Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.

Slides:



Advertisements
Similar presentations
Application Security By Prashant Mali.
Advertisements

Presented to the Tallahassee ISACA Chapter
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Control and Accounting Information Systems
Control and Accounting Information Systems
Overview of IS Controls, Auditing, and Security Fall 2005.
General Ledger and Reporting System
Information Technology Control Day IV Afternoon Sessions.
Auditing Computer-Based Information Systems
การควบคุมในระบบบัญชีที่ใช้คอมพิวเตอร์
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
9 - 1 Computer-Based Information Systems Control.
The Islamic University of Gaza
Chapter 10: Auditing the Expenditure Cycle
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
Chapter 14 System Controls. A Quote “The factory of the future will have only two employees, a man and a dog. The man will be there to feed the dog. The.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Processing Integrity and Availability Controls
Chapter 9 THE ACQUISITION CYCLE— PURCHASING AND RECEIVING
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Chapter 9 THE ACQUISITION CYCLE— PURCHASING AND RECEIVING.
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 8-1 Accounting Information Systems 9 th Edition Marshall.
PowerPoint Presentation by Charlie Cook Copyright © 2004 South-Western. All rights reserved. Chapter 9 Controlling Information Systems: Process Controls.
General Ledger and Reporting System
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 8-1 Accounting Information Systems 9 th Edition Marshall.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Processing Integrity and Availability Controls
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Today’s Lecture application controls audit methodology.
Control and Accounting Information Systems
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
TO ENSURE  THE EFFICIENT & EFFECTIVE DEVELOPMENT / MAINTENANCE OF IT SYSTEMS  PROPER IMPLEMENTATION OF IT SYSTEMS  PROTECTION OF DATA AND PROGRAMS.
Acct 316 Acct 316 Acct 316 Control and Accounting Information Systems 7 UAA – ACCT 316 Accounting Information Systems Dr. Fred Barbee Chapter.
Chapter 16 IT Controls, Asset Protection, and Security.
Transaction Processing and the Internal Control Process Small Business Information Systems Professor Barry Floyd.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
Information Systems Controls Lecture 5 (Chapter 6, 7 & 8)
1 Chapter Three IT Risks and Controls. 2 The Risk Management Process Identify IT Risks Assess IT Risks Identify IT Controls Document IT Controls Monitor.
1 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 12 Designing Systems Interfaces, Controls, and Security.
Chapter 7 Control and AIS. Threats to AIS Natural disasters –DSM flood (p. 249) Political disasters –Terrorism Cyber crime (as opposed to general terrorism)
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
Information Systems Security Operational Control for Information Security.
I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.
 2001 Prentice Hall Business Publishing, Accounting Information Systems, 8/E, Bodnar/Hopwood Chapter 10 Electronic Data Processing Systems.
Chapter 9 Controlling Information Systems: Application Controls.
Today’s Lecture Covers
Controls design Controls are “the plan of organization and all the methods and measures to safeguard its assets, check the accuracy and reliability of.
Hall, Accounting Information Systems, 7e ©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
This Lecture Covers Roles of –Management –IT Personnel –Users –Internal Auditors –External Auditors.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Accounting Information Systems: A Business Process Approach
Chapter 11 Designing Inputs, Outputs, and Controls.
Errors, Fraud, Risk Management, and Internal Controls
Controlling Computer-Based Information Systems, Part II
Processing Integrity and Availability Controls
Managing the IT Function
Systems Design Chapter 6.
Internal controls 01-Nov-2017.
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Footwear Planning and Production Process
Presentation transcript:

Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee

Control Classifications By ObjectivesBy SettingsBy Risk Aversion Administrative Accounting General Application Input Processing Output Corrective Preventive Detective By System Architectures Manual Systems Computer Based Systems Batch Processing Online Processing Data Base SAS 29 (1958) Text Chapter 7 This Chapter

Control Classifications By ObjectivesBy SettingsBy Risk Aversion Administrative Accounting General Application Input Processing Output Corrective Preventive Detective By System Architectures Manual Systems Computer Based Systems Batch Processing Online Processing Data Base Encourage adherence to management policies and procedures. Promote operational efficiency. Safeguard assets Ensure accuracy of accounting data and information.

Input Process Output Sensor Bench- mark Detective and Corrective Controls Corrective Controls Preventive, Detective, and Corrective Controls

Discover the occurrence of adverse events. Tend to be active in nature. After the fact controls

Lead to the righting of effects caused by adverse events. Tend to be more active than detective controls.

Block adverse events, such as errors or losses from occurring. Tend to be passive in nature.

Control Classifications By ObjectivesBy SettingsBy Risk Aversion Administrative Accounting General Application Input Processing Output Corrective Preventive Detective By System Architectures Manual Systems Computer Based Systems Batch Processing Online Processing Data Base Ensure that overall IS is stable and well maintained. Ensure the accuracy of specific applications, inputs, files, programs & outputs.

Control Classifications By ObjectivesBy SettingsBy Risk Aversion Administrative Accounting General Application Input Processing Output Corrective Preventive Detective By System Architectures Manual Systems Computer Based Systems Batch Processing Online Processing Data Base

What Constitutes A Reliable System

What Constitutes Reliability? Availability Security Maintainability Integrity

Corrective Preventive Detective General Application Input Processing Output Administrative Accounting By Risk AversionBy SettingsBy Objectives Control Classifications By System Architectures Manual Systems Computer Based Systems Batch Processing Online Processing Data Base

Controls – The Text Approach Key General Reliability Controls (> than one reliability principle) - Table 8-1 Key Availability Controls - Table 8-2 Key Security Controls - Table 8-3 Key Maintainability Controls - Table 8-4 Key Integrity Controls – Table 8-5

General Reliability Controls Strategic Planning & Budgeting Developing a System Reliability Plan Documentation

Key Availability Controls Minimizing System Downtime Disaster Recovery Plan

Key Security Controls Segregation of Duties in Systems Function

The Text Notes... In a highly integrated AIS, procedures that used to be performed by separate individuals are combined. Therefore, any person who has unrestricted access to the computer, its programs, and live data could have the opportunity to both perpetrate and conceal fraud.

The Text Notes... To combat this threat, organizations must implement compensating control procedures such as the effective segregation of duties within the AIS function.

Organizational Independence Within the Information Systems Function of a Firm using Computer-Based processing Source: AIS, Wilkinson & Cerullo

Information Systems Manager Steering Committee Planning Staff Data-Base Administrator Technical Services Manager Systems Development Manager Data Processing Manager Information Center Systems Analysis & Projects Programming Data Preparation Computer Operations Data Library Data Control Tasks which CREATE systems. Tasks which OPERATE systems. These two functions need to be ORGANIZATIONALLY and PHYSICALLY separated

Flow of batched data within several units of an organization using computer-based processing. Source: AIS, Wilkinson & Cerullo

Data Input Data Input Outputs Errors to be corrected Errors to be corrected Receive & Log Receive & Log Convert Data Convert Data Process Files Log & Distribute Log & Distribute Outputs Error Listing Error Listing Files User Departments Computer-Based Data Processing Department Control Section Data Preparation Section Computer Operations Data Library Record input data in control log. Follow progress of processing. Maintains control totals Reconciles totals during processing. Distribute output. Monitors correction of errors.

Data Input Data Input Outputs Errors to be corrected Errors to be corrected Receive & Log Receive & Log Convert Data Convert Data Process Files Log & Distribute Log & Distribute Outputs Error Listing Error Listing Files User Departments Computer-Based Data Processing Department Control Section Data Preparation Section Computer Operations Data Library Prepare and verify data for entry into processing. What controls do we have here? Batch controls Various computer input controls.

Data Input Data Input Outputs Errors to be corrected Errors to be corrected Receive & Log Receive & Log Convert Data Convert Data Process Files Log & Distribute Log & Distribute Outputs Error Listing Error Listing Files User Departments Computer-Based Data Processing Department Control Section Data Preparation Section Computer Operations Data Library Processes data to produce outputs. What controls do we have here? Various computer processing controls.

Simplified organizational separation in a computer- based system using on-line processing. Source: AIS, Wilkinson & Cerullo

User Departments Computer Operations On-Line Files (Data Library) Data Inputs Displayed Outputs Displayed Outputs Printed Outputs Printed Outputs Process Batch Files Batch Files On- Line Files On- Line Files

Subdivisions of transaction (application) controls and typical control points. Source: AIS, Wilkinson & Cerullo

Source Document Manual Entry Convert To MRF Trans. Data Editing Computer-Based Data Processing Source Document User Transaction Via Terminal Soft-Copy Output Input Controls Processing Controls Output Controls Control Point

Key Security Controls Segregation of Duties in Systems Function Physical Access Controls

Perimeter ControlBuilding Controls Computer Facility Controls

Key Security Controls Segregation of Duties in Systems Function Physical Access Controls Logical Access Controls

Identification Authentication Access Rights Threat Monitoring

Key Security Controls Protection of Personal Computers and Client/Server Networks Internet and e-commerce Controls

Key Maintainability Controls Project Development and Acquisition Controls. Change Management Controls

Control Classifications By ObjectivesBy SettingsBy Risk Aversion Administrative Accounting General Application Input Processing Output Corrective Preventive Detective By System Architectures Manual Systems Computer Based Systems Batch Processing Online Processing Data Base Ensure that overall IS is stable and well maintained. Ensure the accuracy of specific applications, inputs, files, programs & outputs.

Objectives of Application Controls To prevent, detect, and correct errors in transactions as they flow through the various stages of a specific data processing program. Input Process Output

The text correctly notes... If application controls are weak  AIS output is likely to contain errors.  Erroneous data leads to significant potential problems Objectives of Application Controls

Key Integrity Controls Source Data Controls Input Validation Controls On-Line Data Entry Controls Data Processing and Storage Controls

Key Integrity Controls Output Controls Data Transmission Controls

Input Process Output Source Data Input Validation On-line Data Entry Data Processing Storage Data Transmission Output

Key Integrity Controls Source Data Controls

Ensure that all source documents are authorized, accurate, complete, properly accounted for and entered into the system or sent to their intended destinations in a timely manner.

Source Data Controls Forms Design Prenumbered Forms Sequence Test Turnaround Documents Cancelation and Storage of Documents

Source Data Controls Authorization and Segregation of Duties Visual Scanning Check Digit Verification Key Verification

Key Integrity Controls Input Validation Controls

Input Validation Routines Routines that check the integrity of input data as the data are entered into the system. Edit Programs  Edit Checks

Input Validation Routines Sequence Check Field Check Sign Check Validity Check Limit Check

Input Validation Routines Range Check Reasonableness Test Redundant Data Check Capacity Check

Key Integrity Controls On-Line Data Entry Controls

To ensure the integrity of transaction data entered from on-line terminals and PCs by minimizing errors and omissions.

On-Line Data Entry Controls Input Validation Routines User ID and Passwords Automatic Entering of Data Prompting Preformatting

On-Line Data Entry Controls Completeness Check Closed-Loop Verification Transaction Log Error Messages Record Retention

Key Integrity Controls Data Processing and Storage Controls

Processing/Storage Controls Preserve the integrity of data processing and stored data.

Processing/Storage Controls Policies and procedures Data Control Function Reconciliation procedures External data Reconciliation Exception reporting

Data Input Data Input Outputs Errors to be corrected Errors to be corrected Receive & Log Receive & Log Convert Data Convert Data Process Files Log & Distribute Log & Distribute Outputs Error Listing Error Listing Files User Departments Computer-Based Data Processing Department Control Section Data Preparation Section Computer Operations Data Library

Processing/Storage Controls Data currency checks Default values Data matching File labels Write Protection mechanisms

Processing/Storage Controls Database Protection Mechanisms Data Conversion Controls Data Security

Key Integrity Controls Output Controls

Review all output for reasonableness and proper format Reconcile output and input control totals daily Distribute output to appropriate user departments

Output Controls Protect sensitive or confidential outputs Store sensitive/confidential data in secure area Require users to review completeness and accuracy of all output

Output Controls Shred or otherwise destroy sensitive data. Correct errors found on output reports.

Key Integrity Controls Transmission Controls