Group 5
Group 5
of an organization’s objectives in
operational effectiveness and
efficiency, reliable financial
reporting, and compliance with
laws, regulations and policies.
It comprises policies, practices, and
procedures employed by the organization
to achieve four broad objectives:
To safeguard assets of the organization;
Information &
Communication
Segregation of
Access Control
Duties
❑ SEGREGATION OF DUTIES
One of the most important control
activities to minimize incompatible functions
of employees’ duties.
❑ SUPERVISION
In small organizations or in functional
areas that lack sufficient personnel, management
must compensate for the absence of segregation
controls with close supervision.
❑ ACCOUNTING RECORDS
These records capture the economic essence
of transactions and provide audit trail of
economic events.
❑ ACCESS CONTROL
Ensure that only authorized personnel have
access to the firm’s asset. Unauthorized access
exposes assets to misappropriation, damage and
theft.
❑ INDEPENDENT VERIFICATION
Procedures that check accounting system to
identify errors and misrepresentations. Through
these, management can assess the performance of
individuals, the integrity of the transaction
processing system and the correctness of data
contained in accounting records.
General controls begin with a security policy, a
comprehensive plan that helps protect an enterprise
from both internal and external threats.
1. Integrated Security for the Organization
Physical security refers to any measures that an
organization uses to protect its facilities,
resources, or its proprietary data that are stored
on physical media.
Logical security uses technology to limit access to
the organization’s systems and information to only
authorized individuals.
PHYSICAL CONTROLS LOGICAL CONTROLS
❑ facility monitoring (surveillance ❑ e-IDs and passwords system
systems, cameras, guards, exterior authentication
lighting) ❑ biometrics
❑ access controls to facilities/data ❑ logs of logon attempts
center/computers (biometrics, access ❑ application-level firewalls
cards) ❑ anti-virus and anti-spyware software
❑ alarm systems (fire, burglar, water, ❑ intrusion detection systems
humidity, power fluctuations) ❑ encryption for data in transit
❑ shred sensitive documents ❑ smart cards
❑ proper storage/disposal of hard drives
and other electronic storage media
❑ secure storage of backup copies of data
and master copies of critical software
2. Organization-Level, Personnel, File Security Controls
Management’s ethical values, philosophy, assignment of
authority and responsibility, and the effectiveness of
the board of directors.
Processing Output
Input Controls
Controls Controls
Processing Output
Input Controls
Controls Controls
Processing Output
Input Controls
Controls Controls