Preview

Information System Audit in Indian Banks

Powerful Essays
Open Document
Open Document
2079 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information System Audit in Indian Banks
Information System Audit in Indian Banks

CA Bharatish Ballal

Information systems and audit Information itself is an important asset in today’s business. If information is lost, modified, misused huge loss can occur to business. Hence information security becomes important for any business. Information system in business including that of banking is becoming technology oriented. Computers are being used in all the areas of business including that of financial accounting.
Internal controls used in a Computerized Information System (CIS) environment should aim at information security also. This aspect of internal control is mostly overlooked in a Financial Audit where evidence collection and evaluation is more important. Audit provides the assurance to stakeholders of business. Assurance provided by a financial audit is about financial statements, which are relied upon and based on which decisions are taken by many stakeholders. However there are risks associated in any business, which is not highlighted in a financial audit.

Operational Risk and Audit For example Basel II Accord mentions of ‘operational risks’ that are due to failure of system, process, procedure and human action/inaction (fraud) and legal restrictions, etc. in the operation of banks, some of which are not dealt in financial audit. The Basle committee has identified people, processes, systems and external events, as potential hazards for operations. Inadequacy and failure of any of them can result into events, which cause losses. Every business has to identify events of their relevance. The events may be similar in the same industry, but vary from an organization to organization. The whole exercise of the operational risk management is to identify potential events, which are likely to cause losses. Here is a list of some of the events, which could lead to operational risk (non exhaustive): Technology error Fraud and theft

You May Also Find These Documents Helpful

  • Better Essays

    Companies will often use internal controls in the accounting department in order to avoid abuse and inaccurate data recording as well as protecting companies from fraud. Internal controls will also be used by companies as a means to avoid theft of assets, and unauthorized use. The acquisition and disposal of assets is also a very important part of internal controls. These policies and procedures will help companies in the prevention or detection of any unauthorized acquisition, use or the disposition of its assets, as these types of activities could have a negative impact on the company’s financial statements. But in order for the internal controls to work, management has to ensure the proper protocols are being followed.…

    • 1015 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Acct 504 Case Study 2

    • 1426 Words
    • 5 Pages

    Risk assessment – The organization must identify and analyze the different factors that generate risk for the business and must decide how to manage these risks. Because economic industry, regulatory and operating conditions will continue to change. (coso)…

    • 1426 Words
    • 5 Pages
    Good Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The objective of the audit of financial statements is to enable the auditor to express an opinion if the financial statements are prepared in accordance with an identified financial reporting framework. The reason that materiality is allocated to those accounts sampled because materiality represents the magnitude of an omission or misstatement of an item in a financial report. The three function of the audit risk are inherent risk (IR), control risk (CR), and detection risk (DR). Every level of audit risk has an opposite connection that exists between assessed levels of controls, inherent risk, and level of detection risk…

    • 804 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Since these assets are a businesses’ or corporations’ most valuable resources, they must be protected from theft and unauthorized use by creating, and implementing, a company “internal controls system.” Internal controls are procedures and protocols by which a company conducts internal monitoring. Through self-monitoring, a company increases the chance of success. Also, these controls systems ensure the liable parties invested in companies that their business are running efficient. Internal controls form an integral part of any business. In laymen’s terms, it is a system of internal controls which minimize errors in the accounting records, and deter fraud and embezzlement. Because these internal controls protect against many illegal happenings in businesses, they are rightfully required by law.…

    • 1219 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    This essay briefly introduces the perceived threats of Computerized Accounting Information System and provides suggestions on how to prevent the occurrence of these potential dangers. Though the computer technology makes the accounting operation more accurate and faster, this still involves several threats in terms of the security and reliability of the accounting information. Fraudulent activities, management cheats, virus infection, costs and so forth, are all need precaution from the operation of the organization. However, proper selection of software, execution of internal control and other precaution measures may help relieve from the threats.…

    • 1788 Words
    • 6 Pages
    Best Essays
  • Good Essays

    In order to produce results, information must be communicated and shared amongst an organization. This information can be shared in various ways such as verbal and technical communications. Information within an organization is used to comprehend the importance of the input and outputs of the business processes in such ways as collaborations of ideas, sharing of concepts, rules, regulations, and business processes. Every organization has data, files, business, and personal records. Organizations have become more reliant on technology. With this reliance comes a sense of dependence on technology for daily business operations, therefore it is very important that organizations protect their information because they can easily be exposed and vulnerable to cyber attacks.…

    • 614 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Ljb Company Case Study 2

    • 1529 Words
    • 7 Pages

    Internal control procedures are crucial to any business to make sure things stay on the right track, not just help the business to detect dishonesty but also can help the company to reduce the risk of not having a clear view of the company’s financial position due to mistakes done when recording transactions.…

    • 1529 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    There are several different types of threats that can be posed to the accounting information systems of an organization and when ignored can create grave damage to the organization. One threat to the AIS of the organization is the threat of the unauthorized user. Organization needs to have strict controls on who has access to computers that relate to the information system of the organization t prevent loss or to prevent damage. Unauthorized users can also come in the form of hackers that find back doors into the company’s AIS in order to steal sensitive information or to wreak havoc with the information systems. It is essential in the new Information Age for the management is knowledgeable on the AIS and the needed security measures to protect this system.…

    • 851 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Audit and Assurance

    • 929 Words
    • 4 Pages

    Given the recent banking crisis and the current volatility of the financial markets, some commentators have suggested that the current audit model is not fit for purpose and should be changed to reflect the current business practices and models particularly relating to risk and risk assessment.…

    • 929 Words
    • 4 Pages
    Powerful Essays
  • Best Essays

    White Paper

    • 1119 Words
    • 5 Pages

    Information security basically refers to the methods and processes which are mainly designed for the safety of electronic, print or any other confidential information. It is designed to prevent the private and confidential information from unauthorized access, disclosure, misuse, destruction, disruption or modification. The terms computer security, information assurance and information security are used interchangeably. All these fields are linked with each other and share the basic targets of protecting the confidential information. These days several vulnerabilities are faced by IT companies and security organizations in Washington DC. They are mainly linked with the erosion of long duration of competitiveness and rational property loss. There are enormous risks associated with these types of security industries and business men. For this purpose, our company has introduced effective solutions to guarantee the security of information system (Pagani, 2005).…

    • 1119 Words
    • 5 Pages
    Best Essays
  • Better Essays

    Value Chain

    • 2213 Words
    • 9 Pages

    Financial report audit is to provide a reasonable assurance in dependence on a framework of financial reporting, and it is also to check out if the financial report is prepared or not in all important aspects (Robyn M., 2011, pp. 6-7).…

    • 2213 Words
    • 9 Pages
    Better Essays
  • Best Essays

    Snezana, K, Aleksandra, S & Rajko, T 2012, ‘Accounting Information System as a Platform for Business and Financial Decision-Making in the Company’, Management, vol. 65, pp.63-69.…

    • 1851 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    The study aimed at assessing the effectiveness of computerized accounting systems in organizations (the general objective of the study). It employed a case study design and Ministry of Finance and Economic Affairs was chosen as the case of the study. Various literatures were consulted to get the theoretical and empirical thoughts of stupendous authors about the topic under study to help the researcher craft and refine her methodology.…

    • 10724 Words
    • 43 Pages
    Powerful Essays
  • Powerful Essays

    Tires

    • 19823 Words
    • 80 Pages

    Have you ever heard the sayings “knowledge is power” or “information is money”? When people talk about accounting, what they are really talking about is information. The information used by businesses, as well as the technology that supports that information, represents some of the most valuable assets for organizations around the world. Very often, the success of a business depends on effective creation, management, and use of information. As companies become ever more reliant on technology, the need for welleducated Management Information Systems (MIS) auditors and control professionals increases. Improved technology has the potential to dramatically improve business organizations and practices, reduce costs and exploit new business and investment opportunities. At the same time, companies face constant challenges in selecting and implementing these new technologies. Because of their high value and inherent complexity, the development, support, and auditing of information systems has become one of the fastest growing specialties in accounting. Graduates with special interests and skills in computing and technology have expansive opportunities. In addition to traditional accounting and auditing functions, MIS professionals perform evaluations of technologies and communications protocols involving electronic data interchange, client servers, local and wide area networks, data communications, telecommunications, and integrated voice/data/video systems. In public accounting, technology has impacted the auditing profession by extending the knowledge required to draw conclusions and the skills required to audit advanced accounting and information systems. With management consulting practices growing and information systems becoming a larger percentage of public accounting revenue, MIS professionals are in high demand. If you are considering a degree in computer or information systems, you…

    • 19823 Words
    • 80 Pages
    Powerful Essays