| Aspect | Forward Tracing (Information System) | Backward Vouching (Information System) |
|---|---|---|
| Direction of Analysis | Tracing data flow from the original input of the information system toward the final system output. | Tracing system outputs or reports backward to the original input data. |
| Starting Point | User input interfaces, data entry forms, sensors, or source transactions. | Reports, dashboards, logs, or database records produced by the system. |
| Main Objective | Verify that all input data is processed correctly and appears in system outputs. | Verify that the outputs originate from valid and authorized inputs. |
| Typical Data Flow | Input Interface → Application Processing → Database Storage → Reports | Reports → Database Records → Application Processing → Input Source |
| Risk Detected | Missing transactions, incomplete data processing, or unrecorded system inputs. | Fictitious transactions, manipulated outputs, or unauthorized data entries. |
| Audit Focus | Completeness and reliability of data processing. | Validity and authenticity of stored and reported data. |
| Example in Information Systems | Tracing a customer order from a web form submission through the system processing to the sales report. | Selecting a transaction from a sales report and tracing it back to the original web form input. |
(Web Form / Interface)
System Logs
Transaction History
Access Logs
Forward Tracing (Completeness)
Path: Auditor follows the normal system data flow to ensure no data was lost.
Web Form
Validation
Record
Sales Report
Backward Vouching (Validity)
Path: Auditor follows the reverse data flow to ensure the output is legitimate.
Source Doc
System Logs
SQL Record
Sales Report
Integrated Information System Audit Architecture
Enterprise IS Audit Framework
• Threat Correlation
• Anomaly Detection
• Incident Response
APPENDIX (Additional Section of Latest Update IMO)
How Forward Tracing Works in This Architecture
Forward tracing follows the natural system data flow from the beginning of the transaction until it reaches the final system output.
↓
Web Server
↓
Application Server
↓
Business Logic
↓
Database Transaction
↓
Database Storage
↓
Reports
Purpose:
- Ensure all inputs are processed by the system
- Detect missing transactions
- Verify data completeness
Example: A customer order submitted through a website form is traced through the web server, application server, and database until it appears in the sales report.
How Backward Vouching Works in This Architecture
Backward vouching follows the reverse direction of the system flow. The auditor starts from the report or output and traces the data back to the original source.
↑
Database Storage
↑
Database Transactions
↑
Application Logic
↑
Web Server
↑
User Input
Purpose:
- Verify data validity
- Detect fraudulent or fictitious transactions
- Ensure that every report entry originates from a real transaction
Example: A transaction found in a financial report is traced backward to the database record and then to the original user input.
Audit Checkpoints in the System
Auditors typically examine several checkpoints in the system where important information about transactions is recorded.
- Application logs – record internal system activities and processing events
- Database transaction logs – record INSERT, UPDATE, and DELETE operations
- Access logs – record user login activity and access attempts
- Audit trail storage – record historical actions performed in the system
These checkpoints allow investigators to reconstruct every action performed within the system.
Fraud Detection Points
Fraud detection in information systems usually occurs through automated monitoring and analysis of system logs.
- Security Information and Event Management (SIEM) systems
- Transaction anomaly detection
- User behavior monitoring
- Compliance and audit review
By analyzing logs and audit trails, organizations can detect suspicious activities, unauthorized access, and potential fraud.
Comments
Post a Comment