AIS Chapter 4
AIS Chapter 4
Internal controls for computer-based systems have been described as being of two types:
Log : listing (generally a chronological list, expl activity log or access log)
Authorization: is related to the actions an authorized user can do within the IS.
Asymmetric encryption : stronger than symmetric (public key with a private key makes a symmetric
encryption)
Vulnerability assessment: automated scan of the IS and if it finds a weakness in the system it reports
(eg of a vulnerability: a weak password, and if your password is guessed, it becomes a threat)
Penetration testing : “Ethical hackers” the objective is to see to what extent the system is hackable.
Security and IT controls = combination of preventive, detective and corrective controls. (Time
based model based on the equation P > D + R
- P : the time needed for the hacker to break through the IS controls,
- D : time to detect the breach,
- R : reaction time
this model is used by companies with high exposure to risk
Organizational Structure :
IT governance committee, responsibilities include:
2. Budget funds and personnel for the most effective use of the IT systems.
► Database administrator
eg: the operations personnel cannot be the programmer since he can manipulated data
Business Continuity :
Business Continuity Planning (BCP)
Security : the information system is protected against unauthorised access security is the
-
base for the 4 pillars.
- Four pillars for the “home” are : availability, processing integrity (the information that is
processed by the IS is accurate, well structured, complete…) , confidentiality (information
about transactions, reports, plans..) , privacy (related to information about the identity of
people)
Security is more important than the 4 pillars, not because that the pillars are not important but
because the security is the base.
Risks In Not Limiting Unauthorized Users:
Previously covered IT controls that can lessen risk of unauthorized users gaining access to the IT
system (log in / user ID’s …)
Risks From Environmental Factors: Environmental changes that affect the IT system can cause
availability risks and processing integrity risks.
Physical Access Risks: Physical access to computer systems and computer rooms should be limited
to those who must have access in order to carry out their job assignments.
► Security risk is that an intruder who gains physical access may change user access levels.
► Availability risk is the unauthorized physical access to physically shut down, sabotage, or
destroy hardware or software.
► Processing integrity risk is that systems or programs may be shut down or sabotaged.
► Availability risk is that as events interrupt operations, the system becomes unavailable for
regular processing.
► Processing integrity risk is that business interruptions can lead to incomplete or inaccurate
data.
► Confidentiality risk is that unauthorized persons may gain access to confidential data if they
access backup data..
The Operating System: The software that controls the basic input and output activities of the
computer.
► manage computer memory, and communicate between the CPU, memory, and disk
storage
The Database:
A large disk storage for accounting and operating data.
Controls such as user IDs, passwords, authority tables, firewalls, and encryption are examples of
controls that can limit exposure.
A software system that manages the interface between many users and the database.
Physical access, environmental, and business continuity controls can help guard against the loss of
the data or alteration to the DBMS.
A group of LANs connected to each other is called a wide area network, or WAN.
Controls:
firewalls
encryption
encrypted data.
authentication,
Cloud Computing:
As introduced in chapter 2, cloud computing includes:
► Software and data reside with third party companies (the cloud) and not on company
computers.
Security: All processing, storing data, and reading data occur over the Internet; therefore,
the third-party provider must have good user authentication, firewalls, encryption, and
virtual private network connections.
Availability : Any interruptions in service cause the software and data to be unavailable
Processing integrity : All control of software installation, testing, and upgrading is
transferred to the third-party provider of cloud computing services.
Confidentiality : Risk that employees of the third-party provider can possibly browse and
misuse company data.
Input Controls:
Date input - data converted from human readable form to computer readable form.
Source document: paper form used to capture and record the original data of an accounting
transaction.
General controls such as computer logging of transactions and keeping backup files,
become important.
Where source documents are used, several source document controls should be used
Form Design - Both the source document and the input screen should be well designed so that they
are easy to understand and use, logically organized into groups of related data.
Data Preparation – standard data collection procedures reduce the chance of lost, misdirected, or
incorrect data collection from source documents.
Error Handling:
Data should be validated and edited to be as close to the original source of data as possible.
Control totals are subtotals of selected fields for an entire batch of transactions:
Processing Controls:
Intended to prevent, detect, or correct errors that occur during processing.
Control totals, limit and range tests, and reasonableness and sign tests.
Computer logs of transactions processed, production run logs, and error listings.
Output Controls:
Reports from the various applications.
Employee use of IT system hardware and software for personal use or personal gain.