Notes Ais615
Notes Ais615
SYSTEM
There are a few reasons why treats to accounting information systems are increasing.
The first reason is that information available is to an unprecedented number of workers.
Besides, information on distributed computer networks is hard to control. Information is
often distributed among many systems and thousands of employees. Customers and
suppliers have access to each other’s systems and data.
Any potential adverse occurrence is called a threat or an event. The potentially dollar
loss from a threat is called the exposure or impact. The probability that it will happen is
called the likelihood of the threat.
Internal control is the process implemented to provide reasonable assurance that the
following control objectives are achieved. It is a process because it permeates an
organization’s activities and is an integral part of management activities. Internal
control provides reasonable assurances. Complete assurance is difficult to achieve and
prohibitively expensive.
A Harvard business professor has espoused four levels of control to help management
reconcile the conflict between creativity and controls.
● Belief system. This system describes how the company creates value and
helps the employees understand the management’s vision.
● Boundary system. This system helps employees act ethically by setting
boundaries on employee behavior.
● Diagnostic control system. This type of system measures, monitors, and
compares actual company progress to budgets and performance goals.
1
● Interactive control system. This system helps managers to focus on key
strategic issues and to be more involved in decisions.
The Foreign Corrupt Practices Act (FCPA) was passes to prevent companies from bribing
foreign officials to obtain business. In the last 75 years, the SOX is the most important
business-oriented legislation. After the SOX was passed, the SEC mandated that
management must base its evaluation on a recognized control framework. They also
must disclose all material internal control weaknesses and must conclude that a
company does not have effective financial reporting internal controls if there are
material weaknesses.
2
● Methods of assigning authority and responsibility
● Human resource standards
● External influences
Companies have a risk appetite, which is the amount of risk they are willing to accept
to achieve their goals. To avoid undue risk, the risk appetite must be in alignment with
company strategy. The more responsible management’s philosophy and operating style,
the more clearly they are communicated, the more likely employees will behave
responsibly.
The policy and procedures manual explains proper business practices, describes needed
knowledge and experience, explains document procedures, explains how to handle
transactions, and lists the resources provide to carry out specific duties. The manual
includes the chart of accounts and copies of forms and documents. It is a helpful tool
for both current employees and new employees.
One of the greatest control strengths is the honesty of the employees. Policies should
convey the required level of expertise, competence, ethical behavior and integrity
required. The following policies and procedures are important.
● Hiring
● Compensating, evaluating and promoting
● Managing disgruntled employees
● Discharging
● Vacations and rotation of duties
● Confidentiality agreements and fidelity bond insurance
● Prosecute and incarcerate perpetrators
Objective setting is the second ERM component. Management determines what the
company hopes to achieve, often referred to as the corporate vision or mission. The
company determines what must go right to achieve the objectives and establishes
performance measures to determine whether they are met.
3
● Strategic objectives
● Operation objectives
● Reporting objectives
● Compliance objectives
Inherent risks exists before management takes any steps to control the likelihood or
impact of an event.
The residual risk is what remains after management implements internal controls or
some other response to risk. Companies should assess inherent risk, develop a
response, and then assess residual risk.
Accountants and systems designers help management design effective control systems
to reduce inherent risk. They also evaluate internal control systems to ensure that they
are operating effectively.
One way to estimate the value of the internal controls involves the expected loss, the
mathematical product of impact and likelihood.
The value of a control procedure is the difference between the expected loss with the
control procedure and the expected loss without it.
Control activities are policies and procedures that provide reasonable assurance that
control objectives are met and risk responses are carried out. It is management’s
responsibility to develop a secure and adequately controlled system.
Controls are much more effective when placed in the system as it is built, rather than
as an afterthought. Managers need to involve systems analysts, designers, and end
users when designing computer-based control systems.
4
● Change management controls
● Design and use of documents and records
● Safeguarding assets, records and data
● Independent checks on performance
Because management lacks the time and resources to supervise each company activity
and decision, it establish policies for employees to follow and then empowers them.
This empowerment, called authorization, is an important control procedure.
Authorization are often documented by signing, initializing, or entering an authorization
code on a document.
Computer systems can record a digital signature, a means of signing a document with
data that cannot be forged.
Good internal control requires that no single employee be given too much responsibility
over business transactions and processes. An employee should not be in a position to
commit and conceal fraud. Segregation of duties is discussed in two separate sections:
segregation of accounting duties and segregation of system duties.
Effective segregation of accounting duties is achieved when the following functions are
separated (see also figure 7.3 on page 217).
5
● Computer operations: run the software on the company’s computers.
● Information system library: maintains custody of corporate databases, files
and programs in a separate storage area.
● Data control
Independent checks on performance, done by someone other than the person who
performs the original operation, help ensure that transactions are processed accurately.
They include the following:
6
● Double-entry accounting.
● The maximum that debits equal credits provides numerous opportunities for
independent checks.
● Independent review.
● After a transaction is processes, a second person reviews the work of the
first, checking for proper authorization etc.
Information and communication constitute the seventh component of the ERM and is
also a very important component in the accounting information system. This relates
directly to the primary purpose of an AIS, which is to gather, record, process, store,
summarize, and communicate information about an organization.
An audit trail allows transactions to be traced back and forth between their origination
and de financial statements.
This involves training and assisting employees, monitoring their performance, correcting
errors, and overseeing employees who have access to assets.
7
The business software alliance (BSA) tracks down and fines companies that violate
software license agreements. The increasing number of mobile devices should be
tracked and monitored, because their loss could represent a substantial exposure.
8
CHAPTER 11: CONTROLS FOR INFORMATION SECURITY
See figure 8.1 on page 240 for the COBIT framework. It shows the business and
governance objectives. The information for the management has several requirements:
Information must satisfy the seven criteria listed above. The processes to achieve this
are grouped into four basic management activities, also called domains.
COBIT specifies 210 detailed control objectives for these 34 processes to enable
effective management of an organization’s information resources. It also describes
specific audit procedures for assessing the effectiveness of those controls and suggest
metrics that management can use to evaluate performance.
The ‘Trust Service Framework’ is not a substitute for COBIT, because it addresses only a
subset of the issues covered by the COBIT.
The ‘Trust Service Framework’ classifies information systems controls into five
categories that most directly pertain to systems reliability:
● Security
● Confidentiality
● Privacy
9
● Processing integrity
● Availability
The objective of time-based model of security can be expressed in a formula that uses
the following three variables.
P = the time it takes an attacker to break through the organization’s preventive controls
If P > D + C, then the organization’s security procedures are effective. If its otherwise,
then the procedures are not effective. The time-based model of security provides a
means for management to identify the most cost-effective approach to improving
security by comparing the effects of additional investment in preventive, detective, or
corrective controls.
1. Conduct reconnaissance.
2. The goal is to learn as much as possible about the target and to identify
potential vulnerabilities.
3. Attempt social engineering
4. Social engineering takes place when attackers try to use the information
obtained during their initial reconnaissance to ‘trick’ an unsuspecting
employee into granting them access. Social engineering attacks often take
place over the telephone.
5. Scan and map the target.
10
6. Research
7. Execute the attack
8. Cover tracks
Preventive controls
● Training. People play a critical role in information security and that is why
employees must understand and follow the organization’s security policies.
Thus, training is a critical preventive control. All employees should be taught
why security measures are important and need to be trained to follow safe
computing practices. Training is especially needed to educate employees
about social engineering attacks. Employees also needed to be trained not to
allow other people to follow them through restricted access entrances. We
call this social engineering attack piggybacking. It can take place both at the
main entrance to the building but also at any internal looked doors.
● User access controls
● Physical access controls
● Network access controls
● Device and software hardening controls
Authentication controls restrict who can access the organization’s information system.
Authentication is the process of verifying the identity of the person or device attempting
to access the system. The objective is to ensure that only legitimate users can access
the system. There are three methods of verifying a person’s identity:
None of the three basis authentication credentials, by itself, is fool proof. The use of two
or all types in conjunction is called the multifactor authentication process. It is quite
effective. Using multiple credentials of the same type, a process is referred to as
multiple authentication. It can improve security.
11
Authorization controls limit what those individuals can do once they have been granted
access. Authorization is the process of restricting access of authenticated users to
specific portions of the system and limiting what actions they are permitted to perform.
Authorization controls are often implemented by creating an access control matrix.
When an employee attempts to access a particular information systems resource, the
system performs a compatibility test that matches the user’s authentication credentials
against the access control matrix to determine whether that employee should be
allowed to access the resource and perform the requested action.
The demilitarized zone (DMZ) is a separate network that permits controlled access from
the internet to selected resources. The border router and the firewall acts as filters to
control which information is allowed to enter and leave the organization’s information
system.
The transmission control protocol (TCP) specifies the procedures for diving files and
documents into packets to be sent over the internet and the methods for reassembly of
the original document or file at the destination.
The internet protocol (IP) specifies the structure of those packets and how to route
them to the proper destination.
Special-purpose devices called routers are designed to read the destination address
fields in IP packet headers to decide where to send (route) the packet next.
A set of rules, called an access control list (ACL), determine which packets are allowed
entry and which are dropped. Border routers typically perform static packet filtering,
which screens individual IP packets, based solely on the contents of the source and/or
destination fields in the packet header.
Deep packet inspection is a process of examining the data contents of a packet. The
added control comes at the cost of speed. It takes more time to examine the body of an
IP packet. Deep packet inspection is the heart of a new type of security technology
called intrusion prevention systems (IPS) that monitors patterns in the traffic flow,
12
rather than only inspecting individual packers, to identify and automatically block
attacks. An IPS consists of a set of sensors and a central monitor unit that analyses the
data collected. Sensors must be installed in several places to effectively monitor
network traffic. IPSs use several different techniques to identify undesirable traffic
patterns.
13
code. Therefore, programmers must be trained to treat all input from
external users as untrustworthy and to carefully check it before performing
further actions.
Detective controls
Preventive controls are never 100% effective in blocking all attacks. The COBIT control
objective stresses that organizations need to implement detective controls. Detective
controls enhance security by monitoring the effectiveness of preventive controls and
detecting incidents in which preventive controls have been successfully circumvented.
There are four types of detective controls.
Log Analysis
most systems come with extensive capabilities for logging who accesses the system
and what specific actions each user performed. A log analysis is the process of
examining logs to identify evidence of possible attacks. These logs form an adit trail of
system access. It is important to analyse logs of failed attempts to log on a system and
failed attempts to obtain access specific information resources. It’s also important to
analyse changes to the logs themselves and logs need to be analysed regularly to
detect problems in a timely manner.
Managerial Reports
It is really important that the management monitors and evaluates both system
performance and controls. The COBIT framework provides management guidelines that
identify critical success factors associated with each control objective and suggest key
performance indicators.
Security Testing
14
A penetration test is an authorized attempt by either an internal audit team or an
external security consulting firm to break into the organization’s information system.
This test provide a more rigorous way to test the effectiveness of an organization’s
information security.
Corrective controls
Organizations also need procedures to undertake timely corrective actions. Many
corrective actions rely on human judgment. Their effectiveness depends on a great
extent on proper planning and preparation.
Patch Management
once a vulnerability has been identified, the next step is to explore and document how
to take advantage of it to compromise a system. The set of instructions for taking
advantage of a vulnerability is called an exploit. Once an exploit is published on the
internet it can be easily used by anyone who runts that code.
Virtualization takes advantage of the power and speed of modern computers to run
multiple systems simultaneously on one physical computer.
15
Cloud computing takes advantage of the high bandwidth of the modern global
telecommunication network to enable employees to use a browser to remotely access
software, data storage devices, hardware and entire application environments.
Virtualization and cloud computing alter risk of some information security threats, but
they also offer the opportunity to significantly improve overall security.
16
CHAPTER 12: CONFIDENTIALITY & PRIVACY CONTROLS
This chapter covers two other important principles of reliable systems in the thrust
services framework: preserving the confidentiality of an organization’s intellectual
property and protecting the privacy of personal information it collects from customers.
We also discuss the topic of encryption in detail because it is a critical tool to protecting
both confidentiality and privacy.
The first action is the identification and classification of information to be protected. The
first step is to identify where such information resides and who has access to it. This
sounds easy, but it’s harder than you think. It is time-consuming and costly, because it
involves examining more than just the contents of the organization’s financial system.
The next step is to classify the information in terms of its value to the organization.
Encryption is an important and effective tool to protect confidentiality. It is the only way
to protect information in transit over the internet. Encryption is not a panacea. Some
sensitive information may not be stored digitally and therefore cannot be protected by
being encrypted. Strong authentication is needed, so that no one else can prove access
to the computer. Physical access controls are also needed. Sensitive information is
exposed in plain view whenever it is being processed by a program, displayed on a
monitor of included in printed reports. Protecting confidentially requires application of
the principle of defense-in-depth: supplementing encryption with access controls and
training.
The third actions is to use Information rights management (IRM) software. This
software provides an additional layer of protection to specific information resources
offering the capability not only to limit access to specific files or documents, but also to
specify the actions that individuals can perform (read, copy, print, download to USB
devices etc.).
17
Today, organizations constantly exchange information with their business partners and
customers. Therefore, protecting confidentiality also requires controls over outbound
communications. One tool for accomplish that is data loss prevention (DLP) software.
This software works like antivirus programs in reverse, blocking outgoing messages that
contain key words or phrases associated with the intellectual property or other sensitive
data the organization wants to protect.
The last action is training, which is arguably the most important control for protecting
confidentiality. Employees need to know what information they can share with outsides
and what information needs to be protected. They also need to be taught how to
protect these confidentiality data. For example, know how to use encryption software.
They also should be aware of the fact they always need to log out before leaving a
laptop or workstation unattended.
Privacy
The ‘Trust Services Framework’ privacy is closely related to the confidentiality principle.
They only differ in that it focus on protecting personal information about customers
rather than organizational data. the controls that need to be implemented to protect
privacy are the same ones used to protect confidentiality.
The first step is to protect the privacy of personal information collected from customers
to identify what information is collected, where it is stored, and who has access to it.
Furthermore, it is important to implement controls to protect that information because
incidents involving the unauthorized disclosure of customers’ personal information,
whether intentional or accidental, can be costly.
To protect privacy, organizations should run data masking programs. This kind of
programs replace customers’ personal information with fake values before sending that
data to the program development and testing system.
Organizations also need to train employees on how to manage and protect personal
information from customers. This is especially important for medical and financial
personal information.
18
Two major privacy related concerns are spam and identity theft.
Spam is unsolicited e-mail that contains either advertising or offensive content. Spam is
a privacy related issue, because recipients are often targeted as a result of
unauthorized access to e-mail address lists and databases containing personal
information. Spam is also a source of many viruses, worms, spyware programs, and
other types of malware. There are a few key provisions. The sender’s identity must be
clearly displayed in the head of the message. The subject in the field in the header
must be clearly identify the message. The body of the message must provide recipients
with a working link that can be used to opt out of future e-mail. The body of the
message must also include the sender’s valid postal address. At last, organizations
should not send commercial e-mail to randomly generated addresses.
Identity theft on the other hand is the unauthorized use of someone’s personal
information for the perpetrator’s benefit. Identity theft is often a financial crime.
Perpetrators obtain loans or opens new credit cards in the victim’s name and sometimes
loots the victim’s bank accounts. A growing portion of identity theft cases involve
fraudulently obtaining medical care and services, which can have life threatening
consequences.The Generally Accepted Privacy Principles (GAPP) identifies and defines
the following ten internationally recognized best practices for protecting the privacy of
customer’s personal information.
19
described in the organizations privacy policies and only to third parties who
provide the same level of privacy protection.
8. Security. An organization must take reasonable steps to protect its
customers’ personal information from loss or unauthorized disclosure. The
organization must use the preventive, detective and corrective controls to
restrict access to this personal information.
9. Quality. Organizations should maintain the integrity of their customers’
personal information and employ procedures to ensure that it is reasonably
accurate.
10.Monitoring and enforcement. An organization should assign one or more
employees to be responsible for ensuring compliance with its stated privacy
policies. They must periodically verify that their employees are complying
with stated privacy policies.
Encryption is a preventive control that can be used to protect both confidentially and
privacy. Encryption protects data that is being sent over the internet and it provides one
last barrier that must be overcome by an intruder who has obtained unauthorized
access to stored information. Accountants, auditors and system professionals should
understand encryption.
So encryption is the process of transforming normal content, called plain text, into
unreadable gibberish, called cipher text. See figure 9.1 on page 278 for the steps in the
encryption and decryption process.
Decryption reverses this process, transforming cipher text into plaintext. Both involve
use of a key and an algorithm. Computers represent both as a series of binary digits
(0s and 1s).
The algorithm is a formula for combining the key and the text.
Most documents are longer than the key, so the encryption process begins by dividing
the plaintext into blocks, each block being of equal length to the key. Then the
algorithm is applied to the key and the block of plaintext.
● Key length: longer keys provide stronger encryption by reducing the number
of repeating blocks in the cipher text. This makes it harder to spot patterns
in the cipher text that reflect patterns in the original plaintext.
● Encryption algorithm: the nature of the algorithm used to combine the key
and the plaintext is important. A strong algorithm is difficult to break by
using brute force guessing techniques.
● Policies for managing cryptographic keys. No matter how long the keys are,
or how strong an encryption algorithm is, if the keys have been
20
compromised, the encryption can be easily broken. There is also a process
called key escrow. This process involves making copies of all encryption keys
used by employees and storing those copies securely.
There are two basic types of encryption systems. The first one is symmetric encryption
systems. This type use the same key both to the encrypt and decrypt. The other type is
the asymmetric encryption system, which uses two keys. One is called the public key.
This key is widely distributed and available to everyone. The other one is called the
private key and is kept secret and known only to the owner of that pair of keys.
Symmetric encryption is much faster than asymmetric encryption, but it has two major
problems. First, both parties need to know the shared secret key. This means that the
two parties need to have some method for securely exchanging the key that will be
used to both encrypt and decrypt.
The second problem is that a separate key needs to be created for use by each party
with whom the use of encryption is desired.
Asymmetric encryption systems solve these problems. It does not matter who knows
the public key, because any text encrypted with it can be decrypted only by using the
corresponding private key.
Hashing is a process that takes plaintext of any length and transforms it into a shirt
code, called a hash. Hashing differs from encryption in two important aspects. The first
one is that encryption always produces cipher text similar in length to the original
plaintext, but hashing always produces a hash that is of a fixed short length, regardless
of the length of the original plaintext.
The second difference is that encryption is reversible, but hashing is not. Given the
decryption key and the algorithm, cipher text can be decrypted back into the original
plaintext. By hashing, it is not possible to transform a hash back into the original
plaintext, because hashing throws away information.
Hashing Encryption
21
One-way function (cannot reverse or unhash) Reversible (can decrypt back to plaintext)
An important issue for business transactions has always been nonrepudiation, or how to
create legally binding agreements that cannot be unilaterally repudiated by either party.
The answer is to use both hashing and asymmetric encryption to create a digital
signature. A digital signature is a hash if a document or a file that is encrypted using
the document creator’s key.
A digital certificate is an electronic document that contains an entity’s public key and
certifies the identity of the owner of that particular public key. Digital certificates
functions like the digital equivalent of a driver’s licence or passport.
A certificate authority is a trusted independent party, like the government, that issue
the passports and driving licences and contain the certificate authority’s digital
signature to prove that they are genuine.
The system for issuing pairs of public and private keys and corresponding digital
certificates is called a public key infrastructure (PKI). The entire PKI system hinges on
trusting the certificate authorities that issue the keys and the certificates.
Encrypting information while it traverses the internet creates a virtual private network
(VPN), so named because it provides the functionality of a privately owned secure
network without the associated costs of leased telephones, satellites, and other
communication equipment.
See figure 9.4 on page 284 for the virtual private networks.
22
CHAPTER 13: PROCESSING INTEGRITY & AVAILABILITY
CONTROLS
This chapter addresses the remaining two principles of the reliable system: processing
integrity and availability.
The processing integrity principle of the Trust Services Framework states that a reliable
system is one that produces information that is accurate, complete, timely, and valid.
See table 10.1 for the application controls discussed in the COBIT framework to ensure
processing integrity. It requires controls over the input, processing, and output of data.
Input Controls
Forms designs, cancellation and storage of source documents, and automated data
entry controls are needed to verify the validity of input data.
Source documents and other forms should be designed to minimize the chances for
errors and omissions. Two particularly important forms are:
Source documents that have been entered into the system should be cancelled so they
cannot be inadvertently of fraudulently re-entered into the system. Electronic
documents can be similarly ‘cancelled’ by setting a flag field to indicate that the
document has already been processed. Cancellation does not mean disposal.
Source documents should be scanned for reasonableness and propriety before being
entered into the system.
● Field check determines whether the characters in a field are of the proper
type.
● Sign check determines whether the data in a field have the appropriate
arithmetic sign.
● Limit check tests a numerical amount against a fixed value.
● Range check tests whether a numerical amount falls between predetermined
lower and upper limits.
● Size check ensures that the input data will fit into the assigned field.
23
● Completeness check on each input record determines whether all required
data items have been entered.
● Validity check compares the ID code or account number in transaction data
with similar data in the master file to verify that the account exists.
● Reasonableness test determines the correctness of the logical relationship
between two data items.
● Check digit is computed from other digits. The system could assign each
new employee a nine-digit number then calculate a tenth digit from the
original nine and append that calculated number to the original nine to form
a ten-digit ID number.
Processing controls
24
Controls are also needed to ensure that data is processed correctly. There are a few
processing controls.
Output controls
● User review of output. Users should carefully examine system output to
verify that it is reasonable, that it is complete, and that they are intended
recipients.
● Reconciliation procedures. Periodically, all transactions and other system
updates should be reconciled to control reports, file status/update reports,
or other control mechanisms.
● External data reconciliation. Database totals should periodically be
reconciled with data maintained outside the system.
● Data transmission controls. Organizations also need to implement controls
designed to minimize the risk of data transmission errors. There are two
common data transmission controls.
25
○ Checksums. When data are transmitted, the sending device can
calculate a hash of the file. We call this a checksum. The receiving
device performs the same calculation and sends the result to the
sending device.
○ Parity bits. Computers represent characters as a set of binary digits,
called bits. A parity bit is an extra digit added to the beginning of
every character that can be used to check transmission accuracy.
Two basic schemes are referred to as even parity and odd parity.
The receiving device performs parity checking.
Availability
Interruptions to business processes due to the unavailability of systems or information
can cause significant financial losses. The primary objective is to minimize the risk of
system downtime. Another objective is quick and complete recovery and resumption of
normal operations.
26
● Disaster recovery plan (DRP)
● Business continuity plan (BCP)
The recovery point objective (RPO) represents the maximum amount of data that the
organization is willing to potentially lose.
The recovery time objective (RTO) represents the length of time that the organization is
willing to attempt to function without its information system.
Real-time mirroring involves maintaining two copies of the database at two separate
data centers at all times and updating both copies in real-time as each transaction
occurs.
1. An incremental backup involves copying only the data items that have
changed since the last partial backup.
2. A differential backup copies all changes made since the last full back up.
A business continuity plan (BCP) specifies how to resume not only IT operations, but all
business processes, including relocating to new offices and hiring temporary
replacements, in the event that major calamity destroys not only an organization’s data
center but also its main headquarters. Having both a DRP and a BCP can mean the
difference between surviving a major catastrophe.
Change control is the formal process used to ensure that modifications to hardware,
software, or processes do not reduce system reliability. Good change control often
results in overall better operating performance: careful testing prior to implementation
reduces the likelihood of making changes that cause system downtime, and thorough
documentation facilitates quicker ‘trouble shooting’ and resolution of any problems that
do occur. Companies with a good change control process are also less likely to suffer
financial or reputational harm from security incidents.
27
● All changes requests should be documented and follow a standardized
format that clearly identifies the nature of the change, the reason for the
request, the date of the request, and the outcome of the request.
● All changes should be approved by appropriate levels of management.
● To assess the impact of the proposed change on all five principles of systems
reliability.
● All documentation should be updated to reflect authorized changes to the
system.
● Emergency changes or deviations from standard operating policies must be
documented and subjected to a formal review and approval process as soon
after the implementation as practicable. All emergency changes need to be
logged to provide an audit trail.
● Backout plans need to be developed for reverting to previous configurations
in case approved changes need to be interrupted or abandoned.
● User rights and privileges must be carefully monitored during the change
process to ensure that proper segregation of duties is maintained.
28