11 - 1 Chapter 11 Management Control of Information Technology.

Slides:



Advertisements
Similar presentations
So You Want to Break Into the Industry… SAS No. 94 Requirements and Issues Related to IT Audits for Not-for-Profit Organizations.
Advertisements

Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Auditing Concepts.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
The Islamic University of Gaza
Sarbanes-Oxley, Internal Control & Cash
Systems Analysis and Design in a Changing World, 6th Edition
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Standar Pekerjaan Lapangan: Pemahaman Memadai atas Pengendalian Intern Pertemuan 5.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Internal Control in a Financial Statement Audit
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
©2008 Pearson Prentice Hall. All rights reserved. 4-1 Internal Control & Cash Chapter 4.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Security and Control Brian Mennecke. Planning for Security and Control In today’s net-enabled environment, an increasingly important part of IT planning.
Chapter 5 Internal Control over Financial Reporting
Considering Internal Control
Chapter 1: Accounting Information Systems and the Accountant
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
Implications of Information Technology for the Audit Process
Internal Control in a Financial Statement Audit
OVERVIEW OF INFORMATION SYSTEM (IS) AUDITING NORHAFIZAH BINTI ABDUL MUDALIP YAP YONG TECK TAN YUAN JUE TAY QIU JIE GROUP MEMBER:
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Chapter 6 of the Executive Guide manual Technology.
1 Today’s Presentation Sarbanes Oxley and Financial Reporting An NSTAR Perspective.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
SESSION 14 INFORMATION SYSTEMS SECURITY AND CONTROL.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 6-1 Chapter Six Internal Control in a Financial Statement Audit.
CHAPTER 2 TYPES OF BUSINESS INFORMATION SYSTEM. INTRODUCTION Information System support business operations by processing data related to business operation.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 7-1 Chapter Seven Auditing Internal Control over Financial Reporting.
Management Control and Security MIS 503 Management Information Systems MBA Program 1.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter 8 System Management Semester 2. Objectives  Evaluating an operating system  Cooperation among components  The role of memory, processor,
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
(2) Organize information processing centers environment, the various functions and details Information technology audit: An information technology audit,
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 10.
Risk Management Dr. Clive Vlieland-Boddy. Managements Responsibilities Strategy – Hopefully sustainable! Control – Hopefully maximising profits! Risk.
Securing Information Systems
Auditing Concepts.
Describe the responsibilities of financial-information management in an organization
Internal Control Principles
INFORMATION SYSTEMS SECURITY AND CONTROL.
Dinesh Mirchandani University of Missouri – St. Louis
Audit Planning and Analytical Procedures
Session 11 Other Assurance Services
Chapter 7 Part 1 Internal Control
Chapter 9 Control, security and audit
Securing Information Systems
Computer-Based Processing: Developing an Audit Assessment Approach
The CPA Profession Chapter 2.
Internal Control.
INFORMATION SYSTEMS SECURITY and CONTROL
Sarbanes-Oxley Act (404) An IT Viewpoint
Information Systems Security and Control
As we grow, what should our business look like?
An IT Viewpoint Darin Kreimeyer, Senior Manager Newel Linford, Manager
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Chapter 11 Management Control of Information Technology

Control Systems Manager’s job - control - deviation, something wrong - indicate a serious problem Gauges - provided by IS –Control mechanism –Technology helps with control - also need to control IT The components of control systems are –Standards for performance –Sensory determination of actual conditions –Comparison of standard with actual conditions –Compensatory action if the deviation is too great

11 - 3

Control in the Organization Controls can be created through –Structure of the organization Decentralized or centralized More difficult time Trust subordinates Need new ways –Rewards –Management committee –Budget –Direct supervision - remote work - difficult –Procedures Routine audits help establish control

11 - 5

Failure of Control Control breakdown - high sales - mask lack of control –Worldcom - largest bankruptcy in US history - 7/02 - $107 billion, Enron - $63 billion –Qwest - stock options encouraged to overstate company performance –Global Crossing - reward system led to control failure Reward systems for senior managers may have caused these control failures –Stock options IS can strengthen routine control systems though they can tend to be complex

Control of Systems Development It is difficult to predict development time and development cost for new systems –Package implementation can reduce this uncertainty Projects slip for a number of reasons –Lack of user input –Too few resource –Too few individuals working on the project –Lack of top management support –Poor project management

Control of Operations The Foreign Corrupt Practices Act requires publicly held companies to devise and maintain a system of internal accounting controls pertaining to the –Execution of transactions –Recording of transactions –Records of assets –Managerial sign-off on financial statements (Sarbanes- Oxley Act) Control issue - all around - painfully evident - Enron, Martha Stewart - what can happen when controls do not work

Control of Operations All levels of control - organization - responsibility of management IT - ability to process large numbers of transactions in efficient manner - create significant control problems, challenges Error spread through an immense number of transactions very quickly Numerous opportunities for error

Vulnerability of Systems to Transaction Processing Errors 1.Errors and intrusion of the operating system for clients and servers 2.Application programs errors 3.Database security 4.Network operating system reliability and security 5.Adequate control of manual procedures 6.Organizational control 7.Network connectivity 8.Misuse by external users

Control and Electronic Commerce Security of transmitted credit card information Encryption of data Secure electronic transmission Secure payment schemes

Security Manager - not expected to develop all controls - incredibly complex Managers establish environment - encourages control - allocate resources to it - tell network designer - what is needed Internet - myriad of opportunities - disrupt Firewalls –Corporate firewalls –Host based firewalls Monitoring programs –Virus checking Monitoring firms –Can examine connectivity logs to determine hostile threats to the organization

Auditing Information Systems Auditors examine –Databases –Transactions –Processing logic –Controls of critical information systems Audit IS - most concerned with those systems that affect financial statements Internal auditors - continually examine IS Control - fundamental responsibility of management - safeguard assets - protect against errors, fraud, attack Need backup - continue operating if major problem

Management Issues Backup - off-site data storage Security - because so accessible Budget - cannot afford to buy everything Project management - system Data control - accuracy of data - important management consideration