internal audit, or any other form of dedication to certification.

IT audits are also known as automated data processing audits (ADP audits) and computer audits.They were formerly called electronic data processing audits (EDP audits).

An IT audit differs from an audit of the financial statements. While a financial audit's purpose is to evaluate whether the financial statements present fairly, in all material respects, an entity's financial position, results of operations, and cash flows in conformity to standard accounting practices, the purposes of an IT audit is to evaluate the system's internal control design and effectiveness.It covers performance and security protocols, development processes, and IT governance or supervision, but is not limited to.It is sufficient to install controls, but not enough to provide adequate security. Security officials must determine whether the controls are implemented as planned, whether they are successful, or whether there has been any breach of security, and if so, what actions can be taken to prevent future breaches.Independent and unbiased observers must respond to these inquiries. These observers carry out the task of auditing information systems. An audit is an examination of information systems, their inputs, outputs, and processing in an information systems (IS) environment.

AUDIT TRIAL

An audit trail is a step-by-step log that can track accounting or business information to its origin. Audit trails are used to check and monitor other types of transactions, including accounting and mutual fund trading. The audit trail is most often used when it is important to verify the accuracy of a product.Audit trails can be useful tools to assess the authenticity of an accounting transaction, fund origin, or exchange.

When an auditor has to check statistics such as sales, net earnings or earnings per share, audit trails can be used in accounting. Transactions involving the calculation of the revenue, net earnings or earnings per share of a company are reviewed and the calculations can be redone if the figures are incorrectly classified.

For example, the cost of selling merchandise is an expenditure subtracted in calculating net earnings from gross revenue. The cost of the sale amount of goods would be double-checked by checking the transactions and data sources that were used to calculate the cost of the sold goods.To check the final figure, all elements of the final numbers are double-checked along the audit trail. As part of their reporting responsibilities, all public companies are subject to financial audit.

In many different areas of finance, audit trails, or rather the method of following an audit trail, are found. For instance, a mortgage lender can use an audit trail to determine the source of funds for an down payment when buying a home. They may request to see a bank statement showing the deposit of funds into the account and request further verification of the source of the deposit.

When there are concerns about the authenticity or quality of trade data, the Securities and Exchange Commission (SEC) and NYSE will use audit trails to specifically recreate trade. This is to ensure that major exchanges take place in accordance with current regulations.

Add a comment
Know the answer?
Add Answer to:
The primary method to evaluate the effectiveness of an information system’s controls is from conducting an...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1. Detection risk is the risk a. that internal controls will not be followed. b. that...

    1. Detection risk is the risk a. that internal controls will not be followed. b. that the business will naturally experience, regardless of internal controls. c. that measures the effectiveness of a firm's internal controls. d. that an internal audit will not uncover incidents where controls have not been followed. 2. Which one of the following types of audits would be most likely to focus on objectives related to the efficient use of resources? a. Operational audit b. Independent audit...

  • You are the internal audit senior responsible for conducting an assurance engagement of the XYZ Company...

    You are the internal audit senior responsible for conducting an assurance engagement of the XYZ Company payroll process. This process has not been audited for three years and, as such, is due in the normal audit cycle. There have been no significant changes since the previous audit, that is, there were no system changes, no reorganization of personnel, and no substantive procedural changes. However, during the last assurance engagement, the internal audit function identified several observations, some of which were...

  • 1.The general type of fraud that involves intentionally misstating items or omitting important facts from the...

    1.The general type of fraud that involves intentionally misstating items or omitting important facts from the financial statements is typically known as _______. -fraudulent financial reporting -writing checks to fictitious vendors -using company cars for personal use -theft of inventory by employees 2.The general type of fraud that involves some form of theft is typically known as _______. -fictitious sales -misappropriation of assets -unrecorded liabilities -improper asset valuation 3.An audit plan details the nature, extent, and timing of audit procedures...

  • #1) Select the best choice. For security controls, gap analysis involves comparing the present state of...

    #1) Select the best choice. For security controls, gap analysis involves comparing the present state of controls with a desired state of controls. At a minimum, common baseline security controls should be in place. Any gaps to various types of controls should be clearly documented, for example - "Information security responsibilities", which: a. Defines the program to provide initial and ongoing security education across the organization. b. Reduces risk from known vulnerabilities being exploited. c. Defines how staff will execute...

  • Explain whether the auditor should proceed with conducting an audit if information received from the former auditor has...

    Explain whether the auditor should proceed with conducting an audit if information received from the former auditor has significant negative information about circumstances that would require special attention.

  • DQ1. What is an Audit Work Program (some call it Audit Program)? The audit work program...

    DQ1. What is an Audit Work Program (some call it Audit Program)? The audit work program - Email Surveillance Audit Program – What is the structure and contents including various audit steps. Find 1-2 steps in the audit program where the audit software can be used. How can audit software be used to gather evidence?. (the Audit program (Email Surveillance Audit Program details is attached). DQ3. Review the contents of the Audit Manual of Office of University Audits at University...

  • 2. When petrol is pumped into tanks, hydrocarbons escape. To evaluate the effectiveness of pollution controls...

    2. When petrol is pumped into tanks, hydrocarbons escape. To evaluate the effectiveness of pollution controls, experiments were performed. The quantity of hydrocarbons escaping was measured as a function of the tank temperature, the temperature of the petrol pumped in the initial pressure in the tank, and the pressure of the petrol pumped i a) The data is in the same data file as the previous question. Copy it into Minitab and run a regression analysis for the quantity of...

  • 1. During the audit of assets, an internal auditor believes that several items were classified as...

    1. During the audit of assets, an internal auditor believes that several items were classified as assets when they should have been classified as expenses. To whom should the internal auditor report these concerns to? a.Discuss the matter with the chief audit executive b. Discuss the matter with senior management to determine if the classifications are correct. c. Consult with legal counsel for advice. d. Discuss the matter with the general accountant who classified the transactions 2. Internal auditors can...

  • please answer asap! Which of the following is/are the primary means of communication for gathering information...

    please answer asap! Which of the following is/are the primary means of communication for gathering information while assessing management integrity? Communication with the client personnel, the client's industry peers and the previous auditor Communication with client personnel and with the client's industry peers, only Communication with the previous auditor, only Communication with the client's industry peers, only What term refers to the determination of the amount of time to spend testing the client's internal controls and conducting detailed testing of...

  • 2. When petrol is pumped into tanks, hydrocarbons escape. To evaluate the effectiveness of pollution controls, exp...

    2. When petrol is pumped into tanks, hydrocarbons escape. To evaluate the effectiveness of pollution controls, experiments were performed. The quantity of hydrocarbons escaping was measured as a function of the tank temperature, the temperature of the petrol pumped in the initial pressure in the tank, and the pressure of the petrol pumped i a) The data is in the same data file as the previous question. Copy it into Minitab and run a regression analysis for the quantity of...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT