Controlling Information Systems: IT Processes. 2 Learning Objectives Learn the major IT resources Appreciate the problems in providing adequate controls.

Slides:



Advertisements
Similar presentations
Software Quality Assurance Plan
Advertisements

Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Information Technology Control Day IV Afternoon Sessions.
Security and Personnel
How to Document A Business Management System
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Auditing Computer Systems
COBIT - II.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Security Controls – What Works
Information Security Policies and Standards
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Chapter 5 IT Processes Presented by Dr. Mohamed Sammouda.
Managing the Information Technology Resource Jerry N. Luftman
Information Systems Security Officer
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
7.2 System Development Life Cycle (SDLC)
PowerPoint Presentation by Charlie Cook Copyright © 2004 South-Western. All rights reserved. Chapter 8 IT Governance: Management Control of Information.
Stephen S. Yau CSE , Fall Security Strategies.
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
Session 3 – Information Security Policies
1 Performance Auditing  In IT Environment  Evidence Gathering & Analysis Techniques  Computer Assisted Techniques  Use of IDEA.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Elements of Internal Controls Preventing Fraud, Waste, and Abuse in Urban and Rural Transit Systems.
Control environment and control activities. Day II Session III and IV.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Information ITIL Technology Infrastructure Library ITIL.
COBIT - IT Governance.
Controlling Information Systems: IT Processes. 2 Learning Objectives Learn the major IT resources Appreciate the problems in providing adequate controls.
Roles and Responsibilities
Chapter 14 Information System Development
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Chapter 8 - Controlling Information Systems: Introduction to Pervasive Controls Accounting Information Systems 8e Ulric J. Gelinas and Richard Dull © 2010.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
Information Systems Security Operational Control for Information Security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Database Administration
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
Auditing Internal Control Studies & Risk Assessment Chapter 9 Internal Control Studies & Risk Assessment Chapter 9.
Chapter 8 Auditing in an E-commerce Environment
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Database Administration Advanced Database Dr. AlaaEddin Almabhouh.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Welcome. Contents: 1.Organization’s Policies & Procedure 2.Internal Controls 3.Manager’s Financial Role 4.Procurement Process 5.Monthly Financial Report.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Chapter 8 Controlling Information Systems: IT Processes.
Risk Management Dr. Clive Vlieland-Boddy. Managements Responsibilities Strategy – Hopefully sustainable! Control – Hopefully maximising profits! Risk.
Information ITIL Technology Infrastructure Library ITIL.
Review of IT General Controls
Principles of Information Systems Eighth Edition
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Copyright © 2004 South-Western. All rights reserved.
Managing the Delivery of Information Services
Fundamentals of Information Systems, Sixth Edition
TechStambha PMP Certification Training
Controlling Information Systems: IT Processes
County HIPAA Review All Rights Reserved 2002.
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Radiopharmaceutical Production
Presentation transcript:

Controlling Information Systems: IT Processes

2 Learning Objectives Learn the major IT resources Appreciate the problems in providing adequate controls over IT resources Study major IT control processes and practices organization use to manage IT resources Understand how IT and personnel control plans can help an organization achieve its strategic vision for IT Overview the major steps in acquiring and implementing new IT resources Examine business continuity and security controls that help ensure continuous, reliable IT service Value the integral part played by the monitoring function in ensuring the overall effectiveness of a system of internal controls Controlling Information Systems: IT Processes

3 IT Governance vs. Organizational Governance Organizational governance: processes employed by organizations to select and attain objectives. IT governance: processes to see that that the organization’s IT supports the attainment of organizational objectives.

4 Control Objectives for Information Technology (COBIT) Developed by the Information Systems Audit and Control Foundation to provide guidance—to managers, users, and auditors—on the best practices for the management of information technology. According to COBIT –IT resources must be managed by IT control processes to ensure that the organization has the information it needs to achieve its objectives. –Exhibit 8.1 defines the IT resources that must be managed and Chapter 1 describes the qualities that this information must exhibit in order for it to be of value to the organization.

5 IT Resources Data: Objects in their widest sense (i.e., external and internal), structured and nonstructured, graphics, sound, etc. Application systems: Application systems are understood to be the sum of manual and programmed procedures reflecting business processes. Technology: Technology covers hardware, operating systems, database management systems, networking, multimedia, etc. Facilities: Facilities are all resources used to house and support information systems. People: People include staff skills; awareness; and productivity to plan, organize, acquire, deliver, support, and monitor information systems and services.

6 A Hypothetical Computer System The IT resources are typically configured with some or all of the elements shown in Figure 8.1 This computer system consists of one or more mainframe computers connected to several networked client computers (CCs) and PCs perhaps through an LAN and to PCs and CCs located in the organization’s other facilities, perhaps through a WAN Computer facilities operated by other organizations are connected, perhaps via the Internet and through a firewall to the mainframe, servers, and PCs.

7 Hypothetical Computer System: Figure 8.1

8 Questions for the IT Control Process How we can protect the computer from misuse, whether intentional or inadvertent, from within and outside the organization? How do we protect the computer room, and other rooms and buildings where connected facilities are located? Do we have disaster plans in place for continuing our operations? What policies and procedures should be established to provide for efficient, effective, and authorized use of the computer? What measures can we take to help ensure that the personnel who operate and use the computer are competent and honest?

9 Information System Function The ISF is the dept. or function that develops and operates information systems –Centralized: CIO is central leader of all information system functions –Decentralized: Assigns personnel to non-central (e.g., departments) organizational units –Functional organization: Assigns personnel to skills-based units (e.g., programming, systems analysis). Used by both decentralized and centralized organizations –Matrix: Assembles work groups or teams, comprised of members from different functional areas, under the authority of a team leader –Project: Establishes permanent systems development structures such as “Financial Systems Development”

10 Centralized Information System Organization

11 Summary of Information Systems Functions

12 Summary of Information Systems Functions (continued)

13 Summary of Information Systems Functions (continued)

14 COBIT COBIT organizes IT internal control into domains and process Domains include: –Planning and organization –Acquisition and implementation –Delivery and support –Monitoring Processes detail steps in each domain

15 IT Control Domains and Processes

16 IT Control Processes & Domains Planning & Organization Domain –IT Process 1: Establish strategic vision –IT Process 2: Develop tactics to realize strategic vision Acquisition & Implementation Domain –IT Process 3: Identify automated solutions –IT Process 4: Develop & acquire IT solutions –IT Process 5: Integrate IT solutions into operations –IT Process 6: Manage change to existing IT systems

17 IT Control Processes & Domains (cont.) Delivery & Support Domain –IT Process 7: Deliver required IT services –IT Process 8: Ensure security & continuous service –IT Process 9: Provide support services Monitoring Domain –IT Process 10: Monitor Operations

18 IT Process 1 Elements of Strategic IT Plan 1.A summary of the organizational strategic plan’s goals and strategies, and how they are related to the information systems function. 2.IT goals and strategies, and a statement of how each will support organizational goals and strategies. 3.An information architecture model encompassing the corporate data model and the associated information systems. 4.An inventory of current information systems capabilities.

19 IT Process 1: Elements of Strategic IT Plan 5.Acquisition and development schedules for hardware, software, and application systems and for personnel and financial requirements. 6.IT-related requirements to comply with industry, regulatory, legal, and contractual obligations, including safety, privacy, transborder data flows, e-Business, and insurance contracts. 7.IT risks and risk action plan 8.Process for modifying the plan to accommodate changes to the organization’s strategic plan and changes in information technology conditions.

20 IT Control Domains and Processes

21 IT Process 2 Tactics to Plan, Communicate & Manage Vision Ensure overall effectiveness Ensure projects are completed on time Ensure quality projects –Organizational Control Plans for the Information Systems Function –Personnel Control Plans

22 Organizational Control Plans Segregation of Duties –Within IS function Controlling for Input Accuracy, Update Accuracy, Security of Resources –Reducing Risk of: Erroneous recordkeeping, Erroneous management decisions, embezzlement or loss of resources Information System Function

23 Segregating 4 IS Functions Authorizing Events (non ISF) Executing Events (non ISF) Recording Events Safeguarding Resources attributed to/from Events (non ISF)

24 Segregation of Duties

25 Segregation of Duties Applied to IS Function

26 IT Process 2: Organizational Control Plans Organizational Control Plans for the Information Systems Function –The information systems function (ISF) normally acts in a service capacity for other operating units in the organization. In this role, it should be limited to recording events and posting event summaries. –Approving and executing events along with safeguarding resources should be carried out by departments other than IS.

27 IT Process 2: Organizational Control Plans Within the ISF we segregate duties –Data librarian grants access to stored data and programs to authorized personnel to reduce the risk of unauthorized computer operation by programmers or unauthorized programming by operators. –The security officer assigns passwords, monitors employees’ network access, grants security clearance for sensitive projects, and works with human resources on interview practices and background checks –The information technology steering committee Coordinates the organizational and IT strategic planning processes Reviews and approves the strategic IT plan Helps the organization establish and meet user information requirements Help ensure effective and efficient use of IT resources. The committee should consist of about seven executives from major functional areas of the organization, including the information systems executive; report to senior management; and meet regularly.

28 IT Process 2: Personnel Control Plans Selection & Hiring Control Plans –Qualified personnel including technical background Retention Control Plans –Retaining may be harder than hiring –Provide challenging work and opportunities for advancement Personnel Development Control Plans –Training and development Personnel Management Control Plans –Personnel Planning Control Plans Skills, Turnover, Filling Positions –Job Description Control Plans Job descriptions written and updated –Supervision Control Plans Approving, monitoring, and observing the work of others –Personnel Security Control Plans Rotation of duties, Forced vacations, Bonding –Personnel Termination Control Plans procedures when an employee voluntarily or involuntarily leaves an organization.

29 IT Control Domains and Processes

30 IT Process 3: Identify Automated Solutions To ensure selection of the best approach to satisfying users’ IT requirements, an organization’s systems development lifecycle must include procedures to: –define information requirements –formulate alternative courses of action –perform technological, economic, and operational feasibility studies; –assess risks Solutions should be consistent with the strategic information technology plan At completion of this process –Organization must decide what approach will be taken to satisfy users’ requirements, and whether it will develop the IT solution in- house or will contract with third parties for all or part of the development

31 IT Process 4 Develop/Acquire IT Solutions Develop and Acquire Application Software Acquire Application Infrastructure Develop Service Level Requirements and Application Documentation which typically includes the following: –Systems documentation –Program documentation –Operations run manuals –User manuals –Training materials

32 IT Process 5: Integrate IT Solutions Into Operational Processes To ensure that a new or significantly revised system is suitable, the organization’s SDLC should provide for a planned, tested, controlled, and approved conversion to the new system. After installation, the SDLC should call for a review to determine that the new system has met users’ needs in a cost-effective manner. When organizations implement enterprise systems, the successful integration of new information systems modules into existing information and operations processes becomes more difficult and more important.

33 IT Process 6: Manage Changes to Existing IT Systems To ensure processing integrity between versions of systems and to ensure consistency of results from period to period, changes to the IT infrastructure (hardware, systems software, and applications) must be managed via change request, impact assessment, documentation, authorization, release and distribution policies, and procedures. Program change controls provide assurance that all modifications to programs are authorized, and ensure that the changes are completed, tested, and properly implemented. Changes in documentation should mirror the changes made to the related programs.

34 IT Control Domains and Processes

35 IT Process 7: Deliver Required IT Services 1.Define service levels 2.Manage Third-party services 3.Manage IT Operations 4.Manage data (backup) 5.Identify and allocate costs

36 IT Process 8: Ensure Security & Continuous Service Ensure Continuous Service –Disaster recovery planning; Contingency planning; Business interruption planning; Business continuity planning. Restricting Access to Computing Resources –Restrict physical access to computer facilities. –Restrict logical access to stored programs, data, and documentation. Ensure Physical Security –Smoke detectors, fire alarms, fire extinguishers, fire-resistant construction materials, insurance –Waterproof ceilings, walls, and floors; adequate drainage; water and moisture detection alarms; insurance –Regular cleaning of rooms and equipment, dust-collecting rugs at entrances, separate dust-generating activities from computer, good housekeeping –Voltage regulators, backup batteries and generators

37 IT Process 8 (Cont.)

38 IT Process 9: Provide Support Services Identify the training needs of all personnel, internal and external, who make use of the organization’s information services, and should see that timely training sessions are conducted. Assistance through a “help desk” function

39 IT Control Domains and Processes

40 IT Process 10: Monitor Operations Gather data about processes Generate performance reports