Top Banner
1 Pertemuan 7 Internal Control System Matakuliah :A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun : 2005 Versi : 1/1
39

1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

Dec 19, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

1

Pertemuan 7Internal Control System

Matakuliah :A0274/Pengelolaan Fungsi Audit Sistem Informasi

Tahun : 2005

Versi : 1/1

Page 2: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

2

Learning Outcomes

Pada akhir pertemuan ini, diharapkan mahasiswa

akan mampu :

• Mahasiswa dapat menunjukkan Internal Control System.

Page 3: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

3

Outline Materi

• Risk Assessment– Risk Assessment: Internal Perspective– Risk Assessment: External perspective

• Control Strategies– Fourfold Perspective of Controls Model

• Prediction• Prevention• Detection• correction

– Information Systems and Controls Model• Physical Controls• Computer Controls: General• Computer Controls: Application

– An Internal Audit Function

Page 4: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

4

– Corporate Governance• Audit Committee• Information Technology Governance

– Logs and Auditability– Segregation of Duties– Investigation Procedures

Page 5: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

5

Risk Assessment

• Risk assessment is a critical step in building an effective internal control system that has the ability to manage undesirable events, primarily because it strategically focuses attention on the most likely trouble spots with the highest costs rather than general protection. The IIA focuses on risk assessment in internal auditor activities and standards.

Page 6: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

6

• The five major areas of internal control include:– Control Environment– Risk Assessment– Information and Communication– Monitoring– Control Activities

Page 7: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

7

Risk Assessment: Internal Perspective

• An effective risk assessment must emphasize a good understanding of the internal risks.

Page 8: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

8

Risk Assessment: External Perspective

• An effective risk assessment must also emphasize a good understanding of the external risks, especially if the firm has a web server connected to its internal systems or has remote access to networks. If the company has remote access to its computer systems, it should be concerned about unauthorized access by users external to the organization.

• If the company has employed electronic commerce, there are a number of risks to consider.

Page 9: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

9

• While online, there is a risk that the data used in an e-commerce transaction might be stolen.

• The highest risk associated with the Internet is neither hackers or crackers but viruses or worm. It is relatively easy to spread malicious code as attachments to e-mail. And while it is virtually impossible to activate a virus by simply opening an e-mail message, Microsoft complicated that by allowing the automatic opening of attachments in Outlook. Almost all wide-spread viruses depend on the features of Outlook (e.g., automatically open attachments) and the address book on each computer.

Page 10: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

10

• There are several other problem areas or risks associated with e-mail.

Page 11: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

11

Control Strategies

• Effective control activities can help to mitigate the risks identified in the risk assessment.

Page 12: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

12

Fourfold Perspective of Controls Model

• Before developing management policies, management needs to have a general understanding of how to design effective internal controls.

Page 13: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

13

Prediction

• The first area, prediction, is the most difficult.

Page 14: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

14

Prevention

• Secondly, activities should be implemented where the objective is to prevent malicious activities.

• A better control is firewall that has multiple layers: a combination of routers, filters, proxy servers, software, and so on, used to provide a shield that could be compared to an onion, with all its layers of skin. Preventive controls are also necessary in software applications to prevent errors in data

Page 15: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

15

Detection

• It is much easier to develop controls for detection, the third perspective.

Page 16: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

16

Correction

• The last perspective, correction, is another fruitful source of controls.

Page 17: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

17

Information Systems and Controls Model

• A second model applies to controls in general: physical and computer.

Page 18: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

18

Physical Controls

• Physical controls involve controls of a manual nature.

• Transaction authorization needs physical controls (i.e., manual controls) to ensure all material transactions are processed by the accounting system with integrity and in compliance with management policies and objectives. Using management decision rules, certain recurring transactions become a programmed procedure, or operate under general authority. Other decisions of a non-routine nature need specific authority.

Page 19: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

19

• Segregation of duties is another important type of physical control.

Page 20: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

20

• Three good rules of thumb for developing controls using segregation of duties controls is:– Separate authorization of transactions from

processing them– Separate custody of assets from record

keeping– Create controls such that a successful fraud

can only be perpetrated using collusion

Page 21: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

21

• The latter generally can be accomplished by separating steps of the process between different individuals. Also, make sure segregation of duties extends beyond the typical area of basic accounting functions.

Page 22: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

22

• Some of the controls that illustrate proper segregation of duties in information systems are:– Separate systems development from computer

operations.– Separate new systems development from

maintenance, which also should increase the quality of documentation.

– Separate the database administrator (DBA) from other database and systems functions, computer operations, development and maintenance.

– Separate data library function from computer operations, development and maintenance.

– Use of a data control group.

Page 23: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

23

• Management also will assess the integrity of the computer system and data on an ongoing basis as a part of independent verification. Internal controls should also be implemented for independent verification of data. A classic control in this category is the comparison of physical assets with accounting records but it also includes controls such as reviewing management reports.

Page 24: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

24

Computer Controls: General

• They would include controls such as locked doors for sensitive areas (e.g., data storage, mainframe room). They should also include controls regarding the development of new systems.

Page 25: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

25

• These controls might include:– Requiring a written request with justification from

user(s)– Requiring a written evaluation and authorization of

this request by information systems staff– Requiring the design of the application by a cross-

functional team that includes a CISA or CIA (to ensure the inclusion of adequate controls during development)

– Requiring adequate documentation procedures– Requiring a written report on the testing (probably re-

introduce CISA or CIA to the process at this point)

Page 26: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

26

– Requiring full off-line testing for new applications, hardware, or systems before activation online

– Requiring training of new applications before implementation

Page 27: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

27

• Major changes to existing software systems should generally follow the same set of controls.

• There should also be controls regarding computer operations.

• Access to programs and data are critical and need controls and have already been discussed.

Page 28: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

28

Computer Controls: Application

• They include:– Input controls– Processing controls– Output controls

Page 29: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

29

An Internal Audit Function

• The most important general control activity is an internal audit function. Each enterprise must have an independent source for developing and verifying controls, above and beyond what the external auditors might do in a financial audit.

Page 30: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

30

Corporate Governance

• A key control strategy is an effective corporate governance structure. This strategy begins with the internal auditor function and includes an effective audit committee and information technology governance.

Page 31: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

31

Audit Committee

• Another key major control activity is an adequate audit committee. But having an audit committee is not the same as having an effective audit committee.

• Companies need an audit committee for several reasons.

• The organizational structure of the committee is also important.

• Leadership refers to the chair of the audit committee.

• Lastly, the audit committee needs to be proactive.

Page 32: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

32

Information Technology Governance

• Information technology governance is similar to corporate governance in its objectives and is a prime service of ISACA.

Page 33: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

33

• The objectives of information technology governance are to:– Understand the issues and the strategic

importance of information technology– Ensure that the enterprise can sustain its

operations– Ascertain it can implement the strategies

required to extend its activities into the future

Page 34: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

34

• Information governance should address the following:– Appropriate and adequate business and information

technology performance measures– Appropriate and adequate business and information

technology outcome drivers– Information technology strategic and alignment issues– Best practices in information technology governance– Questions boards and management should ask

Page 35: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

35

Logs and Auditability

• The last control activities area is that of logs. The more an enterprise is dependent on systems, automation and computers, the more invisible audit trails tend to become.

• One effective control is the implementation of computer logs.

• If the entity is connected to the Internet, logs become even more important. Logs hould be used to track data such as sites visited, files downloaded or uploaded, time spent on the Internet, etc.

Page 36: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

36

• Hacking tools might be an indication of an employee preparing to hack into the organization’s system.

Page 37: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

37

Segregation of Duties

• Another primary objective of internal controls is the effective use of segregation of incompatible duties.

• Three rules to observe are to separate transaction authorization from transaction processing, record keeping from asset custody and any series of transaction processing steps such that a collusion of individuals would be necessary to commit fraud.

Page 38: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

38

Investigation Procedures

• Management must also consider what specific procedures should be employed to protect against internal threats. Key positions, including executives, may require a background search.

Page 39: 1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

39

The EndThe End