Chapter 12-1. Chapter 12-2 Chapter 12: Computer Controls for Organizations and Accounting Information Systems Introduction General Controls for Organizations.

Slides:



Advertisements
Similar presentations
MODERN AUDITING 7th Edition
Advertisements

© Copyright 2011 John Wiley & Sons, Inc.
Core Concepts of ACCOUNTING INFORMATION SYSTEMS Moscove, Simkin & Bagranoff John Wiley & Sons, Inc. Developed by: S. Bhattacharya, Ph.D. Florida Atlantic.
Auditing Computer-Based Information Systems
Chapter 5: Database Forms and Reports
Auditing Computer Systems
9 - 1 Computer-Based Information Systems Control.
The Islamic University of Gaza
ACCOUNTING INFORMATION SYSTEMS
Financial Accounting, Fifth Edition
Chapter Chapter 13-2 Chapter 13 Data Modeling Introduction An Overview of Databases Steps in Creating a Database Using Rea Creating Database Tables.
MODERN AUDITING 7th Edition
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Dr. Raymond N. Johnson, CPA MODERN AUDITING 7th Edition Developed by: Raymond N. Johnson Portland Sate University John Wiley & Sons, Inc. William C. Boynton.
Copyright 2010 John Wiley & Sons, Inc.
Chapter 3: Data Modeling
5th Edition, Irv Englander
CHAPTER 2: Introduction to Systems Concepts and Systems Architecture
Chapter 9 Computer Controls for Accounting Information Systems
12-1 Planning for Information Technology and Systems.
Module 4: The Human Resource Management Cycle
2-1 Information Technologies Concepts and Management.
Accounting Information Systems, 1st Edition
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Chapter 13 Prepared by Richard J. Campbell Copyright 2011, Wiley and Sons Auditing Human Resources Processes: Personnel and Payroll in Service Industries.
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 © John Wiley & Sons, Inc. All rights reserved. Slide 1 Systems.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Introduction to Databases Chapter 1: Introducing Data and Data Management.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 6-1 Introduction to Information Technology.
Chapter 8 Introduction to Internal Control Systems
ACCOUNTING INFORMATION SYSTEMS
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Core Concepts of ACCOUNTING INFORMATION SYSTEMS Moscove, Simkin & Bagranoff John Wiley & Sons, Inc. Developed by: Marianne Bradford, Ph.D. Bryant College.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Chapter 12: Computer Controls
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design, 2 nd Edition Copyright 2003 © John Wiley & Sons, Inc. All rights reserved.
Implications of Information Technology for the Audit Process
Chapter 2 Information Technology and AISs
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 © John Wiley & Sons, Inc. All rights reserved. Slide 1 Systems.
PowerPoint Presentation for Dennis, Wixom & Tegarden Systems Analysis and Design Copyright 2001 © John Wiley & Sons, Inc. All rights reserved. Slide 1.
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 © John Wiley & Sons, Inc. All rights reserved. Slide 1 Systems.
Chapter Chapter 13-2 Accounting Information Systems, 1 st Edition Data and Databases.
© Copyright 2011 John Wiley & Sons, Inc.
Slide 3-1 Chapter 3 Terms Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
Chapter 101 The Design Process Chapter 10 Achieving Quality Through Continual Improvement Claude W. Burrill / Johannes Ledolter Published by John Wiley.
Chapter 14 Prepared by Richard J. Campbell Copyright 2011, Wiley and Sons Auditing Inventory Processes: Tracking and Costing Products in the Land Development.
13-1 COBOL for the 21 st Century Nancy Stern Hofstra University Robert A. Stern Nassau Community College James P. Ley University of Wisconsin-Stout (Emeritus)
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved
Chapter 16 Information and Operations Management 1e Management 1e - 2 Management 1e Learning Objectives  Explain how managers use controls.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Slide 1-1 Chapter 1 Terms Information Systems Overview Introduction to Information Systems Judith C. Simon.
Slide 1-1 Chapter 1 Information Systems Overview Introduction to Information Systems Judith C. Simon.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Slide 2-1 Chapter 2 Information Systems in Organizations Introduction to Information Systems Judith C. Simon.
Chapter 9: Introduction to Internal Control Systems
MODERN AUDITING 7th Edition Developed by: Gregory K. Lowry, MBA, CPA Saint Paul’s College John Wiley & Sons, Inc. William C. Boynton California Polytechnic.
A- 1. A- 2 Appendix B Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
K-1. K-2 Appendix K Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc 2-1 Introduction to Information Technology 2.
Slide 11-1 Chapter 11 Terms Information Resource Management Strategies Introduction to Information Systems Judith C. Simon.
Systems Analysis and Design
Dinesh Mirchandani University of Missouri – St. Louis
Using Technology to Manage Information
Systems Analysis and Design
Chapter 1: The Study of Accounting Information Systems
Financial Accounting, Fifth Edition
Accounting Information Systems: Essential Concepts and Applications Fourth Edition by Wilkinson, Cerullo, Raval, and Wong-On-Wing Module 1: Decision Making,
Systems Analysis and Design
Presentation transcript:

Chapter 12-1

Chapter 12-2 Chapter 12: Computer Controls for Organizations and Accounting Information Systems Introduction General Controls for Organizations General Controls for Information Technology Application Controls for Transaction Processing

Chapter 12-3 General Controls For Organizations Integrated Security for the Organization Organization-Level Controls Personnel Policies File Security Controls Business Continuity Planning Computer Facility Controls Computer Access Controls

Chapter 12-4 Developing a Security Policy

Chapter 12-5 Integrated Security for the Organization Physical Security  Measures used to protect its facilities, resources, or proprietary data stored on physical media Logical Security  Limit access to system and information to authorized individuals Integrated Security  Combines physical and logical elements  Supported by comprehensive security policy

Chapter 12-6 Physical and Logical Security

Chapter 12-7 Organization-Level Controls Consistent policies and procedures Management’s risk assessment process Centralized processing and controls Controls to monitor results of operations

Chapter 12-8 Organization-Level Controls Controls to monitor the internal audit function, the audit committee, and self- assessment programs Period-end financial reporting process Board-approved policies that address significant business control and risk management practices

Chapter 12-9 Personnel Policies Separation of Duties  Separate Accounting and Information Processing from Other Subsystems  Separate Responsibilities within IT Environment Use of Computer Accounts  Each employee has password protected account  Biometrics

Chapter Separation of Duties

Chapter Division of Responsibility in IT Environment

Chapter Division of Responsibility in IT Environment

Chapter Personnel Policies Informal Knowledge of Employees  Protect against fraudulent employee actions  Observation of suspicious behavior  Highest percentage of fraud involved employees in the accounting department  Must safeguard files from intentional and unintentional errors

Chapter Safeguarding Computer Files

Chapter File Security Controls

Chapter Business Continuity Planning Definition  Comprehensive approach to ensuring normal operations despite interruptions Components  Disaster Recovery  Fault Tolerant Systems  Backup

Chapter Disaster Recovery Definition  Process and procedures  Following disruptive event Summary of Types of Sites  Hot Site  Flying-Start Site  Cold Site

Chapter Fault Tolerant Systems Definition  Used to deal with computer errors  Ensure functional system with accurate and complete data (redundancy) Major Approaches  Consensus-based protocols  Watchdog processor  Utilize disk mirroring or rollback processing

Chapter Backup Batch processing  Risk of losing data before, during, and after processing  Grandfather-parent-child procedure Types of Backups  Hot backup  Cold Backup  Electronic Vaulting

Chapter Batch Processing

Chapter Computer Facility Controls Locate Data Processing Centers in Safe Places  Protect from the public  Protect from natural disasters (flood, earthquake) Limit Employee Access  Security Badges  Man Trap Buy Insurance

Chapter A _______ is a comprehensive plan that helps protect the enterprise from internal and external threats. A.Firewall B.Security policy C.Risk assessment D.VPN Study Break #1

Chapter A _______ is a comprehensive plan that helps protect the enterprise from internal and external threats. A.Firewall B.Security policy C.Risk assessment D.VPN Study Break #1 - Answer

Chapter All of the following are considered organization-level controls except: A.Personnel controls B.Business continuity planning controls C.Processing controls D.Access to computer files Study Break #2

Chapter All of the following are considered organization-level controls except: A.Personnel controls B.Business continuity planning controls C.Processing controls D.Access to computer files Study Break #2 - Answer

Chapter Fault-tolerant systems are designed to tolerate computer errors and are built on the concept of _________. A.Redundancy B.COBIT C.COSO D.Integrated security Study Break #3

Chapter Fault-tolerant systems are designed to tolerate computer errors and are built on the concept of _________. A.Redundancy B.COBIT C.COSO D.Integrated security Study Break #3 - Answer

Chapter General Controls for Information Technology Security for Wireless Technology Controls for Networks Controls for Personal Computers IT Control Objectives for Sarbanes-Oxley

Chapter General Controls for Information Technology IT general controls apply to all information systems Major Objectives  Computer programs are authorized, tested, and approved before usage  Access to programs and data is limited to authorized users

Chapter Control Concerns

Chapter Security for Wireless Technology Utilization of wireless local area networks Virtual Private Network (VPN)  Allows remote access to entity resources Data Encryption  Data converted into a scrambled format  Converted back to meaningful format following transmission

Chapter Controls for Networks Control Problems  Electronic eavesdropping  Hardware or software malfunctions  Errors in data transmission Control Procedures  Checkpoint control procedure  Routing verification procedures  Message acknowledgment procedures

Chapter Controls for Personal Computers Take an inventory of personal computers Applications utilized by each personal computer Classify computers according to risks and exposures Physical security

Chapter Additional Controls for Laptops

Chapter IT Control Objectives for Sarbanes-Oxley “IT Control Objectives for Sarbanes-Oxley”  Issued by IT Governance Institute (ITGI)  Provides guidance for compliance with SOX and PCAOB requirements Content  IT controls from COBIT  Linked to PCAOB standards  Linked to COSO framework

Chapter Application Controls for Transaction Processing Purpose  Embedded in business process applications  Prevent, detect, and correct errors and irregularities Application Controls  Input Controls  Processing Controls  Output Controls

Chapter Application Controls for Transaction Processing

Chapter Input Controls Purpose  Ensure validity  Ensure accuracy  Ensure completeness Categories  Observation, recording, and transcription of data  Edit tests  Additional input controls

Chapter Observation, Recording, and Transcription of Data Confirmation mechanism Dual observation Point-of-sale devices (POS) Preprinted recording forms

Chapter Preprinted Recording Form

Chapter Edit Tests Input Validation Routines (Edit Programs)  Programs or subroutines  Check validity and accuracy of input data Edit Tests  Examine selected fields of input data  Rejects data not meeting preestablished standards of quality

Chapter Edit Tests

Chapter Edit Tests

Chapter Additional Input Controls Unfound-Record Test  Transactions matched with master data files  Transactions lacking a match are rejected Check-Digit Control Procedure Modulus 11 Technique

Chapter Processing Controls Purpose  Focus on manipulation of accounting data  Contribute to a good audit trail Two Types  Control totals  Data manipulation controls

Chapter Audit Trail

Chapter Control Totals Common Processing Control Procedures  Batch control total  Financial control total  Nonfinancial control total  Record count  Hash total

Chapter Data Manipulation Controls Data Processing  Following validation of input data  Data manipulated to produce decision-useful information Processing Control Procedures  Software Documentation  Error-Testing Compiler  Utilization of Test Data

Chapter Output Controls Purpose  Ensure validity  Ensure accuracy  Ensure completeness Major Types  Validating Processing Results  Regulating Distribution and Use of Printed Output

Chapter Output Controls Validating Processing Results  Preparation of activity listings  Provide detailed listings of changes to master files Regulating Distribution and Use of Printed Output  Forms control  Pre-numbered forms  Authorized distribution list

Chapter A ______ is a security appliance that runs behind a firewall and allows remote users to access entity resources by using wireless, hand-held devices. A.Data encryption B.WAN C.Checkpoint D.VPN Study Break #4

Chapter A ______ is a security appliance that runs behind a firewall and allows remote users to access entity resources by using wireless, hand-held devices. A.Data encryption B.WAN C.Checkpoint D.VPN Study Break #4 - Answer

Chapter Organizations use ______ controls to prevent, detect, and correct errors and irregularities in transactions that are processed. A.Specific B.General C.Application D.Input Study Break #5

Chapter Organizations use ______ controls to prevent, detect, and correct errors and irregularities in transactions that are processed. A.Specific B.General C.Application D.Input Study Break #5 - Answer

Chapter Copyright Copyright 2010 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make backup copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

Chapter Chapter 12