DAMPAK TI TERHADAP AUDIT

Slides:



Advertisements
Presentasi serupa
Audit Wikipedia (id)‏ Audit atau pemeriksaan dalam arti luas bermakna evaluasi terhadap suatu organisasi, sistem, proses, atau produk. Audit dilaksanakan.
Advertisements

Pengendalian umum, dan pengendalian aplikasi
Pengendalian Internal (Internal Control)
Pemahaman Pengendalian Internal
Pengaruh Audit SI/TI & Komputer pada pengendalian internal & Auditing
Auditing Computer-Based Information Systems
DAMPAK TEKNOLOGI INFORMASI TERHADAP AUDIT
Chapter 10 Information Systems Controls for System Reliability
Pengendalian Sistem Informasi Akuntansi
TUJUAN AUDIT SI/TI Pertemuan 2.
Managing Software Requirements (manajemen kebutuhan perangkat lunak)
Panduan Audit Sistem Informasi
Panduan Audit Sistem Informasi
Analisis dan Perancangan Sistem
Electronic Data Processing
Pemeriksaan Atas Sikus Pengeluaran
TSI Perbankan Indonesia: Kompleksitas, Permasalahan,
1 Pertemuan 17 Input / Output Matakuliah: T0316/sistem Operasi Tahun: 2005 Versi/Revisi: 5.
Standar Pelaporan Lap. Keu. Sesuai PABU
Testing Implementasi Sistem Oleh :Rifiana Arief, SKom, MMSI
AUDIT SISTEM INFORMASI
Pengenalan Audit dan Audit SI/TI
PENGENDALIAN SISTEM INFORMASI BERDASARKAN KOMPUTER
Perkembangan Teknologi Alat bantu bekerja manual (dengan kertas, pensil, dan sebagainya) Alat bantu mekanis, elektro mekanis, dan Unit Record System Sudah.
Standar Pekerjaan Lapangan: Audit ats Cash
Audit Working Papers Pertemuan Matakuliah: A0294/Audit SI Lanjutan Tahun: 2009.
Test System Architecture, Cases, & Coverage Pertemuan 5
Electronic Data Processing
BAGIAN 12 PENGARUH TI TERHADAP AUDIT
13 Akuntansi Biaya Activity Based Costing
1 INTRODUCTION Pertemuan 1 s.d 2 Matakuliah: A0554/Analisa dan Perancangan Sistem Informasi Akuntansi Tahun: 2006.
Metodologi Audit Sistem Informasi
Audit Sistem Informasi berbasis Komputer
EIS (Executive Information Systems)
Pert. 16. Menyimak lingkungan IS/IT saat ini
PENGENDALIAN INTERNAL
Support System IT Putri Taqwa Prasetyaningrum,S.T.,M.T.
Pengendalian Sistem Informasi
IT AUDITS IT audits: pemeriksaan terhadap proses atau data yang melekat dengan teknologi informasi. Berkaitan dengan internal, external, dan fraud audits.
PEMILIHAN SISTEM.
Audit Teknologi sistem Informasi
Testing dan Implementasi
IMPLEMENTASI FMS.
Kertas kerja pemeriksaan akuntansi Dr Rilla Gantino, SE., AK., MM
PENGENDALIAN SISTEM INFORMASI BERDASARKAN KOMPUTER
CA113 Pengantar Manajemen Bisnis
Information Technologies
BAB IX SPI dalam Sistem PDE
SISTEM PENYIMPANAN OTOMATIS (AUTOMATED STORAGE SYSTEMS)
Pertemuan <<18>> << Penemuan Fakta(01) >>
Audit Teknologi Informasi Pertemuan 11
TINJAUAN MENYELURUH PROSES BISNIS
Pengantar Bisnis 7 Sessi.
Testing dan Implementasi SI220A
ETIKA PROFESI Sesi 7.
EIS (Executive Information Systems)
KONSEP AUDIT SISTEM INFORMASI
Audit pengolahan Data Elektronik
PENGENDALIAN DATABASE DAN OUTPUT
13 KEWAJIBAN HUKUM PEMERIKSAAN AKUTANSI YULAZRI M.AK., CA., CPA
Kelompok 7 : Adora Aline alfiana (01) Dinda Rakhmawati Setiani (06)
SISTEM INFORMASI MANAJEMEN
Kertas Kerja Pemeriksaan (Working Paper)
TINJAUAN MENYELURUH PROSES BISNIS
Auditing 1 & Prak Sumber : Sukrisno Agoes (2006) “Auditing (Pemeriksaan Akuntan) oleh Kantor Akuntan Publik, Edisi Keempat, LPFE UI, Jakarta.
BAGIAN 12 PENGARUH TI TERHADAP AUDIT
Hardware Merupakan komponen-komponen fisik peralatan yang membentuk suatu sistem komputer, serta peralatan- peralatan lain yang mendukung komputer dalam.
ISA Implementation Support Module Prepared by IAASB Staff October 2010 Materiality, Misstatements and Reporting − Part II.
SISTEM PENUNJANG KEPUTUSAN UNTUK SISTEM INFORMASI MANAJEMEN.
Pertemuan 6 Audit Teknologi Informasi Kel 4 : - Aditya pratama.
Transcript presentasi:

DAMPAK TI TERHADAP AUDIT 14 PEMERIKSAAN AKUTANSI DAMPAK TI TERHADAP AUDIT YULAZRI M.AK., CA., CPA FAK EKONOMI & BISNIS

VISI DAN MISI UNIVERSITAS ESA UNGGUL

Materi Sebelum UTS PENGANTAR AUDIT AUDIT PROSES TANGGUNG JAWAB DAN TUJUAN AUDIT BUKTI AUDIT KERTAS KERJA PEMERIKSAAN STANDAR AUDIT LAPORAN AUDIT

Materi Setelah UTS MATERIALITAS DAN AUDIT RISK INTERNAL CONTROL PENILAIAN IC DAN TEST IC PERENCANAAN DAN AUDIT PROGRAM KODE ETIK PROFESI KEWAJIBAN HUKUM DAMPAK TI PADA PROSES AUDIT

KEMAMPUAN AKHIR YANG DIHARAPKAN Mahasiswa memahami tahapan proses audit. Mahasiswa memahami proses perencanaan audit. Mahasiswa dapat menggunakan aplikasi dasar dari analisa laporan keuangan (analytical review)

Proses/tahapan audit previous new Field work Reporting Planning Risk Risk respond Reporting

Perencanaan audit Audit should be plan

Basic Computer Architecture Central Processing Unit (CPU) Main Memory (RAM) (volatile memory) Turn-off the computer and it forgets Disk Drive non-volatile (persistent) memory Maintains data across shutdowns Data Files Temporary Files Registry Entries Unallocated Space Swap Space Log Files Email

Computer Forensic Requirements Hardware Familiarity with all internal and external devices/components of a computer Thorough understanding of hard drives and settings Understanding motherboards and the various chipsets used Power connections Memory

TI DAN AKUNTANSI Teknologi informasi (TI) berfungsi untuk meningkatkan efektifitas dan efisiensi serta kualitas proses bisnis, termasuk di dalamnya proses akuntansi. Teknologi informasi berpengaruh besar terhadap pendekatan dan proses audit laporan keuangan. Auditor harus memahami keunggulan dan kelemahan TI.

How Information Technologies Enhance Internal Control Computer controls replace manual controls Higher-quality information is available

TI DAN SISTEM PENGENDALIAN TI mengantikan pengendalian manual yang cenderung kurang efektif dan kurang efisien. TI meningkatkan keunggulan kualitas pengolahan data dari sisi: Kemampuannya memproses transaksi yang komplek dalam jumlah yang besar secara efektif dan efisien. Konsistensi dalam proses pengolahan data. Kemampuannya menjamin keandalan proses pengolahan data.

TI DAN SISTEM PENGENDALIAN TI menggantikan pemisahan fungsi konvensional. TI menurunkan peluang kecurangan (fraud). TI meningkatkan keunggulan kualitas informasi dari sisi: ketepatan waktu, keakuratan informasi, kemudahan akses, serta kemampuan adaptasi dengan kebutuhan pengguna informasi (customizing). Halaman

Assessing Risks of Information Technologies Risks to hardware and data Reduced audit trail IT can improve a company’s internal controls; however, it can also affect the company's overall control risk. If IT systems fail, organizations can be paralyzed by the inability to retrieve information or by the use of unreliable information caused by processing errors. Specific risks to IT systems include the aforementioned. Need for IT experience and separation of IT duties

Kerusakan file data dan informasi karena rusaknya hardware/software. RISIKO PENGGUNAKAN TI Saat ini TI bukan lagi pilihan, tapi keharusan. Risiko yang harus diperhatikan antara lain: Kerusakan file data dan informasi karena rusaknya hardware/software. Kerusakan proses yang sangat masif yang tidak dapat diketahui dengan segera. Ketergantungan yang tinggi terhadap fungsi hardware/software. Halaman

Risks to Hardware and Data Reliance on hardware and software Unauthorized access Without proper physical protection, hardware or software may not function or may function improperly. When organizations replace manual procedures with technology-based procedures, the risk of random error from human involvement decreases. However, the risk of systematic error increases because once procedures are programmed into computer software, the computer processes information consistently for all transactions. IT cased accounting systems often allow online access to electronic data in master files software and other records. Because online access can occur from remote access points, there is potential for illegitimate access. Since much of the data is stored in centralized electronic files, this increases the risk of loss or destruction of entire data files. Systematic vs. random errors Data loss

RISIKO PENGGUNAAN TI Kerusakan sistematis vs random, pada saat proses manual digantikan dengan TI, kerusakan random karena human errors dapat diturunkan, tetapi kerusakan sistematis justru bisa meningkat. Unauthorized access. Akses online terhadap data elektronik berpotensi meningkatkan risiko akses tanpa otorisasi. Loss of data. Data elektronik yang rata-rata disimpan terpusat dalam data base, meningkatkan risiko kerusakan atau hilangnya keseluruhan data. Need for IT experience. Penggunaan TI memerlukan staf yang memahami dan mampu memanfaatkan keunggulan TI Halaman

PENGENDALIAN TI General controls (pengendalian umum). Adalah sistem pengendalian untuk seluruh aspek fungsi TI, mencakup: administrasi TI, pemisahan fungsi TI, pengembangan TI, pengamanan akses fisik dan online terhadap hardware/software/data, backup data, dan perencanaan kontinjensi untuk situasi emerjensi. Auditor harus mengevaluasi pengendalian umum untuk keseluruhan TI dalam organisasi. Halaman

PENGENDALIAN TI Aplication controls (pengendalian aplikasi). Adalah sistem pengendalian untuk program aplikasi yang digunakan untuk memproses transaksi, seperti pengendalian untuk sistem penjualan dan penerimaan kas. Auditor harus mengevaluasi pengendalian aplikasi untuk setiap kategori transaksi atau akun, karena pengendalian aplikasi bisa jadi berbeda-beda untuk setiap kategori transaksi atau akun. Halaman

Reduced Audit Trail Visibility of audit trail Lack of traditional authorization With the use of computers, IT often reduces or even eliminates source documents and records that allow the organization to trace accounting information. In many IT systems, employees who deal with the initial processing of transactions never see the final results. Therefore, they are less able to identify mistakes. Advanced IT systems can often initiate transactions automatically, such as calculating interest on savings accounts and ordering inventory when pre-specified order levels are reached. Detection risk Reduced human involvement

Need for IT Experience and Separation of Duties It is important to have personnel with knowledge and experience to install, maintain, and use the system. Reduced separation of duties Need for IT experience

Internal Controls Specific to Information Technology Information technology controls General controls apply to all aspects of the IT function including IT admin, separation of IT duties, systems development, physical and online security over access to hardware, software and related data. Application controls apply to processing transactions. Application controls General controls

Relationship Between General and Application Controls

Control activities Kebijakan dan prosedur yang membantu menjamin pengarahan managemen dilaksanakan

Control Activities Pemisahan Tugas Pengendalian Pengolahan Informasi General Control Application Control Pengendalian Pisik Review Kinerja

Pemisahan Tugas: seseorang tidak boleh melakukan tugas yang tidak kompatibel Pemisahan tugas pelaksana, pencatatan, dan penyimpanan aset dari suatu transaksi Pemisahan bagian IT dengan Pengguna Pemisahan dalam bagian IT: Pengembangan sistem Operation Data control Securities administration

Information Processing Control General Control Pengendalian organisasi dan operasional Pengendalian pengembangan sistem dan dokumentasi Pengendalian perangkat keras dan lunak Pengendalian akses Pengendalian data dan prosedural Application Control

Physical Control Direct physical control Indirect physical control Penghitungan berkala terhadap aset

Information and communication: Idenfikasi, perekaman, dan pertukaran informasi dalam rerangka bentuk dan waktu yang memungkinkan orang menjalankan tanggungjawabnya

Information and Communication Transaksi Hanya transakasi valid Seluruh transaksi Hak dan kewajiban Pengukuran Cukup detail Audit atau transaction trail Dokumen dan catatan

Categories of General and Application Controls

Administration of the IT Function The perceived importance of IT within an organization is often dictated by the attitude of the board of directors and senior management.

Segregation of IT Duties The CIO or IT manager should be responsible for oversight of the IT function. Systems analysts are responsible for the overall design of each application system Computer operators are responsible for the day-to-day operations of the computer following the schedule established by the CIO.

Systems Development Typical test strategies Pilot testing Pilot testing is when a new system is implemented in one part of the organization while other locations continue to rely on the old system. Parallel testing is when the new and old systems operate simultaneously in all locations. Pilot testing Parallel testing

Physical and Online Security Online Controls: User ID control Password control Separate add-on security software Physical controls decrease the risk of unauthorized changes to programs and improper use of programs and data files. Proper user IDs and passwords control access to software and related data files this reducing the likelihood that unauthorized changes are made to software applications and data files. Physical Controls: Keypad entrances Badge-entry systems Security cameras Security personnel

Backup and Contingency Planning Offsite storage of critical files is a key element to a backup and contingency plan One key to a backup and contingency plan is to make sure that all critical copies of software and data files are backed up and stored off the premises.

Hardware Controls These controls are built into computer equipment by the manufacturer to detect and report equipment failures.

Application controls are designed for each software application Input controls Output controls Processing controls

Aplication control Pengendalian Input Pengendalian Proses Pengendalian Output

Aplication control Input Control Otorisasi Konversi Data Input Verification Control Computer Editing: missing data check, valid character check, limit (reasonable) check, valid sign check, valid code check, check digit) Koreksi Kesalahan

Processing Control Control totals File identification labels Limit and reasonableness checks Before-and-after report Sequence test Process tracing data

Output control: hasil benar dan hanya orang yang berhak yang memperoleh hasilnya Reconciliation of totals Comparioson to source document Visual scanning

Input Controls These controls are designed by an organization to ensure that the information being processed is authorized, accurate, and complete.

Batch Input Controls Total for all Financial total records in a batch Total of codes from all batch records Hash total Total of records in a batch Record count

Processing Controls Correct file, database, or program? Validation test Correct processing order? Sequence test Accuracy of processed data? Arithmetic accuracy test Data exceeds preset amounts? Data reasonableness test Completeness of record fields? Completeness test

Output Controls These controls focus on detecting errors after processing is completed rather than on preventing errors.

Impact of Information Technology on the Audit Process Effects of general controls on system-wide applications Effects of general controls on software changes Ineffective general controls create the potential for material misstatements across all system applications regardless of the quality of the application controls. Client changes to application software affect the auditor’s reliance on automated controls. Auditors obtain information about general and application controls through interviews, examination of system documentation, and reviews of detailed questionnaires completed by IT staff. If general controls are ineffective, the auditor’s ability to rely on IT-related application controls to reduce control risk in all cycles is reduced. After identifying specific IT-based application controls that can be used to reduce control risk, auditors can reduce substantive testing. Obtaining an understanding of client general controls Relating IT controls to transaction-related audit objectives Effect of IT controls on substantive testing

Auditing in IT Environments with Varied Complexity Audit around the computer LESS Smaller companies IT controls < effective Audit though the computer MORE Parallel simulation Test data

Auditing Around and Through the Computer

Test Data Approach 1. Test data should include all relevant conditions that the auditor wants tested. 2. Application programs tested by the auditors’ test data must be the same as those the client used throughout the year. Auditor’s process their own test data using the client’s computer system and application program to determine whether the automated controls correctly process the test data. 3. Test data must be eliminated from the client’s records.

Test Data Approach Input test transactions to test key control procedures Master files Application programs (assume batch system) Transaction files (contaminated?) Contaminated master files Control test results

Test Data Approach Control test results Auditor makes comparisons Auditor-predicted results of key control procedures based on an understanding of internal control Differences between actual outcome and predicted result

Parallel Simulation The auditor uses auditor-controlled software to perform parallel operations to the client’s software by using the same data files.

Parallel Simulation Production transactions Master file Auditor-prepared program Client application system programs Auditor results Client results Auditor makes comparisons between client’s application system output and the auditor-prepared program output Exception report noting differences

Embedded Audit Module Approach Auditor inserts an audit module in the client’s application system to identify specific types of transactions.

Embedded Audit Module Approach

Issues for Different IT Environments Network Environments Database Management Systems Outsourced IT e-Commerce systems

KEUNGGULAN TI Reduced human involvement (penurunan keterlibatan manusia), proses bisnis menjadi lebih efisien dan tidak dibatasi dengan waktu. Lack of traditional authorization (penghilangan otorisasi manual), otorisasi tersebar luas, proses bisnis lebih cepat dan lebih efisien. Reduced separation of duties, proses bisnis menjadi lebih sederhana, birokrasi yang rumit menjadi berkurang tajam, pengendalian dilakukan secara elektronik. Halaman

Pengendalian Umum vs Aplikasi Risiko Pengubahan Software Aplikasi Tanpa Otorisasi Risiko Benturan Antar Sub Sistem Pengendalian Aplikasi Penerimaan Kas Pengendalian Aplikasi Penjualan Pengendalian Aplikasi Penggajian Pengendalian Aplikasi Siklus Lainnya Risiko Pengubahan Master File Tanpa Otorisasi Risiko Proses Tanpa Otorisasi PENGENDALIAN UMUM Halaman