General Computer Controls Module 2013
General Computer Controls Module 2013
DEPARTMENT OF ACCOUNTANCY
AUDIT 3A
2013
A PRE-READING
B INTRODUCTION
C TYPES OF ON-LINE COMPUTER SYSTEMS
D CONTROLS IN A COMPUTERISED ENVIRONMENT
E QUESTIONS RELATING TO THE TOPIC
PART A: PRE-READING
PART B: INTRODUCTION
This module introduces you to the basic concepts regarding computers and their
significance in an organisation. The more complex issues regarding computers will be
dealt with at honours level.
The use of computers is part of everyday life (as you would all know)!
This module will aim to explain the basic concepts in computers, which an audit
professional is expected to have knowledge of.
2. PRIOR KNOWLEDGE
Computers will not be new to you as you have dealt with its basic operations in BIS (2 nd
year) as well as all your other subjects.
With regards to auditing specifically you have already been introduced to general
controls, in Audit 2. This module will pick general controls from where you left it and you
will also be introduced to application controls.
It is an extremely important module as most of you will take on employment next year and
are expected to have certain knowledge about computers, risks associated with
computers and their respective controls. For those of you studying further you will study
computers at a more extensive level in your postgraduate studies.
3. RESOURCES
In order to master this topic you should make use of the following resources
4. STUDY OUTCOMES
After you have completed your studies of this topic you must be able to:
5. EXAMINATION POSSIBILITIES
Transactions are entered via terminals, automatically authorised by the system and the
relevant files on the system are updated immediately. Thus, the transaction and the
master file are updated immediately.
Transactions are entered via a terminal, authorised and written to a transaction file. The
transaction is then updated in batch mode.
This system provides the opportunity for good control over the input and processing of
transactions ensuring the completeness and accuracy of the data through batch
(control) totals and audit trails.
It is obvious from the above that the transaction and master file in this type of system is
not updated immediately, but only after a batch has been entered correctly and is in
balance.
Shadow Processing:
A copy of the master file is used during the day and is updated continuously using on-
line entry with real time processing. The computer simultaneously creates batch files for
the day’s transactions. These batch files are used to update the original master file
overnight in batch mode.
A new copy of the master file is then made for use during the following day.
Shadow processing provides the benefits of both real time processing and batch
processing while affording better protection to the data in the original master file.
Transactions are entered, authorised and written to a memory file which contains
information drawn from the master file.
This process is similar to shadow processing and insinuates that:
o Enquiries are made from the memory master file (which is fully up to date);
o The original master file is updated at a later stage from the transaction files.
On-Line Enquiry Facilities:
Users are limited to enquiry of information on master files which are updated from other
systems.
On-Line Downloading/Uploading:
This involves data being downloaded from a master file onto an intelligent terminal such
as a personal computer. This data can then be updated & uploaded to another
computer e.g. The mainframe computer.
PART D: CONTROLS IN A COMPUTERISED ENVIROMENT
General controls are those which establish an overall framework of control for computer
activities. They are controls which should be in place before any processing of
transactions gets underway and they span across all applications.
These are the controls in place over the actual development of a new system the entity
intends on using. This could be a purchased package or a system developed in-house.
In a question, you need to ensure that you know what type of system you are dealing
with to ensure that you suggest the relevant controls. Examples of the types of controls
over the development of a system in-house include, but are not limited to the following:
o The client should develop a system with a clear view of its strategic business plan to
ensure that the system will aid the process of achieving the business objectives;
o A steering committee should conduct a feasibility study and define the selection
criteria;
o Projects should be authorised after analysing the users’ needs and performing a
proper systems analysis;
o Project authorisation & management;
o System design and programming standards;
o Testing of new system;
o Conversion to new system.
o Involvement from :
o User department
Departmental requirements
Internal / external auditors
o Project team
Day to day management of project
Ensure project is developed in stages
Prepare timetables for each stage
o Definition
Defining the way the system must work
To meet the specification of users and business
4. Testing
Purchased package:
o Keep in mind :
Minimum changes should be made to package
If modifications is necessary, use normal rules i.r.o system development
Possibility of future amendments (e.g. tax updates)
Quality of maintenance service from supplier
The above information has to be applied to the selection of a package and the
implementation of a package. This can be done as follows:
o Implementation
o Involvement of:
User departments
Data processing
Management
Quality assurance
o Testing
Balancing old files with new files
Third party confirmations
Follow up of exception reports
Comparison with data run on old system (parallel)
Manual comparison of data
Approval by users
These controls exist to ensure that any maintenance that takes place on the newly
developed system is done accurately and in accordance with the requisite level of
authority. The changes would be made to ensure that the system meets the needs
of the users. Some examples of these types of controls are:
o Change forms are to be pre-numbered and locked away when not required;
o Any change requests made by the users of the system must be approved by the
Line Manager of the user and a reason as to why the change is necessary must
be provided;
o All change forms need to be signed by Management or the Computer Steering
Committee prior to the change being effected;
o After the change has been made, an IT expert is to test the change to determine
if it has been made as per the approved change request and is working
effectively.
o Completeness of changes
o To ensure all approved requests for changes are processed
o Achieved by:
Pre-numbered change request forms
Do regular sequence checks; or
Enter change forms in a register
Outstanding requests reviewed by senior official
o Validity of changes
o Requests should be approved by correct level of authority depending on
importance
o User requirements
o Reviewed by data processing department
o Documented
3. Organisational & Management Controls
Segregation of duties
o Functional
Separate CIS Department
o Operational
SOD between:
System analysts
Programmers
Operators
o Normal SOD between:
Transaction initiation
Authorisation
Processing
Safeguarding
o Independent person must correct errors
o Software protection
Software purchases from reputable suppliers
Take care with use of “free” of “public domain” programs
Do not lend out program disks
Do not boot up from a disk
Do not use illegal copies
o Staff
Inform staff members against dangers
Train users of microcomputers
Reporting procedures in case of infection
Limit the use of microcomputers to authorized staff
As the name suggests, these controls would ensure that access to and editing of
data and programs should be restricted to only those users who have the authority
to use the data. Examples of these types of controls include:
Programmed controls
o Terminals
TINS (Terminal identification numbers)
Limited access to system (to specific applications)
Automatic log off after 5 minutes of non-use
Shut down after 3 unsuccessful login attempts
Limited to 1 workstation log on
Investigation into each disconnection
Simultaneous login prohibited
o Identification of users
User ID’s & passwords
Verify IP address
Magnetic cards
Voice recognition / fingerprints (use of biometric data)
o Authorisation of users
Logon ID’s
Passwords
Multilevel passwords
User matrixes
Passwords for specific authorised levels
o Password control
Password strength
o Minimum 6 characters (Minimum length)
o Alpha /numerical
o CAPITAL LETTERS AND small caps
o and other - ! @ # *
Not easily guessed not shown on screen
Changed regularly
o Automatic system request
o Re-use of password prohibited
Confidentiality emphasised
Cancelled on resignation/ dismissal
Cancelled after period of inactivity
Use for authorisation
o Limit access to part of system
o Limit access to certain times of day
o Authorisation levels linked
o Program libraries
Access to backup programs controlled by access software
Passwords
Updating authorised
o Utilities
Stored separately
Use logged and reviewed
Physical controls
o Terminals
o Physically locked
o Located in visible area
o Situated in lockable room
o Computer hardware
o Lockable room
o Supervision & review
o Removable mediums secure
o Manual logs
o Program libraries
o Register (REGULAR REVIEW)
o Access controlled
o Distributable processing
o Only executable programs (instead of production programs) at branches
o Independent comparison of exec. Programs to source programs (e.g.
internal auditor)
o Logs reviewed
o Screening & training of staff
o Emergency access controls
The controls are put in place for programs that process data to ensure that they are
installed or developed and maintained in an authorised and effective manner, and
that access to the system software is limited. Examples of these types of control
include:
These are the controls that the entity would put in place to ensure that it would be
able to continue as a going concern, even in the event of a disaster that the
company might experience. Examples of these types of controls include:
o Physical environment:
Protection against the elements
Fire: extinguishers etc
o Water: away from water pipes
o Power: backup supply
o Environment: air con etc
o Other controls
Adequate insurance
No over reliance on staff
Virus protection / prevention
Physical security
Cable protection
o Personnel Controls
Segregation of duties
Job rotation
Hiring/firing procedures
Employment contracts
Use of hardware/software
Confidentiality
PART E: QUESTIONS RELATING TO THE TOPIC
QUESTION BANK
These are included at the end of each module. The solutions will also be available on
Edulink NextGen after the completion of the module.