100% found this document useful (1 vote)
96 views32 pages

ManagmentControlIPB PDF

1. The document discusses various types of management control over information system (IS) functions including top management control, IS management control, system development management control, programming management control, data administration control, quality assurance management control, and security administration control. 2. It describes the responsibilities and focus of each type of management control such as top management being responsible for long-run policy decisions and IS management being responsible for planning and controls of all IS activities. 3. For each control, it discusses aspects such as approaches, models, roles, functions, organizational issues, and relationships to other functions to ensure proper management and oversight of the IS system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
96 views32 pages

ManagmentControlIPB PDF

1. The document discusses various types of management control over information system (IS) functions including top management control, IS management control, system development management control, programming management control, data administration control, quality assurance management control, and security administration control. 2. It describes the responsibilities and focus of each type of management control such as top management being responsible for long-run policy decisions and IS management being responsible for planning and controls of all IS activities. 3. For each control, it discusses aspects such as approaches, models, roles, functions, organizational issues, and relationships to other functions to ensure proper management and oversight of the IS system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Management Control

Page 1
Risk and Control Associated with ICT Architecture

Komputer Aplikasi

Data Sistem Komunikasi


The IT Audit
(James A. Hall, Information Technology Auditing,2011)
• Focus of IT Control is on the computer base aspects of an
organization’s information system.
Control Over IS Functions
 Management Control • Application Control
 Top Management • Boundary
 IS Management • Input
 System Development
Management • Communications
 Programming Management • Processing
 Data Administration • Database
 Quality assurance • Output
Management
 Security Administration
 Operation Management

IS Constrol and AUdit, ROn Weber. CISA review Manual, ISACA,


9/28/11 4
2003
Control Over IS functions
IS Constrol and AUdit, ROn Weber. CISA review Manual, ISACA,
9/28/11 5
2003
Assessing information technology risk

 TOP Management
 Must ensure the IS function is well managed. It
is responsible primarily for long-run policy
decisions on how information systems will be
used in the organization
 IS Management
 Has overall responsibility for the planning and
controls of all information system activities. It
also provides advice to top management in
relation to long-run policy decision making and
translate long-run policy into short-run goals and
objectives

9/28/11 IS Constrol and AUdit, ROn Weber. CISA 6


review Manual, ISACA, 2003
Assessing information technology risk
 System Development Management
 Responsible for the design,
implementation and maintenance of
application systems
 Programming management
 Is responsible for programming new
system, maintaining old systems and
providing general system supports
software

9/28/11 IS Constrol and AUdit, ROn Weber. CISA 7


review Manual, ISACA, 2003
Assessing information technology risk
 Data administration
 Responsible for addressing planning and
controls issue in relation to use an
organization data
 Quality assurance management
 Responsible for ensuring information system
development, implementation, operation, and
maintenance conform to establish quality
standard

9/28/11 IS Constrol and AUdit, ROn Weber. CISA 8


review Manual, ISACA, 2003
Assessing information technology risk

 Security administration
 Responsible for access control and physical
security over the IS function.
 Operation Management
 Responsible for planning and controlling of
the day-to-day operations of IS

9/28/11 IS Constrol and AUdit, ROn Weber. CISA 9


review Manual, ISACA, 2003
Management Control: Top Management
Control
 Must ensure the IS function is well managed. It is responsible
primarily for long-run policy decisions on how information systems
will be used in the organization.
 Mendiskusikan peran manajemen dalam perencanaan, pengorganisasian,
kepemimpinan, dan pengendalian fungsi sistem informasi

IS Constrol and AUdit, ROn Weber. CISA review Manual, ISACA,


9/28/11 10
2003
Management Control: Top Management
Control
• Evaluating the Planning Function
• Type of Planning Function
• Contingency Approach Planning
• Role of steering Committee
• Evaluation the Organization Function
• Resources the IS Function
• Centralization VS Decentralization
• Internal Organization of IS Function
• Evaluation the Leading Function
• Motivating IS Personnel
• Matching Leadership Style win IS System
• Effective Communication with IS personnel
• Evaluation the controlling function
• Overall Control of the IS Function
• Technology diffusion and control of the IS Function
• Control over IS Activities
• Control over the user of IS Services
Management Control: Information System
Management
 Has overall responsibility for the planning and controls of all
information system activities. It also provides advice to top
management in relation to long-run policy decision making and
translate long-run policy into short-run goals and objectives
Management Control: System Development
Management Control
 Responsible for the design, implementation and maintenance of
application systems
 Provide a contingency perspective on the models of the IS system
development process that auditor can use as a basis for evidence collection
and evaluation
Management Control: System Development
Management Control
 Approach of system development
 Normative Model of the System development
 System Development Life-Cycle (SDLC)
 Sociotechnical Design Approach
 Political approach
 Prototyping approach
 Contingency approach
 Evaluation the major phases in the System development process
 Problem/opportunity definition
 Management of the change process
 Entry and feasibility assessment
 Analysis of the existing system
 Formulating strategic requirements
 Organizational and job design
 Information Processing system Design
Management Control: System Development
Management Control
 Approach of system development
 Normative Model of the System development
 System Development Life-Cycle (SDLC)
 Sociotechnical Design Approach
 Political approach
 Prototyping approach
 Contingency approach
 Evaluation the major phases in the System development process
 Problem/opportunity definition
 Management of the change process
 Entry and feasibility assessment
 Analysis of the existing system
 Formulating strategic requirments
 Organizational and job design
 Information Processing system Design
Management Control: Programming
Management Control
• Is responsible for programming new system, maintaining old systems and
providing general system supports software
• Discusses major phases in the program life cycle and the important control should
be exercised in the each phase.
• Program development life cycle
• Planning
• Control
• Design
• Coding
• Testing
• Operation and maintenance
• Organizing Programming Team
• Chief Programmer Teams
• Adaptive team
• Controlled-decentralized teams
• Managing the system programming group
Management Control: Data Administration
Control
• Responsible for addressing planning and controls issue in relation to use an
organization data
• Motivation toward the Data Administrator and Database Administrator Roles
• Function of DA and DBA
• Defining, creating, redefine, and retiring data
• Making the database available to users
• Informing and servicing users
• Maintaining database integrity
• Monitoring operation
Management Control: Data Administration
Control
• Some Organization Issues
• Placement of the DA and DBA
• Effect of decentralization of the IS Function
• Data repository System
• Basic function of DRs
• Some problem with DRs
• Audit Aspect of a DRs
• Control over DA and DBA
• Some exposure
• Some Remedial Measure
Management Control: Quality assurance
Management
 Responsible for ensuring information system development,
implementation, operation, and maintenance conform to establish
quality standard.
 Motivation of QA role
 QA function
 Developing Quality goals
 Developing, promulgating and maintenance standard for the IS Function
 Monitoring Compliance with QA standard
 Identifying area for improvement
 Reporting to Management
 Training in QA standards and procedures

IS Constrol and AUdit, ROn Weber. CISA review Manual, ISACA,


9/28/11 19
2003
Management Control: Quality assurance
Management
 Responsible for ensuring information system development,
implementation, operation, and maintenance conform to establish
quality standard
 Organizational Consideration
 Placement of the QA Function
 Staffing the QA function
 Relationship between QA and Auditing

IS Constrol and AUdit, ROn Weber. CISA review Manual, ISACA,


9/28/11 20
2003
Management Control: Security Management
Controls
 Responsible for access control and physical security over the IS
function.
 Conducting security programs
 Preparation of a project plan
 Identification of asset
 Threats identification
 Exposure analysis
 Control adjustment
 Report preparation
Management Control: Security Management
Controls
 Responsible for access control and physical security over the IS function.
 Major security threats and remedial measures
 Fire damage
 Water damage
 Energy variations
 Structural damage
 Pollution
 Unauthorized intrusion
 Viruses and worm
 Misuse of software, data, and services
 Hacking
 Control of last resort
 Disaster Recovery planning
 Insurance
Management Control: Operation
Management
 Responsible for planning and controlling of the day-to-day operations of IS
 Computer operation
 Operation controls
 Scheduling Control
 Maintenance control
 Network Operation
 Wide Area Networks control
 Local Area Network Control
 Data preparation and entry
 Production control
 Input/output Control
 Job scheduling control
 Management of service-level agreement
 Transfer/pricing charge out control
 Acquisition of consumable
Management Control: Operation
Management
 Responsible for planning and controlling of the day-to-day operations of IS
 File Library
 Storage of storage media
 User of storage media
 Maintenance and disposal of storage media
 Location of storage media
 Documentation and program library
 Help desk technical support
 Capacity planning and performance monitoring
 Management of outsource operation
 Financial viability of the outsourcing Vendor
 Compliance with the outsourcing contract’s term and condition
 Reliability of outsourcing vendor's control
 Outsource disaster recovery planning
Management Control: Operation
Management
 Responsible for planning and controlling of the day-to-day operations of IS

Assessing information technology risk
 It is more likely auditor evaluate management control before
application controls.
 After evaluate a management control, auditor usually do not have to
evaluate it again because it should function all across all applications.
 e.g if auditors find that an organization enforces high quality of
documentation standards, it is likely they will have review the quality
of documentation for each application system

IS Constrol and AUdit, ROn Weber. CISA review Manual, ISACA,


9/28/11 26
2003
Identify information technology controls
• Preventive Control
• Instructions are placed on a source document to prevent clerks from
filling it out incorrectly. Notes that the control work only if the
instructions are sufficient clear and the clerks is sufficient trained to
understand the instruction. Both the clerks and instructions are
components of the system that contribute the control. The instruction
themselves are not the control

IS Constrol and AUdit, ROn Weber. CISA review Manual, ISACA,


9/28/11 27
2003
Nature Detective
of Controls
Control
 An input program identifies incorrect data
entered in a system via terminal, again the
control is a system because part of the program
must work together to pinpoint errors
 Corrective Control
 A program uses specials codes that enable it to
correct data corrupted with error-correcting to
rectify the error

IS Constrol and AUdit, ROn Weber. CISA review Manual, ISACA,


9/28/11 28
2003
Assessing information technology risk

 To asses the level of control risk associated with a segment of


the audit, auditors consider the reliability of both
management and application controls.
 Auditors usually identify and evaluate control in management
subsystem first. Management (subsystem) control are
fundamentals controls because they cover all application
system
 The absence of management control is a serious concern for
auditor

IS Constrol and AUdit, ROn Weber. CISA review Manual, ISACA,


9/28/11 29
2003
Assessing information technology risk
 System Development Management
 Responsible for the design, implementation and maintenance of
application systems
 Programming management
 Is responsible for programming new system, maintaining old systems and
providing general system supports software

IS Constrol and AUdit, ROn Weber. CISA review Manual, ISACA,


9/28/11 30
2003

You might also like