MODULE 12 Control Audit And Security Of Information System 12.1 Controls in Information systems 12.2 Need and methods of auditing Information systems 12.3.

Slides:



Advertisements
Similar presentations
Chapter 6 Computer Assisted Audit Tools and Techniques
Advertisements

Presented to the Tallahassee ISACA Chapter
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
General Ledger and Reporting System
Auditing Computer-Based Information Systems
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
9 - 1 Computer-Based Information Systems Control.
Software Quality Assurance (SQA). Recap SQA goal, attributes and metrics SQA plan Formal Technical Review (FTR) Statistical SQA – Six Sigma – Identifying.
Documentation Testing
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
Database Integrity, Security and Recovery Database integrity Database integrity Database security Database security Database recovery Database recovery.
IS Security Control & Management. Overview n Why worry? n Sources, frequency and severity of problems n Risks to computerized vs. manual systems n Purpose.
Data Model Examples: DFD’s and System Flowcharts
1 Output Controls Ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. Exposures of this sort can cause serious.
1 Transaction Management Database recovery Concurrency control.
Processing Integrity and Availability Controls
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
General Ledger and Reporting System
©Ian Sommerville 2006Critical Systems Slide 1 Critical Systems Engineering l Processes and techniques for developing critical systems.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
E.R.P.S University of Palestine. Risks in an ERP environment : The use of ERP systems clearly introduces additional risks into the system environment.
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
Introduction to Accounting 120
Today’s Lecture application controls audit methodology.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
The Islamic University of Gaza
Cmpe 471 Computer Crime: Techniques and Countermeasures.
Update from Business Week Number of Net Fraud Complaints – 2002 – 48,252 – 2004 – 207,449.
1 BTEC HNC Systems Support Castle College 2007/8 Systems Analysis Lecture 9 Introduction to Design.
Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing.
Chapter 13 Sequential File Processing. Master Files Set of files used to store companies data in areas like payroll, inventory Usually processed by batch.
Transaction Processing System
Chapter 7 Control and AIS. Threats to AIS Natural disasters –DSM flood (p. 249) Political disasters –Terrorism Cyber crime (as opposed to general terrorism)
Information Systems Security Operational Control for Information Security.
Checking data Chapter 7 Prepared by:Sir Mazhar Javed.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Objectives of Control The objectives of control are:  To ensure that all data are processed  To preserve the integrity of maintained data  To detect,
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
S4: Understanding the IT environment of the entity.
MODULE 12 CONTROL AUDIT AND SECURITY OF INFORMATION SYSTEM 12.1 Controls in Information systems 12.2 Need and methods of auditing Information systems 12.3.
Sequential Files Chapter 13. Master Files Set of files used to store companies data in areas like payroll, inventory Set of files used to store companies.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
Database Security Outline.. Introduction Security requirement Reliability and Integrity Sensitive data Inference Multilevel databases Multilevel security.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Today’s Lecture Covers
MBA 664 Database Management Dave Salisbury ( )
PRESENTER PRIYANKA GUPTA.  Testing the complete system with respect to requirements.  In System testing, the functionalities of the system are tested.
CONTROLLING INFORMATION SYSTEMS
©Ian Sommerville 2000Dependability Slide 1 Chapter 16 Dependability.
Auditing Of Information Systems Systems Analysis And Design © Systems Analysis And Design © V. Rajaraman OBJECTIVES  Ensure computer based financial and.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
Topic: Reliability and Integrity. Reliability refers to the operation of hardware, the design of software, the accuracy of data or the correspondence.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Welcome to the ICT Department Unit 3_5 Security Policies.
INFORMATION SYSTEMS SECURITY AND CONTROL.
Reporting and Interpreting Sales Revenue, Receivables, and Cash
Processing Integrity and Availability Controls
Managing the IT Function
The Impact of Information Technology on the Audit Process
The Impact of Information Technology on the Audit Process
Designing and Debugging Batch and Interactive COBOL Programs
INFORMATION SYSTEMS SECURITY and CONTROL
System Testing.
Presentation transcript:

MODULE 12 Control Audit And Security Of Information System 12.1 Controls in Information systems 12.2 Need and methods of auditing Information systems 12.3 Testing Information systems 12.4 Security of Information systems Systems Analysis And Design © Systems Analysis And Design © V. Rajaraman Learning Units

Learning Goals Systems Analysis And Design © Systems Analysis And Design © V. Rajaraman 1 of 27  Why controls are necessary in Information systems  Methods of controlling Information systems  How controls are introduced in Information systems  Why Information systems need auditing  How are systems audited  The methods used to test Information systems  How the security of an Information system is ensured

Motivation For Controls Systems Analysis And Design © Systems Analysis And Design © V. Rajaraman 2 of 27  It is very important to ensure the reliability of reports produced by an information system  If unreliability is seen by users the entire credibility of the system is lost  Ensuring reliability is not difficult for small systems but when a system has to handle massive data it is a challenge  Systematic controls are thus essential when a system is designed

Motivation For Audits Systems Analysis And Design © Systems Analysis And Design © V. Rajaraman 3 of 27  Many organizations are now entirely dependent on computer based information system  These information systems contain financial data and other critical procedures  It is essential to protect the systems against frauds and ensure that sound accounting practices are followed  It is necessary to trace the origin and fix responsibilities when frauds occur  Audit methods primary purpose is to ensure this.

Motivation For Testing Systems Analysis And Design © Systems Analysis And Design © V. Rajaraman 4 of 27  Systems contain many individual subsystems  Usually sub-systems and programs are individually tested  However when a whole system is integrated unforeseen errors may be seen  Thus before releasing a system the entire operational system should be tested for correctness and completeness

Motivation For Security Systems Analysis And Design © Systems Analysis And Design © V. Rajaraman 5 of 27  Systems contain sensitive data about the organization and also about persons working in the organization  Sensitive data should be protected from spies, thieves or disgruntled employees.  Thus access should be carefully controlled and provided only on a need to know basis  When computers are networked corruption/erasure may take place due to viruses  Services may be disrupted due to denial of service attacks  Thus systems should be designed with appropriate security measures.

Motivation For Disaster Recovery Systems Analysis And Design © Systems Analysis And Design © V. Rajaraman 6 of 27  Organizations depend on Information systems for their entire operations  It is thus essential to ensure continuity of service when unforeseen situations such as disk crashes,fires,floods and such disasters take place.  Thus it is essential to ensure quick recovery from disasters and ensure continuity of service.

Systems Analysis And Design © Systems Analysis And Design © V. Rajaraman Control Audit And Security Of Information System CONTROL- Method to ensure that a system processes data as per design and that all data is included and are correct AUDIT AND TESTING - Ensure that the system is built as per specifications and that processed results are correct. Protect systems from frauds. SECURITY- Protection of data resources,programs,and equipment from illegal use,theft,vandalism,accidents, disasters etc. 7 of

Need Of Controls Systems Analysis And Design © Systems Analysis And Design © V. Rajaraman Information systems handle massive amounts of data – accidents such as not including some data can cause serious damage Incorrect data entry can lead to high monetary losses Credibility in the information system may be lost if errors are found in operational systems 8 of

Objectives Of Controls Systems Analysis And Design © Systems Analysis And Design © V. Rajaraman To make sure data entering the computer are correct Check clerical handling of data before it is input to a computer Provide means of detecting and tracing errors which occur due to bad data or bad program Ensure legal requirements are met To guard against frauds 9 of

Control Techniques Systems Analysis And Design © Systems Analysis And Design © V. Rajaraman ORGANIZATIONAL MEASURES Well defined responsibility for input preparation, delivery output use, operation and maintenance - Changes in program and data (if any) should be documented - Performance of task and recording must be by different persons to prevent frauds 10 of

Systems Analysis And Design © Systems Analysis And Design © V. Rajaraman Control Techniques INPUT PREPARATOIN CONTROL -Sequence numbering -Batch controls -Data entry and verification -Record totals -Self checking digits, (Covered in Module 7) 11 of

Processing Controls Systems Analysis And Design © Systems Analysis And Design © V. Rajaraman  PROOF FIGURES –An additional data element introduced to detect data entry/processing error Example:item code,qty supplied,cost/unit,proof cost(proof cost is additional data introduced. Proof cost=(H-cost/unit)where H is a constant > maxcost Check if H  qty =  qty *proof cost +  qty * cost/unit If two sides are not equal, there is an error. 12 of

Processing Controls Systems Analysis And Design © Systems Analysis And Design © V. Rajaraman  TWO WAY CHECK – Calculate same qty in two different ways and they should be equal Example :  gross pay -  deductions =  net pay  RELATIONSHIP CHECK –We know relation between variable. Example : Rebate total =  Sales * discount percent  CHECKPOINT RESTART – Periodical storing of process state. If there is a failure roll back to saved state and restart computation.  CHECK POINTS also useful to check intermediate results in long and complex calculations.Region where an error occurred can thus be isolated 13 of