Chapter 9 Computer Controls for Accounting Information Systems

Slides:



Advertisements
Similar presentations
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Advertisements

Control and Accounting Information Systems
Accounting Information Systems
Core Concepts of ACCOUNTING INFORMATION SYSTEMS Moscove, Simkin & Bagranoff John Wiley & Sons, Inc. Developed by: S. Bhattacharya, Ph.D. Florida Atlantic.
Auditing Computer-Based Information Systems
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
9 - 1 Computer-Based Information Systems Control.
The Islamic University of Gaza
Security Controls – What Works
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
ACCOUNTING INFORMATION SYSTEMS
Chapter Chapter 13-2 Chapter 13 Data Modeling Introduction An Overview of Databases Steps in Creating a Database Using Rea Creating Database Tables.
Chapter 14 System Controls. A Quote “The factory of the future will have only two employees, a man and a dog. The man will be there to feed the dog. The.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Chapter 14 Organizing and Manipulating the Data in Databases
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Processing Integrity and Availability Controls
Chapter 3: Data Modeling
5th Edition, Irv Englander
CHAPTER 2: Introduction to Systems Concepts and Systems Architecture
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
Accounting Principles, 6e Weygandt, Kieso, & Kimmel
Chapter 171 Stabilizing the Quality System Chapter 17 Achieving Quality Through Continual Improvement Claude W. Burrill / Johannes Ledolter Published by.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Processing Integrity and Availability Controls
Accounting Information Systems, 1st Edition
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Chapter 13 Prepared by Richard J. Campbell Copyright 2011, Wiley and Sons Auditing Human Resources Processes: Personnel and Payroll in Service Industries.
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 © John Wiley & Sons, Inc. All rights reserved. Slide 1 Systems.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Chapter 2: Information Technology and AISs
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Introduction to Databases Chapter 1: Introducing Data and Data Management.
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Chapter 8 Introduction to Internal Control Systems
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Core Concepts of ACCOUNTING INFORMATION SYSTEMS Moscove, Simkin & Bagranoff John Wiley & Sons, Inc. Developed by: Marianne Bradford, Ph.D. Bryant College.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Chapter 12: Computer Controls
Considering Internal Control
Implications of Information Technology for the Audit Process
Chapter 2 Information Technology and AISs
Accounting Principles, Ninth Edition
Chapter 101 The Design Process Chapter 10 Achieving Quality Through Continual Improvement Claude W. Burrill / Johannes Ledolter Published by John Wiley.
13-1 COBOL for the 21 st Century Nancy Stern Hofstra University Robert A. Stern Nassau Community College James P. Ley University of Wisconsin-Stout (Emeritus)
Chapter 16 Information and Operations Management 1e Management 1e - 2 Management 1e Learning Objectives  Explain how managers use controls.
Slide 1-1 Chapter 1 Terms Information Systems Overview Introduction to Information Systems Judith C. Simon.
SESSION 14 INFORMATION SYSTEMS SECURITY AND CONTROL.
Chapter 4-1. Chapter 4-2 Chapter 4: Data Modeling Introduction An Overview of Databases Steps in Creating a Database Using REA Creating Database Tables.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Chapter 9: Introduction to Internal Control Systems
Chapter Chapter 12-2 Chapter 12: Computer Controls for Organizations and Accounting Information Systems Introduction General Controls for Organizations.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Slide 11-1 Chapter 11 Terms Information Resource Management Strategies Introduction to Information Systems Judith C. Simon.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
5th Edition, Irv Englander
INFORMATION SYSTEMS SECURITY AND CONTROL.
Dinesh Mirchandani University of Missouri – St. Louis
Using Technology to Manage Information
Controlling Computer-Based Information Systems, Part II
Financial Accounting, Fifth Edition
The Quality System Chapter 13
INFORMATION SYSTEMS SECURITY and CONTROL
ACCOUNTING INFORMATION SYSTEMS
Presentation transcript:

Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security for the Organization Organization-Level, Personnel, File Security Controls Fault-Tolerant Systems, Backup, and Contingency Planning and Computer Facility Controls Access to Computer Files

Chapter 9 Computer Controls for Accounting Information Systems Information Technology General Controls Security for Wireless Technology Controls for Hardwired Network Systems Security and Controls for Microcomputers IT Control Objectives for Sarbanes-Oxley Application Controls For Transaction Processing Input, Processing, and Output Controls

Introduction Internal control systems with focus on specific security in organizations control procedures to ensure effective use of resources efficient utilization of resources Primary challenges associated with connectivity protection of sensitive data and information stored or transferred providing appropriate security and control procedures

General Controls For Organizations Developing an appropriate security policy involves Identifying and evaluating assets Identifying threats Assessing risk Assigning responsibilities Establishing security policies platforms Implementing across the organization Managing the security program

Integrated Security for the Organization Organizations are dependent on networks for transactions, data sharing, and communications. need to give access to customers, suppliers, partners, and others Security threats for organizations arise from the complexity of these networks the accessibility requirements present

Integrated Security for the Organization Key security technologies that can be integrated include intrusion detection systems firewalls biometrics and others An integrated security system reduces the risk of attack increases the costs and resources needed by an intruder

General Controls within IT Environments Organizational level controls Personnel Controls File Security Controls Fault-Tolerant Systems, Backup, and Contingency Planning Computer Facility Controls Access to Computer Files

Organization-Level Controls Important controls include consistent policies and procedures management’s risk assessment process centralized processing and controls controls to monitor results of operations controls to monitor the internal audit function, the audit committee, and self-assessment programs the period-end financial reporting process Board-approved policies that address significant business control and risk management practices

Personnel Controls An AIS depends heavily on people for the creation of the system, the input of data into the system, the supervision of data processing distribution of processed data, and the use of approved controls

Personnel Controls General controls that affect personnel include separation of duties use of computer accounts separation of duties control procedures

Separation of Duties Separation of duties should be designed and implemented in two ways: separate accounting and information processing subsystems separate the responsibilities within the IT environment

Separation of Duties Separate Responsibilities within IT Environment. Designated operational subsystems initiate and authorize asset custody detect errors in processing data enter them on an error log, and refer them back to the specific user subsystem for correction.

Division of Responsibility Division of responsibility functions within an IT environment can be on the following lines: Systems Analysis Function Data Control Function Programming Function Computer Operations Function Transaction Authorization Function AIS Library Function

Use of Computer Accounts Use of computer accounts helps to ensure access is limited to specific users mostly by using passwords nowadays by use of biometrics (digital fingerprinting) protects use of scarce resources

Use of Computer Accounts limit user access to particular computer files or programs protect files from unauthorized use protect computer time from unauthorized use place resource limitations on account numbers which limits programmer/operator errors

File Security Controls The purpose of file security controls is to protect computer files from accidental abuse intentional abuse

File Security Controls Some examples of file security controls are external file labels internal file labels lockout procedures file protection rings read-only file designation

Fault-Tolerant Systems are designed to tolerate computer errors and keep functioning are often based on the concept of redundancy are created by instituting duplicate communication paths and communications processors

Fault-Tolerant Systems Redundancy in CPU processing can be achieved with consensus-based protocols with a second watchdog processor Disks can be made fault-tolerant by a process called disk mirroring by rollback processing

Backup Backup is essential for vital documents is batch processed using Grandfather-parent-child procedure can be electronically transmitted to remote sites (vaulting) needs an uninterruptible power system (UPS) as an auxiliary power supply

Backup similar to the redundancy concept in fault-tolerant systems a hot backup is performed while the database is online and available for read/write a cold backup is performed while the database is offline and unavailable to its users

Contingency Planning Contingency planning includes the development of a formal disaster recovery plan. describes procedures to be followed in an emergency describes the role of each member of the team. appoint one person to be in command and another to be second-in-command involves a recovery site that can either be a hot site or cold site

Computer Facility Controls Locate the Data Processing Center in a safe place where the public does not have access it is guarded by personnel there are limited number of secured entrances there is protection against natural disasters

Computer Facility Controls Limit employee access by incorporating magnetic, electronic, or optical coded identification badges Buy insurance

Access to Computer Files Logical access to data is restricted Password codes identifications (encourage strong passwords) biometric identifications with voice patterns, fingerprints, and retina prints

INFORMATION TECHNOLOGY GENERAL CONTROLS The objectives of controls is to provide assurance that the development of and changes to computer programs are authorized, tested, and approved before their usage access to data files is restricted processed accounting data are accurate and complete

Control Concerns Errors may be magnified Inadequate separation of duties Audit trails Greater access to data Characteristics of magnetic or optical media

INFORMATION TECHNOLOGY GENERAL CONTROLS IT general controls involve Security for Wireless Technology Controls for Hardwired Network Systems Security and Controls for Microcomputers IT Control Objectives for Sarbanes-Oxley

Security for Wireless Technology Security for wireless technology involves A virtual private network (VPN) Data encryption

Controls for Hardwired Network Systems The routine use of systems such as DDP and client/server computing increases control problems for companies, which include electronic eavesdropping hardware or software malfunctions causing computer network system failures errors in data transmission

Controls for Hardwired Network Systems To reduce the risk of system failures, networks are designed to handle periods of peak transmission volume to use redundant components,such as modems, to recover from failure using checkpoint control procedure to use routing verification procedures to use message acknowledgment procedures

Security and Controls for Microcomputers General and application control procedures are important to microcomputers. Most risks associated with AISs result from errors, irregularities or fraud general threats to security (such as a computer virus) Some of the risks that are unique to the microcomputer are Hardware - microcomputers can be easily stolen or destroyed Data and software - easy to access, modify, copy or destroy; therefore are difficult to control

Control Procedures for Microcomputers Some cost effective control procedures are take inventory install Keyboard locks lock laptops in cabinets follow software protection procedures create back-up files and lock office doors

Additional Controls for Laptops Some specific controls for the laptop are identify your laptop use nonbreakable cables to attach laptops to stationary furniture load antivirus software keep laptop information backed up

IT Control Objectives for Sarbanes-Oxley The Sarbanes-Oxley Act of 2002 (SOX) profoundly impacts public companies managers the internal auditors the external auditors

IT Control Objectives for Sarbanes-Oxley The IT Governance Institute (ITGI) issued ‘IT Control Objectives for Sarbanes-Oxley’ in April 2004, which helps organizations comply with SOX requirements and the PCAOB requirements includes detailed guidance for organizations by starting with the IT controls from CobiT and linking those to the IT general control categories in the PCAOB standard, and then linking to the COSO framework

Application Controls for Transaction Processing Application controls are designed to prevent, detect, and correct errors and irregularities in transactions in the input processing the output stages of data processing

Application Controls for Transaction Processing

Input Controls Input controls attempt to ensure the validity accuracy completeness of the data entered into an AIS The categories of input controls include observation, recording, and transcription of data edit tests additional input controls

Observation, Recording, and Transcription of Data The observation control procedures to assist in collecting data are feedback mechanism dual observation point-of-sale (POS) devices preprinted recording forms

Data Transcription Data transcription Preformatted screens the preparation of data for computerized processing Preformatted screens Make the electronic version look like the printed version

Edit Tests Input validation routines (edit programs) check the validity check the accuracy after the data have been entered, and recorded on a machine-readable file of input data

Edit Tests Edit tests examine selected fields of input data and reject those transactions whose data fields do not meet the pre-established standards of data quality Real-time systems use edit checks during data-entry.

Examples of Edit Tests The following are the tests for copy editing Numeric field Alphabetic field Alphanumeric field Valid code Reasonableness Sign Completeness Sequence Consistency

Processing Controls Processing controls focus on the manipulation of accounting data after they are input to the computer system. Key objective is a clear audit trail Processing controls are of two kinds: Data-access controls Data manipulation controls

Data-Access Control Totals Some common processing control procedures are batch control total financial control total nonfinancial control total hash total record count

Data Manipulation Controls Once data has been validated by earlier portions of data processing, they usually must be manipulated in some way to produce useful output. Data manipulation controls include: Software documentation, i.e. flow charts and diagrams Compiler Test Data

Output Controls The objectives of output controls is to ensure validity accuracy completeness Two major types of output application controls are validating processing results by Activity (or proof) listings

Output Controls regulating the distribution and use of printed output through Forms Prenumbered forms authorized distribution list Shredding sensitive documents

Copyright Copyright 2008 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make backup copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

Chapter 9