SlideShare una empresa de Scribd logo
1 de 77
Descargar para leer sin conexión
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
AuditNet® Training without Travel™ 
Auditing Databases
Guest Presenter:
Richard Cascarino,
MBA, CIA, CISM, CFE
Richard Cascarino &
Associates
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Jim Kaplan CIA CFE
• President and Founder of
AuditNet®, the global resource
for auditors (now available on
Apple and Android and Windows
devices)
• Auditor, Web Site Guru,
• Internet for Auditors Pioneer
• Recipient of the IIA’s 2007
Bradford Cadmus Memorial
Award.
• Author of “The Auditor’s Guide
to Internet Resources” 2nd
Edition
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Richard Cascarino MBA CIA CISM CFE
• Principal of Richard Cascarino &
Associates based in Colorado USA
• Over 30 years experience in IT
audit training and consultancy
• Past President of the Institute of
Internal Auditors in South Africa
• Member of ISACA
• Member of Association of Certified
Fraud Examiners
• Author of Auditor's Guide to IT
Auditing
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Webinar Housekeeping
• This webinar and its material are the property of AuditNet® and Richard Cascarino
and Associates. Unauthorized usage or recording of this webinar or any of its material
is strictly forbidden. We are recording the webinar and you will be provided with a link
access to that recording as detailed below. Downloading or otherwise duplicating the
webinar recording is expressly prohibited.
• Webinar recording link will be sent via email within 5-7 business days.
• NASBA rules require us to ask polling questions during the Webinar and CPE
certificates will be sent via email to those who answer ALL the polling questions
• The CPE certificates and link to the recording will be sent to the email address you
registered with in GTW. We are not responsible for delivery problems due to spam
filters, attachment restrictions or other controls in place for your email client.
• Submit questions via the chat box on your screen and we will answer them either
during or at the conclusion.
• After the Webinar is over you will have an opportunity to provide feedback. Please
complete the feedback questionnaire to help us continuously improve our Webinars
• If GTW stops working you may need to close and restart. You can always dial in and
listen and follow along with the handout.
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Disclaimers
• The views expressed by the presenters do not necessarily represent the 
views, positions, or opinions of AuditNet® or the presenters’ respective 
organizations. These materials, and the oral presentation accompanying 
them, are for educational purposes only and do not constitute accounting 
or legal advice or create an accountant‐client relationship. 
• While AuditNet® makes every effort to ensure information is accurate and 
complete, AuditNet® makes no representations, guarantees, or warranties 
as to the accuracy or completeness of the information provided via this 
presentation. AuditNet® specifically disclaims all liability for any claims or 
damages that may result from the information contained in this 
presentation, including any websites maintained by third parties and 
linked to the AuditNet® website
• Any mention of commercial products is for information only; it does not 
imply recommendation or endorsement by AuditNet®
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Today’s Agenda
– Database Jargon
– Types of DBMS
– Who Looks after the Database
– Restart and Recovery
– Reviewing the Database Design
– Impact of Databases on Auditors
– Auditing the Database
– CAATTs in a Database Environment
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Databases
Definition of Terms
–Database
a collection of data logically organized to meet the information 
requirements of a universe of users
–Database Management System (DBMS)
a hardware/software system which manages data by providing 
organisation, access and control functions
–Data Dictionary / Data Directory Systems (DD / DS)
the software which manages a repository of information about data 
and the data base environment
–Database Administration
a human function involved in the co‐ordination and control of data 
related activities
7
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Definition of Terms
–User System Interfaces
components of the data base environment which request, manipulate 
and transform data into information for an end user
–Data Structure
the interrelationships of data
–Storage Structures
methods and techniques used to physically represent data structures on 
storage devices
–Access Methods
software logic procedures used to retrieve, insert, modify and delete 
data on a storage device
8
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Data Independence implements 
Data Sharing
Diverse users with different logical views
New users with new logical views
Changing logical views
Changing physical representation
Data Independence is the "how" of "what" Data 
Sharing is
9
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Principles of Data Structures
Data Structures are used to model a business (function) 
in terms of information
–Sequential
–Hierarchical
–Network
–Relational Model
Data Structures are also the basis for Database Designs
10
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Conceptual Level Of Database 
Design
Data Structure Diagrams
–DBMSs vary in data structuring capabilities
Entry Access Methods
–Read The First
–Randomising
–Indexing
Navigational Access Methods
–Read The Next
–Embedded Links
–Inverted Index
11
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Data Dictionary / Directory 
Systems
Data Dictionary
–Tells "what" is in a database / file
–Deals with the description of the logical view
–Name, Description, Synonym
Data Directory
–Tells "where and how to access" data
–Deals with the description of the physical aspects of 
data
–Location, Address, Physical Representation
12
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Attributes for Describing 
Entities Of The DD/DS
Identification
Source
Classification
Usage
Qualification
Relationship
13
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Data Dictionary / Data 
Directory System
The DD/DS can be a useful tool independent of the 
need for a DBMS
–Documentation support
–Coordination of shared data usage
–Control over modification of programs and files
The DD/DS has become popular with the advent of 
DBMS packages
–Greater recognition of opportunities to share data
–Greater need to control data usage
–Privacy legislation
–Complexity of relationships involved
14
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Activity
Scope of Activity is a function of the number of 
components dependent on the DD/DS for Meta Data
–Application Programs / Report Generators / DBMS
Degree of Activity is a function of the time the 
component is "bound" to its Meta Data
–Pre‐compile
–Compile
–Run‐time
–Execution Time
Embedded Links for implementing interrecord 
relationships
15
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Polling Question 1
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Database Types
Sequential
Hierarchical
Network
Relational Model
Components
–Data Definition Language (DDL)
–Storage Structure Definition Language (SSDL)
–Data Manipulation Language (DML)
–DBMS Nucleus and Utilities
17
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Sequential Approach
Fundamental Assumption
–There is a Direct Relationship between data
18
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Hierarchical Approach
Fundamental Assumption
–There is some Hierarchical Relationship between data
Terminology
Root Segment
Parent Segment
Child Segment
Twins
19
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Network Approach
Fundamental 
Assumption
–There is some              
General               
Relationship                
between data
Terminology
–Records / Pointers
Note
Any Structure                         
may be defined
Records may contain 
multiple fields
20
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Relational Model
Fundamental Assumption
–There is some Mathematical Relationship between 
data
21
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Relational Data Manipulation
–SELECT ‐ All Retrieval
–UPDATE ‐ Change
–INSERT   ‐ Create new TUPLE
–DELETE  ‐ Delete Tuple
Qualified Manipulation
–FROM    ‐ Specifies Table
–WHERE ‐ Conditions
–AND       ‐ Conjunction of Conditions
–OR          ‐ Disjunction of Conditions
22
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Relational Data Manipulation
–Example
SELECT ‐ EMPLOYEE = NAME
FROM    ‐ EMPLOYEE = DB
WHERE ‐ DEPT = "B03"
AND      ‐ POSITION = "MANAGER"
Result
Managers in Dept B03
A.B. JONES
C.D. SMITH
–The Result is Always a Table
23
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Inverted List
Indexes and Pointers
1 Ford Blue
2 BMW Blue
3 Ford Red
4 Ford Blue
Ford 1,3,4
BMW 2
Blue 1,2,4
Red 3
24
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Packages and Vendors
ADABAS ‐ Software AG (North America)
IDMS ‐ Cullinane Corporation
IMS ‐ IBM
DB2 ‐ IBM
S2000 ‐ MIR Systems Corporation
TOTAL ‐ CINCOM Systems Inc.
DMS II ‐ UNISYS
DATACOM  ‐ ADR
25
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Polling Question 2
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Who Looks After My Database 
System?
Database Administrator
Functions Of The DBA
–Co‐ordinating the information content of the database
–Deciding the storage structure and access strategy
–Liaising with users
–Defining authorization checks and validation 
procedures
–Defining a strategy for back‐up and recovery
–Monitoring performance and responding to changes in 
requirements
27
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Tools of The DBA
Utility Programs
–Loading
–Reorganisation Routines
–Statistical Analysis
–Journaling (e.g., Logs)
–Recovery
Data Dictionary
Database Analysers
28
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Recovery
When? Examples
–Action Failure       Insert, Replace Fails   
–DB Operation Fails
–Transaction Failure  Deadlock
–System Failure  Power, Hardware, Software
–Media Failure Head Crash
29
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Recovery Criteria
Reinstate Databases to a known state
Minimize lost work
Allow recovery on a transaction basis
Provide fast recovery
Minimize manual work
Ensure safety of recovery data
Provide mechanism to inform users of "lost" 
transactions
Cater for various types of failures
30
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Recovery Procedures
Roll Back
–Log processed backwards and completed transactions 
Rolled out. (last Checkpoint Used)
Roll Forward
–Log processed forward to:
Reinstate the system
Update Back‐up copy (e.g., Media Failure)
Other
–Compensating Transactions (e.g., Journal Entries)
–Salvation Routine
31
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Criteria For Effective Log 
Recovery
Before Database is updated
–Log Before Image to undo change if necessary (e.g., 
failure before update)
After Database is updated
–Log After Image to redo change if necessary (e.g., 
media failure)
–Audit Trail information ‐ for manual follow‐up
–(e.g., Program Id, Transaction Id)
32
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Checkpoints and Save Points
Used to define a "stable" state of the database for recovery
–DB is reinstated at last Checkpoint
–Log processed forward and system reinstated
Some Mechanisms For Automated Recovery
–Back‐up (image) Copies
Databases dumped at various intervals, e.g., daily, weekly, on tapes or back‐up 
devices
–Journal or Log
System Ensures that all transactions and data base activity is recorded on a Log
–Save Points
User‐defined intermediate point to recovery from in the event of a failure
–System Checkpoints
System‐defined intermediate point to recovery from in the event of a failure
–Transaction Files
Changes also kept in a separate file and updated
33
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Tools of Restart/Recovery
The Recovery Log
The Checkpoint
The Database Dump
Database Restart/Recovery Software
34
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Recovery Log
Before/after images of the recovery log
–Before Image ‐ Content
Image of Data before modification
Date/Time of change
Processing Program Id of modifying transaction
May be written to Recovery Log stored on a direct access file
–Before Image ‐ Function
Applied to point in time of failure of the environment
Applied to Database to "back out" faulty update transactions
Establishes Database to most recent Quiet Point (Checkpoint)
35
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Before/After Image Logs
After Images ‐ Content
–Image of data after modification
–Date/Time of change
–Processing Program id of modifying transaction
After Images ‐ Function
–Applied to reloaded Database dump
–Brings the Database forward in time to the last 
checkpoint or point of failure
Database Checkpoint taken at a quiet point of the data base ( i.e., all 
update activity has terminated
Buffers are flushed and update transactions are queued until 
checkpoint is taken
36
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Checkpoints
Database Checkpoints can be taken at anytime
May be difficult to synchronize with O/S Checkpoints
May be procedurally initiated by application programs
May be automatically initiated by algorithm
Elapsed Time
Transactions processed
37
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Polling Question 3
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Data Dictionary
"Yellow Pages" of my Database
Functions of a "DD"
–Repository for
description
definition
structure (format)
relationship
usage
access, integrity constraints
–of System Objects
39
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Reviewing Relevant Database 
Designs
Procedure for reviewing a Data Structure 
–list all the record types
–read and analyze their descriptions and names
–identify the key of each record and verify requirement for 
uniqueness
–study the relationships (and sets)
–read and analyze their descriptions and names
–identify all the relationships which are:
1:M
M:M
–Evaluate the strength of each relationship
(membership Option Specification)
–Verify consistency of the design with business                                  
information needs
40
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Documentation of the 
Database Environment
Using the DD/DS as a documentation tool
Data Dictionary/Directory system can be used to 
accept, record and generate
–Requirements and Specifications
–Data Documentation
–Metadata generation
Can automate documentation process
–Cross‐referencing
–Report Generation
–Change Control
41
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Advantages of an Active 
DD/DS
Accuracy
Timeliness
Completeness
Control over updates
42
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Data Dictionary/Directory 
System
Control Realized Through Metadata Generation
–Compile Date/Time Stamp
Program Execution Lock‐out
Concentration of Vulnerability in Access to DD/DS
DD/DS Self‐protection
–Status Control (e.g. "Production" Status Cannot Be 
Modified)
–Password Protection
–Update authorization Restricted to DBA
43
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Administration & Coordination 
Functions
Review & Monitoring Activities
–Review of  Database Designs
–Review of System Design
–Review  of Program Design & Coding
–Monitor Quality Of Data
–Monitor Performance
44
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Segregation of Duties
Strategies to mitigate the concern of concentration of 
risk
–Evolutionary Development
–Fragment The Function
Distribution based on Location
Distribution based upon Users
Data Administration Versus Database Administration
–Use of the SDLC to define reponsibilities and 
deliverables
45
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Organizational Issues
Roles Which Require Segregation
–Database Administration
–Systems Development
–Programming
–Operations
–End Users
–Internal Audit
46
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Central Administration Of 
Schema / Subschema
Assignment of Responsibilities for Database Design 
Duties
–Data Administration
–Database Administration
–Systems Development/design
–Systems Programming
Integrate the Database Design Methodology into the 
SDLC and Roles Matrix
47
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Control Over Changes 
Classification of Changes
–Magnitude of Effort (subjective)
Start‐up Effort
Merging Existing Components
Modifying an Existing Component
Emergency Maintenance
Component of The Environment (Objective)
–Application Programs (Fix, Enhancement, Etc.)
–System Software (New Release, Enhancement, Etc.)
–Data Descriptions (Re‐organization)
–Data (File Scrubbing, Zap, Etc.)
48
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Controlling Access to Data in a 
Database Environment
Impact of a Database Environment on Privacy & 
Security
–Assessing requirements amongst multiple users is more 
difficult
–Sharing of Data may cause control concerns
–It is possible to describe security specifications using 
the Declaritive Data Definition Language (DDL)
More clear specification
Easier to audit
–Migration of implementation of controls from the 
application to the environment
49
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Controlling Completeness & 
Accuracy of Databases
Impact of Database on Completeness & Accuracy Issues
–Effect on the quality of information provided
–Concentration of risk due to sharing of data
–Increased cost of error correction
–Effect on user reliance & confidence
–Database erosion
–Cascading errors
Migration of controls for mitigating the concerns involving 
completeness and accuracy
Generalized in the environment
Implemented in the DBMS, DD/DS, Etc.
50
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Polling Question 4
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
The Impact on the Auditor
Benefits from the Auditor's viewpoint
–Consistency of data
–Enhance quality of audit by increased accessibility
–More accurate systems development process
–Data Resource Management will accrue benefits 
through formalized discipline
–Migration of controls
Disadvantages from the Auditor's viewpoint
–New Technology/Pioneer Syndrome
–Implementation cost control
–Access to DBMS managed data
–Data Integrity Trade‐offs
–Change in scope/timing of audit
52
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Role of the Auditor
Consult with User on requirements
–Edit & Validation rules
–Partial acceptance or rejection on error
–Responsibility for correctness
Consult with DBA on implementation plan
–Tools available
–Edit & Validation element by element
–Error response
Ensure the existence of procedures for edit & validation 
maintenance
–Are the Edit & Validation rules sufficient?
–Procedures for adding new Data Elements
53
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Edit & Validation Controls
Commonly encountered Database Management System 
supported Edit & Validation Controls
–Uniqueness checking for Key And Non‐key
–Structural/Relational checking
–Picture string and simple format checking
–Membership type in CODASYL Systems
Manual
Automatic
54
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Using the DD / DS
Passive DD/DS environment
–Tool for Documentation
–No assurance that application system resembles dd/ds 
content
Active DD/DS environment
–Edit & Validation performed according to declaritively 
specified criteria
–Metadata generation can provide control
–DD/DS produces documentation for
Programmers
Analysts
System Users
55
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
The Database Input / Output Controller 
(DBIOC) as a tool for Controls
Serves as an excellent repository for Completeness and 
Accuracy controls
Centrally maintainable
Central responsibility for administration of controls
Security of the tool can be more easily verified
Data Sampling if required, is transparent to all users 
and processes
56
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Controlling Initial Database 
Content
User is responsible for providing initial database 
content
User spot checks loaded database for correctness
Auditor specifies sufficient checking using statistical 
methods when appropriate
Database Load Utilities may be augmented using exits
57
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Database Restart/recovery 
Software
Database Patch Utility (data Base Zapper)
–Allows Quick (dangerous) fixes to rectify errors
–Allows DBA to disable the database
partially or completely
immediately or as current transactions complete
–Allows unrestricted browsing
–Restricted to DBA staff
–Procedural control over use
–Written approvals and log of activity
58
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Auditing the Database
Set the audit objective and assess the environment
Assess capabilities of software environment
Review the DBA function
Review relevant database designs
Perform transaction impact analysis for relevant 
transactions
Design and perform substantive tests when appropriate
59
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Assessing The Environment
Checklist of environmental questions
1. Is there a formally established data(base) administration 
function?
2. Is the administration activity project oriented or more focused 
on databases?
3. Does senior management take an active role in formulating and 
monitoring database strategy?
4. Is there an (active) DD/DS?
5. Are the control features of the DBMS and DD/DS effectively 
utilized?
6. Are databases implemented in conjunction with on‐line 
technology?
7. Are there corporate‐wide data standards?
8. Is there a formal SDLC?
60
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Assessing The Environment
Checklist of application questions
1. Do diverse users share databases (of audit 
consequence) that were not shared previously?
2. Are there different logical views of the same physical 
database?
3. Are database planned, designed and implemented 
around corporate information needs as opposed to 
parochial, departmental or application oriented 
requirements?
4. Can data from one user area be easily incorporated 
into other applications?
5. Do users have a well defined sense of responsibility 
over data within their sphere influence?
61
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Assess Capabilities of the 
Software Environment
Assessment must be in terms of two perspectives
–Potential Capability: Features & Characteristics available in 
the package
Vendor Documentation
Education & Training
–Implemented Capability: Features & Characteristics which 
have been actually made operational
Database Administration
System Generation Parameters
–Software assessment should focus on controls 
implemented in these components
DBMS   DD/DS   DB/DC   DBIOC
Performance Reports
62
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Reviewing the DBA Function
Review DBA job description and organizational placement
Evaluate SDLC involvement
Review uilization Of DD/DS
Review DBA established standard practices and procedures, 
including:
–Database Security
–Restart/Recovery
–Data Edit/Validation
–Audit Trail
Evaluate impression of others
–Systems Designers / Operations Personnel / End Users
63
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Polling Question 5
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
CAATTs in a Database 
Environment
There are three basic aspects of the Database Environment 
which may be subjected to Substantive Testing
–System Components
–Metadata
–User Data
Testing of system components when appropriate is a matter of 
LOAD, GEN & RUN for the purpose of checking
–System component lock‐out
–Access controls
–Input error controls
–Input completeness controls
65
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Testing of Metadata
Schema/Subschema Comparison Check
–To verify consistency of Data Definitions the Schema & 
Subschema would be compared to the actual Internal 
Control Blocks and Storage Structures
Load Source Schema/Subschema from library
Generate Schema/Subschema from DBMS Control Blocks
Compare at Source level
Active DD/DS Comparison Check
–To verify consistency the above procedure is repeated 
for descriptions maintained in the DD/DS
–Works also for Passive DD/DS's
66
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Administrative Checking
System Documentation & Change Control check
–To verify Completeness & Accuracy Of Metadata which 
is subject to maintenance
–Produce Status & Version control report from DD/DS
–Verify the accuracy of current status & versions by 
comparison to existing occurrences
–Verify Audit Trail of Change Control with application 
personnel and the DBA
67
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Testing Of User Data
Sampling of user data
–use of retrieval software tools
–well known sampling routines
–should be used on recovery logs
Derived data check
–use of independently written software to verify 
accuracy of derived data
–user written code may be embedded in retrieval 
software
68
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Testing Of User Data
Recovery Log comparison check (after image)
–dump current database (tape 1)
–load previous database dump
–apply forward transaction journal
–dump newly constructed database (tape 2)
–reload original database from tape 1
–compare tape 1 and tape 2
–should be identical
–analyze discrepancies
–make adjustments
69
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Testing User Data
Recovery Log comparison check (before image)
–dump current database ‐ tape 1
–run a representative updating program
–apply transaction journal to backout transaction
–dump newly constructed database ‐ tape 2
–reload original database ‐ tape 1
–compare tape 1 and tape 2
–should be identical
–analyze discrepancies
–make adjustments
70
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Audit Tools Available
Active DD/DS
Testing of application software & databases
Testing of system software & system data
Retrieval software
Integrity checking software
DBIOC
Recovery log images
Security log
Derived data
Performance measurement tools
71
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Audit Techniques Available
Testing Of Application Software & Databases
–Verify the effective operation of controls through the 
use of test transactions and test databases
–Test data generators may be data dictionary driven
–Pseudo‐live databases
–Parallel testing
Testing of system software & system data
–Independent verification of the DBMS Software
–Verification of system generated control blocks using 
OS/DBMS dump facilities
72
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Audit Tools Available
–Retrieval for audit purposes can be supported using 
three different approaches
Modification of audit software
Development of special interface mechanisms
Inclusion of retrieval for audit purposes as part of DBMS Software
–Integrity Checking software
Vendor and/or user written routines to scan storage structures and 
check for integrity
pointer integrity
index integrity
Available in some DBMS's
–Database Input Output Controller (DBIOC)
May be used as a host for imbedded sampling for audit purposes
Database procedures/exits
User written software modules
73
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Polling Question 6
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Questions?
• Any Questions?
Don’t be Shy!
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Coming Up Next
IT AUDIT BASIC
3. IT Basics Audit use of CAATs May 5
4. Auditing Contingency Planning May 7
5. IT Fraud and Countermeasures May 12
IT AUDIT ADVANCED
1. Advanced IT Audit Risk Analysis for Auditors May 14
2. Advanced IT Audit Securing the Internet May 19
3. Advanced IT Audit IT Security Reviews May 21
4. Advanced IT Audit  Performance Auditing of the IT 
Function May 26
5. Advanced IT Audit Managing the IT Audit Function May 
28
Copyright © 2014 AuditNet® and Richard Cascarino & Associates
Thank You!
Richard Cascarino, MBA, CIA, CISM, CFE
Richard Cascarino & Associates
970-291-1497
rcasc@rcascarino.com
Jim Kaplan
AuditNet LLC®
800-385-1625
www.auditnet.org
webinars@auditnet.org

Más contenido relacionado

La actualidad más candente

Sure Fire Ways to Succeed with Data Analytics
Sure Fire Ways to Succeed with Data AnalyticsSure Fire Ways to Succeed with Data Analytics
Sure Fire Ways to Succeed with Data AnalyticsJim Kaplan CIA CFE
 
Top 10 excel analytic tests to minimize fraud and process risks
Top 10 excel analytic tests to minimize fraud and process risksTop 10 excel analytic tests to minimize fraud and process risks
Top 10 excel analytic tests to minimize fraud and process risksJim Kaplan CIA CFE
 
Right to Audit Clauses: What you need to know!
Right to Audit Clauses: What you need to know!Right to Audit Clauses: What you need to know!
Right to Audit Clauses: What you need to know!Jim Kaplan CIA CFE
 
2013 audit net guide to audit planning
2013 audit net guide to audit planning2013 audit net guide to audit planning
2013 audit net guide to audit planningJim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Jim Kaplan CIA CFE
 
IT Fraud Series: Data Analytics
IT Fraud Series: Data AnalyticsIT Fraud Series: Data Analytics
IT Fraud Series: Data AnalyticsJim Kaplan CIA CFE
 
20150311 auditnet ap_procure_excel_rlv2
20150311 auditnet ap_procure_excel_rlv220150311 auditnet ap_procure_excel_rlv2
20150311 auditnet ap_procure_excel_rlv2Jim Kaplan CIA CFE
 
The Truth Behind Detecting Fraud Using Data Analytics
The Truth Behind Detecting Fraud Using Data AnalyticsThe Truth Behind Detecting Fraud Using Data Analytics
The Truth Behind Detecting Fraud Using Data AnalyticsJim Kaplan CIA CFE
 
Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsJim Kaplan CIA CFE
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Jim Kaplan CIA CFE
 
Technology development: What is audit's role?
Technology development: What is audit's role?Technology development: What is audit's role?
Technology development: What is audit's role?Jim Kaplan CIA CFE
 
How ERM and audit work together, a combined assurance approach
How ERM and audit work together, a combined assurance approach How ERM and audit work together, a combined assurance approach
How ERM and audit work together, a combined assurance approach Jim Kaplan CIA CFE
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationJim Kaplan CIA CFE
 

La actualidad más candente (20)

20160210 webinarslides
20160210 webinarslides20160210 webinarslides
20160210 webinarslides
 
Sure Fire Ways to Succeed with Data Analytics
Sure Fire Ways to Succeed with Data AnalyticsSure Fire Ways to Succeed with Data Analytics
Sure Fire Ways to Succeed with Data Analytics
 
Fieldwork Webinar
Fieldwork WebinarFieldwork Webinar
Fieldwork Webinar
 
It62015 slides
It62015 slidesIt62015 slides
It62015 slides
 
Top 10 excel analytic tests to minimize fraud and process risks
Top 10 excel analytic tests to minimize fraud and process risksTop 10 excel analytic tests to minimize fraud and process risks
Top 10 excel analytic tests to minimize fraud and process risks
 
Right to Audit Clauses: What you need to know!
Right to Audit Clauses: What you need to know!Right to Audit Clauses: What you need to know!
Right to Audit Clauses: What you need to know!
 
Technology ahia 2012 jmk
Technology ahia 2012 jmkTechnology ahia 2012 jmk
Technology ahia 2012 jmk
 
2013 audit net guide to audit planning
2013 audit net guide to audit planning2013 audit net guide to audit planning
2013 audit net guide to audit planning
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10)
 
IT Fraud Series: Data Analytics
IT Fraud Series: Data AnalyticsIT Fraud Series: Data Analytics
IT Fraud Series: Data Analytics
 
20150311 auditnet ap_procure_excel_rlv2
20150311 auditnet ap_procure_excel_rlv220150311 auditnet ap_procure_excel_rlv2
20150311 auditnet ap_procure_excel_rlv2
 
The Truth Behind Detecting Fraud Using Data Analytics
The Truth Behind Detecting Fraud Using Data AnalyticsThe Truth Behind Detecting Fraud Using Data Analytics
The Truth Behind Detecting Fraud Using Data Analytics
 
Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analytics
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
IT Fraud and Countermeasures
IT Fraud and CountermeasuresIT Fraud and Countermeasures
IT Fraud and Countermeasures
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
 
Technology development: What is audit's role?
Technology development: What is audit's role?Technology development: What is audit's role?
Technology development: What is audit's role?
 
Ethics for Internal Auditors
Ethics for  Internal AuditorsEthics for  Internal Auditors
Ethics for Internal Auditors
 
How ERM and audit work together, a combined assurance approach
How ERM and audit work together, a combined assurance approach How ERM and audit work together, a combined assurance approach
How ERM and audit work together, a combined assurance approach
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 

Similar a It22015 slides

Structuring your organization for success with data analytics
Structuring your organization for success with data analytics Structuring your organization for success with data analytics
Structuring your organization for success with data analytics Jim Kaplan CIA CFE
 
IDEA Basics, Getting Started, and Basics of Importing Data
IDEA Basics, Getting Started, and Basics of Importing DataIDEA Basics, Getting Started, and Basics of Importing Data
IDEA Basics, Getting Started, and Basics of Importing DataJim Kaplan CIA CFE
 
Audit analytics and the agile auditor
Audit analytics and the agile auditorAudit analytics and the agile auditor
Audit analytics and the agile auditorJim Kaplan CIA CFE
 
Are You a Smart CAAT or a Copy CAAT
Are You a Smart CAAT or a Copy CAATAre You a Smart CAAT or a Copy CAAT
Are You a Smart CAAT or a Copy CAATJim Kaplan CIA CFE
 
Credential Transparency Initiative - Orientation for Registry Partners
Credential Transparency Initiative - Orientation for Registry PartnersCredential Transparency Initiative - Orientation for Registry Partners
Credential Transparency Initiative - Orientation for Registry PartnersCredential Engine
 
Is Your Audit Department Highly Effective?
Is Your Audit Department Highly Effective?Is Your Audit Department Highly Effective?
Is Your Audit Department Highly Effective?Jim Kaplan CIA CFE
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud DetectionFraudBusters
 
How to data mine your print reports
How to data mine your print reports How to data mine your print reports
How to data mine your print reports Jim Kaplan CIA CFE
 
Going global while being local
Going global while being localGoing global while being local
Going global while being localBharath Rao
 
Analytics Rising: Plan for Success
Analytics Rising: Plan for SuccessAnalytics Rising: Plan for Success
Analytics Rising: Plan for SuccessLewandog, Inc,
 
How to build a data analytics strategy in a digital world
How to build a data analytics strategy in a digital worldHow to build a data analytics strategy in a digital world
How to build a data analytics strategy in a digital worldJim Kaplan CIA CFE
 
David J Keith
David J Keith David J Keith
David J Keith Dave Keith
 
Creating A Winning Service Catalogue, Mike Kyffin (webinar slides)
Creating A Winning Service Catalogue, Mike Kyffin (webinar slides)Creating A Winning Service Catalogue, Mike Kyffin (webinar slides)
Creating A Winning Service Catalogue, Mike Kyffin (webinar slides)Service Desk Institute
 
DSRC Corporate Capabilities Presentation
DSRC Corporate Capabilities PresentationDSRC Corporate Capabilities Presentation
DSRC Corporate Capabilities PresentationDSRC
 
Router_ Connecting Students through Explaining.pptx
Router_ Connecting Students through Explaining.pptxRouter_ Connecting Students through Explaining.pptx
Router_ Connecting Students through Explaining.pptxssuser5a964f
 
Router_ Connecting Students through Explaining.pptx
Router_ Connecting Students through Explaining.pptxRouter_ Connecting Students through Explaining.pptx
Router_ Connecting Students through Explaining.pptxssuser5a964f
 
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) Jim Kaplan CIA CFE
 

Similar a It22015 slides (20)

It12015
It12015It12015
It12015
 
Structuring your organization for success with data analytics
Structuring your organization for success with data analytics Structuring your organization for success with data analytics
Structuring your organization for success with data analytics
 
IDEA Basics, Getting Started, and Basics of Importing Data
IDEA Basics, Getting Started, and Basics of Importing DataIDEA Basics, Getting Started, and Basics of Importing Data
IDEA Basics, Getting Started, and Basics of Importing Data
 
Audit analytics and the agile auditor
Audit analytics and the agile auditorAudit analytics and the agile auditor
Audit analytics and the agile auditor
 
Are You a Smart CAAT or a Copy CAAT
Are You a Smart CAAT or a Copy CAATAre You a Smart CAAT or a Copy CAAT
Are You a Smart CAAT or a Copy CAAT
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
 
Future audit analytics
Future audit analyticsFuture audit analytics
Future audit analytics
 
Credential Transparency Initiative - Orientation for Registry Partners
Credential Transparency Initiative - Orientation for Registry PartnersCredential Transparency Initiative - Orientation for Registry Partners
Credential Transparency Initiative - Orientation for Registry Partners
 
Is Your Audit Department Highly Effective?
Is Your Audit Department Highly Effective?Is Your Audit Department Highly Effective?
Is Your Audit Department Highly Effective?
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud Detection
 
How to data mine your print reports
How to data mine your print reports How to data mine your print reports
How to data mine your print reports
 
Going global while being local
Going global while being localGoing global while being local
Going global while being local
 
Analytics Rising: Plan for Success
Analytics Rising: Plan for SuccessAnalytics Rising: Plan for Success
Analytics Rising: Plan for Success
 
How to build a data analytics strategy in a digital world
How to build a data analytics strategy in a digital worldHow to build a data analytics strategy in a digital world
How to build a data analytics strategy in a digital world
 
David J Keith
David J Keith David J Keith
David J Keith
 
Creating A Winning Service Catalogue, Mike Kyffin (webinar slides)
Creating A Winning Service Catalogue, Mike Kyffin (webinar slides)Creating A Winning Service Catalogue, Mike Kyffin (webinar slides)
Creating A Winning Service Catalogue, Mike Kyffin (webinar slides)
 
DSRC Corporate Capabilities Presentation
DSRC Corporate Capabilities PresentationDSRC Corporate Capabilities Presentation
DSRC Corporate Capabilities Presentation
 
Router_ Connecting Students through Explaining.pptx
Router_ Connecting Students through Explaining.pptxRouter_ Connecting Students through Explaining.pptx
Router_ Connecting Students through Explaining.pptx
 
Router_ Connecting Students through Explaining.pptx
Router_ Connecting Students through Explaining.pptxRouter_ Connecting Students through Explaining.pptx
Router_ Connecting Students through Explaining.pptx
 
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10)
 

Más de Jim Kaplan CIA CFE

How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides Jim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Jim Kaplan CIA CFE
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel Jim Kaplan CIA CFE
 
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudWhen is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudJim Kaplan CIA CFE
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 Jim Kaplan CIA CFE
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analyticsJim Kaplan CIA CFE
 
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10Jim Kaplan CIA CFE
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal AuditorJim Kaplan CIA CFE
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling Jim Kaplan CIA CFE
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingJim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Jim Kaplan CIA CFE
 
Implementing and Auditing GDPR Series (2 of 10)
Implementing and Auditing GDPR Series (2 of 10) Implementing and Auditing GDPR Series (2 of 10)
Implementing and Auditing GDPR Series (2 of 10) Jim Kaplan CIA CFE
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Jim Kaplan CIA CFE
 
How to use ai apps to unleash the power of your audit program
How to use ai apps to unleash the power of your audit program How to use ai apps to unleash the power of your audit program
How to use ai apps to unleash the power of your audit program Jim Kaplan CIA CFE
 
Driving More Value With Automated Analytics
Driving More Value With Automated AnalyticsDriving More Value With Automated Analytics
Driving More Value With Automated AnalyticsJim Kaplan CIA CFE
 
Building and Striving for Data Analytics Excellence
Building and Striving for Data Analytics ExcellenceBuilding and Striving for Data Analytics Excellence
Building and Striving for Data Analytics ExcellenceJim Kaplan CIA CFE
 

Más de Jim Kaplan CIA CFE (20)

How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10)
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel
 
Tracking down outliers
Tracking down outliersTracking down outliers
Tracking down outliers
 
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudWhen is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analytics
 
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal Auditor
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
 
Ethics for internal auditors
Ethics for internal auditorsEthics for internal auditors
Ethics for internal auditors
 
Implementing and Auditing GDPR Series (2 of 10)
Implementing and Auditing GDPR Series (2 of 10) Implementing and Auditing GDPR Series (2 of 10)
Implementing and Auditing GDPR Series (2 of 10)
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
How to use ai apps to unleash the power of your audit program
How to use ai apps to unleash the power of your audit program How to use ai apps to unleash the power of your audit program
How to use ai apps to unleash the power of your audit program
 
Driving More Value With Automated Analytics
Driving More Value With Automated AnalyticsDriving More Value With Automated Analytics
Driving More Value With Automated Analytics
 
Building and Striving for Data Analytics Excellence
Building and Striving for Data Analytics ExcellenceBuilding and Striving for Data Analytics Excellence
Building and Striving for Data Analytics Excellence
 

Último

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Último (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

It22015 slides

  • 1. Copyright © 2014 AuditNet® and Richard Cascarino & Associates AuditNet® Training without Travel™  Auditing Databases Guest Presenter: Richard Cascarino, MBA, CIA, CISM, CFE Richard Cascarino & Associates
  • 2. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Jim Kaplan CIA CFE • President and Founder of AuditNet®, the global resource for auditors (now available on Apple and Android and Windows devices) • Auditor, Web Site Guru, • Internet for Auditors Pioneer • Recipient of the IIA’s 2007 Bradford Cadmus Memorial Award. • Author of “The Auditor’s Guide to Internet Resources” 2nd Edition
  • 3. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Richard Cascarino MBA CIA CISM CFE • Principal of Richard Cascarino & Associates based in Colorado USA • Over 30 years experience in IT audit training and consultancy • Past President of the Institute of Internal Auditors in South Africa • Member of ISACA • Member of Association of Certified Fraud Examiners • Author of Auditor's Guide to IT Auditing
  • 4. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Webinar Housekeeping • This webinar and its material are the property of AuditNet® and Richard Cascarino and Associates. Unauthorized usage or recording of this webinar or any of its material is strictly forbidden. We are recording the webinar and you will be provided with a link access to that recording as detailed below. Downloading or otherwise duplicating the webinar recording is expressly prohibited. • Webinar recording link will be sent via email within 5-7 business days. • NASBA rules require us to ask polling questions during the Webinar and CPE certificates will be sent via email to those who answer ALL the polling questions • The CPE certificates and link to the recording will be sent to the email address you registered with in GTW. We are not responsible for delivery problems due to spam filters, attachment restrictions or other controls in place for your email client. • Submit questions via the chat box on your screen and we will answer them either during or at the conclusion. • After the Webinar is over you will have an opportunity to provide feedback. Please complete the feedback questionnaire to help us continuously improve our Webinars • If GTW stops working you may need to close and restart. You can always dial in and listen and follow along with the handout.
  • 5. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Disclaimers • The views expressed by the presenters do not necessarily represent the  views, positions, or opinions of AuditNet® or the presenters’ respective  organizations. These materials, and the oral presentation accompanying  them, are for educational purposes only and do not constitute accounting  or legal advice or create an accountant‐client relationship.  • While AuditNet® makes every effort to ensure information is accurate and  complete, AuditNet® makes no representations, guarantees, or warranties  as to the accuracy or completeness of the information provided via this  presentation. AuditNet® specifically disclaims all liability for any claims or  damages that may result from the information contained in this  presentation, including any websites maintained by third parties and  linked to the AuditNet® website • Any mention of commercial products is for information only; it does not  imply recommendation or endorsement by AuditNet®
  • 6. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Today’s Agenda – Database Jargon – Types of DBMS – Who Looks after the Database – Restart and Recovery – Reviewing the Database Design – Impact of Databases on Auditors – Auditing the Database – CAATTs in a Database Environment
  • 7. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Databases Definition of Terms –Database a collection of data logically organized to meet the information  requirements of a universe of users –Database Management System (DBMS) a hardware/software system which manages data by providing  organisation, access and control functions –Data Dictionary / Data Directory Systems (DD / DS) the software which manages a repository of information about data  and the data base environment –Database Administration a human function involved in the co‐ordination and control of data  related activities 7
  • 8. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Definition of Terms –User System Interfaces components of the data base environment which request, manipulate  and transform data into information for an end user –Data Structure the interrelationships of data –Storage Structures methods and techniques used to physically represent data structures on  storage devices –Access Methods software logic procedures used to retrieve, insert, modify and delete  data on a storage device 8
  • 9. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Data Independence implements  Data Sharing Diverse users with different logical views New users with new logical views Changing logical views Changing physical representation Data Independence is the "how" of "what" Data  Sharing is 9
  • 10. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Principles of Data Structures Data Structures are used to model a business (function)  in terms of information –Sequential –Hierarchical –Network –Relational Model Data Structures are also the basis for Database Designs 10
  • 11. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Conceptual Level Of Database  Design Data Structure Diagrams –DBMSs vary in data structuring capabilities Entry Access Methods –Read The First –Randomising –Indexing Navigational Access Methods –Read The Next –Embedded Links –Inverted Index 11
  • 12. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Data Dictionary / Directory  Systems Data Dictionary –Tells "what" is in a database / file –Deals with the description of the logical view –Name, Description, Synonym Data Directory –Tells "where and how to access" data –Deals with the description of the physical aspects of  data –Location, Address, Physical Representation 12
  • 13. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Attributes for Describing  Entities Of The DD/DS Identification Source Classification Usage Qualification Relationship 13
  • 14. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Data Dictionary / Data  Directory System The DD/DS can be a useful tool independent of the  need for a DBMS –Documentation support –Coordination of shared data usage –Control over modification of programs and files The DD/DS has become popular with the advent of  DBMS packages –Greater recognition of opportunities to share data –Greater need to control data usage –Privacy legislation –Complexity of relationships involved 14
  • 15. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Activity Scope of Activity is a function of the number of  components dependent on the DD/DS for Meta Data –Application Programs / Report Generators / DBMS Degree of Activity is a function of the time the  component is "bound" to its Meta Data –Pre‐compile –Compile –Run‐time –Execution Time Embedded Links for implementing interrecord  relationships 15
  • 16. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Polling Question 1
  • 17. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Database Types Sequential Hierarchical Network Relational Model Components –Data Definition Language (DDL) –Storage Structure Definition Language (SSDL) –Data Manipulation Language (DML) –DBMS Nucleus and Utilities 17
  • 18. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Sequential Approach Fundamental Assumption –There is a Direct Relationship between data 18
  • 19. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Hierarchical Approach Fundamental Assumption –There is some Hierarchical Relationship between data Terminology Root Segment Parent Segment Child Segment Twins 19
  • 20. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Network Approach Fundamental  Assumption –There is some               General                Relationship                 between data Terminology –Records / Pointers Note Any Structure                          may be defined Records may contain  multiple fields 20
  • 21. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Relational Model Fundamental Assumption –There is some Mathematical Relationship between  data 21
  • 22. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Relational Data Manipulation –SELECT ‐ All Retrieval –UPDATE ‐ Change –INSERT   ‐ Create new TUPLE –DELETE  ‐ Delete Tuple Qualified Manipulation –FROM    ‐ Specifies Table –WHERE ‐ Conditions –AND       ‐ Conjunction of Conditions –OR          ‐ Disjunction of Conditions 22
  • 23. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Relational Data Manipulation –Example SELECT ‐ EMPLOYEE = NAME FROM    ‐ EMPLOYEE = DB WHERE ‐ DEPT = "B03" AND      ‐ POSITION = "MANAGER" Result Managers in Dept B03 A.B. JONES C.D. SMITH –The Result is Always a Table 23
  • 24. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Inverted List Indexes and Pointers 1 Ford Blue 2 BMW Blue 3 Ford Red 4 Ford Blue Ford 1,3,4 BMW 2 Blue 1,2,4 Red 3 24
  • 25. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Packages and Vendors ADABAS ‐ Software AG (North America) IDMS ‐ Cullinane Corporation IMS ‐ IBM DB2 ‐ IBM S2000 ‐ MIR Systems Corporation TOTAL ‐ CINCOM Systems Inc. DMS II ‐ UNISYS DATACOM  ‐ ADR 25
  • 26. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Polling Question 2
  • 27. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Who Looks After My Database  System? Database Administrator Functions Of The DBA –Co‐ordinating the information content of the database –Deciding the storage structure and access strategy –Liaising with users –Defining authorization checks and validation  procedures –Defining a strategy for back‐up and recovery –Monitoring performance and responding to changes in  requirements 27
  • 28. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Tools of The DBA Utility Programs –Loading –Reorganisation Routines –Statistical Analysis –Journaling (e.g., Logs) –Recovery Data Dictionary Database Analysers 28
  • 29. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Recovery When? Examples –Action Failure       Insert, Replace Fails    –DB Operation Fails –Transaction Failure  Deadlock –System Failure  Power, Hardware, Software –Media Failure Head Crash 29
  • 30. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Recovery Criteria Reinstate Databases to a known state Minimize lost work Allow recovery on a transaction basis Provide fast recovery Minimize manual work Ensure safety of recovery data Provide mechanism to inform users of "lost"  transactions Cater for various types of failures 30
  • 31. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Recovery Procedures Roll Back –Log processed backwards and completed transactions  Rolled out. (last Checkpoint Used) Roll Forward –Log processed forward to: Reinstate the system Update Back‐up copy (e.g., Media Failure) Other –Compensating Transactions (e.g., Journal Entries) –Salvation Routine 31
  • 32. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Criteria For Effective Log  Recovery Before Database is updated –Log Before Image to undo change if necessary (e.g.,  failure before update) After Database is updated –Log After Image to redo change if necessary (e.g.,  media failure) –Audit Trail information ‐ for manual follow‐up –(e.g., Program Id, Transaction Id) 32
  • 33. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Checkpoints and Save Points Used to define a "stable" state of the database for recovery –DB is reinstated at last Checkpoint –Log processed forward and system reinstated Some Mechanisms For Automated Recovery –Back‐up (image) Copies Databases dumped at various intervals, e.g., daily, weekly, on tapes or back‐up  devices –Journal or Log System Ensures that all transactions and data base activity is recorded on a Log –Save Points User‐defined intermediate point to recovery from in the event of a failure –System Checkpoints System‐defined intermediate point to recovery from in the event of a failure –Transaction Files Changes also kept in a separate file and updated 33
  • 34. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Tools of Restart/Recovery The Recovery Log The Checkpoint The Database Dump Database Restart/Recovery Software 34
  • 35. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Recovery Log Before/after images of the recovery log –Before Image ‐ Content Image of Data before modification Date/Time of change Processing Program Id of modifying transaction May be written to Recovery Log stored on a direct access file –Before Image ‐ Function Applied to point in time of failure of the environment Applied to Database to "back out" faulty update transactions Establishes Database to most recent Quiet Point (Checkpoint) 35
  • 36. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Before/After Image Logs After Images ‐ Content –Image of data after modification –Date/Time of change –Processing Program id of modifying transaction After Images ‐ Function –Applied to reloaded Database dump –Brings the Database forward in time to the last  checkpoint or point of failure Database Checkpoint taken at a quiet point of the data base ( i.e., all  update activity has terminated Buffers are flushed and update transactions are queued until  checkpoint is taken 36
  • 37. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Checkpoints Database Checkpoints can be taken at anytime May be difficult to synchronize with O/S Checkpoints May be procedurally initiated by application programs May be automatically initiated by algorithm Elapsed Time Transactions processed 37
  • 38. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Polling Question 3
  • 39. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Data Dictionary "Yellow Pages" of my Database Functions of a "DD" –Repository for description definition structure (format) relationship usage access, integrity constraints –of System Objects 39
  • 40. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Reviewing Relevant Database  Designs Procedure for reviewing a Data Structure  –list all the record types –read and analyze their descriptions and names –identify the key of each record and verify requirement for  uniqueness –study the relationships (and sets) –read and analyze their descriptions and names –identify all the relationships which are: 1:M M:M –Evaluate the strength of each relationship (membership Option Specification) –Verify consistency of the design with business                                   information needs 40
  • 41. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Documentation of the  Database Environment Using the DD/DS as a documentation tool Data Dictionary/Directory system can be used to  accept, record and generate –Requirements and Specifications –Data Documentation –Metadata generation Can automate documentation process –Cross‐referencing –Report Generation –Change Control 41
  • 42. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Advantages of an Active  DD/DS Accuracy Timeliness Completeness Control over updates 42
  • 43. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Data Dictionary/Directory  System Control Realized Through Metadata Generation –Compile Date/Time Stamp Program Execution Lock‐out Concentration of Vulnerability in Access to DD/DS DD/DS Self‐protection –Status Control (e.g. "Production" Status Cannot Be  Modified) –Password Protection –Update authorization Restricted to DBA 43
  • 44. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Administration & Coordination  Functions Review & Monitoring Activities –Review of  Database Designs –Review of System Design –Review  of Program Design & Coding –Monitor Quality Of Data –Monitor Performance 44
  • 45. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Segregation of Duties Strategies to mitigate the concern of concentration of  risk –Evolutionary Development –Fragment The Function Distribution based on Location Distribution based upon Users Data Administration Versus Database Administration –Use of the SDLC to define reponsibilities and  deliverables 45
  • 46. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Organizational Issues Roles Which Require Segregation –Database Administration –Systems Development –Programming –Operations –End Users –Internal Audit 46
  • 47. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Central Administration Of  Schema / Subschema Assignment of Responsibilities for Database Design  Duties –Data Administration –Database Administration –Systems Development/design –Systems Programming Integrate the Database Design Methodology into the  SDLC and Roles Matrix 47
  • 48. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Control Over Changes  Classification of Changes –Magnitude of Effort (subjective) Start‐up Effort Merging Existing Components Modifying an Existing Component Emergency Maintenance Component of The Environment (Objective) –Application Programs (Fix, Enhancement, Etc.) –System Software (New Release, Enhancement, Etc.) –Data Descriptions (Re‐organization) –Data (File Scrubbing, Zap, Etc.) 48
  • 49. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Controlling Access to Data in a  Database Environment Impact of a Database Environment on Privacy &  Security –Assessing requirements amongst multiple users is more  difficult –Sharing of Data may cause control concerns –It is possible to describe security specifications using  the Declaritive Data Definition Language (DDL) More clear specification Easier to audit –Migration of implementation of controls from the  application to the environment 49
  • 50. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Controlling Completeness &  Accuracy of Databases Impact of Database on Completeness & Accuracy Issues –Effect on the quality of information provided –Concentration of risk due to sharing of data –Increased cost of error correction –Effect on user reliance & confidence –Database erosion –Cascading errors Migration of controls for mitigating the concerns involving  completeness and accuracy Generalized in the environment Implemented in the DBMS, DD/DS, Etc. 50
  • 51. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Polling Question 4
  • 52. Copyright © 2014 AuditNet® and Richard Cascarino & Associates The Impact on the Auditor Benefits from the Auditor's viewpoint –Consistency of data –Enhance quality of audit by increased accessibility –More accurate systems development process –Data Resource Management will accrue benefits  through formalized discipline –Migration of controls Disadvantages from the Auditor's viewpoint –New Technology/Pioneer Syndrome –Implementation cost control –Access to DBMS managed data –Data Integrity Trade‐offs –Change in scope/timing of audit 52
  • 53. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Role of the Auditor Consult with User on requirements –Edit & Validation rules –Partial acceptance or rejection on error –Responsibility for correctness Consult with DBA on implementation plan –Tools available –Edit & Validation element by element –Error response Ensure the existence of procedures for edit & validation  maintenance –Are the Edit & Validation rules sufficient? –Procedures for adding new Data Elements 53
  • 54. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Edit & Validation Controls Commonly encountered Database Management System  supported Edit & Validation Controls –Uniqueness checking for Key And Non‐key –Structural/Relational checking –Picture string and simple format checking –Membership type in CODASYL Systems Manual Automatic 54
  • 55. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Using the DD / DS Passive DD/DS environment –Tool for Documentation –No assurance that application system resembles dd/ds  content Active DD/DS environment –Edit & Validation performed according to declaritively  specified criteria –Metadata generation can provide control –DD/DS produces documentation for Programmers Analysts System Users 55
  • 56. Copyright © 2014 AuditNet® and Richard Cascarino & Associates The Database Input / Output Controller  (DBIOC) as a tool for Controls Serves as an excellent repository for Completeness and  Accuracy controls Centrally maintainable Central responsibility for administration of controls Security of the tool can be more easily verified Data Sampling if required, is transparent to all users  and processes 56
  • 57. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Controlling Initial Database  Content User is responsible for providing initial database  content User spot checks loaded database for correctness Auditor specifies sufficient checking using statistical  methods when appropriate Database Load Utilities may be augmented using exits 57
  • 58. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Database Restart/recovery  Software Database Patch Utility (data Base Zapper) –Allows Quick (dangerous) fixes to rectify errors –Allows DBA to disable the database partially or completely immediately or as current transactions complete –Allows unrestricted browsing –Restricted to DBA staff –Procedural control over use –Written approvals and log of activity 58
  • 59. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Auditing the Database Set the audit objective and assess the environment Assess capabilities of software environment Review the DBA function Review relevant database designs Perform transaction impact analysis for relevant  transactions Design and perform substantive tests when appropriate 59
  • 60. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Assessing The Environment Checklist of environmental questions 1. Is there a formally established data(base) administration  function? 2. Is the administration activity project oriented or more focused  on databases? 3. Does senior management take an active role in formulating and  monitoring database strategy? 4. Is there an (active) DD/DS? 5. Are the control features of the DBMS and DD/DS effectively  utilized? 6. Are databases implemented in conjunction with on‐line  technology? 7. Are there corporate‐wide data standards? 8. Is there a formal SDLC? 60
  • 61. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Assessing The Environment Checklist of application questions 1. Do diverse users share databases (of audit  consequence) that were not shared previously? 2. Are there different logical views of the same physical  database? 3. Are database planned, designed and implemented  around corporate information needs as opposed to  parochial, departmental or application oriented  requirements? 4. Can data from one user area be easily incorporated  into other applications? 5. Do users have a well defined sense of responsibility  over data within their sphere influence? 61
  • 62. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Assess Capabilities of the  Software Environment Assessment must be in terms of two perspectives –Potential Capability: Features & Characteristics available in  the package Vendor Documentation Education & Training –Implemented Capability: Features & Characteristics which  have been actually made operational Database Administration System Generation Parameters –Software assessment should focus on controls  implemented in these components DBMS   DD/DS   DB/DC   DBIOC Performance Reports 62
  • 63. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Reviewing the DBA Function Review DBA job description and organizational placement Evaluate SDLC involvement Review uilization Of DD/DS Review DBA established standard practices and procedures,  including: –Database Security –Restart/Recovery –Data Edit/Validation –Audit Trail Evaluate impression of others –Systems Designers / Operations Personnel / End Users 63
  • 64. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Polling Question 5
  • 65. Copyright © 2014 AuditNet® and Richard Cascarino & Associates CAATTs in a Database  Environment There are three basic aspects of the Database Environment  which may be subjected to Substantive Testing –System Components –Metadata –User Data Testing of system components when appropriate is a matter of  LOAD, GEN & RUN for the purpose of checking –System component lock‐out –Access controls –Input error controls –Input completeness controls 65
  • 66. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Testing of Metadata Schema/Subschema Comparison Check –To verify consistency of Data Definitions the Schema &  Subschema would be compared to the actual Internal  Control Blocks and Storage Structures Load Source Schema/Subschema from library Generate Schema/Subschema from DBMS Control Blocks Compare at Source level Active DD/DS Comparison Check –To verify consistency the above procedure is repeated  for descriptions maintained in the DD/DS –Works also for Passive DD/DS's 66
  • 67. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Administrative Checking System Documentation & Change Control check –To verify Completeness & Accuracy Of Metadata which  is subject to maintenance –Produce Status & Version control report from DD/DS –Verify the accuracy of current status & versions by  comparison to existing occurrences –Verify Audit Trail of Change Control with application  personnel and the DBA 67
  • 68. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Testing Of User Data Sampling of user data –use of retrieval software tools –well known sampling routines –should be used on recovery logs Derived data check –use of independently written software to verify  accuracy of derived data –user written code may be embedded in retrieval  software 68
  • 69. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Testing Of User Data Recovery Log comparison check (after image) –dump current database (tape 1) –load previous database dump –apply forward transaction journal –dump newly constructed database (tape 2) –reload original database from tape 1 –compare tape 1 and tape 2 –should be identical –analyze discrepancies –make adjustments 69
  • 70. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Testing User Data Recovery Log comparison check (before image) –dump current database ‐ tape 1 –run a representative updating program –apply transaction journal to backout transaction –dump newly constructed database ‐ tape 2 –reload original database ‐ tape 1 –compare tape 1 and tape 2 –should be identical –analyze discrepancies –make adjustments 70
  • 71. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Audit Tools Available Active DD/DS Testing of application software & databases Testing of system software & system data Retrieval software Integrity checking software DBIOC Recovery log images Security log Derived data Performance measurement tools 71
  • 72. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Audit Techniques Available Testing Of Application Software & Databases –Verify the effective operation of controls through the  use of test transactions and test databases –Test data generators may be data dictionary driven –Pseudo‐live databases –Parallel testing Testing of system software & system data –Independent verification of the DBMS Software –Verification of system generated control blocks using  OS/DBMS dump facilities 72
  • 73. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Audit Tools Available –Retrieval for audit purposes can be supported using  three different approaches Modification of audit software Development of special interface mechanisms Inclusion of retrieval for audit purposes as part of DBMS Software –Integrity Checking software Vendor and/or user written routines to scan storage structures and  check for integrity pointer integrity index integrity Available in some DBMS's –Database Input Output Controller (DBIOC) May be used as a host for imbedded sampling for audit purposes Database procedures/exits User written software modules 73
  • 74. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Polling Question 6
  • 75. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Questions? • Any Questions? Don’t be Shy!
  • 76. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Coming Up Next IT AUDIT BASIC 3. IT Basics Audit use of CAATs May 5 4. Auditing Contingency Planning May 7 5. IT Fraud and Countermeasures May 12 IT AUDIT ADVANCED 1. Advanced IT Audit Risk Analysis for Auditors May 14 2. Advanced IT Audit Securing the Internet May 19 3. Advanced IT Audit IT Security Reviews May 21 4. Advanced IT Audit  Performance Auditing of the IT  Function May 26 5. Advanced IT Audit Managing the IT Audit Function May  28
  • 77. Copyright © 2014 AuditNet® and Richard Cascarino & Associates Thank You! Richard Cascarino, MBA, CIA, CISM, CFE Richard Cascarino & Associates 970-291-1497 rcasc@rcascarino.com Jim Kaplan AuditNet LLC® 800-385-1625 www.auditnet.org webinars@auditnet.org