0% found this document useful (0 votes)
41 views

General Computer Controls Module 2013

The document discusses general computer controls for an accounting course. It begins by introducing the topic and defining general computer controls. It then describes different types of online computer systems and controls that should be implemented in a computerized environment, including controls over system development and implementation, system maintenance, access controls, and business continuity. The document provides definitions, explanations, and examples of different general computer controls.

Uploaded by

44v8ct8cdy
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views

General Computer Controls Module 2013

The document discusses general computer controls for an accounting course. It begins by introducing the topic and defining general computer controls. It then describes different types of online computer systems and controls that should be implemented in a computerized environment, including controls over system development and implementation, system maintenance, access controls, and business continuity. The document provides definitions, explanations, and examples of different general computer controls.

Uploaded by

44v8ct8cdy
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 20

UNIVERSITY OF JOHANNESBURG

DEPARTMENT OF ACCOUNTANCY
AUDIT 3A
2013

GENERAL COMPUTER CONTROLS


Index:

A PRE-READING
B INTRODUCTION
C TYPES OF ON-LINE COMPUTER SYSTEMS
D CONTROLS IN A COMPUTERISED ENVIRONMENT
E QUESTIONS RELATING TO THE TOPIC
PART A: PRE-READING
PART B: INTRODUCTION

1. INTRODUCTION OF THE TOPIC

This module introduces you to the basic concepts regarding computers and their
significance in an organisation. The more complex issues regarding computers will be
dealt with at honours level.
The use of computers is part of everyday life (as you would all know)!
This module will aim to explain the basic concepts in computers, which an audit
professional is expected to have knowledge of.

2. PRIOR KNOWLEDGE

Computers will not be new to you as you have dealt with its basic operations in BIS (2 nd
year) as well as all your other subjects.

With regards to auditing specifically you have already been introduced to general
controls, in Audit 2. This module will pick general controls from where you left it and you
will also be introduced to application controls.

It is an extremely important module as most of you will take on employment next year and
are expected to have certain knowledge about computers, risks associated with
computers and their respective controls. For those of you studying further you will study
computers at a more extensive level in your postgraduate studies.

3. RESOURCES

In order to master this topic you should make use of the following resources

3.1 Lecture attendance and consultation


3.2 Module
3.3 Question Banks
3.4 Lecture Slides
3.5 Pre-reading

4. STUDY OUTCOMES

After you have completed your studies of this topic you must be able to:

4.1 Provide definitions of computers and be able to identify these in a given


scenario.
4.2 Identify the types of controls that should be implemented.
4.3 Recommend any possible improvements to be implemented in a
computerised environment.
4.4. Be able to apply the concepts of computers to any given scenario.

5. EXAMINATION POSSIBILITIES

You can expect theory based questions that include


 Pure theory
 Practical application
 Scenario based questions
PART C: DEFINITIONS OF THE TYPES OF ON-LINE COMPUTER SYSTEMS

TYPES OF ON-LINE SYSTEMS

On-Line Entry with Real-Time Processing:

Transactions are entered via terminals, automatically authorised by the system and the
relevant files on the system are updated immediately. Thus, the transaction and the
master file are updated immediately.

On-Line Entry with Batch Processing:

Transactions are entered via a terminal, authorised and written to a transaction file. The
transaction is then updated in batch mode.

This system provides the opportunity for good control over the input and processing of
transactions ensuring the completeness and accuracy of the data through batch
(control) totals and audit trails.

It is obvious from the above that the transaction and master file in this type of system is
not updated immediately, but only after a batch has been entered correctly and is in
balance.

Shadow Processing:

A copy of the master file is used during the day and is updated continuously using on-
line entry with real time processing. The computer simultaneously creates batch files for
the day’s transactions. These batch files are used to update the original master file
overnight in batch mode.

A new copy of the master file is then made for use during the following day.

Shadow processing provides the benefits of both real time processing and batch
processing while affording better protection to the data in the original master file.

On-Line Entry with Memory Update:

Transactions are entered, authorised and written to a memory file which contains
information drawn from the master file.
This process is similar to shadow processing and insinuates that:
o Enquiries are made from the memory master file (which is fully up to date);
o The original master file is updated at a later stage from the transaction files.
On-Line Enquiry Facilities:

Users are limited to enquiry of information on master files which are updated from other
systems.

On-Line Downloading/Uploading:

This involves data being downloaded from a master file onto an intelligent terminal such
as a personal computer. This data can then be updated & uploaded to another
computer e.g. The mainframe computer.
PART D: CONTROLS IN A COMPUTERISED ENVIROMENT

GENERAL CONTROLS DEFINITION:

General controls are those which establish an overall framework of control for computer
activities. They are controls which should be in place before any processing of
transactions gets underway and they span across all applications.

OVERALL FRAMEWORK OF GENERAL COMPUTER CONTROLS:

The following framework is an outline of the controls to be covered in this module.


These controls will be discussed in detail throughout the module.

General Computer Controls


1. System Development and Implementation Controls
2. System maintenance Controls (Change Controls)
3. Organisational and Management Controls
4. Access Controls to Data and Programs
5. Computer Operating Controls
6. System Software Controls
7. Business Continuity Controls

UNDERSTANDING THE GENERAL CONTROL ENVIRONMENT

1. Systems Development & Implementation Controls

o Objective: To ensure self-developed/purchased system properly developed,


authorised and meet user’s needs.

These are the controls in place over the actual development of a new system the entity
intends on using. This could be a purchased package or a system developed in-house.
In a question, you need to ensure that you know what type of system you are dealing
with to ensure that you suggest the relevant controls. Examples of the types of controls
over the development of a system in-house include, but are not limited to the following:

o The client should develop a system with a clear view of its strategic business plan to
ensure that the system will aid the process of achieving the business objectives;
o A steering committee should conduct a feasibility study and define the selection
criteria;
o Projects should be authorised after analysing the users’ needs and performing a
proper systems analysis;
o Project authorisation & management;
o System design and programming standards;
o Testing of new system;
o Conversion to new system.

Please take note of the following controls over a self-developed system:

1. Project authorisation and management


o Development plan authorized
o Steering committee
 Made up of senior management from both user and computer
departments

o Steering committee must ensure that :


 Project authorized
 Timetables are adhered to
 Budgets are achieved
 Quality requirements

o Involvement from :
o User department
 Departmental requirements
 Internal / external auditors

o Data processing department


 Technical soundness
 Compatibility with other systems
 Operational aspects

o Quality control department


 Standard of design
 Testing
 Documentation

o Perform feasibility study


 Buy / self-developed
 Cost / benefit analysis

o Project team
 Day to day management of project
 Ensure project is developed in stages
 Prepare timetables for each stage

o Project authorized after feasibility study/analysis before commence


2. System specification & user needs

o Definition
 Defining the way the system must work
 To meet the specification of users and business

Two methods of specifying systems


o Traditional method
 Written systems specification by means of discussions between the
data processing department and users
o Prototype systems
 Design prototype
 User department try out
 Refine the design through a series of prototypes

3. System design and programming standards

o System design and programming standards needed to :


 Ensure system interacts properly with existing systems and system
software;
 Ensure that appropriate control-related programmed procedures are built
in;
 Ensure there is supervision over system design;
 Comply with predetermined standards;
 Done on program library not live data.

4. Testing

Testing of in-house systems should be carried out in 3 stages

4.1 Program testing


o Checking the logic of the program to their specs
o Methods used :
 Test data
 Desk checking (program code analysis)

4.2 System testing


o Ensure the logic of various individual programs links together to form a
system in line with the detailed system description
o Methods used
 Test data
 User testing
4.3 Live testing
o Tested under operational conditions
 Parallel running
 Pilot running
o Parallel running
 New system in parallel with old system
 Problem : cost of double processing, difficulty of comparison (e.g.
additional info)
o Pilot running
 Introduce system for only small portion

Take note of the following controls over a purchased package:

Purchased package:

Important information to consider when purchasing a package:

o Package must meet user requirements


 Prepare statement of requirements
 Measure available packages against requirements

o Keep in mind :
 Minimum changes should be made to package
 If modifications is necessary, use normal rules i.r.o system development
 Possibility of future amendments (e.g. tax updates)
 Quality of maintenance service from supplier

The above information has to be applied to the selection of a package and the
implementation of a package. This can be done as follows:

1. Specification and selection of package

o Discussions with other users


o Observing operation of package
o Questioning other users of package re:
 Facilities offered by program
 Freedom from program errors
 Speed & efficiency
 Ease of use
 Quality of support

2. Implementation and testing of package


o Testing
o Independent testing
o Review of experiences of other users

o Implementation
o Involvement of:
 User departments
 Data processing
 Management
 Quality assurance

Advantages of purchased systems:

o Less implementation time (immediate implementation)


o Lower cost and cost is predetermined
o Tested thoroughly – thus very reliable

Disadvantages of purchased systems:

o Dependent on vendors for maintenance


o Too general /inflexible to cater for needs
o Change maintenance difficult/impossible
o Written overseas (Vat and Tax differs)

A conversion from an old system to a new system often takes place an


organisations, thus it is important to implement controls for these conversions.

Controls during conversion to the new system (self-developed /


purchased)

o Planning and preparation


 Prepare timetables for conversion
 Define methods used (e.g. parallel / pilot)
 Determine cut-off dates
 Prepare data files for conversion (e.g. Standing data)
 Training of staff
 Balance files on old system
 Prepare premises (constant power / air-con)

o Control over conversion of data by data control group


 Supervision by senior management
 Auditor involvement

o Update system documentation


 System flowcharts
 System descriptions
 Operating manuals

o Testing
 Balancing old files with new files
 Third party confirmations
 Follow up of exception reports
 Comparison with data run on old system (parallel)
 Manual comparison of data
 Approval by users

o Backup of new system


o Post-implementation review

2. System Maintenance Controls/ System Change Controls

o Objective: To ensure changes to system is authorised, meet user’s needs and


made effectively.

These controls exist to ensure that any maintenance that takes place on the newly
developed system is done accurately and in accordance with the requisite level of
authority. The changes would be made to ensure that the system meets the needs
of the users. Some examples of these types of controls are:

o Change forms are to be pre-numbered and locked away when not required;
o Any change requests made by the users of the system must be approved by the
Line Manager of the user and a reason as to why the change is necessary must
be provided;
o All change forms need to be signed by Management or the Computer Steering
Committee prior to the change being effected;
o After the change has been made, an IT expert is to test the change to determine
if it has been made as per the approved change request and is working
effectively.

o Completeness of changes
o To ensure all approved requests for changes are processed
o Achieved by:
 Pre-numbered change request forms
 Do regular sequence checks; or
 Enter change forms in a register
 Outstanding requests reviewed by senior official

o Validity of changes
o Requests should be approved by correct level of authority depending on
importance
o User requirements
o Reviewed by data processing department
o Documented
3. Organisational & Management Controls

o Objective: Organisational framework such as segregation of duties (SOD),


supervision and review and virus protection

These controls would be implemented to ensure that an organisational framework


over the computerised information system (CIS) activities is in place, and to ensure
that the basic principles of segregation of duties, review and virus protection are
met. Examples of these types of controls include, but are not limited to the following:

o Computer department is to be represented on the Board of Directors;


o CIS manager should report to senior management;
o Top Management should be committed to controls and to implement
management controls such as establishing an Internal Audit department.
o Computer steering committee set IT policies and exercise control over IT
activities
o CIS manager reports directly to senior management
o Staff practices/ processing
 the rotation of operator duties
 system development staff not assigned to operator duties
 at least two operators per shift(scheduling of staff)
 staff take regular leave
o Employment practices
 training of staff and career development
 supervision and review

Segregation of duties

o Functional
 Separate CIS Department
o Operational
 SOD between:
 System analysts
 Programmers
 Operators
o Normal SOD between:
 Transaction initiation
 Authorisation
 Processing
 Safeguarding
o Independent person must correct errors

Controls against computer viruses

o Software protection
 Software purchases from reputable suppliers
 Take care with use of “free” of “public domain” programs
 Do not lend out program disks
 Do not boot up from a disk
 Do not use illegal copies

o Data file protection


 Install virus detection software
 Test data files for viruses before use
 Regular backups
 Keep disks on write protect

o Staff
 Inform staff members against dangers
 Train users of microcomputers
 Reporting procedures in case of infection
 Limit the use of microcomputers to authorized staff

o Supervision and review


 By CIS manager, divisional managers, section heads
 System investigations by internal and external audit

4. Access Controls to Data & Programs

o Objective: To prevent unauthorised changes to programs, data, terminals &


files.

As the name suggests, these controls would ensure that access to and editing of
data and programs should be restricted to only those users who have the authority
to use the data. Examples of these types of controls include:

o Passwords are to be changed regularly and must be alphanumeric;


o Passwords are to be kept confidential;
o User matrixes must exist in order to restrict database information to the users
on a least privileges basis;
o The terminal should shut down after 3 unsuccessful log-in attempts and
generate an exception report for management to review & investigate.

Programmed controls
o Terminals
 TINS (Terminal identification numbers)
 Limited access to system (to specific applications)
 Automatic log off after 5 minutes of non-use
 Shut down after 3 unsuccessful login attempts
 Limited to 1 workstation log on
 Investigation into each disconnection
 Simultaneous login prohibited

o Identification of users
 User ID’s & passwords
 Verify IP address
 Magnetic cards
 Voice recognition / fingerprints (use of biometric data)

o Authorisation of users
 Logon ID’s
 Passwords
 Multilevel passwords
 User matrixes
 Passwords for specific authorised levels

o Monitor access and processing


 Audit trails reviewed for daily activities
 Console logs and activity registers
 Application software (unauthorized access)
 Firewalls

o Communication lines & networks


 Passwords
 Dial & dial back
 Identification data
 Different routes for sensitive data
 Encryption of data

o Password control
 Password strength
o Minimum 6 characters (Minimum length)
o Alpha /numerical
o CAPITAL LETTERS AND small caps
o and other - ! @ # *
 Not easily guessed not shown on screen
 Changed regularly
o Automatic system request
o Re-use of password prohibited
 Confidentiality emphasised
 Cancelled on resignation/ dismissal
 Cancelled after period of inactivity
 Use for authorisation
o Limit access to part of system
o Limit access to certain times of day
o Authorisation levels linked

o Program libraries
 Access to backup programs controlled by access software
 Passwords
 Updating authorised
o Utilities
 Stored separately
 Use logged and reviewed

Physical controls

o Terminals
o Physically locked
o Located in visible area
o Situated in lockable room
o Computer hardware
o Lockable room
o Supervision & review
o Removable mediums secure
o Manual logs

o Program libraries
o Register (REGULAR REVIEW)
o Access controlled

o Distributable processing
o Only executable programs (instead of production programs) at branches
o Independent comparison of exec. Programs to source programs (e.g.
internal auditor)
o Logs reviewed
o Screening & training of staff
o Emergency access controls

5. Computer Operating Controls

o Objective: Ensuring procedures applied correctly & consistently during processing


These are those controls that actually deal with how the user of the computer
operates the computer and to ensure that programmed procedures are applied
correctly and consistently during the processing of data. Examples of these types of
controls include, but are not limited to the following:
o There must be continuous monitoring and review of the functioning of the
computer hardware;
o There must be standardised procedures and operating procedures for the
users of the system to follow;
o The must be adequate user manuals in place.
o Scheduling of processing
o Set-up and execution of programs
 Competent person
 Procedure manuals
 Test against processing log
 Supervision & review
o Use correct programs & data files
o Operating procedures
 Hardware checks
 Operating instructions & manuals
 Segregation of duties
 Rotation of duties
 Logs
 Supervision and review
o Recovery procedure
 Emergency plan & instructions
 Backup of data & hardware

6. System Software Controls

o Objective: To ensure installation, development, maintenance of software


packages authorised and effective.

The controls are put in place for programs that process data to ensure that they are
installed or developed and maintained in an authorised and effective manner, and
that access to the system software is limited. Examples of these types of control
include:

o In the processing by users on personal(micro) computers, there must be:


 Control over the software on the PC to ensure that it is not copied or
pirated;
 Programs which are written internally should be documented and
tested to ensure that the program has the integrity required by
management.
o Acquisition & development controls
 See previous notes
o Security over system software
 Integrity of staff
 Division of duties
 Employment policies
 Supervision & review
o Database systems
 Access control
 Documentation
 Supervision & review
o Networks
 Support department
 Access controls
 Disaster recovery plan
o Processing on microcomputers
 Control of software
 Programs written internally tested & documented

7. Business Continuity Controls

o Objective: Prevent/Limit system interruption (Downtime)

These are the controls that the entity would put in place to ensure that it would be
able to continue as a going concern, even in the event of a disaster that the
company might experience. Examples of these types of controls include:

o Data is backed up regularly and kept off-site in a fireproof safe;


o The entity has UPS (Uninterrupted Power Supply) to ensure that it can
continue doing business in the event of a power failure;
o The entity’s server room is air-conditioned to ensure that the servers do not
overheat resulting in the loss of vital data;
o Plan, document and test the disaster recovery plan to ensure that it will be
effective in the event of a disaster.

o Physical environment:
 Protection against the elements
 Fire: extinguishers etc
o Water: away from water pipes
o Power: backup supply
o Environment: air con etc

o Emergency plan & disaster recovery procedures


 Establish procedures/Responsibilities
 Prepare list of files & data to be recovered
 Provide alternative processing facilities
 Plan, document & test the disaster recovery plan
o Backups
 Regular backups on rotational basis
 On-line/ Real time backups
 Store back-up files on separate premises
 Hardware backup facilities
 Store in fireproof safe
 Retention of files / records for required times

o Other controls
 Adequate insurance
 No over reliance on staff
 Virus protection / prevention
 Physical security
 Cable protection

o Personnel Controls
 Segregation of duties
 Job rotation
 Hiring/firing procedures
 Employment contracts
 Use of hardware/software
 Confidentiality
PART E: QUESTIONS RELATING TO THE TOPIC

QUESTION BANK

Refer to the question bank at the back of the module.

SOLUTIONS TO QUESTION BOOK QUESTIONS

These are included at the end of each module. The solutions will also be available on
Edulink NextGen after the completion of the module.

You might also like