...Kudler Fine Foods is a company that uses a significant amount of electronic data and information to flow through their system on a daily basis. The company relies on this data to be accurate and trustworthy. Considering the dependency and importance of the electronic data flowing through the system in such a high volume, they would benefit from computer assisted audit techniques (CAATs). A CAATs audit is focused on testing the computer systems for data integrity and security of the company’s information data processing. CAATs provide a 10 step process made available to the auditor for use as guidelines in conducting an efficient audit. The guidelines will reduce the time to complete the audit, save money and ensure a high degree of confidence in the audit results. The CAATs audit will provide the owner of Kudler Fine Foods with assurance that the systems are operating with accuracy and the data is secure. To initiate the audit procedure, the auditor will first collaborate with the owner of Kudler Fine Foods to define the intents and desired end results of the audit. The auditor will review the computer systems, processes, types of data and process controls with Kathy Kudler to ensure that she thoroughly understands the system. Through this collaboration, the auditor will determine the best strategies for assessing the risks associated with the system and current processes. He or she will also determine the optimal strategy for collecting and testing data. Once...
Words: 1856 - Pages: 8
... 2013 Milan Havel Abstract Kudler seeks to improve their audit process by allowing changes implemented to their audit documentation process. It is important to implement changes reflected by computer assisted auditing techniques (CAATs). These changes will offer a variety of benefits to Kudler as well as the auditor. The use of CAATs will allow auditors to use the software for improved analysis and application of security. Auditors will also be able to extract and analyze data to foresee any potential threats, trends, fraud issues, or foresee expectations. The use of validation tools will also allow Kudler greater success in their audit. Using test decks, integrated test facilities (ITF), and parallel simulations will allow auditors to verify and test data quickly and effectively. The functions of this software will improve greatly not only the speed of the audit, but also accuracy as well. Auditors will be able to analyze a vast amount of data and verify balances, again information, and verify any duplicate information. Kudler should choose a custom audit software suitable to their organizational needs. More specifically, they should focus on accuracy, reliability, and compliance as their key goals for the audit. The distinct audit software should be in connection with their AIS and will offer numerous benefits. Kudler and the auditor will be able to manage current or past transactions, history, reporting, and foresee audit trails to analyze any issues or errors...
Words: 1144 - Pages: 5
...Running Head: KUDLER FINE FOODS IT SECURITY REPORT Kudler Fine Foods IT Security Report CMGT/400 Abstract Kudler Fine Foods is developing a customer loyalty program that will reward customers and increase sales. Kudler has requested the team to design the customer loyalty program while making sure that system meets security requirements. The following paper will describe a plan on how Kudler can achieve their goal by using the Systems Development Life Cycle or SDLC, which has five phases, and how they can use each one. As part of establishing Kudler’s reputation, the company will emphasize the need for security for the business and its customers. Introduction Kudler Fine Foods is a local business based in San Diego California that would like to increase their sales in their three other California locations. Kudler has decided to implement a customer loyalty program. The customer loyalty program will reward customers for shopping within the locations. One of the goals is to increase sales by tracking customer purchases so that sales can be more relevant and to attract customers. Kudler has decided that a development team is needed to build this new service for its customers. As part of the development, the System Development Life Cycle will be used to obtain the goal while paying attention to the security needs that the program will create. Our team will develop the SDLC and identify the potential threats and vulnerabilities have the customer loyalty program...
Words: 3313 - Pages: 14
...Preface Kudler Fine Foods began operations in 1998, by Kathy Kudler; the company has grown from one store to three and aspirations to add more locations in the near future. Our company was hired to analyze Kudler’s future accounting technology needs. We recommended a system to automate the accounting functions of accounts payable, accounts receivable, inventory, and payroll. We concluded that upgrading its accounting information system with retail-specific software instead of custom written software would be best for Kudler Foods. We have assessed the design basics of the data tables from an accounting perspective; recommend improvement to the data tables, and clarified how the information in the pivot table advanced decision-making for management The pivot table made from the information extracted from Kudlers inventory report for year-end will improve the decision-making process of inventory to be purchased by store location and by product type. We have analyzed the risk associated with the Accounting Information System in the areas of accounts payable, accounts receivable, inventory, and payroll, identified all risks and internal control points, incorporated the controls and risks into flowcharts, designed internal controls to mitigate risks to the systems, evaluated the application of internal controls to the systems, and discussed other controls, outside the system that Kudler Fine Foods may need. Kudler’s management requested the proposed audit schedule...
Words: 1148 - Pages: 5
...Over the past several weeks I have had the opportunity to study Kudler Fine Foods operations. This has included their financials, inventory, payroll, and human resources. The attached brief explores audit productivity software used by Kudler’s audit firm and how it can help Kudler improve its operation and plans for expansion. Computer Assisted Auditing Techniques Computer Assisted Audit Techniques (CAATs) are computer base tools that an auditor uses to carry out various automated tests to evaluate the IT system or data. CATTs are very useful when the company has a significant volume of audit data in an electronic format (IT Audit Manual, 2011). Kudler Fine Foods has an independent auditor review their books every year. Among the computer assisted auditing techniques the auditors could use to validate data and system integrity in Kudler’s system are: • Electronic working papers – are used to support the audit opinion by demonstrating that the auditor has complied with set standards across all jobs, and the documents contain relevant information material to the audit (Quizlet, 2011). An advantage to using electronic work papers is that they automatically adjust other working papers when a related working paper is changed. They automate the audit process increasing the auditor’s efficiency. When the audit is complete, the auditor can automatically produce Generally Accepted Accounting Principles (GAAP) financial statements (Core Concepts of Information Technology Auditing...
Words: 1767 - Pages: 8
...| Course Design Guide School of Business ACC/542 Version 3 Accounting Information Systems | Copyright © 2012, 2009, 2007 by University of Phoenix. All rights reserved. Course Description In this course, students examine the fundamentals of accounting systems design. Topics include business information systems, business processes and data flows, database concepts and tools, internal control and risks, auditing the information system, and using the information system to perform audit functions. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Bagranoff, N. A., Simkin, M. G., & Strand Norman, C. (2008). Core concepts of accounting information systems (10th ed.). New York, NY: Wiley. Hunton, J. E., Bryant, S. M., & Bagranoff, N. A. (2004). Core concepts of information technology auditing. Hoboken, NJ: Wiley. O’Brien, J. A. & Marakas, G. M. (2008). Management information...
Words: 2104 - Pages: 9
...Kudler Fine Foods IT Security Report Kudler Fine Foods IT Security Report Kudler Fine Foods is a specialty food store that has three stores located in San Diego, Ca. Kudler Fine Food strives to ensure their customers are happy and stay shopping at their stores. Kudler Fine Foods is starting a frequent shopper program. The new program will require a new system that Kudler will need to design and secure. First potential security threats need to be identified. Throughout the system development, process security will need to be considered. Kudler will need to address concerns if the new system is ever removed. Information security policies will need to be developed to ensure the security of Kudler and their customers. The employees of Kudler will need to go through security awareness training. In addition, audit provisioning by the Kudler staff will need to be addressed. This paper will discuss each of the security issues that Kudler will have to cover. Most Critical Threats Identified With the implementation of the improved customer rewards program many systems will need to be secured and possible threats and vulnerabilities need to be identified. Kudler’s current servers need to be properly secured to ensure they are not hacked or attacked by malicious code. If Kudler’s servers are hacked customers information like addresses, phone numbers, and email addresses could be used by attackers to try to acquire log on information. This is known as phishing, were an attacker...
Words: 3971 - Pages: 16
...Kudler Service Request Matt Glaman BSA/310 Kudler Fine Foods are in the process of planning to create and deploy an information system which will be used to track customer purchasing trends through a Frequent Shopper Program. This program will provide rewards and discounts to customers, and in exchange, Kudler Fine Foods will be able to use this data to better target its customers. Implementation of the Frequent Shopper Program will entail new Point of Sale technology, a means of storing customer data, building out the hardware and software means to process retained data. Outside of any technology issues there are legal ramifications, as well as ethical implication. The Frequent Shopper program will be logging intimate data about Kudler Fine Foods customers. Each customer will have to provide contact information and postal address information. As the customer begins to make purchases each transaction will be cataloged which will expose purchasing habits along with other metadata that can be interrupted, such as the typical time of week and day the customer shops. Kudler Fine Foods management must declare a set standard of what data is to be logged to protect customers. Questions must be asked about how certain data is associated with customers. For example, transaction times could be disassociated from a direct customer profile but still provide insight as to popular shopping times. Outlining the ethics of the data collected provides a means for designing other...
Words: 1243 - Pages: 5
...2012 System Integrity and Validation Kudler Fine Foods has three different locations that carry domestic and imported foods that are in five different departments. Kudler Fine Food management decided to have an accounting firm come in and look at the computer system that they are using. Kudler Fine Food is looking to successfully improve the system for possible expansion in the local area or in different states. The accounting firm has given Kudler Fine Foods six weeks to let them know what the strengths, weaknesses, and what improvements need to be done. The accounting firm took the first week to look at the type of system that Kudler Fine Foods have and how to make improvements. What the accounting firm discovered is that Kudler Fine Foods has installed the comprehensive modular Retail Management System which is a point-of-sale that may or may not have a web-based program. During this time the accounting firm discussed the improvements to the module to reduce the manual transactions and make the system more effective. The accounting firm also discussed the possible threats and ways that the threats can be prevented. The next step that needed to be discussed is the type of software for Kudler Fine Foods. The accounting firm made a suggestion of industry-customizable financial software that would replace the current processes. Once the accounting firm decided that the industry-customizable financial software would benefit Kudler Fine Foods there were flowcharts produced for the...
Words: 1807 - Pages: 8
...& Edsel Abreu Audit Proposal ACC/542 Accounting Information Systems Instructor: Anita Rodriguez Audit Proposal Kudler Fine Food has expanded their business and has updated their computer systems to meet demands. As IT information is adopted within the organization, automation control processes have become more virtualized. To ensure that KFFs computerize systems function properly an audit must be performed on an annual basis. Management at Kudler Fine Foods wants to see the proposed audit schedules for all systems. Management wants to know the types of audit and how they will be conducted. In addition, management would like to know about events that might prevent reliance on auditing through the computer. There are four types of IT audits: attestation audits, findings and recommendations audits, SAS 70 audits, and statement auditing standards (SAS) 94 audits. During an attestation audit, the auditor provides assurance the client is responsible for something. After the responsible party makes the assertion of a letter to the auditor, the auditor begins the audit of the company. The auditor examines, reviews, or performs an agreed-upon procedure (AUP) and provides a written report to the responsible party on their findings. The AUP report is usually a negative assurance report stating what it was asked to do and any findings to provide feedback to the user. The SAS 70 audit stands for the “State on Auditing Standards No. 70”. The SAS 70 audit is performed by a CPA...
Words: 1340 - Pages: 6
...Audit Proposal Tonja Wallace Georgia State Accounting Information Systems ACC 542 Deborah Johnson September 06, 2010 Audit Proposal Our firm has been working with Kudler Fine Foods for several weeks implementing a new accounting information system (AIS) that will assist with the process of payroll, inventory, accounts receivable and payables along with the daily sales. The current AIS that have been implemented will address the systems integrity and the new system will help KFF to ensure that the data is accurate and reliable for the preparation of the financial statements for the organization. Now that the new accounting information system has been set up it is now time to perform an audit of KFF internal controls. In order to do this we will take a look at the different types of audits that maybe used for each process. Then recommend the audit that will most fit the needs of KFF as well as give an explanation of how the audit will be conducted. KFF will also be informed of events that might prevent the reliance on auditing through the computer. An audit for IT involves evaluating the computer’s role for achieving audits and control objectives. These audits look at the components for the AIS for the users, procedures, hardware, software, data communications and the database. According to Bagranoff, Simkin, and Norman (2008) there are four main types of IT audits and they are attestation, findings and recommendations, SAS # 70 and last but not least SAS #...
Words: 1053 - Pages: 5
...systems of Kudler Fine Foods. We have discussed their current computer system and evaluated the possibility of threats to it and recommend integrated software solutions. The T3 line at Kudler is clearly more data transmission than is necessary for the company, so it was recommended they switch to T1 dedicated line to reduce costs. Due to the importance of inventory control, we showed management how to take their current inventory data tables and construct pivot tables to improve decision making on inventory. Internal controls were reviewed on payroll, accounts payable, accounts receivable, and inventory processes to ensure the accuracy and validity of data. The review determined that if Kudler does not implement the recommended internal controls system suggested, the business could be under serious threats. Information Technology (IT) auditing is another important improvement that Kudlers should make since our analysis showed that there are risks and vulnerabilities in the AIS process. Our final recommendation will be in the way that the audit process is improved by using computer assisted auditing techniques. This will complete the firm’s analysis and recommendations for Kudler Fine Foods. o Our firm last week analyzed and recommended different types of Information Technology (IT) audits that Kudler Fine Foods can use to assess the risks and vulnerabilities in Accounting Information Systems (AIS) processes. In addition to audit types, owner Kathy Kudler needs...
Words: 1144 - Pages: 5
...Types of Audits To distinguish between the types of audits that may be used for each process of Kudler Fine Foods IT Systems, the auditor must first determine which audit is appropriate. There are different audits available for the processes at Kudler Fine Foods; including attestation, findings and recommendations, SAS 70, and SAS 94. The auditor will need to decide which audit is most appropriate for the Accounting Information System and the Retail Enterprise Management System incorporated into Kudler’s Systems. During an attestation audit, the auditor will provide assurance for a specified topic or issue for which the client is responsible. An assertion is made based on specified criteria, and the results are provided in a report. The findings and recommendations audit is used when, “implementing systems, security review, database application review, IT infrastructure and improvements needed engagement, project management, and IT internal audit services” (Hunton, Bryant, & Bagranoff, 2004, p. 217). This type of report does not include the auditor’s opinion, but any information pertaining to the work performed is included. The SAS 70 audit includes information pertaining to a company’s internal controls and is used when services, such as payroll are outsourced to an ADP. An ADP provides payroll services to companies at a lower rate than it would cost if the company were to handle this in-house. An SAS 70 audit is used when companies want to assure that they have implemented...
Words: 968 - Pages: 4
...Audit Proposal Audits are a critical and an important part of every company whether performed internally or externally. With the expansion of Kudler Fine Foods and update of their information system, the company must ensure system processes are functioning properly. Conducting an audit will identify any problems with the newly implemented computer system. There are several types of audits that can be performed for each process. The most important factor is choosing the appropriate type of audit that best fits the process. Most audits are conducted similarly and should always be completed in an efficient and effective manner. Furthermore, there are events that could prevent the reliance of an audit through the computer in which management must be made aware of and evaluate accordingly. Types of Audits There are various types of audits that will give credence to the accounting records, accounting policies, and financial statements of a business organization. For example, an internal audit can be conducted of the accounting department to examine company policies and procedures as well as development and evaluations of internal controls. Internal audits will provide management with insight and recommendations based on analysis and assessment of data and business processes. An external audit will assess the computer-based accounting system and provide judgment on the accuracy and fairness of financial statements. “The fairness evaluation is conducted in the context of generally...
Words: 1146 - Pages: 5
...Internal Control and Risk Evaluation – Kudler Fine Foods Lisa Cook University of Phoenix ACC/542 August 15, 2011 Internal Control and Risk Evaluation Internal controls and risk assessments are an integral part for a company to be successful. Management at Kudler Fine Foods has reviewed the flowcharts prepared and is requesting information on controls that will be required. Risks are none to be a negative event occurring in a company’s productivity. Internal controls are the policies and procedures put in place to reduce unforeseen occurrences associated with the risks. This brief will discuss the risks of Kudler Fine Food’s current Accounting Information System (AIS) evaluated by Team B and incorporate the controls into the flowcharts, design internal controls to mitigate risks to the systems, evaluate the application of internal controls to the systems, and discuss other controls, outside the system, that Kudler Fine Foods may need. Risks in the Systems According to Hunton, Bryant, & Bagranoff (2004), “business enterprises face a variety of risks, including business, audit, security, and continuity risks” (pg. 48). When analyzing Kudler Fine Foods current information system the team found that Kudler lacked internal controls and risk evaluations required to run their information system. Several concerns were brought up as major potential risks. The three risks focused on are those of business, security, and continuity. Several of Kudler’s risks within the...
Words: 923 - Pages: 4