Chapter 4-19 AICPA Trust Services Principles categorizes IT controls and risks into five categories: SO 3 General controls from a Trust Services Principles perspective General Controls f
Trang 1Chapter
4-1
Prepared by Coby Harmon University of California, Santa Barbara
Westmont College
Trang 3Chapter
4-3
1 An overview of internal controls for IT systems
2 General controls for IT systems
3 General controls from a Trust Services Principles perspective
4 Hardware and software exposures in IT systems
5 Application software and application controls
6 Ethical issues in IT systems
Study Objectives
Study Objectives
Trang 4Chapter
4-4 SO 1 An overview of internal controls for IT systems
Internal Controls for IT Systems
Internal Controls for IT Systems
Accounting Information System - collects, processes,
stores, and reports accounting information
Internal controls for computer-based systems have been
described as being of two types:
► General controls
► Application controls
Trang 5Chapter
4-5 SO 1 An overview of internal controls for IT systems
Internal Controls for IT Systems
Internal Controls for IT Systems
Application controls
used to control inputs,
processing, and outputs
Trang 6SO 1 An overview of internal controls for IT systems
Internal Controls for IT Systems
Internal Controls for IT Systems
Question
Trang 7Chapter
4-7 SO 2 General controls for IT systems
General Controls for IT Systems
General Controls for IT Systems
Five categories of general controls:
1 Authentication of users and limiting unauthorized access
2 Hacking and other network break-ins
3 Organizational structure
4 Physical environment and physical security of the
system
5 Business Continuity
Trang 8 Two factor authentication
SO 2 General controls for IT systems
General Controls for IT Systems
General Controls for IT Systems
Trang 9 Public key encryption
Wired equivalency privacy
Wireless protected access
Service set identifier
Virtual private network
SO 2 General controls for IT systems
General Controls for IT Systems
General Controls for IT Systems
Secure sockets layer
Trang 10Chapter
4-10
Organizational Structure
IT governance committee, responsibilities include:
1 Align IT investments to business strategy
2 Budget funds and personnel for the most effective use
of the IT systems
3 Oversee and prioritize changes to IT systems
4 Develop, monitor, and review all IT operational policies
5 Develop, monitor, and review security policies
SO 2 General controls for IT systems
General Controls for IT Systems
General Controls for IT Systems
Trang 11SO 2 General controls for IT systems
General Controls for IT Systems
General Controls for IT Systems
Trang 12Chapter
4-12
Controls for an IT system should include controls over
the physical environment of the system which includes:
► Location
► Operating environment
► Back-up systems
Physical Environment and Security
SO 2 General controls for IT systems
General Controls for IT Systems
General Controls for IT Systems
Trang 13Chapter
4-13
Locate in area that are least at risk of natural disasters such as flood, earthquake, hurricane,
and fire.
Controls for an IT system should include controls over
the physical environment of the system which includes:
► Location
► Operating environment
► Back-up systems
Physical Environment and Security
SO 2 General controls for IT systems
General Controls for IT Systems
General Controls for IT Systems
Properly control dust, temperature, and humidity
Location should also have a fire
Trang 14Chapter
4-14
Physical Environment and Security
Physical access controls:
► Limited access to computer rooms through
employee ID badges or card keys
► Video surveillance equipment
► Logs of persons entering and exiting the computer
rooms
► Locked storage of backup data and offsite backup
data
SO 2 General controls for IT systems
General Controls for IT Systems
General Controls for IT Systems
Trang 15Chapter
4-15
Business Continuity
Business Continuity Planning (BCP)
Two parts of business continuity are related to IT systems:
► A strategy for backup and restoration of IT systems, to
include redundant servers, redundant data storage, daily incremental backups, a backup of weekly
changes, and offsite storage of daily and weekly backups
► A disaster recovery plan
SO 2 General controls for IT systems
General Controls for IT Systems
General Controls for IT Systems
Trang 16Chapter
4-16
The Real World
The Real World
In some organizations, loss of a key CEO could spell disaster For
example, Martha Stewart founded and became the CEO of Martha
Stewart Living Omnimedia Inc In June 2003, she was indicted for
possible legal violations related to insider trading, and she stepped down as CEO Some in the financial community wondered if the
firm could continue or thrive without Martha Stewart Part of the
business continuity plan for her company should have been a
strategy to operate if some event would prevent Martha Stewart
from serving as CEO Martha was convicted, served time in prison, and successfully returned to work.
SO 2 General controls for IT systems
Trang 17SO 2 General controls for IT systems
General Controls for IT Systems
General Controls for IT Systems
Question
Trang 18Chapter
4-18
b Develop, monitor, and review security policies
An IT governance committee has several responsibilities
Which of the following is least likely to be a responsibility of the
IT governance committee?
c Oversee and prioritize changes to IT systems
d Align IT investments to business strategy
a Develop and maintain the database and ensure
adequate controls over the database
SO 2 General controls for IT systems
General Controls for IT Systems
General Controls for IT Systems
Question
Trang 19Chapter
4-19
AICPA Trust Services Principles categorizes IT controls
and risks into five categories:
SO 3 General controls from a Trust Services Principles perspective
General Controls from an AICPA Trust
Services Principles Perspective
General Controls from an AICPA Trust
Services Principles Perspective
System is protected against unauthorized (physical and
logical) access.
Trang 20Chapter
4-20
AICPA Trust Services Principles categorizes IT controls
and risks into five categories:
SO 3 General controls from a Trust Services Principles perspective
General Controls from an AICPA Trust
Services Principles Perspective
General Controls from an AICPA Trust
Services Principles Perspective
System is available for operation and use as committed or agreed.
Trang 21Chapter
4-21
AICPA Trust Services Principles categorizes IT controls
and risks into five categories:
SO 3 General controls from a Trust Services Principles perspective
General Controls from an AICPA Trust
Services Principles Perspective
General Controls from an AICPA Trust
Services Principles Perspective
System processing is complete, accurate, timely and authorized.
Trang 22Chapter
4-22
AICPA Trust Services Principles categorizes IT controls
and risks into five categories:
SO 3 General controls from a Trust Services Principles perspective
General Controls from an AICPA Trust
Services Principles Perspective
General Controls from an AICPA Trust
Services Principles Perspective
Personal information obtained
as a result of e-commerce is collected, used, disclosed, and retained as committed or
agreed.
Trang 23Chapter
4-23
AICPA Trust Services Principles categorizes IT controls
and risks into five categories:
SO 3 General controls from a Trust Services Principles perspective
General Controls from an AICPA Trust
Services Principles Perspective
General Controls from an AICPA Trust
Services Principles Perspective
Information designated as confidential is protected as committed or agreed.
Trang 24Chapter
4-24
Previously covered IT controls that can lessen risk of
unauthorized users gaining access to the IT system:
SO 3 General controls from a Trust Services Principles perspective
General Controls from an AICPA Trust
Services Principles Perspective
General Controls from an AICPA Trust
Services Principles Perspective
Trang 25► security breach resolution,
► secure socket layers (SSL),
► virtual private network (VPN),
► wired equivalency privacy (WEP)
Risks From Hacking or Other Network Break-Ins
SO 3 General controls from a Trust Services Principles perspective
General Controls from an AICPA Trust
Services Principles Perspective
General Controls from an AICPA Trust
Services Principles Perspective
Trang 26Chapter
4-26
Controls that may be applied are,
► wireless protected access (WPA),
► service set identifier (SSID),
► antivirus software,
► vulnerability assessment,
► penetration testing, and
► intrusion detection
SO 3 General controls from a Trust Services Principles perspective
General Controls from an AICPA Trust
Services Principles Perspective
General Controls from an AICPA Trust
Services Principles Perspective
Risks From Hacking or Other Network Break-Ins
Trang 27Chapter
4-27
Environmental changes that affect the IT system can
cause availability risks and processing integrity risks.
Risks From Environmental Factors
Physical Access Risks
SO 3 General controls from a Trust Services Principles perspective
General Controls from an AICPA Trust
Services Principles Perspective
General Controls from an AICPA Trust
Services Principles Perspective
Physical access to computer systems and computer rooms
should be limited to those who must have access in order to
carry out their job assignments
Trang 28Chapter
4-28
► Security risk is that an intruder who gains physical access may change user access levels
► Availability risk is the unauthorized physical access to
physically shut down, sabotage, or destroy hardware or software
► Processing integrity risk is that systems or programs may be shut down or sabotaged.
► Confidentiality risk is that intruder may gain access to
confidential data.
Physical Access Risk
SO 3 General controls from a Trust Services Principles perspective
General Controls from an AICPA Trust
Services Principles Perspective
General Controls from an AICPA Trust
Services Principles Perspective
Trang 29Chapter
4-29
► Security risk is that an unauthorized person may gain access to the backup data.
► Availability risk is that as events interrupt operations, the
system becomes unavailable for regular processing
► Processing integrity risk is that business interruptions can
lead to incomplete or inaccurate data
► Confidentiality risk is that unauthorized persons may gain
access to confidential data if they access backup data
Business Continuity Risks
SO 3 General controls from a Trust Services Principles perspective
General Controls from an AICPA Trust
Services Principles Perspective
General Controls from an AICPA Trust
Services Principles Perspective
Trang 30SO 3 General controls from a Trust Services Principles perspective
General Controls from an AICPA Trust
General Controls from an AICPA Trust
Trang 31Chapter
4-31
b Availability risk
The risk that an unauthorized user would shut down
systems within the IT system is a(n)
c Processing integrity risk
d Confidentiality risk
a Security risk
SO 3 General controls from a Trust Services Principles perspective
General Controls from an AICPA Trust
General Controls from an AICPA Trust
Question
Trang 32Chapter
4-32
Hardware and Software Exposures
Hardware and Software Exposures
Typical IT system components that represent “entry
points” where the risks must be controlled.
1 The operating system
2 The database
3 The database management system (DBMS)
4 Local area networks (LANs)
Trang 33Chapter
4-33
Exposure Areas
Hardware and Software Exposures
Hardware and Software Exposures
Exhibit 4-6
SO 4
Trang 34Chapter
4-34
The software that controls the basic input and output
activities of the computer
Provides the instructions that enable the CPU to:
► read and write to disk,
► read keyboard input,
► control output to the monitor,
► manage computer memory, and
► communicate between the CPU, memory, and disk
storage
The Operating System
Hardware and Software Exposures
Hardware and Software Exposures
SO 4 Hardware and software exposures in IT systems
Trang 35Chapter
4-35
Unauthorized access would allow an unauthorized user to:
1 Browse disk files or memory for sensitive data or
passwords
2 Alter data through the operating system
3 Alter access tables to change access levels of users
4 Alter application programs
5 Destroy data or programs
The Operating System
Hardware and Software Exposures
Hardware and Software Exposures
SO 4 Hardware and software exposures in IT systems
Trang 36Chapter
4-36
A large disk storage for accounting and operating data
Controls such as:
► user IDs, passwords,
Hardware and Software Exposures
Hardware and Software Exposures
SO 4 Hardware and software exposures in IT systems
Trang 37Chapter
4-37
A software system that manages the interface between
many users and the database
The Database Management System
Hardware and Software Exposures
Hardware and Software Exposures
SO 4 Hardware and software exposures in IT systems
Exhibit 4-7
Trang 38Hardware and Software Exposures
Hardware and Software Exposures
SO 4 Hardware and software exposures in IT systems
The Database
Management System
Exhibit 4-6
Trang 39Chapter
4-39
A software system that manages the interface between
many users and the database
Physical access, environmental, and business continuity
controls can help guard against the loss of the data or
alteration to the DBMS
The Database Management System
Hardware and Software Exposures
Hardware and Software Exposures
SO 4 Hardware and software exposures in IT systems
Trang 40Chapter
4-40
A local area network, or LAN, is a computer network
covering a small geographic area
A group of LANs connected to each other is called a wide
area network, or WAN.
LANS and WANS
Hardware and Software Exposures
Hardware and Software Exposures
SO 4 Hardware and software exposures in IT systems
Trang 41Chapter
4-41
LANS and WANS
Hardware and Software Exposures
Hardware and Software Exposures
SO 4 Hardware and software exposures in IT systems
Trang 42Hardware and Software Exposures
Hardware and Software Exposures
SO 4 Hardware and software exposures in IT systems
Exhibit 4-6
Trang 43Chapter
4-43
Same kind of exposures as a local area network
Controls include:
wired equivalency privacy (WEP) or wireless
protected access (WPA),
station set identifiers (SSID), and
encrypted data.
Wireless Networks
Hardware and Software Exposures
Hardware and Software Exposures
SO 4 Hardware and software exposures in IT systems
Trang 44Chapter
4-44
The Real World
The Real World
Boeing Co uses wireless networks on the floor of the large shop
where it manufactures airplanes This wireless network with
notebook computers allows Boeing workers to move around the
plane while they are working and view engineering drawings or
parts availability during the manufacturing processes The
employees do not have to walk to a desk or workstation, away from the manufacturing flow, to access these things Wireless networks
can make employees more efficient by allowing them to roam.
SO 4 Hardware and software exposures in IT systems
Trang 45Chapter
4-45
The use of dual
firewalls can help
The Internet and World Wide Web
Hardware and Software Exposures
Hardware and Software Exposures
SO 4 Hardware and software exposures in IT systems
Exhibit 4-6
Trang 46Chapter
4-46
The organization’s security
policy should address the
security expectations of workers
who telecommute, and such
workers should connect to the
company network via a virtual
private network.
Hardware and Software Exposures
Hardware and Software Exposures
Exhibit 4-6
Telecommuting Workers
and Mobile Workers
SO 4