Access control lies at the heart of accounting information integrity. In the absence of
adequate controls, supplier invoices can be deleted, added, or falsified. Individual payroll
account balances can be erased or the entire accounts payable file can be destroyed.
Evidence gathered about the effectiveness of access controls tests the management assertions
of existence, completeness, accuracy, valuation and allocation, rights and obligations,
and presentation and disclosure.
Since payments to false vendors carries such potential for material loss, the auditor
is concerned about the integrity of the valid vendor file. By gaining access to the file, a
computer criminal can place his or her name on it and masquerade as an authorized
vendor. The auditor should therefore assess the adequacy of access controls protecting
the file. These include password controls, restricting access to authorized managers, and
using data encryption to prevent the file contents from being read or changed.
As discussed in previous chapters, computer access controls are both system-wide
and application-specific. Access control includes controlling access to the operating systems,
the networks, and the databases with which all applications interact. The auditors
will typically test these controls as part of their review of general controls.
Access control lies at the heart of accounting information integrity. In the absence ofadequate controls, supplier invoices can be deleted, added, or falsified. Individual payrollaccount balances can be erased or the entire accounts payable file can be destroyed.Evidence gathered about the effectiveness of access controls tests the management assertionsof existence, completeness, accuracy, valuation and allocation, rights and obligations,and presentation and disclosure.Since payments to false vendors carries such potential for material loss, the auditoris concerned about the integrity of the valid vendor file. By gaining access to the file, acomputer criminal can place his or her name on it and masquerade as an authorizedvendor. The auditor should therefore assess the adequacy of access controls protectingthe file. These include password controls, restricting access to authorized managers, andusing data encryption to prevent the file contents from being read or changed.As discussed in previous chapters, computer access controls are both system-wideand application-specific. Access control includes controlling access to the operating systems,the networks, and the databases with which all applications interact. The auditorswill typically test these controls as part of their review of general controls.
การแปล กรุณารอสักครู่..
