Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.

Slides:



Advertisements
Similar presentations
Presented to the Tallahassee ISACA Chapter
Advertisements

Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
General Ledger and Reporting System
Information Technology Control Day IV Afternoon Sessions.
Auditing Computer-Based Information Systems
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
Auditing Computer-Based Information Systems
9 - 1 Computer-Based Information Systems Control.
Chapter 14 System Controls. A Quote “The factory of the future will have only two employees, a man and a dog. The man will be there to feed the dog. The.
THE AUDITING OF INFORMATION SYSTEMS
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 136 C HAPTER 8 Information Systems Controls for System.
Processing Integrity and Availability Controls
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
PowerPoint Presentation by Charlie Cook Copyright © 2004 South-Western. All rights reserved. Chapter 9 Controlling Information Systems: Process Controls.
General Ledger and Reporting System
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 8-1 Accounting Information Systems 9 th Edition Marshall.
Information Systems Controls for System Reliability -Information Security-
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Processing Integrity and Availability Controls
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Management Information Systems
Today’s Lecture application controls audit methodology.
RNJ 10/02/091 3 Computing System Fundamentals 3.6 Errors Prevention and Detection.
Chapter 22 Systems Design, Implementation, and Operation Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 22-1.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
© 2013 Pearson Education, Inc. Publishing as Prentice Hall 1 CHAPTER 11: DATA AND DATABASE ADMINISTRATION Modern Database Management 11 th Edition Jeffrey.
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
TO ENSURE  THE EFFICIENT & EFFECTIVE DEVELOPMENT / MAINTENANCE OF IT SYSTEMS  PROPER IMPLEMENTATION OF IT SYSTEMS  PROTECTION OF DATA AND PROGRAMS.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
David N. Wozei Systems Administrator, IT Auditor.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
Implications of Information Technology for the Audit Process
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
Information Systems Security Operational Control for Information Security.
I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
System Analysis and Design
System Development Lifecycle Verification and Validation.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
CPS ® and CAP ® Examination Review OFFICE ADMINISRATION, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper.
Test and Review chapter State the differences between archive and back-up data. Answer: Archive data is a copy of data which is no longer in regular.
Database Security Outline.. Introduction Security requirement Reliability and Integrity Sensitive data Inference Multilevel databases Multilevel security.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Today’s Lecture Covers
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
1 3 Computing System Fundamentals 3.6 Errors Prevention and Recovery.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
CONTROLLING INFORMATION SYSTEMS
Verification & Validation
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Overview of Preventive Maintenance IT Essentials 5.0.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Review of IT General Controls
Controlling Computer-Based Information Systems, Part II
Processing Integrity and Availability Controls
Managing the IT Function
Footwear Planning and Production Process
Presentation transcript:

Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall

Learning Objectives Identify and explain controls designed to ensure processing integrity. Identify and explain controls designed to ensure systems availability. Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall

Trust Services Framework Security (Chapter 8) Access to the system and its data is controlled and restricted to legitimate users. Confidentiality (Chapter 8) Sensitive organizational information (e.g., marketing plans, trade secrets) is protected from unauthorized disclosure. Privacy (Chapter 9) Personal information about customers is collected, used, disclosed, and maintained only in compliance with internal policies and external regulatory requirements and is protected from unauthorized disclosure. Processing Integrity Data are processed accurately, completely, in a timely manner, and only with proper authorization. Availability System and its information are available to meet operational and contractual obligations. Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall

Controls Ensuring Processing Integrity Input Process Output Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall

Input Controls “Garbage-in Garbage-out” Form Design All forms should be sequentially numbered Verify missing documents Use of turnaround documents Eliminate input errors Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall

Input Controls Data Entry Checks Field check Characters proper type? Text, integer, date, and so on Sign check Proper arithmetic sign? Limit check Input checked against fixed value? Range check Input within low and high range value? Size check Input fit within field? Completeness check Have all required data been entered? Validity check Input compared with master data to confirm existence Reasonableness check Logical comparisons Check digit verification Computed from input value to catch typo errors Prompting Input requested by system Close-loop verification Uses input data to retrieve and display related data Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall

Batch Input Controls Batch Processing Batch Totals Input multiple source documents at once in a group Batch Totals Compare input totals to output totals Financial Sums a field that contains monetary values Hash Sums a nonfinancial numeric field Record count Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall

Processing Controls Data Matching File Labels Multiple data values must match before processing occurs. File Labels Ensure correct and most current file is being updated. Batch Total Recalculation Compare calculated batch total after processing to input totals. Cross-Footing and Zero Balance Tests Compute totals using multiple methods to ensure the same results. Write Protection Eliminate possibility of overwriting or erasing existing data. Concurrent Update Locking records or fields when they are being updated so multiple users are not updating at the same time. Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall

Output Controls User Review Reconciliation Data Transmission Controls Verify reasonableness, completeness, and routed to intended individual Reconciliation Data Transmission Controls Check sums Hash of file transmitted, comparison made of hash before and after transmission Parity checking Bit added to each character transmitted, the characters can then be verified for accuracy Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall

Controls Ensuring Availability Systems or information need to be available 24/7 It is not possible to ensure this so: Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall

Minimize Risks Preventive Maintenance Fault Tolerance Cleaning, proper storage Fault Tolerance Ability of a system to continue if a part fails Data Center Location Minimize risk of natural and human created disasters. Training Less likely to make mistakes and will know how to recover, with minimal damage, from errors they do commit Patch Management Install, run, and keep current antivirus and anti-spyware programs Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall

Quick Recovery Back-up Business Continuity Plan (BCP) Incremental Copy only data that changed from last partial back-up Differential Copy only data that changed from last full back-up Business Continuity Plan (BCP) How to resume not only IT operations, but all business processes Relocating to new offices Hiring temporary replacements Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall

Change Control Formal process used to ensure that modifications to hardware, software, or processes do not reduce systems reliability Changes need to be documented. Changes need to be approved by appropriate manager. Changes need to be tested before implementations. All documentation needs to be updated for changes. Back-out plans need to be adopted. User rights and privileges need to be monitored during change. Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall

Disaster Recovery Plan (DRP) Procedures to restore an organization’s IT function in the event that its data center is destroyed Cold Site An empty building that is prewired for necessary telephone and Internet access, plus a contract with one or more vendors to provide all necessary equipment within a specified period of time Hot Site A facility that is not only prewired for telephone and Internet access but also contains all the computing and office equipment the organization needs to perform its essential business activities Second Data-Center Used for back-up and site mirroring Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall