-
Book Overview & Buying
-
Table Of Contents
CISA – Certified Information Systems Auditor Study Guide - Second Edition
By :
Data Analytics (DA) is the method of examining data or information. It helps you to understand the data by transforming raw data into usable and meaningful information.
The following are some examples of the use of DA:
CAATs are extremely useful to IS auditors for gathering and analyzing large and complex data during an IS audit. CAATs help an IS auditor collect evidence from different hardware, software environments, and data formats.
The following table presents a breakdown of the functions of CAAT tools:
|
CAAT Tools |
Functions |
|
General Audit Software |
This is a standard type of software that is used to read and access data directly from various database platforms. |
|
Utility and Scanning Software |
This helps in generating reports of the database management system. It scans all the vulnerabilities in the system. |
|
Debugging |
This helps in identifying and removing errors from computer hardware or software. |
|
Test Data |
This is used to test processing logic, computations, and controls programmed in computer applications. |
Table 2.10: Breakdown of CAAT functions
A CAAT helps an IS auditor collect information independently. Information obtained through CAATs is considered more reliable.
The following are some examples of use cases for CAAT tools:
An auditor should be aware of the following precautions when using CAAT tools:
A CISA candidate should understand the difference between continuous auditing and continuous monitoring:
|
Continuous Auditing |
Continuous Monitoring |
|
In continuous auditing, an audit is conducted in a real-time or near-real-time environment. In continuous auditing, the gap between operations and an audit is much shorter than under a traditional audit approach. |
In continuous monitoring, the relevant process of a system is observed on a continuous basis. |
|
For example, high payouts are audited immediately after a payment is made. |
For example, antivirus or IDSs may continuously monitor a system or a network for abnormalities. |
Table 2.11: Differences between continuous auditing and continuous monitoring
Continuous auditing and continuous monitoring are mutually exclusive. Continuous assurance can be ensured if both continuous monitoring and continuous auditing are in place. Generally, the results of continuous auditing are the precursor for the introduction of a continuous monitoring process.
For IS audits, continuous audit techniques are extremely important tools. The following are the five widely used continuous audit tools.
The following are the features of an Integrated Test Facility (ITF).
In an ITF, a fictitious entity is created in the production environment:
The following are the features of a System Control Audit Review File (SCARF):
The following are the features of the snapshot technique:
The following are the features of an audit hook:
The following are the features of Continuous and Intermittent Simulation (CIS):
The following table summarizes the features of continuous audit tools:
|
Audit Tool |
Usage |
|
SCARF/EAM |
This is useful when regular processing cannot be interrupted. |
|
Snapshots |
Pictures or snapshots are used when an audit trail is required. |
|
Audit hooks |
When early detection of fraud or error is required. |
|
ITF |
Test data is used in a production environment |
|
CIS |
CIS is useful for the identification of transactions as per predefined criteria in a complex environment. |
Table 2.12: Types of continuous audit tools and their features
An IS auditor should be aware of the methods and procedures through which analysis and findings are reported to the audit committee and senior management. The effective reporting of audit findings and communicating the findings to all the stakeholders are very important parts of audit execution; these are covered in more detail in the next section.
The following table covers important aspects from the CISA exam perspective:
|
CISA Questions |
Possible Answers |
|
What is the first step of conducting data analytics? |
The first step will be determining the objective and scope of analytics. |
|
Which is the most effective online audit technique when an audit trail is required? |
The snapshot technique. |
|
What is the advantage of an Integrated Test Facility (ITF)? |
Setting up a separate test environment/test process is not required. An ITF helps validate the accuracy of the system processing. |
|
Which is the most effective online audit technique when the objective is to identify transactions as per predefined criteria? |
CIS is most useful to identify transactions as per predefined criteria in a complex environment. |
Table 2.13: Key aspects from the CISA exam perspective
Change the font size
Change margin width
Change background colour