Preview

Information System Audit in Indian Banks

Powerful Essays
Open Document
Open Document
2079 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information System Audit in Indian Banks
Information System Audit in Indian Banks

CA Bharatish Ballal

Information systems and audit Information itself is an important asset in today’s business. If information is lost, modified, misused huge loss can occur to business. Hence information security becomes important for any business. Information system in business including that of banking is becoming technology oriented. Computers are being used in all the areas of business including that of financial accounting.
Internal controls used in a Computerized Information System (CIS) environment should aim at information security also. This aspect of internal control is mostly overlooked in a Financial Audit where evidence collection and evaluation is more important. Audit provides the assurance to stakeholders of business. Assurance provided by a financial audit is about financial statements, which are relied upon and based on which decisions are taken by many stakeholders. However there are risks associated in any business, which is not highlighted in a financial audit.

Operational Risk and Audit For example Basel II Accord mentions of ‘operational risks’ that are due to failure of system, process, procedure and human action/inaction (fraud) and legal restrictions, etc. in the operation of banks, some of which are not dealt in financial audit. The Basle committee has identified people, processes, systems and external events, as potential hazards for operations. Inadequacy and failure of any of them can result into events, which cause losses. Every business has to identify events of their relevance. The events may be similar in the same industry, but vary from an organization to organization. The whole exercise of the operational risk management is to identify potential events, which are likely to cause losses. Here is a list of some of the events, which could lead to operational risk (non exhaustive): Technology error Fraud and theft

You May Also Find These Documents Helpful

  • Good Essays

    Before any strategy takes place, an auditor must determine the end result desired from the Information Technology being used as well as the type of technology being dealt with. The most important thing is security thus it is vital to know this technology in and out to be able to determine its strengths and weaknesses. This allows for proper compensation to combat such attacks whether they are fraudulent or accidental in nature. It is necessary to be familiar with different types of proven viable internal control setups to properly test and gage an IT’s internal control system. There are three different strategies use when testing internal controls. First includes assessing the controls using user control information. In this strategy, an auditor would gather computer-generated reports and compare those to all documentation on specific transactions. This process is also known as auditing around the computer because it deals with more hard copy documents. The next strategy entails using application controls to determine the level of risk…

    • 627 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Companies will often use internal controls in the accounting department in order to avoid abuse and inaccurate data recording as well as protecting companies from fraud. Internal controls will also be used by companies as a means to avoid theft of assets, and unauthorized use. The acquisition and disposal of assets is also a very important part of internal controls. These policies and procedures will help companies in the prevention or detection of any unauthorized acquisition, use or the disposition of its assets, as these types of activities could have a negative impact on the company’s financial statements. But in order for the internal controls to work, management has to ensure the proper protocols are being followed.…

    • 1015 Words
    • 4 Pages
    Better Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The objective of the audit of financial statements is to enable the auditor to express an opinion if the financial statements are prepared in accordance with an identified financial reporting framework. The reason that materiality is allocated to those accounts sampled because materiality represents the magnitude of an omission or misstatement of an item in a financial report. The three function of the audit risk are inherent risk (IR), control risk (CR), and detection risk (DR). Every level of audit risk has an opposite connection that exists between assessed levels of controls, inherent risk, and level of detection risk…

    • 804 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    ecology lab 2

    • 691 Words
    • 4 Pages

    A. A species of vole was found to have a type II functional response. At very low food densities what do you expect to limit feeding rate the most? (3pts)…

    • 691 Words
    • 4 Pages
    Satisfactory Essays
  • Best Essays

    With rapid development of the information technology, computerized accounting information system plays an increasingly crucial role in the operation of organization regardless large, medium or small enterprises. This can be contributed to the merits of the marriage of accounting and the computer science technology, which dramatically improve the accuracy and speed of the process of information system. However, along with the advantages of the computerized accounting information system, there emerge several deadly deficiencies which, if not appropriately deal with, can be greatly detrimental to the interests of the organization and, even worse, may lead to collapse of the company. This essay mainly focuses on several important aspects of the deficiency of the computerized accounting information system and then provides feasible solutions to prevent the negative influence derived from these threats.…

    • 1788 Words
    • 6 Pages
    Best Essays
  • Good Essays

    In order to produce results, information must be communicated and shared amongst an organization. This information can be shared in various ways such as verbal and technical communications. Information within an organization is used to comprehend the importance of the input and outputs of the business processes in such ways as collaborations of ideas, sharing of concepts, rules, regulations, and business processes. Every organization has data, files, business, and personal records. Organizations have become more reliant on technology. With this reliance comes a sense of dependence on technology for daily business operations, therefore it is very important that organizations protect their information because they can easily be exposed and vulnerable to cyber attacks.…

    • 614 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ljb Company Case Study 2

    • 1529 Words
    • 7 Pages

    Internal control procedures are crucial to any business to make sure things stay on the right track, not just help the business to detect dishonesty but also can help the company to reduce the risk of not having a clear view of the company’s financial position due to mistakes done when recording transactions.…

    • 1529 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Audit and Assurance

    • 929 Words
    • 4 Pages

    Given the recent banking crisis and the current volatility of the financial markets, some commentators have suggested that the current audit model is not fit for purpose and should be changed to reflect the current business practices and models particularly relating to risk and risk assessment.…

    • 929 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Acct 504 Case Study 2

    • 1426 Words
    • 5 Pages

    Risk assessment – The organization must identify and analyze the different factors that generate risk for the business and must decide how to manage these risks. Because economic industry, regulatory and operating conditions will continue to change. (coso)…

    • 1426 Words
    • 5 Pages
    Good Essays
  • Best Essays

    Snezana, K, Aleksandra, S & Rajko, T 2012, ‘Accounting Information System as a Platform for Business and Financial Decision-Making in the Company’, Management, vol. 65, pp.63-69.…

    • 1851 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    The study aimed at assessing the effectiveness of computerized accounting systems in organizations (the general objective of the study). It employed a case study design and Ministry of Finance and Economic Affairs was chosen as the case of the study. Various literatures were consulted to get the theoretical and empirical thoughts of stupendous authors about the topic under study to help the researcher craft and refine her methodology.…

    • 10724 Words
    • 43 Pages
    Powerful Essays
  • Better Essays

    Value Chain

    • 2213 Words
    • 9 Pages

    Financial report audit is to provide a reasonable assurance in dependence on a framework of financial reporting, and it is also to check out if the financial report is prepared or not in all important aspects (Robyn M., 2011, pp. 6-7).…

    • 2213 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Tires

    • 19823 Words
    • 80 Pages

    Have you ever heard the sayings “knowledge is power” or “information is money”? When people talk about accounting, what they are really talking about is information. The information used by businesses, as well as the technology that supports that information, represents some of the most valuable assets for organizations around the world. Very often, the success of a business depends on effective creation, management, and use of information. As companies become ever more reliant on technology, the need for welleducated Management Information Systems (MIS) auditors and control professionals increases. Improved technology has the potential to dramatically improve business organizations and practices, reduce costs and exploit new business and investment opportunities. At the same time, companies face constant challenges in selecting and implementing these new technologies. Because of their high value and inherent complexity, the development, support, and auditing of information systems has become one of the fastest growing specialties in accounting. Graduates with special interests and skills in computing and technology have expansive opportunities. In addition to traditional accounting and auditing functions, MIS professionals perform evaluations of technologies and communications protocols involving electronic data interchange, client servers, local and wide area networks, data communications, telecommunications, and integrated voice/data/video systems. In public accounting, technology has impacted the auditing profession by extending the knowledge required to draw conclusions and the skills required to audit advanced accounting and information systems. With management consulting practices growing and information systems becoming a larger percentage of public accounting revenue, MIS professionals are in high demand. If you are considering a degree in computer or information systems, you…

    • 19823 Words
    • 80 Pages
    Powerful Essays