Report Ais
Report Ais
e. Application Controls
Ethical standards are derived from societal mores and deep-rooted personal beliefs
about issues of right and wrong that are not universally agreed upon. It is quite
possible for two individuals, both of whom consider themselves to be acting ethically, to
be on opposite sides of an issue.
Ethical
Issues in
Business
Ethics
pertains to the principles of conduct that individuals use in making
choices and guiding their behavior in situations that involve the
concepts of right and wrong.
Business
Ethics
(1) How do managers decide what is right in conducting their business? and
(2) Once managers have recognized what is right, how do they achieve it?
Ethical issues in business can be
divided into four areas :
Equity
Rights
Honesty
Justice
Minimize risk
Computer Ethics
Computer Ethics
is simply the exposure to stories and reports found in the popular media
regarding the good or bad ramifications of computer technology.
Para computer ethics
involves taking a real interest in computer ethics cases and acquiring some
level of skill and knowledge in the field.
Theoretical computer ethics
Ethical Issues:
Dissemination of inaccurate or unauthorized information.
Security vs. Freedom of Access:
Security can protect personal property but limit data access.
Automated monitoring may protect systems but compromise user privacy.
Security
Copyright Laws
Ownership of Property
Reliance on AI:
Expert systems are designed to make decisions, often replacing human experts.
Artificial Intelligence
Concerns:
Inaccurate or incomplete knowledge in the system.
Responsibility for faulty decisions made by AI.
Potential biases from the decision-making style of developers or managers.
Artificial Intelligence
Who is responsible for the accuracy and completeness of the knowledge base?
Who is accountable if an AI system causes harm with its decisions?
Who owns the expertise once it’s coded into a system?
Unemployment and Displacement
Computer technology is changing many jobs, and some workers are displaced
because they cannot adapt to these changes.
Unemployment and Displacement
Should employers be responsible for retraining workers who lose their jobs due to
computerization?
Misuse of Computers
Copying proprietary software.
Using a company computer for personal purposes.
Snooping through other people’s files.
Misuse of Computers
Why do people often ignore laws against copying software?
Should the law be changed?
What harm does unauthorized copying cause to software developers?
Is there harm when computers are used for personal reasons at work?
Does it matter if it’s during or outside of work hours?
Is it okay to look through someone else's paper or computer files?
Are paper files and computer files treated differently?
IT GOVERNANCE CONTROLS
Information Technology Governance
a relatively new subset of corporate governance that
focuses on managing strategic IT resources
Key objectives includes: reducing risk and ensuring
that IT investments adds value to the corporation.
Information Technology Governance
Controls
Organizational Structure
Centralized Model
Distributed Model
Centralized Model
Database administrator
Data processing
Separating new
systems development
from maintenance
Distributed Model
Lack of standards
Corporate IT
Function
Corporate IT Function
Central testing of
commercial software User services
and hardware
Audit
Procedures
COMPUTER CENTER SECURITY
AND CONTROLS
Construction
Access
Air-conditioning
Fire Suppression
Fault Tolerance Control
Backup documentation
contains key information about the user and that is used to approve
all actions the user attempts during the session
Access Control List
Accdiental Threats
Intentional Threats
3 Sources of Exposures
Privileged personnel who abuse their authority
Individuals who browse the operating system to identify and exploit
security flaws
Individuals who intentionally insert computer viruses into the
operating system
Operaing System Controls and Tests of Controls
Controlling Access Privileges
Password Control
Controlling against Malicious and Destuctive Programs
System Audt Trail Controls
Setting Audit Trail Objectives
Implementing a System Audit Trail
Control Access Privileges
logs that record activity at the system, application and user level
2 Types of Audit Logs
1. Keystroke Monitoring
2. Event Monitoring
Setting Audit Trail Objectives
Access
Controls designed to prevent unauthorized individuals from viewing, retrieving,
corrupting, or destroying the entity’s data
a table contains rules that limit the actions a user can take
Database authorization table
User-defined procedure
Audit 3
for Testing 4
Controls
Responsibility
The auditor should make sure that only database administrators are in
charge of creating authority tables and user views. To check this, the
for Authority
auditor can: Tables and
1 Review Policies and Job Descriptions Subschemas
2 Examine Access Privileges
3 Conduct Interviews
Appropriate The auditor can select a sample of users and verify that their access
access privileges stored in the authority table are consistent with their
organizational functions.
authority.
Biometric
The auditor should evaluate the costs and benefits of biometric controls.
Controls.
Encryption The auditor should verify that sensitive data, such as passwords, are
properly encrypted. This can be done by printing the file contents to hard
Controls copy.
Backup Controls
Features of Backup Controls
Database Backup
Transaction log
Checkpoints
Recovery Module
DATABASE BACKUP
The backup feature makes a periodic backup of the entire
database.
This is an automatic procedure that should be performed at
least once a day.
The backup copy should then be stored in a secure remote
area.
TRANSACTION LOG (JOURNAL)
uses the logs and backup files to restart the system after a
failure.
Audit Objectives Relating to Database
Backup
1
The auditor should verify from system documentation that
production databases are copied at regular intervals (perhaps
several times an hour).
2
The auditor should verify through documentation and observation that
backup copies of the database are stored off-site to support disaster
recovery procedures.
Audit
Procedures
CONTROLLING NETWORKS
NETWORK TOPOLOGIES
Examples:
Hacking - occurs when someone breaks into the network to steal
or manipulate information.
Intercepting Messages - this is like eavesdropping on private
messages being sent between two people.
Denial-of-Service (DoS) Attacks - involves overwhelming a
website or network with fake requests, causing it to crash.
2. Risks From Equipment Failures:
- are risks caused by the malfunction or breakdown of network
components like hardware, cables, or servers.
Examples:
Server going offline
Damaged cables or hardware
Loss of stored files or programs
I. CONTROLLING RISKS FROM
SUBVERSIVE THREATS
FIREWALL
- is a system that enforces access control between two networks.
It ensures secure and controlled communication between external
and internal networks.
KEY PRINCIPLES OF FIREWALLS:
Traffic Control
Network-Level Firewalls
Dual-homed System
Network-Level Firewalls
Efficient but low security access control.
Examples:
Examples:
EEE3: EDE3:
Encrypt-Encrypt- Encrypt-Decrypt-
Encrypt with three Encrypt with three keys
different keys. but works differently.
2. Public Key Encryption
- Two keys: public (for encoding) and private (for decoding).
Example:
Digital Signature
Digital Certificate
DIGITAL SIGNATURE
Request-Response
Technique: Call-Back Devices:
Ensures smooth Verifies user identity
communication. before granting access
AUDIT OBJECTIVES RELATING TO
SUBVERSIVE THREATS
(1) Prevent and detect (2) Make stolen data
illegal access. unusable.
- Flexibility 3. Encryption
- Proxy Services Verification 4. Message
- Filtering Logs
- Segregation of
Systems
- Audit Tools 5. Call-Back
- Probe for Weaknesses Tests
II. CONTROLLING RISKS FROM
EQUIPMENT FAILURES
LINE ERRORS
- occur when noise disrupts the transmission of data, changing the bit
structure of the message.
» Noise - is made up of random signals that can interfere with the message
signal when they reach a certain level.
Sources:
Electric motors
Atmospheric conditions
Faulty wiring or components
Adjacent channel interference
ERROR DETECTION AND
CORRECTION TECHNIQUES
Echo Check
Parity Check
ECHO CHECK
- The receiver returns the message to the sender.
Controls
Physical Control
Relates primarily to the human activities employed in
accounting systems.
Physical controls focus on people
Physical Control
01 Transaction Authorization
— to ensure that all material transactions processed by the
information system are valid and in accordance with management’s
objectives.
02 Segregation of Duties
Objective 1. The segregation of duties should be such that the
authorization for a transaction is separate from the processing of the
transaction.
Objective 2. Responsibility for the custody of assets should be separate
from the record-keeping responsibility.
Objective 3. The organization should be structured so that a successful
fraud requires collusion between two or more individuals with
incompatible responsibilities
Physical Control
03 Supervision
04 Accounting Records
— these records capture the economic essence of transactions and
provide an audit trail of economic events.
Organizations must maintain audit trails for two reasons.
First, this information is needed for conducting day-to-day
operations.
Second, the audit trail plays an essential role in the financial
audit of the firm.
Physical Control
05 Access Control
06 Independent Verification
— Through independent verification procedures, management can assess:
(1) the performance of individuals,
(2) the integrity of the transaction processing system, and
(3) the correctness of data contained in accounting records.
That was
so hot