Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
For internal circulation with in IA&AD PursuIT IT Audit Wing The Quarterly IT Audit Journal of Indian audit and Accounts Department Vol. I Office of the Comptroller & Auditor General of India Jan - Mar 2005 Table of Contents MESSAGE Wishing You a Very Happy New Year - 2005 1. Crystal Ball I am pleased to know that the Information Technology Audit wing has come up with a Quarterly Journal PursuIT from the first quarter of this year. • Alok Ojha, Director (IT Audit) O/o C&AG of India 2. Challenges in Auditing e-Governance Initiatives Information Technology Audit has emerged as one of the significant areas of focus by Supreme Audit Institutions the world over. IA&AD also has made rapid strides in both, use of IT within the department and in conducting IT Audits of the applications of auditees. IT environment being a rapidly changing one the IT Auditors need to keep themselves updated continuously. I hope that this step taken by IT Audit wing in the form of PursuIT will help in sharing and disseminating knowledge in the department. • Dr.Ashutosh Sharma, Dy. Director (IT Audit), O/o CAG of India, iCISA, Noida. • G. Srinivas, Dy. Director, NAAA, Shimla. I have gone through the contents of the present issue of PursuIT and I have found that the issue will not only enrich the knowledge of the readers on latest developments in the area of IT Auditing but will also make them aware about the IT audits conducted in the department in addition to helping them in solving their practical problems. I am sure that this journal will provide the opportunity to learn about something new in every subsequent issue. 4. Highlights of 3. From Data Analysis towards Data Mining • Rajesh Goel, Sr. DAG O/o the PAG (Civil audit), Rajasthan Information Technology Audits 5. Let us Try - Importing ORACLE Data Table into IDEA • K.P. Singh, AAO (IT Audit) • S.C. Naithani, Sr. Auditor With this I congratulate the officials who have contributed to the journal and convey my best wishes to the new beginning made by the IT Audit wing. Feedback Comptroller & Auditor General of India [email protected] [email protected] Office of the Comptroller and Auditor General of India International Centre for Information Systems and Audit i ( CISA), A-52, Sector-62, Institutional Area, NOIDA- 201 301 (UP) PursuIT IT Audit Wing Crystal Ball: A Quantitative Approach to Risk Analysis Alok Ojha, Director (IT Audit) O/o C&AG of India Risk Analysis and Risk Based Auditing are the latest buzzwords in the field of Audit today. In the modern Risk based Auditing approach, instead of focusing on risks of auditors (namely Inherent Risk, Control Risk and Detection Risk) Audit aligns its efforts with the risks faced by the executive to increase the relevance of Audit efforts. The ideal goal for risk analysis is to be completely quantitative i.e. put a monetary value to all the risks identified by the executive. This is not always possible and qualitative measures of risk like High, Medium and Low have to be used in Risk Analysis frameworks. This article describes a framework of doing a quantitative risk analysis for Project Management. When planning a project there are normally two key parameters, the time and the cost. These are estimates of time and cost. They are expected to vary because of inherent uncertainties. Measure of these uncertainties is the risk. As a simplistic example let us say that there are three material inputs in the cost of a project A, B, and C. There sum total goes in the Project Report and becomes a component of the total cost. If the price or quantity of a material A varies it will have a final impact on the project cost. If for arguments sake we assume that cost due to B and C are fixed then the entire variability (risk) in the project cost will come because of the variability (risk) in the cost of A. In real life actually all of the inputs will vary and contribute to the variability (risk) of the project. In statistics variance is the measure of variability of an uncertain variable and therefore if known it can be used to measure the risk quantitatively. Finding out the combined variance of the project based on variances of each of these components though theoretically possible will in practice will be such complex mathematics that it will be impossible to comprehend. Jan - Mar 2005 For scenarios like these quantitative risk analysis tools like Crystal Ball use simulation techniques to depict the variability of the final output given the variability of inputs in a graphical form. The steps for applying CB to a real life situation are discussed with reference to an analysis made in “Calculation of Levelized Tariff for a Power Project” by the Bhakra Beas Management Board (BBMB) Description of the Project In a power project the financial out flow in the initial stages is more because of initial capital costs, servicing of the loans etc. Subsequently the costs come down significantly in the case of a hydro electric project. Therefore a uniform tariff needs to be worked out taking into account the costs and expenditures over the time which would assure the required Return on Equity over a period of time (35 years in this case). The outgo on account of asset creation in this power project model is basically costs of civil works and cost of electrical works. The estimated costs of civil and electrical works are modelled to escalate every year at an assumed rate. The financial costs comprise of interest on loan and a working capital cost. Both these rates are assumed. The discount rate which is to be used is laid down by an order of Ministry of Power and is therefore not variable. BBMB had only done a sensitivity analysis over two variables and two values in the project appraisal. We expanded the examination by looking at some more parameters: Costs 1. Capital Financing Costs a. Loan Servicing b. Required Return on Equity 2. Running Expenses a. Depreciation b. O&M Costs c. Working Capital Charges These parameters and their relations with the final output was modelled in a spreadsheet by BBMB. Spread Sheet Model The project whose risk analysis is to be undertaken should be represented in a spreadsheet model. The model should have the input components linked to the final components as cell dependencies. The illustration below is helpful. The existence of such a model is a crucial step in applying CB Analysis. This is executive’s view of the project. If such a model is available with the Auditee it obviates the need for creating a model by Auditor and then getting it validated. -1- PursuIT Jan - Mar 2005 IT Audit Wing Assumptions This is the most critical aspect of the quantitative risk analysis using Crystal Ball. Here we make assumptions about the “variability” of the input components. In Crystal Ball either one of the pre-defined statistical distributions or a custom distribution, where the user defines the probability of the uncertain variable taking a value (range), can be used. An understanding of statistical distributions is required for defensible analysis. These assumptions would be more valid if they are made on the basis of sound historical analysis. For example if we assumed that Assumptions that we made: (i) The rate of interest which was taken as 10% and 11% was taken to vary normally with a mean of 10% and SD of 0.5%. In simpler terms the probability that the interest rate would be within 10+/- 1.5% was taken as 99%. (v) Energy Availability at presumed 90% efficiency was taken, we took it to vary normally with SD of 5% 3. Analysis of CB Results We carried out a simulation for the Levelized tariff with all these 5 assumed parameters varying as per the assumed distribution. This analysis was done for ROE at 12%, 14% and 16%. The simulation was carried out with 1000 trials i.e. each of the variables took a random value as per their distribution 1000 times. BBMB in its analysis had come to the conclusion that a Levelized tariff of Rs. 2.76 will achieve its ROE target of 16%. However we found that there was a nearly 40% probability of the required Levelized tariff being more than this cut off figure. This means that there is a substantial probability of the project not being able to realize the intended benefits. More importantly, the managements take such risks of not being able to meet the objectives without realising so. Furthermore, the sensitivity analysis done by BBMB was with respect to the interest rates. Crystal Ball sensitivity analysis showed that the major risk factors lay else where. The risk on account of Energy Availability and Escalation in Civil works was significantly more than that on account of interest rate fluctuations. 4. “Audit Findings” and Analysis (ii) O&M Cost were taken as fixed 4% in the model we took it to vary normally with mean of 4% and S.D. of 0.2%. In simpler terms the probability that the O&M cost would be within 4+/- 0.6% was taken as 99%. (iii) Escalation on Civil Works cost was taken as 3% in the BBMB model. We, instead, took it as an extreme distribution with a mode of 3%, since these escalations are in practise found to be more than envisaged with a positive skew. Based on this analysis it can be seen that (a) The management was taking a risk of about 40% of the project not being able to achieve its objectives. More importantly management was taking this risk without even being aware of it. (b) The management had not been able to identify and prioritize the most significant risks it faced with respect to its project objectives. CB is basically a decision making tool to aid the management. When used by Auditors it has the potential of changing the whole audit approach. The Auditors have long been blamed of doing a post mortem and there findings being hindsight wisdom and of little use to the management. An approach based on a tool like CB can change all this as the findings are futuristic and can actually help shape the execution of the project. In the instant case the executive will be able to focus its efforts on ensuring the power availability which has emerged as the critical risk factors. 5. (iv) Escalation on Electrical Works cost was taken as 1.5% in the BBMB model. We instead took it as an extreme distribution with a mode of 3%, since these escalations, also, in practise are found to be more than envisaged with a positive skew. Challenges in Application The challenges in applying these tools as seen from a few pilot studies have been the ability to create spreadsheet models and most critically an understanding of statistical distributions. Relating statistical distributions to real life scenarios is quite vital and expertise of a statistician could help. Û -1- PursuIT IT Audit Wing Challenges in Auditing e-Governance Initiatives “Access to, and flow of, information determines the power structures in organizations the world over..” • Dr.Ashutosh Sharma, Dy. Director (IT Audit), O/o CAG of India, iCISA, Noida, • G. Srinivas, Dy. Director, NAAA, Shimla. In the much acclaimed Hindi novel RAAG DARBARI written by Shrilal Shukla, amongst other things, the travails of a character named Langad are described in a very humorous but ironic prose. Langad spends most of the pages available to him in the novel in the quest of a ‘nakal’ of a ‘dastavez’ i.e. the copy of a document from the tehsildar’s office, a quest which remains unfulfilled against an obdurate and all powerful bureaucracy. E governance is good news to Langad and millions of his fellow citizens in India. The INTOSAI Standing Committee on IT Audit Task force defines e-government as "the online exchange of government information with, and the delivery of services to, citizens, businesses and other government agencies". In other words this encompasses interactions between Government and citizens (G2C), Government and business (G2B) and inter government dealing (G2G). Till date IT Audit wing of SAI India has cleared the IT Audit reports of 14 e-governance projects, the important ones are eSEVA, eCOPS (AP) ,Computerization of land records (Mahrashtra and Tamil Nadu), Computerizations in Municipal department Chennai ,Computerization of transport departments (Delhi and Jharkhand) and Integrated Bus Reservation System in Maharashtra. This paper is presented based on the experiences gained from audit of these initiatives. This paper does not limit itself to what is reported in the CAG’s report, but covers the entire gamut of issues and problems faced during the audit E-government is capable of enhancing the quality of public services for citizens and businesses by making information services more accessible (24X7),transparent and convenient to use. E-governance can enable agencies to process transactions more accurately and at a lower cost, and can make it easier for government and non-governmental organisations to share information with one another. As audit of e-governance initiatives is technically challenging and a developing area audit can function as an agent to see that Governments should make e government part of a wider agenda for change, and not simply superimpose it on existing, perhaps inefficient, services. An e-governance project on the face of it implies removal of the human interface and substituting it with electronic means of getting information and facilitating transactions. Use of a web-based system for dealing with public is the most common mode, though there are other models also for delivery of services. However, considering the low level of internet penetration in India, most of the e-governance projects involve large-scale use of IT kiosks. These kiosks are the primary means of e-governance in view of the digital divide in the country. Eventually most of the projects aim at becoming completely internet based in the times to come when internet Jan - Mar 2005 connectivity becomes available to the majority of people. But till that time the traditional modes of interaction have to remain operational to serve the public Audit of e-governance initiatives is not just an audit of technology used. The scope of audit of e-governance initiatives by SAI is very wide. It is also the audit of the way government seeks to work. It involves audit of business process reengineering. It is also a Value for money audit for the investment made. At the core of the audit is the IT security features built into the project. Considering these diverse aspects, this paper is divided into six broad sections: 1. Business case for e-governance 2. Acquisition process 3. Implementation issues including Quality of service 4. IT Security 5. Data analysis 6. Reporting parameters 1. Business Case for e-Governance 1.1 Conceptualisation of project: The first question is whether Information and Communication Technologies (ICT) are a solution for the problems in governance. E-governance projects are by nature huge and complex. Such a decision needs to be taken on careful analysis of cost and benefits of the project. The auditors challenge in this area is due to the fact that the decision making process is not documented in most of the cases and inferences may have to be drawn from actual results of implementation of project. 1.2 Feasibility Study: Auditor faces with the dilemma as to whether he should insist on a well-documented feasibility study, User Requirements and System Requirement Specifications. As IT is in itself at a nascent stage, it is quite likely that the auditor faces with a situation where no such documents are available. (The Government replied to an audit query in case of eSeva stating that had they kept working on a detailed feasibility study, the project would have never seen light of the day). In such a situation, it would be reasonable to depend on files and other documents to understand whether adequate thinking has gone into before taking the decisions. In all probability most of the problems in development and implementation would be a direct consequence of inadequate feasibility study etc and would become basis for comments on inadequate planning and evaluation. 1.3 Cost Benefit Analysis: Audit faces with a problem of evaluating whether the costs of the project justify the benefits. Firstly, identifying the costs would be an issue in a situation where a private partner gets transaction charges from the government. Secondly, it is very difficult to quantify benefits many of which are like increased transparency, convenience, etc. The auditor has to rely on reasonability in making judgment about benefits. Parameters like quicker service needs to be tested based on examination of recorded average time before and after implementation of project. If the Government got prepared a Cost Benefit analysis report like in the form of Pay Back Period or Break Even Point etc (eCops project planning documents included a statement showing Pay Back Period based on savings from reduced manpower), the same should be tested for reasonability. Savings in form of diversion of surplus staff due to e-governance to other projects needs to be examined. In most of the cases one would find that -2- PursuIT the staff strength remains the same even after new technology and systems have come in place. 1.4 Case for outsourcing: The recent trend in Government to outsource IT activities to private sector needs attention of auditor. It would be reasonable to rely on judgment of the executive regarding whether to go in for outsourcing and the form in which outsourcing is to be done viz., software development outsourcing, BOOT basis or public private partner-ship. The auditor should make sure that well informed decision is made after detailed analysis of alternatives. The auditor should make sure that sovereign duties or statutory functions of Government are not outsourced. For example, it would be unreasonable to outsource the responsibility to maintain data relating to FIRs etc to a private party. 1.5 Identification of services to be included in egovernance: The guiding principle should be what the people want to access on-line. The auditor may recommend additional areas that may come to his notice during audit for inclusion. Here auditor can work as a change manager to encourage widespread use of e-governance projects. 1.6 Business process reengineering: Introduction of egovernance involves not merely change in technology, but may also require reengineering the business process. This involves redefining the roles and responsibilities of various functionaries. The auditor should evaluate the adequacy of changes in the process to facilitate and take benefits of egovernance. 2. Jan - Mar 2005 IT Audit Wing Acquisition Process 2.1 Preparedness of various departments/functionaries: This is one of the most important prerequisites for implementation of an e-governance project. In most of the projects, none of the functionaries/departments are found ready. The databases are not compatible, the hardware and software are not compatible with existing ones. These lead to problems in implementation and eventually increased cost and delays. 2.2 Selection of Vendor of hardware/software: The selection of vendor should involve careful examination of capability of the firm. This particularly important if customized software is to be developed by the vendor. The audit can bench mark the acquisition process using models like Software Acquisition – Capability Maturity Model (SA-CMM). 2.3 Use of frameworks in software development and project implementation: The auditor is expected to examine whether the project management has used any of the established frameworks like CoBIT, CMMi etc. If so, auditor can examine the extent of compliance with framework. Even if the project management has not adopted any specific framework, the auditor can rely on good practices of these frameworks while making examination. We often relied on CoBIT audit guidelines for use as Half Margin memos in conduct of audits. The problem faced is that these have to be amended to suit the audit goals in the situation. Initially when we issued questionnaires as it is, the auditee did not even understand how to reply and the replies received did not even reflect actual views of project management. In many cases, the replies were found to be self-contradictory or conflicting with each other. We then carefully amended the questionnaires based on what assurance we were trying to achieve in audit and explained them in detail to the auditee and to get proper response. 2.4 Development of Software: The software methodology should involve an established good practice like System Development Life Cycle (SDLC). There should be a right to audit the development firm’s work by the acquirer. In the absence of such clause and its effective enforcement, the auditor should seek alternative methods of obtaining satisfaction and may also need to qualify the report. In case of eSeva, the entire development of software was left completely to private firm with no role from Government, which eventually resulted in avoidable problems in the software. 2.5 Contract document: The contract should be examined from legal perspective to make clear the responsibilities of both parties including incorporation of confidentiality clause. There should be adequate penal provisions on the vendor for poor quality of programme, cost and time overruns, etc. Often it is noticed that though many penal provisions are present in the contract, most of them are never invoked giving unintended benefit to the developer. 2.6 Maintenance contract: It should be examined in audit whether adequate provisions for post implementation maintenance of hardware and software are provided. In case the maintenance is to be taken up in house or by some other vendor the capability should be examined. 2.7 Acceptance testing: The auditor should ensure that project (application) is finally accepted after detailed stage wise acceptance testing by various user groups. Inadequate acceptance testing results in many problems at a later stage. 2.8 Need for physical verification: The IT auditor may on many occasions need to physically verify the hardware. For this may have to visit various locations. It was seen in one of the audits that, on physical verification, private partner has not complied with contractual provision to a very significant extent regarding providing hardware and facilities at service centers. We ensured that a designated official from auditee is always present during audit. Physical verification may also be necessary to evaluate the adequacy of physical and logical access controls. IT audit on many occasions results in findings which exist at a particular moment and no document of evidence except physical inspection by auditor is possible. In such cases, auditor should rely on counter signature of official of the auditee present at the location as acceptable audit evidence. 3. Implementation Issues Including Quality of Service 3.1 Web-based services: These should be in such a way that citizen is encouraged to access web services rather than seeking services through traditional methods of visiting office. While kiosks are a transitory process, real cost savings and convenience can only come through website based services. The website should be designed in such a way that it provides all information to the user regarding access to services. It should be user friendly. It should give an overview of security like the Digital Certification, payment gateway etc to increase the confidence of the user. It should be continuously updated. The initial response to web-based services may not be very encouraging due to the public concerns about security in using internet. However, this should not be a reason for not keeping everything accurate and updated on the net. The popularity of web based services increases if the initial visitors to the site -3- PursuIT IT Audit Wing get good service. Web services should not be launched without adequate processes and quality services in place from day one. In many cases, the website and services were in place from beginning, but the sites were neither updated nor convenient to use. Lot of procedural requirements including manual intervention by way of follow up letters etc was involved. Eventually when everything was set right, it took time for people to come back and use the web services. 3.2 Provision for paper based receipt in case of web payments: There should be a provision for the user to print a paper receipt as an evidence of making the payment. The auditor should verify the adequacy of the same. 3.3 Quality of service: The auditor needs to examine the quality of services under e-governance. This is the most important facet of audit of e-governance projects. The parameters are wide and varied. Broadly these include parameters indicating efficiency of project and user orientation. Efficiency can be gauzed from speed, security, superiority over traditional methods, etc. User orientation involves examining how easy is it to access services, extent of clubbing services at single location, user support and problem resolution, local language interface, friendly and supporting approach of staff in kiosks, reduction of need to visit government offices repeatedly etc. It was a major challenge to evaluate projects like eSeva and eCops on these parameters. In case of eSeva we relied on a survey conducted by Government using some research and educational institutes. We also used a questionnaire to collect information from citizens present at eSeva centers to supplement the work done by Government nominated institutes. In case of eCops, the problem was even more complex due to huge resistance within the auditee department to the project. Even in cases where eCops provides lots of convenience, the departmental users were found to paint a grim picture to tarnish the image of the project. The response of people could not be tested in case of eCops due to administrative constraints. 4. IT Security 4.1 Adequate physical and logical access controls: These need to be examined keeping in view the risks. This includes all the basic checks to be performed regarding general controls and application controls (Input, output and processing). Most significant part of our time of audit was spent on this area since there were many controls that were absent or insufficient. The data in these projects could be amended at any stage by multiple sources. 4.2 Encryption of data: Considering the fact that huge and important data travels over the network or internet, it is essential that data is encrypted. Most of the time auditor finds himself in a dilemma when project management replies that encryption has not been resorted to, as it would slow down the system. In IBRS Maharastra there was no token based authentication system to identify authorized ticketing agents which would have served some purpose of compensating controls. The auditor should take into account the risks and established compensating controls before forming an opinion. 4.3 Use of PKI: Public Key Infrastructure and use of Digital Signatures has legal validity under IT Act 2000. Auditor should evaluate the extent PKI has been adopted depending on the nature of the project Jan - Mar 2005 4.4 Penetration testing of website: Ethical hacking or penetration testing has been one of the accepted practices of IT audit. The auditors should decide on these tests taking into account their own competence and whether any such tests are conducted by project management. In all cases, the auditor should take prior approval of the auditee before conducting any such tests. 4.5 Source code: The auditor should see whether the package used open source system. The auditor should ensure that source code of the package is available with responsible government official. Auditor may if necessary run a code comparison programme to compare the executable with that in the programme library. This gives the auditor an assurance that no unauthorized programme is running on the system. In case of eSeva it was noticed that private operator bluntly refused to share with source code and government insisted and got the same at the instance of audit 4.6 Segregation of duties: This is one of the significant areas which is likely to be found lacking. Auditor should not merely check for clubbing of incompatible functions (database administrator and systems administrator) but should see it in overall context in relation to existence of any compensating controls before forming an opinion. 4.7 Protection against viruses, worms etc: Auditor should examine the project for adequacy of protection against Trojan horses, viruses, worms etc. He should also test the website for possibility of Denial of Service attacks. A successful DoS attack on a well established e-governance project leads to not only inconvenience to citizens but also severely affects the public confidence in the system. 4.8 BCP and DRP: Since most of e-governance projects are critical and huge in nature, the plans for Business Continuity and Disaster Recovery should be reviewed by the auditors. Auditor should also examine the arrangements of Hot site, Warm site or Cold site as part of BCP. In IBRS Maharashtra entire data beyond a certain date was lost and could not be recovered due to absence of backup. 4.9 Use of outside expertise: Since SAI may sometimes be lacking in core technical skills like conducting network testing, website ethical hacking (penetration testing), testing firewall configuration etc, it is accepted practice to use outside experts. However, care should be taken to ensure that the outside expert appointed does not misuse his access to data and system. Proper confidentiality clause should be incorporated in the contract with the outside expert for this purpose. During the audit of eSeva, we tried to use the services of NIC for conducting some core technical network testing. The Government in meetings expressed serious reservations about using outside experts. Taking into account their objections and our own perceived necessity, we abandoned the idea and conducted the network testing ourselves. 4.10 Program change controls: This is an important area of concern for auditor particularly in a project of e-governance. Most of the time, it may be noticed that program changes are made based on discussions of programmers with users without any documented approval procedure. This can lead to serious risk of unauthorized program changes. 4.11 Security over monetary transactions: In e-governance initiatives involving eCommerce, security over monetary transactions becomes very important. Auditor should ensure -4- PursuIT that adequate control exists to account for the collection of money, prevent misuse of credit card information, etc. 5. Data Analysis 5.1 Use of audit tools: Auditor may use tools like IDEA, Excel, SQL, Access etc to analyse the data. When egovernance integrates data between different departments etc, data transfer and integrity are of paramount importance. These tools can throw light on serious limitations in the database. Based on data analysis auditor can form an opinion as to whether the information generated from the e-governance project is dependable. Data analysis also helps auditor in forming opinion about various application controls like input controls, processing controls, output controls and edit checks. Auditor should be cautious to ensure that data is properly copied into IDEA etc package so that the results are accurate. In eSeva, eCops and IBRS audit, many of our audit results were collaborated by data analysis using IDEA and SQL. 5.2 Use of embedded audit module: In case the auditors is associated at the stage of developed itself, they can ask for an embedded audit module which copies exceptional data to a separate audit file for review by auditor. Audit should also insist on adequate audit trails to be built in the application at the developmental stage. 6. Jan - Mar 2005 IT Audit Wing Reporting Audit Findings 6.1 Balanced reporting: Use of e-governance leads to increased transparency and helps further participatory democracy. Most of these projects have the capability of altering the power base in favour of people. These help in curbing corruption and misuse of power by executive. These will always be many individuals who would like to see that these projects fail as they threaten the existing power structures. Auditor should be cautious to ensure that audit reports do not result in giving means for unscrupulous elements to kill the project. The reports should be balanced with recommendations. They should also reflect the efforts and success of government in implementing the projects. The page limitation should not be a reason for printing a report which is completely one-sided. While performing IT audit of e-governance projects, the role of SAI is not only to bring lacunae to notice of legislature, but also to help project management improve the project. 6.2 Impact of individual observations on overall project: Auditor should take into account the impact of individual weaknesses on the overall project. Auditor need not report weaknesses for which adequate compensating controls exists. The report should clearly indicate the impact on overall project so that legislature / executive can decide on the need for corrective action. Conclusion e-Governance is most of all about people, it is an enabler of change rather than an end in itself. On the issue of e-governance it is often seen that it is not the government which sets the agenda but the enlightened citizenry and credible organizations have an important role to play. SAI India can play an important part in this process by auditing these e-governance initiatives in a constructive manner. This will not only help in assuring the legislature about the usefulness of these initiatives but also lend credibility and create trust amongst citizens for these services. E-governance seeks to completely change the way we perceive the government. This assumes importance especially with the Right to Information Bill soon becoming a reality. Here the role of audit is to give an opinion about processes ensuring the security of sensitive data, and creating trust among citizens and businesses that may be understandably nervous about transacting business on-line. Individual technical objections when reported by media based on CAG’s report could be blown out of context and proportion. Development of egovernance itself is at a very nascent stage in the country. Our reports should therefore ensure that they are balanced with sufficient coverage of achievements of the project management. Extremely critical reporting from SAI without coverage of positive achievements would hamper the development of e-governance. The baby should not be thrown with the bathwater. Therefore, auditor should ensure that the reporting is balanced and constructive. “The future is electronic and we better be prepared for it”. Û From Data Analysis … towards Data Mining Audit Rajesh Goel, Sr. DAG, O/o PAG(Civil Audit),Rajasthan. Data Analysis had brought out some very emphatic audit findings in IAAD’s IT Audit efforts re-emphasizing the audit value that data analysis has. Most of the published IT Audit reports are banking heavily on conclusions drawn as a result of data analysis carried out by auditors with the help of data analysis software. As per Strategic IT Audit plan of 2003, four kinds of generalized audit software or CAATs were identified for usage in the department namely MS Excel, MS Access, IDEA and Structured Query Language. Performing audits without using such IT tools is hardly an option. When all the information needed for doing an audit is on computer systems, how can one carry out an audit without using the computer? Much has been discussed and said about the data analysis software and tools adopted by IAAD, so this article will not address them. However, the subject of data mining is relatively new and the focus of this article would be to introduce data mining which is a step ahead of data analysis. Data mining refers to extracting or mining knowledge from large amounts of data. There are data mining tools available for auditors to extract information carried in large databases in an easily comprehensible form. For the purpose of understanding and appreciating the added features over and above data analysis tools, a case study depicting the use of a data mining tool would be presented in this article. The data mining tool that has been chosen for the purpose of this article is WizRule1. 1 WizRule is a data mining tool from WizSoft suite from Wiz Soft Inc. The price of the software is approximately Rs. 80,000 per license. WizRule can handle a large number of data bases directly like Oracle, MS Access and many others using ODBC. A demo copy of the WizRule software can be downloaded from the website www.wizsoft.com -5- PursuIT IT Audit Wing WizRule is a data-auditing tool based on data mining technology. WizRule performs a complex analysis of data revealing inconsistencies, errors and cases to be audited. Almost anyone who works with data – from end users to database managers – is well aware of the great number of errors that occur in data. These errors are the result of a range of different factors. In many cases, they are caused by faulty data entry, whereby the user types in one value instead of another. In other cases, errors are made intentionally, such as in cases of fraud. Errors are sometimes also the result of software or hardware malfunctions, resulting in corrupted data. The WizRule program implements an innovative approach to automatic data-auditing. It is based on the following assumption: In many cases, errors are exceptions to the norm. For example, if, in all sale transactions to a certain customer, the salesperson is Dan, a single transaction in which the salesperson is someone else, who is usually connected with other customers, can be considered a “deviating transaction” or a suspected error. In creating a software application that discovers exceptions to the norm, the program first needs to discover all the rules in a given data set. This is precisely Wiz Rule’s strong point. WizRule is based on a mathematical algorithm that is capable of revealing all the rules governing a data set within a very short span of time. The output of a WizRule analysis is a list of records that are unlikely in reference to the discovered rules. These records are suspected errors, or at least cases to be examined. Although WizRule is based on sophisticated mathematical algorithms, the software has been designed for users with little or no knowledge of mathematics. WizRule performs its calculations in the background and then displays the results of the analysis in clear, easy-to-understand formats. We need only select the file to be analyzed, and WizRule does the rest of the work. WizRule examines data seeking to understand relationships or rules that may exist. The rules may be of the if-then type or they may be formulas. An example of an if-then rule is: If Customer is Apex and Order Item is Scanner Then Salesperson = John Goodside Rule’s probability is 0.98 The rule exists in 103 records Deviations (records’ serial numbers): 11,54 An example of a formula rule is: A=5*B Where: A = Value of a stock B = Net Profit Rule’s accuracy level: 0.99 The rule exists in 1890 records Jan - Mar 2005 Deviations (records’ serial numbers): 43,378,453,567,568,789,800,904,1010, 1800 WizRule allows the auditor to adjust the minimum probability level of the if-then rules, the minimum accuracy level of the formula rules, the minimum number of cases of a rule and the maximum number of conditions of a rule. Here is a real-world case. Embassy Vouchers’ Data Analysis For the purpose of evaluation, WizRule was applied to a database of approximately 25,000 vouchers of embassies. This database in MS Access was developed at Headquarters office in the year 2001 and contained the information about vouchers generated in five major Indian missions. WizRule, since it discovers all the rules that exist in the data helped us in identifying the business rules that govern the data and also point out the departures from these rules. The departure from these rules would indicate errors in system application controls, errors in data entry and even frauds. In either case they would identify cases for detailed audit. Application of WizRule to the database of vouchers of selected embassies generated a Rule Report having more than hundred rules in order of significance. A casual browsing shows that these rules in many cases confirm the existence of business rules. This is helpful to an auditor to draw assurance about the system. The deviations are nearly always audit findings or certainly cases for further investigations. A few illustrative cases are listed below: Case I Visa Fee should always be a receipt therefore cases where there is expenditure on this object head are certainly cases of erroneous data. A further analysis can be carried out to examine these individual cases. If objectExpenseName is Visa Fee Then expOrReceipt is R Rule's probability: 0.954 The rule exists in 208 records. Significance Level: Error probability is almost 0 Deviations (records' serial numbers): 2198, 8349, 8396, 16648, 16664, 16665, 16667, 16668, 16669, 22979 Case II In London Embassy 97% of the vouchers are expenditure vouchers. The data could be incomplete or point to a peculiarity in London Embassy. If missionName is London Then expOrReceipt is E Rule's probability: 0.973 The rule exists in 8260 records. Significance Level: Error probability is almost 0 Deviations (records' serial numbers): 1795, 1796, 1798, 1799, …… -6- PursuIT IT Audit Wing Conclusion The data analysis by tools like IDEA require the auditors to first develop the audit criterion and then carry out the analysis against this criterion. Developing an audit criterion is a process which is normally very much dependent upon the auditor’s knowledge about the entity, skills in risk assessment etc. Traditionally auditors used to look for isolated cases of irregularity and it was their skill of zeroing in on such cases that made them become better transaction auditors. In fact it can be argued that even in the wake of developments like application of statistical sampling etc. the true skill of an auditor still lies in identifying a “biased” sample, which would contain most of the irregularities. As is clear from the analysis above, a data mining tool can help us on both the fronts. It can develop the audit criterion, throw up a sample to be investigated and give assurance about the remaining data. The deviation report from the WizRule gave us a set of transactions and also tells us what to look for when auditing these transactions. For example the deviation report regarding classification of above data tells us: 1. What are the vouchers where classification is wrong? 2. Check these transactions to ascertain why the classification was wrong. Whether it was due to a. Errors in data entry b. Erroneous data processing c. Deliberate error of commission 3. Gives us assurance that the classification is correct in the remaining vouchers. Thus a data mining tools has high applicability in the following areas: (a) Establishing the existence of business rules and thus establish data integrity. (b) Drawing assurance about controls on data entry. (c) Drawing a sample for audit which fulfils audit criterion and helps in zeroing in on potential audit findings and even unearthing frauds. Û Jan - Mar 2005 Maharashtra Industrial Development Corporation (Corporation) had computerised its water billing system with Oracle as a back end and Developer 2000 as front end to generate water bills and to maintain database of its consumers. A review of the water billing system revealed that as per the instructions issued (November 1997) by the Corporation in this regard, the industrial consumers were to be charged 50 per cent above the normal industrial rate if they had not obtained Building Completion Certificate (BCC) on or before 1 December 1997. The database for the water billing system had two critical fields, which controlled the billing for BCC purposes; 'BCC date' and 'BCC field', both with 'Yes/No' option. The water billing system was programmed in such a way that if the 'BCC field' was 'Yes' (i.e. BCC submitted) the consumer would be billed at normal rate and if the 'BCC field' was 'No' (i.e. BCC not submitted) then the consumer would be billed at 1.50 times the normal rates. However, the Corporation had not fed the 'BCC date field' in billing system and it was left blank. This was a crucial lacuna as the date of obtaining the BCC was crucial for further billing purpose. (b) Non incorporation of validity checks and improper coding in water billing system resulted in loss of revenue of Rs.2..04 crore. In the absence of validation check for linking the 'BCC date field' and 'BCC field' with 'Yes/No' option, 106 consumers who had not obtained 'BCC' on or before 1 December 1997 had been billed at normal rate instead of higher rate resulting in a revenue loss of Rs.1.70 core in respect of Thane, Dombivali and Ambernath divisions of the Corporation during the period December 1997 to March 2001. In respect of Ambernath division, Rs.34.37 lakh collected by way of penalty for non production of BCC from consumers had been subsequently refunded wrongly (August 1998) to the consumers by considering the date of starting production as ‘BCC’. Thus, non incorporation of suitable preventive, detective and corrective validation checks and improper coding of parameters of business rules resulted in loss of revenue of Rs.2.04 crore due to under billing of water charges. The Corporation stated (December 2002) that the irregularities mentioned in Audit para were examined and modification carried out in the water billing software. Efforts are being made to recover the amount due to the Corporation. The reply of the Government was awaited (December 2002). Highlights of some of the Information Technology Audit reviews which have been printed. 1. Maharashtra Industrial Development Corporation -Under billing of water charges (a) Non incorporation of validation checks and improper coding in water billing system resulted in under billing of Rs.2.04 crore . 2. Computerisation of the activities relating to Housing Department of Delhi Development Authority The computerised database of DDA relating to allotment of flats and realisation of dues from allottees was incomplete, inaccurate and unreliable. No input controls were provided to keep a check over the allotment of flats to ineligible minors and also over the double -7- PursuIT Jan - Mar 2005 IT Audit Wing allotment of flats to the same individual in contravention of the guidelines. Lack of monitoring of cancelled flats led to delay up to 10 years in their re-allotment as per the computerised database. The database was unreliable and depicted an untrue picture of the dues recoverable by DDA mainly due to non updation of the cancelled flats in the allottees’ database leading to duplication of demands. As per computerised database, in 19826 cases of allotments, not even a single instalment was paid by the allottees up to March 2000 against the demand of Rs 310.47 crore and in 46893 other cases, where the flats were allotted on cash down basis, no payment was made by the allottees against the demand of Rs 697.94 crore. Injudicious termination of a contract resulted in avoidable delay of more than two years in implementation of an online Housing Management Information System besides extra avoidable expenditure of Rs 19.88 lakh. Failure to take over operation of Housing Management Information System named 'AWAAS' completed by CMC Ltd. in October 1999 and accepted by DDA in November 1999 resulted in expenditure of Rs 32.88 lakh till October 2002 on its operation by outsourcing against the cost of Rs 43.25 lakh for application software development. 'AWAAS' Application was not fully operational despite Rs 1.95 crore were spent on its development including the cost of Hardware, System Software and Networking. 3. Information Technology Audit of eSeva – an e-Governance initiative by Government Though Government launched a unique and conceptually a good project to put e-governance into action to provide a large number of services to citizens on one-stopshop basis, the project suffered from lack of transparency, inefficient and ineffective implementation largely due to unpreparedness of the participating departments and inadequate coordination. The network was exposed to serious risks of physical access controls and logical controls. The key data and huge volumes of cash pertaining to various departments had been left to the administration of private operator without adequate internal controls. Data integrity, reliability, and safety across the project were also inadequate. The eSeva project, a New Service, was started without formal budget provision and without conducting feasibility study. Financial rules were largely neglected by the Director, eSeva project in implementing the programme. The project was rushed through implementation even when the participating departments were not ready. The bid evaluation adopted in selecting the operator lacked transparency, and only one operator was selected instead of two in violation of the Government orders. Adequate documentation did not exist for any of the aspects relating to software, hardware, network, error handling, etc. Complete technical documentation including the source code specified in the tender was also not obtained. This had resulted in a situation where the Director was completely dependent on the operator. Adequate business continuity plan also did not exist. The essential controls in computerised environment such as logical access controls, physical access controls, etc. were found inadequate. The network security of the project was also lacking. The transactions in eSeva were not reconciled with the data in the respective departments and scrutiny revealed many irregularities, inadequacies and inconsistencies in the data. Government assets worth Rs 90 lakh relating to the TWINS pilot project were handed over to the operator free of cost though not provided in the agreement. 4. Information Technology Audit review on the High Tension Billing System of Maharashtra State Electricity Board, Mumbai. The computerised high tension (HT) billing system of Maharashtra State Electricity Board (Board) was initially implemented in 1981 and re-engineered during 1997-2000. Considering that about 58 per cent of the total revenue is generated from HT consumers, the system handling HT billing and revenue realisation is ‘mission critical’ in nature. In the absence of a formal information technology (IT) policy and long term strategy, the IT center sites prepared during April 1999 to August 2002 at a cost of Rs.1.40 crore were not made operational due to delay in procurement of hardware. The Board incurred expenditure of Rs.1.54 crore on outsourcing of billing due to delayed commissioning of IT centre at Bhandup. No policy regarding physical and logical security of IT assets including software and data existed. Insufficient security features with respect to access control, passwords and login control rendered the system vulnerable to unauthorized access and data manipulation. The disaster recovery and business continuity plan was not documented. The data backup was not periodically checked to ensure recovery of data. In the absence of undertaking by Price Waterhouse Associates for passing on intellectual property rights to the Board, the system design, source codes of IT billing system developed are vulnerable to misuse. There was waiver of minimum charges of Rs.7.13 crore and non levy of charges of Rs.1.54 crore in violation of rules. Delay in issue of bills to HT consumers (Rs. 868.44 crore) resulted in loss of interest of Rs. 1.15 crore. Excess bulk discount of Rs.3.19 crore was granted to ineligible HT consumers and incorrect calculation of power factor incentive resulted in excess rebate of Rs.5.58crore. Û -8- PursuIT Jan - Mar 2005 IT Audit Wing Let us Try Importing ORACLE Data Table into IDEA K.P. Singh, AAO (IT Audit) S.C. Naithani, Sr. Auditor(IT Audit) Since the inception of the IT Audit Wing at Headquarters, one of the major problems raised by the field representatives of different audit offices is how to download the oracle data into IDEA (Generalized Audit Software) adopted as one of the CAATs in the IA&AD. Although, the ORACLE data can be very well queried using SQL Commands, IDEA being very popular and User Friendly Interrogation Software, the present article is an attempt to help and guide to all those who wish to use IDEA as the main interrogation tool. The detailed procedure for downloading Oracle Data into IDEA using ODBC driver is explained in the subsequent paragraphs: Ensure that the PC in use on which IDEA has been installed is connected to the auditees Data Base Server (in other words it allows you to Log on to their System. Diagram – 1 Open the IDEA Software Select the Import Assistant Click on Use the ODBC to import the file option and press next as indicated in the Diagram – 1. ODBC Import Box appears on the screen Diagram – 2 A list of available ODBC Drivers is displayed in the Box as indicated in Diagram – 2. Press on Create an ODBC Data Source button. Pressing on Create on ODBC Data Source will open the screen as per Diagram – 3 Diagram – 3 Enter the DSN (Data Source Name) in the space provided. Click on OK If there is no connectivity between your pc and the Data Source Name, an error message will be displayed. Else it will take you to next screen as shown in Diagram 4. Once the Screen as shown opposite is displayed, select the Oracle ODBC Driver option from the list of drivers Diagram 4 Press Next if there is no connectivity, this will return an error message “unable to access file”. Else this prompts you to the next screen as per Diagram 5. -9- PursuIT Jan - Mar 2005 IT Audit Wing The Diagram 5 asks you to enter the file data source you want to save this connection to. Or, you can customize the location by clicking browse button. Diagram 5 Press Next This will take us to the next screen as shown in Diagram 6. Diagram 6 Create New Data Source box appears and indicates the details of File Data Source (Filename and Driver name) Press Finish button. Enter the User Name, Password and the Server Name in the Microsoft ODBC for Oracle Connect box. Diagram 7 (Note: the User Name, Password and Server Name to make use of the auditees database while Importing the tables into IDEA is to be obtained from the DBA of the Auditee organization) Pressing the OK button will end the process of creation of an ODBC Data Source. In subsequent steps this created data source will be utilized for importing ORACLE Data Table in to IDEA. Once the creation of ODBC Data Source is done this can be used any number of times for Importing the ORACLE Data Tables from the same server. For this: Diagram 8 Open the Select Data Source screen (Diagram 8). This will show the name of DSN name created by us. Select the created DSN name and press OK. - 10 - PursuIT Jan - Mar 2005 IT Audit Wing Diagram 9 This will open the Microsoft ODBC for ORACLE Connect box (Diagram 9). Enter the User Name, Password and the Server Name Press OK Diagram 10 Next screen (Diagram 10) will list the Available Tables in the auditee server as shown in Diagram 10. Select the desired table(s). The button Check Size of ODBC Import will ascertain the disk space required for importing the selected table(s). Press Next button. Diagram 11 This brings us to the last screen (Import Assistant – Specify Idea Filename) of importing the table. Enter the Idea file name for the imported table in the Name of Database Press Finish Diagram 12 After importing the table, the imported table(s) can be used as other IDEA files. Analysis, Extractions, Sampling Techniques can be made use of. The imported table will appear like one shown in the Diagram 12. Û - 11 -