Auditing in CIS Environment 1 1
Auditing in CIS Environment 1 1
Database software: Used to store Oracle, MS Access and FileMaker For desktop computers, laptops and tablets:
data and sort information. Pro Microsoft Windows
Mac Application (for Apple devices)
Application Suites: A collection Linux
of related programs sold as a
package. OpenOffice, Microsoft Office For smartphones:
Apple’s iOS
Multimedia software: Tools used Google’s Android
for a mixture of audio, video, Windows Phone OS
image and text content. Real Player, Media Player
Other than operating systems, some people also classify programming
Communication Software: Tools software and driver software as types of system software. However, we will
that connect systems and allow discuss them individually in the next two sections.
text, audio, and video-based
communication. MS NetMeeting, IRC, ICQ
Test 2: ENUMERATION 25 points
Internet Browsers: Used to Netscape Navigator, MS Internet Major Components of an Information System (HSDPPN)
access and view websites. Explorer, and Google Chrome
1. Hardware
Email Programs: Software used Microsoft Outlook, Gmail, Apple 2. Software
for emailing. Mail 3. Data
4. People
System Software 5. Procedures
System software helps the user, hardware, and application software to 6. Networks
interact and function together. These types of computer software allow an
environment or platform for other software and applications to work in. Functions of an Information System (CPC3)
This is why system software is essential in managing the whole computer
system. 1. Capture Input
2. Process
When you first power up your computer, it is the system software that is 3. Convey Output
initially loaded into memory. Unlike application software, the System 4. Collect Feedback
5. Controls Five categories of General Control
Characteristics of various types of IT-Based Systems 1. Organization and Operations Controls
2. System development and Documentation Controls
1. Butch Processing
3. Hardware and Systems Software Controls
2. Real-time or Online Processing
4. Access Controls
3. Online Transaction Processing (OTP)
5. Data and Procedural Controls
4. Designing Support System
5. Expert System Segregation of Duties. The key function:
6. Centralized Processing System
1. System Analysts
7. Decentralized Processing Systems
2. Application Programmer
8. Client or Server Architecture (IT Architecture)
3. System Programmer
9. Local Area Network (LAN)
4. Operator
10. Wide Area Network
5. Data Librarian
11. Cloud Computing
6. Quality Assurance
12. Virtualized Client or Server Infrastructure
7. Control Group
13. Electronic Data Infrastructure or EDI
8. Data Security
Auditors Responsibilities 9. Database Administrator
10. Network Technician
1. Result in transaction trails that exist for a short period of time or only in
computer readable form; Two common controls over system change include the following:
2. Include program error that cause uniform mishandling of transactions-
clerical error become less frequent; 1. Design Methodology
3. Include computer controls that need to be relied upon instead of 2. Change Control Process
segregation of functions;
4. Involve increased difficulty in detecting an authorized access; Hardware and systems software controls
5. Allow increased management supervisory potential resulting from more 1. Parity Check
timely reports; 2. Echo Check
6. Include less documentation of initiation and execution of transactions;
3. Diagnostic Routines
7. Include computer controls that affect the effectiveness of related manual
4. Boundary Protection
control procedures that use computer output.
5. Periodic Maintenance