Learning Unit 6
Learning Unit 6
6.1 Introduction
In the previous study unit we showed you what a powerful tool Microsoft Office Excel can be
when it is used to perform calculations, present reports and charts and analyse data.
Spreadsheets have become an essential tool for numerous entities, many of whom cannot
function without the use of spreadsheets. This is why spreadsheet security and control have
become so important to ensure that spreadsheets, which organisations rely on, are not
compromised, leading to incorrect calculations, reports, charts and data analysis, which in
turn could lead to incorrect management decisions.
In this study unit we will focus specifically on spreadsheet security, risks and controls.
ICON DESCRIPTION
Open Rubric
This icon indicates that you need to self-reflect.
This icon indicates that you need to click on the link to view a brief video file.
Thus to assess the risk potential for certain spreadsheets, the following factors have to be
considered:
2
Owing to the structural design of spreadsheets, a minor change in a formula or value or in
any of their input cells may affect their overall output, where manual errors may also go
undetected.
Because the user only sees the results on the face of the spreadsheet or printed report,
these errors could easily go unnoticed.
Another common error is the possibility of the user working on the wrong spreadsheet
version.
The potential consequences of one or more of the above errors occurring or security
being breached with unauthorised modifications to spreadsheets could result in:
• financial loss or bankruptcy of an organisation
• incorrect costing or budgeting
• public embarrassment, adverse news coverage or loss of reputation
• loss of investor confidence
• loss of share value
• loss of financial control
• career damage
• lawsuits
3
6.3 Spreadsheet controls
With the potential risks of a breach in security or the occurrence of an error in
spreadsheets, management will need to implement controls to minimise the risks
identified.
There are various ways of controlling spreadsheets. One is to make regular back-
ups of spreadsheets and to audit working versions of spreadsheets from time to
time to check any changes made to ensure that the spreadsheet still works as it was
intended to.
Spreadsheet use also poses inherent risks. These risks can be lessened by
reducing the number of spreadsheets in use. The use of tested and audited
templates for frequently recreated spreadsheets can also decrease risks.
A password may encrypt the specific workbook, the structure or the cells in a
spreadsheet. Note, however, that commercial hackers may use various
programs available on the internet to obtain the password for a file – hence
password protection alone may not be sufficient.
The following steps should also be followed and communicated to the users of
spreadsheets that are password protected to ensure that their passwords stay
safe and that this is regarded as good practice for password protection:
- Do not share the password with anyone.
- Do not write the password down and place it where people can find it.
- Do not use an obvious password (eg birthdays or names) that someone
could easily guess.
- Use a combination of letters and numbers.
- Include uppercase and lowercase letters, numbers and symbols in the
password.
- Use numbers to represent letters, for instance, 3 for your E and 1 for i.
- Passwords should be eight or more characters in length.
- Change passwords regularly if needed.
• Input control. Spreadsheet input data needs to be verified to the original source
data for accuracy. Another person also needs to trace inputs back to original
source data.
• Logical inspection. An independent person other than the spreadsheet user should
test the formulas and functions for correctness. Only one logical inspection per
spreadsheet is required if the other controls are working effectively.
4
Another facet of logical inspection is the inclusion of fixed values in formulas. A formula
should never contain a fixed (“hard-coded”) value. Even “permanently” fixed components
(eg tax rate) can change in the context of business operations. To prevent these types of
mistakes you could separate the input components from the formulas by having a data input
section/sheet in which you can easily identify the various inputs and assumptions on the
face of the spreadsheet and update these without the need to change the detailed
formulas/ functions. The use of control balances may also prove helpful to ensure the
soundness of formulas or input on spreadsheets.
In so doing, the use of formulas and functions becomes much more flexible, with a decrease
in potential errors caused by the inclusion of an incorrect fixed value.
You may be auditing formulas and you need to see all the formulas on the worksheet. You
can use the following procedures to control the hiding or displaying of formulas:
There are two ways to switch between displaying formulas and their values on a
worksheet:
• Using an icon/command:
– Click on the Formulas tab on the Ribbon.
– In the Formula Auditing group, click on the Show Formulas icon.
OR
• Optimal security. Protect your entire workbook file with a password allowing
only authorised users to view or modify the data.
• Additional protection of specific data. Protect certain worksheet or
workbook elements, with or without a password. This will help to prevent users
from accidentally or intentionally changing, moving or deleting data, formulas or
functions.
5
6.4.1 Using passwords to help secure an entire workbook
For optimal password security, always assign a password to open and view the file. In
section 4.2 you will learn how to give only certain users permission to modify data or
workbook elements.
Before you start the next practical section, start/open the Microsoft Office Excel Program.
6
• Select Encrypt with Password, the Encrypt Document dialog box appears.
• In the Confirm Password dialog box, in the Reenter password box, type the
password again, and then click OK.
• After typing the password, the “Protect Workbook” option colour filling
changes from white to light-brown as per above with a message: “A
password is required to open this workbook”
7
• Close the workbook, and open it again.
• Before opening, the workbook should first prompt you to put in a password,
see below:
NOTE
Workbook element and worksheet element protection is not workbook-level password security (as per 4.1
above). Element protection cannot protect a workbook from users with malicious intent.
When you protect a worksheet, all cells on the worksheet are locked by default, and
users cannot make any changes to a locked cell. For example, they cannot insert,
modify, delete or format data in a locked cell. However, you can specify which
elements users will be allowed to change when you protect the worksheet.
8
Computer activity 6.2
Type
password
• In the Password to unprotect sheet box, type a password for the sheet,
click OK and then retype the password to confirm it.
9
(b) To unprotect an individual cell(s) within an already protected a
worksheet
10
(d) To unlock any graphic objects inserted in worksheet (such as
pictures, clip art, shapes or Smart Art Graphic)
Image/Object or
Picture inserted in
the worksheet
NOTE
The password is optional. If you do not supply a password, any user can unprotect the sheet
and change the protected elements. Make sure that you choose a password that is easy to
remember, because if you lose the password, you cannot gain access to the protected
elements on the worksheet.
11
• On the Review tab, in the Changes group, click Protect Workbook.
• A “Protect Structure and Windows” window will open.
• To protect the structure of a workbook, select the Structure check box.
• To keep the workbook windows in the same size and position every time the
workbook is opened, select the Windows check box.
• To prevent other users from removing workbook protection, in the Password
(optional) box, type a password, click OK.
• Click OK.
Retype the password to confirm it.
12
6.4.3 Protecting confidential data in a workbook
Hiding, locking and protecting workbook and worksheet elements are not intended to
secure or protect any confidential information you keep in a workbook. This will only help
obscure data or formulas that might confuse other users and prevent them from viewing
or making changes to that data.
Excel does not encrypt data that is hidden or locked in a workbook. To help keep confidential
data confidential, you may want to limit access to workbooks containing such information
by storing them in a location that is available only to authorised users.
Activity 6
After working through this study unit, you should be able to answer the
following:
For every month’s salary calculation spreadsheet that Jane uses, she scribbles
the passwords on a piece of paper and then sticks it on the front of her wall
calendar at the applicable month. She uses the name of her pet parrot, Polly,
together with the applicable month as the password for the monthly salary
spreadsheets.
(a) (i) Advise Jane on what good password practice is and what she should
refrain from doing with reference to the case study above.
(ii) Advise Jane on whether she should use a password to secure the entire
workbook or password to secure the specific worksheet. Briefly explain why.
(b) List and explain the factors to consider when assessing the potential risks of a
spreadsheet.
6.5 Summary
In this study unit we discussed and described spreadsheet risks and controls. We specifically
discussed factors to consider when assessing the potential risk of spreadsheets, including
the consequences of errors contained in spreadsheets. We looked at controls that can be
implemented to minimise the risks identified. Lastly, we focused on certain security and
privacy controls that are included in Microsoft Office Excel that you can use to protect
your data, formulas and functions.
13