Overview of IS Controls, Auditing, and Security Fall 2005.

Slides:



Advertisements
Similar presentations
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Advertisements

Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Control and Accounting Information Systems
Control and Accounting Information Systems
Auditing Concepts.
Information Technology Control Day IV Afternoon Sessions.
Auditing Computer-Based Information Systems
Internal Control.
Auditing Computer Systems
Auditing Computer-Based Information Systems
The Islamic University of Gaza
What do Computer Scientists and Engineers do? CS101 Regular Lecture, Week 10.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Overview of IS Auditing n Need for control and Audit of Computers –Org cost of data loss –cost of incorrect decision –Value of hardware, software, personnel.
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Impact of Information Technology on the Audit.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.
Chapter 17 Acquiring and Implementing Accounting Information Systems
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
SEC835 Database and Web application security Information Security Architecture.
AICT5 – eProject Project Planning for ICT. Process Centre receives Scenario Group Work Scenario on website in October Assessment Window Individual Work.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Overview of Systems Audit
INTERNAL AUDIT vis-à-vis INTERNAL CONTROL
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Chapter 3 Internal Controls.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
Auditing Internal Control over Financial Reporting
Chapter 5 Internal Control over Financial Reporting
Considering Internal Control
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
Implications of Information Technology for the Audit Process
Internal Control in a Financial Statement Audit
7-Oct-15 System Auditing. AUDITING Auditing is a systematic process of objectively obtaining and evaluating evidence regarding assertions about economic.
Chapter 7 Control and AIS. Threats to AIS Natural disasters –DSM flood (p. 249) Political disasters –Terrorism Cyber crime (as opposed to general terrorism)
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Evaluation of Internal Control System
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
S4: Understanding the IT environment of the entity.
The Sarbanes-Oxley Act of PricewaterhouseCoopers Introduction of Panel Members The Sarbanes-Oxley Act of 2002 Sample testing of controls Marcus.
Information Security What is Information Security?
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal.
Controls design Controls are “the plan of organization and all the methods and measures to safeguard its assets, check the accuracy and reliability of.
AUDIT IN COMPUTERIZED ENVIRONMENT
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 6-1 Chapter Six Internal Control in a Financial Statement Audit.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 7-1 Chapter Seven Auditing Internal Control over Financial Reporting.
Auditing Internal Control Studies & Risk Assessment Chapter 9 Internal Control Studies & Risk Assessment Chapter 9.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Auditing Internal Control over Financial Reporting Chapter Seven.
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Chapter 3-Auditing Computer-based Information Systems.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Database Principles: Fundamentals of Design, Implementation, and Management Chapter 1 The Database Approach.
Auditing Concepts.
Internal Control Principles
Internal Control.
The Demand for Audit and Other Assurance Services
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Overview of IS Controls, Auditing, and Security Fall 2005

IS Auditing Versus Controls  An organizational function to assess whether computer systems safeguard assets, maintain data integrity, and help organizations achieve their goals efficiently and effectively  Controls are measures for assuring the above; auditing verifies the effectiveness of the controls  Controls are “the plan of organization and all the methods and measures to safeguard its assets, check the accuracy and reliability of its accounting data, promote operational efficiency, and encourage adherence to prescribed managerial policies” (AICPA, USA)  They can be preventive, detective or corrective  They can be manual or automated

Auditing  Auditing can be defined as “a systematic process of objectively obtaining and evaluating evidence regarding assertions about economic actions and events to ascertain the degree of correspondence between those assertions and established criteria and communicating the results to interested users”  Auditing deals with assessing the reliability of controls  IS auditing deals with controls over information processing operations

Traditional Control mechanisms  separation of duties  controlling access to assets (e.g., lock and key)  audit trail (capture of materials and data)  capture and storage of events in multiple locations and time periods (duplication)  Too many controls will reduce efficiency; too few controls will reduce effectiveness

Effect of computers on controls and auditing  No clear separation of duties many different activities are placed in the same location, done at the same time, by the same unit (program). multiple users use the program decline in accountability (analyst?, programmer?, quality assurance?, user?)  Access to assets threatened information systems concentrate the organizational assets (centralization) several users (functional managers, technical people such as system administrators and programmers) have access; high potential for abuse greater exposure of data assets due to communication networks

Effect of computers on controls and auditing  Tighter integration as opposed to duplication Databases workflow automation (ERP) systems  Changes to evidence collection and evaluation procedures query languages, cryptography, system design methods

IT control principles  Focus should be on prevention than detection because detection is expensive in a complex IT environment; also, the loss due to an error is significant emphasis should be placed on the design stage testing prior to production should be rigorous  use IT and its capabilities to tailor control procedures to the business process manual control and audit procedures are likely to be ineffective in a sophisticated IT driven system

IT control principles  Processes that make extensive use of paper inputs and outputs are not less risky than more complex integrated computer based systems; a properly constructed computer based system can be far less risky than the former loosely connected systems have more input and outputs that need to be checked than a tightly integrated system  an electronic audit trail is as effective as or more effective than a paper-based audit trail.  It is better to “build-in” controls rather than “build- on” top of existing process structure.

IT Controls  General (Management) Controls Relate to the policies and procedures of data, program, hardware, security, and administrative management  Application Controls Relate to the mechanisms embedded in application systems, e.g., data validation controls

Auditing around or through the computer  Auditing around the computer Forming an audit opinion through examining inputs and outputs of applications Applications are treated as black boxes  Auditing through the computer Forming an audit opinion by examining the processing logic, and controls used by the application, and by limited testing of the inputs and outputs  Open question: Assume that a firm uses an off the shelf packaged software. Discuss which method is appropriate under what circumstances?

IT Security  IT Security mechanisms are a subset of control mechanisms  They address primarily compromise on one or more of the following dimensions of information: Availability Accuracy - free from mistake or error Authenticity - being genuine or original Confidentiality Integrity - being whole, complete, uncorrupted Utility - state of having value for some purpose Possession - having ownership

Case 1 (Due on 8/29/2005)  Consider the following summary of a Business Week Commentary (Source: “Maybe We Should Call them Scammers,” Business Week, January 16, 1995, p. 32) Which is more accurate, humans or machines? Although technology is capable of 100% accuracy, some stores average as low as 85% accuracy, according to investigators who are researching the accuracy of scanning technology. Retailers argue that the systems are more accurate than human clerks and many retailers argue that issue is being blown out of proportion. Retailers say the problems are primarily attributable to the failure to enter data into scanner computers, especially when prices change  To do: Suggest at least two control policies and procedures that retailers could implement to reduce the problem alluded to in the above description. For each control, discuss the salient strengths and weaknesses.  Solutions that offer automated and preventive control mechanisms will get higher points