• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/135

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

135 Cards in this Set

  • Front
  • Back
Threat
A threat is any potential adverse occurrence or unwanted event that could injure the AIS or the organization
exposure or impact
of the threat is the potential dollar loss that would occur if the threat becomes a reality
One of the primary objectives of an AIS
is to control a business organization
Management expects accountants to
eliminating system threats; and
Detect, correct, and recover from threats when they do occur
Internal control
is the process implemented by the board of directors, management, and those under their direction to provide reasonable assurance that the following control objectives are achieved

Assets (including data) are safeguarded
Records are maintained in sufficient detail to accurately and fairly reflect company assets
Accurate and reliable information is provided
There is reasonable assurance that financial reports are prepared in accordance with GAAP
Operational efficiency is promoted and improved
Adherence to prescribed managerial policies is encouraged
The organization complies with applicable laws and regulations
Internal control provides
reasonable, rather than absolute, assurance
Internal control systems have inherent limitations, including
They are susceptible to errors and poor decisions
They can be overridden by management or by collusion of two or more employees
Internal control is a process because
It permeates an organization’s operating activities
It is an integral part of basic management activities
Internal controls perform three important functions
Preventive controls
Detective controls
Corrective controls
Internal controls are segregated into two categories
General controls (entity level
Section 404 of SOX requires
States management is responsible for establishing and maintaining an adequate internal control structure and procedures
Contains management’s assessment of the company’s internal controls
Attests to the accuracy of the internal controls, including disclosures of significant defects or material noncompliance found during the tests
companies develop good internal control systems. Three of the most important are
The COBIT framework
The COSO internal control framework
COSO’s Enterprise Risk Management framework (ERM)
COBIT
Control Objectives for Information and Related Technology )
COBIT
Business objectives
IT resources
IT processes
COSO
The Committee of Sponsoring Organizations) (COSO) is a private sector group consisting of
COSO
Defines internal controls
Provides guidance for evaluating and enhancing internal control systems
Widely accepted as the authority on internal controls
Incorporated into policies, rules, and regulations used to control business activities
COSO’s internal control model has five crucial components
Control environment
Risk assessment
Control activities
Information and communication
Monitoring
ERM
Enterprise Risk Manage Integrated Framework
ERM
An enhanced corporate governance document
Expands on elements of preceding framework
Provides a focus on the broader subject of enterprise risk management
ERM defines risk management as
A process effected by an entity’s board of directors, management, and other personnel
Applied in strategy setting and across the enterprise
To identify potential events that may affect the entity
And manage risk to be within its risk appetite
In order to provide reasonable assurance of the achievement of entity objectives
Major ERM objectives
Strategic objectives, Operations objectives, Reporting objectives, Compliance objectives
Major ERM control components
Internal environment
Objective setting
Event identification
Risk Assessment
Risk response
Control activities
Information and Communication
Monitoring
The ERM model is
three-dimensional
Internal environment consists of the following
Management’s philosophy, operating style, and risk appetite
The board of directors
Audit committee
Commitment to integrity, ethical values, and competence
Organizational structure
Methods of assigning authority and responsibility
Human resource standards
External influences
why the company exists
corporate vision or mission
COSO identified many
many internal and external factors that could influence events and affect a company’s ability to implement strategy and achieve objectives
Companies should
Assess inherent risk / Develop a response / Then assess residual risk
The ERM model indicates four ways to respond to risk
Reduce it / Accept it / Share it / Avoid it
Jack Donaghy is trying to decide whether to install a motion detector system in the “TGS with Tracy Jordan” custom warehouse (located in the GE building) to reduce the probability of a catastrophic theft
A catastrophic theft could result in losses of $800,000
Local crime statistics suggest that the probability of a catastrophic theft at the GE building is 12%
Companies with motion detectors only have about a 0.5% probability of catastrophic theft
The present value of purchasing and installing a motion detector system and paying future security costs is estimated to be about $43,000
Expected loss without control procedure = $800,000 x .12 = $96,000.
Expected loss = Impact x Likelihood
Expected loss with control procedure = $800,000 x .005 = $4,000.
Estimated value of control procedure = $96,000 - $4,000 = $92,000.
Estimated cost of control procedure = $43,000 (given).
Benefits exceed costs by $92,000 - $43,000 = $49,000.
Control activities
are policies, procedures, and rules that provide reasonable assurance that management’s control objectives are met and their risk responses are carried out
control procedures fall into one of the following categories
Proper authorization of transactions and activities
Segregation of duties
Project development and acquisition controls
Change management controls
Design and use of documents and records
Safeguard assets, records, and data
Independent checks on performance
levels of authorization
General authorization
Management authorizes employees to handle routine transactions without special approval
Special authorization
For activities or transactions that are of significant consequences, management review and approval is required.
Might apply to sales, capital expenditures, or write-offs over a particular dollar limit
Effective segregation of accounting duties is achieved when the following functions are separated
Authorization – approving transactions and decisions
Recording – preparing source documents; maintaining journals, ledgers, or other files; preparing reconciliations; and preparing performance reports
Custody – handling cash, maintaining an inventory storeroom, receiving incoming customer checks, writing checks on the organization’s bank account
collusion
would override segregation and renders the segregation of duties useless
Authority and responsibility must be divided clearly among the following functions
Systems administration
Network management
Security management
Change management
Users
Systems analysts
Programming
Computer operations
Information systems library
Data control
in order to reduce the potential for cost overruns and project failure and to improve the efficiency and effectiveness of the IS
Strategic master plan
Project controls
Data processing schedule
Steering committee
System performance measurements
Post-implementation review
Change management is the process of making sure that the changes do not negatively affect
Systems reliability
Security
Confidentiality
Integrity
Form and content should be kept as simple as possible to
Promote efficient record keeping
Minimize recording errors
Facilitate review and verification
Maintain accurate records of all assets
Periodically reconcile recorded amounts to physical counts
Restrict access to assets
Protect records and documents
Segregation of duties only has value when supplemented by
independent checks
The following independent checks are typically used
Top-level reviews
Management at all levels should monitor company results and periodically compare actual performance
Analytical reviews
Examinations of relationships between different sets of data
Reconciliation of independently maintained sets of records
Check the accuracy and completeness of records by reconciling them with other records that should have the same balance
Comparison of actual quantities with recorded amounts
Periodically, count significant assets and reconcile the count to company records
Double-entry accounting
Ensure that debits equal credits
Independent review
After one person processes a transaction, another reviews their work
According to the AICPA, an AIS has five primary objectives
Identify and record all valid transactions
Properly classify transactions
Record transactions at their proper monetary value
Record transactions in the proper accounting period
Properly present transactions and related disclosures in the financial statements
Monitoring can be
Perform ERM evaluation
Implement effective supervision
Use responsibility accounting
Monitor system activities
Track purchased software
Conduct periodic audits
To monitor risk and detect fraud and errors, the company should have periodic
External audits
Internal audits
Special network security audits
Auditors should test system controls and browse system usage files looking for suspicious activities (discussed in Chapter 9).
Employ a computer security officer, a Chief Compliance Officer, and security consultants
Engage forensic specialists
Install fraud detection software
Implement a fraud hotline
SOX mandates that companies set up mechanisms for employees to anonymously report abuses such as fraud.
An effective way to comply with the law and resolve employee concerns is to provide access to an anonymous hotline.
Anonymous reporting can be accomplished through
Phone lines
Web-based reporting
Anonymous emails
Snail mail
Chapt 7
Chapt 7
The five basic principles that contribute to systems reliability
Security
Confidentiality
Privacy
Processing Integrity
Availability
COBIT information criteria
Effectiveness
Efficiency
Confidentiality
Integrity
Availability
Compliance
Reliability
COBIT domains
Plan and organize
Acquire and implement
Deliver and support
Monitor and evaluate
three fundamental information security concepts
Security as a management issue, not a technology issue
The time-based model of security
Defense in depth
Security is a
top management issue
Security
is a key component of the internal control and systems reliability to which management must attest
in the COSO model, management’s philosophy and operating style are critical
to an effective control environment
The Trust Services framework identifies four essential criteria
Develop and document policies
Effectively communicate those policies to all authorized users
Design and employ appropriate control procedures to implement those policies
Monitor the system, and take corrective action to maintain compliance with the policies
Developing a comprehensive set of security policies begins with taking an inventory of information systems resources, including
Hardware
Software
Databases
Once the organization’s information systems resources have been identified
they need to be valued in order to select the most cost-effective control procedures
COBIT stresses that the
CEO and CFO are accountable for ensuring that the organization has implemented a thorough risk assessment program
Technology advances
create new threats and alter the risks associated with existing threats
Effective control involves a continuous cycle of
Developing policies to address identified threats;
Communicating those policies to all employees;
Implementing specific control procedures to mitigate risk;
Monitoring performance; and
Taking corrective action in response to problems
The time-based model of security focuses on implementing a set of
preventive, detective, and corrective controls that enable an organization to recognize that an attack is occurring and take steps to thwart it before any assets have been compromised
The time-based model evaluates the effectiveness of an organization’s security by measuring and comparing the relationship among three variables
P = Time it takes an attacker to break through the organization’s preventive controls.
D = Time it takes to detect that an attack is in progress.
C = Time to respond to the attack.
These three variables are evaluated as follows
If P > (D + C), then security procedures are effective.
Otherwise, security is ineffective
of defense-in-depth
employ multiple layers of controls to avoid having a single point of failure
Reconnaissance
Collecting information to identify potential vulnerabilities
Social Engineering
Tricking unsuspecting employees into allowing access to system
Scan and Map
Detailed scan of system to identify potential points of remote entry
Research
Researching vulnerabilities of software identified during scan
Attack Execution
Unauthorized access to system
Cover
Removing evidence of attack
Preventive
The objective of preventive controls is to prevent security incidents from happening
Detective
Preventive controls are never 100% effective in blocking all attacks
So organizations implement detective controls to enhance security
Corrective
Detection of attempted and successful intrusions is not enough
Therefore, the AICPA Trust Services Framework specifies the need for procedures to react to incidents and to take corrective actions on a timely basis
Authentication
Focuses on verifying the identity of the person or device attempting to gain access
Password
Authorization
Restricts access of authenticated users to specific portions of the system and specifies what actions they are permitted to perform
Training (1st layer)
Employees should be trained to follow safe computing practices
Controlling Physical Access (2nd layer)
It is absolutely essential to achieve any degree of information security
Controlling Remote Access (3rd layer)
It is important to control which information is allowed to enter and leave the organization’s information system
Host and Application Hardening (4th layer)
Information security is enhanced by supplementing preventive controls on the network perimeter with additional preventive controls on the organization’s network
Encryption (5th layer)
Encrypting sensitive stored data provides one last barrier that must be overcome by an intruder
Encryption is the process of transforming normal text, called plaintext, into unreadable gibberish, called cipher-text
Decryption reverses this process
To encrypt or decrypt, both a key and an algorithm are needed
There are two basic types of encryption systems
Symmetric encryption systems
Use the same key to encrypt and decrypt
Asymmetric encryption systems
Use two keys
The public key is publicly available
The private key is kept secret and known only to the owner of that pair of keys
Either key can be used to encrypt
Whichever key is used to encrypt, the other key must be used to decrypt
Hashing
Hashing takes plaintext of any length and transforms it into a short code called a hash
Encryption always produces cipher-text similar in length to the plaintext, but hashing produces a hash of a fixed short length.
Encryption is reversible, but hashing is not; you cannot transform a hash back into its original plaintext
Digital signatures
Asymmetric encryption and hashing are used to create digital signatures
Digital certificate
An electronic document, created and digitally signed by a trusted third party
Log analysis
Most systems come with extensive capabilities for logging who accesses the system and what specific actions each user performed
The log may indicate unsuccessful attempts to log in to different servers
Intrusion detection systems
A major weakness of log analysis is that it is labor intensive and prone to human error
Intrusion detection systems (IDS) represent an attempt to automate part of the monitoring
Managerial reports
Management can use COBIT to set up a report scorecard
COBIT provides
Management guidelines that identify crucial success factors associated with each objective
Key performance indicators that can be used to assess their effectiveness
Security testing
The effectiveness of existing security procedures should be tested periodically
Computer emergency response team (CERT)
Responsible for dealing with major incidents
Should include technical specialists and senior operations management
A chief security officer (CSO)
Should impartially assess and evaluate the IT environment, conduct vulnerability and risk assessments, and audit the chief information office (CIO)’s security measures
Patch management
Fixing known vulnerabilities and installing latest updates to all of an organization’s software
Chapter 8
Chapter 8
Maintaining confidentiality requires that management identify which information is sensitive
Each organization will develop its own definitions of what information needs to be protected
Most definitions will include
Business plans
Pricing strategies
Client and customer lists
Legal documents
Encryption is a fundamental control procedure for protecting the confidentiality of sensitive information
Confidential information should be encrypted
While stored and whenever transmitted
If data is encrypted before sending it, a virtual private network (VPN) is created
Primary difference is that privacy focuses on protecting personal information about customers
rather than organizational data
The Trust Services privacy framework of the AICPA and CICA lists ten internationally recognized best practices for protecting the privacy of customers’ personal information *
As Follows
* Management
The organization establishes a set of procedures and policies for protecting privacy of personal information it collects
*Notice
Provides notice about its policies and practices when it collects the information or as soon as practicable thereafter
*Choice and consent
Describes the choices available to individuals and obtains their consent to the collection and use of their personal information
*Collection
The organization collects only that information needed to fulfill the purposes stated in its privacy policies
*Use and retention
The organization uses its customers’ personal information only according to stated policy and retains that information only as long as needed
*Access
The organization provides individuals with the ability to access, review, correct, and delete the personal information stored about them
*Disclosure to Third Parties
The organization discloses customers’ personal information to third parties only per stated policy and only to third parties who provide equivalent protection
*Security
The organization takes reasonable steps to protect customers’ personal information from loss or unauthorized disclosure
Quality
The organization maintains the integrity of its customers’ personal information
Monitoring and enforcement
The organization assigns one or more employees to be responsible for assuring and verifying compliance with its stated policies
encryption and access controls are
the two basic mechanisms for protecting consumers’ personal
COBIT control objective addresses
the need for controls over the input, processing, and output of data
These six AC categories are grouped into three groups of integrity controls
Input controls
Processing controls
Output controls
Input controls include
Forms design
Pre-numbered forms sequence test
Turnaround documents
Cancellation and storage of documents
Authorization and segregation of duties
Visual scanning
Check digit verification
RFID security
Once data is collected, data entry control procedures are needed to ensure that it’s entered correctly
Common tests to validate input include
Field check
Sign check
Limit check
Range check
Size (or capacity) check
Completeness check
Validity check
Reasonableness test
Check digit verification
Batch processing data entry controls
Sequence check
Error log
Batch totals
Online data entry controls
Automatic entry of data
Prompting
Pre-formatting
Closed-loop verification
Transaction logs
Error messages
Processing controls to ensure that data is processed correctly include
Data matching
Two or more items must match before processing can proceed
Example: The quantity billed on the vendor invoice must match the quantity ordered on the purchase order and the quantity received on the receiving report


File labels
External labels should be checked visually to ensure the correct and most current files are being updated


Recalculation of batch totals
Batch totals should be recomputed as processing takes place
Common tests to validate input
Field check
Sign check
Limit check
Range check
Size (or capacity) check
Completeness check
Validity check
Reasonableness test
Check digit verification
Batch processing data entry controls
Sequence check
Error log
Batch totals
Online data entry controls
Automatic entry of data
Prompting
Pre-formatting
Closed-loop verification
Transaction logs
Error messages
Processing controls to ensure that data is processed correctly include
Data matching, File labels, Recalculation of batch totals, Cross-footing balance test, Write-protection mechanisms, and Database processing integrity procedures
Data matching
Two or more items must match before processing can proceed
Example: The quantity billed on the vendor invoice must match the quantity ordered on the purchase order and the quantity received on the receiving report
File labels
External labels should be checked visually to ensure the correct and most current files are being updated
Recalculation of batch totals
Batch totals should be recomputed as processing takes place
Cross-footing balance test
Compares arithmetic results produced by two different methods to verify accuracy
Example: Compute the sum of column totals in a spreadsheet and compare it to a sum of the row totals
Write-protection mechanisms
Protect against accidental writing over or erasing of data files but are not foolproof
Database processing integrity procedures
Database systems use database administrators, data dictionaries, and concurrent update controls to ensure processing integrity
Concurrent update controls protect records from being updated by two users simultaneously
Important output controls include
User review of output, Reconciliation procedures
, External data reconciliation,
User review of output
Users carefully examine output for reasonableness, completeness, and to assure they are the intended recipient
Reconciliation procedures
Periodically, all transactions and other system updates should be reconciled to control reports, file status/update reports, or other control mechanisms
External data reconciliation
Database totals should periodically be reconciled with data maintained outside the system
Example: Compare number of employee records in the payroll file to number in the human resources file (excess records in payroll suggests a “ghost” employee).
There are two basic types of data transmission controls
Parity checking and Message acknowledgment techniques
Parity checking
Computers represent characters as a set of binary digits (bits)
For example, “5” is represented by the seven-bit pattern 0000101
When data are transmitted some bits may be lost or received incorrectly
Two basic schemes to detect these events are referred to as even parity and odd parity
In either case, an additional bit is added to the digit being transmitted
Message acknowledgment techniques
A number of message acknowledgment techniques can be used to let the sender of an electronic message know that a message was received
Echo check
Trailer record
Numbered batches
Threats to system availability originate from many sources, including
Hardware and software failures
Natural and man-made disasters
Human error
Worms and viruses
Denial-of-service attacks and other sabotage
Minimizing
Risk of significant system downtime caused by the preceding threats These availability controls include
**
Minimizing risk of system downtime
Organizations can take a variety of steps to minimize the risk of system downtime
Physical and logical access controls (Chapter 7) can reduce the risk of successful denial-of-service attacks
An uninterruptible power supply (UPS) provides protection from a prolonged power outage and buys the system enough time to back up critical data and shut down safely
**
Disaster recovery and business continuity planning
**
Minimize the extent of the disruption, damage, and loss
Temporarily establish an alternative means of processing information
Resume normal operations as soon as possible
Train and familiarize personnel with emergency operations
**
Key components of effective disaster recovery and business continuity plans include
Data backup procedures
Data need to be backed up regularly and frequently.
Infrastructure Replacement
Reciprocal agreements – the organization enters into an agreement with another organization that uses similar equipment to have temporary access to and use of their information system resources in the event of a disaster
Cold site – an empty building is purchased or leased and pre-wired for necessary telephone and Internet access
Hot site –a facility that is pre-wired for phone and Internet (like the cold site) but also contains the essential computing and office equipment
Thorough documentation
The disaster recovery plan itself, including instructions for notifying appropriate staff and the steps to resume operation, needs to be well documented
Periodic testing
Plans should be tested on at least an annual basis to ensure they reflect recent changes in equipment and procedures
Adequate insurance
Organizations should acquire adequate insurance coverage to defray part or all of the expenses associated with implementing their disaster recovery and business continuity plans