Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 7 Control and AIS. Threats to AIS Natural disasters –DSM flood (p. 249) Political disasters –Terrorism Cyber crime (as opposed to general terrorism)

Similar presentations


Presentation on theme: "Chapter 7 Control and AIS. Threats to AIS Natural disasters –DSM flood (p. 249) Political disasters –Terrorism Cyber crime (as opposed to general terrorism)"— Presentation transcript:

1 Chapter 7 Control and AIS

2 Threats to AIS Natural disasters –DSM flood (p. 249) Political disasters –Terrorism Cyber crime (as opposed to general terrorism) Equipment malfunctions Employee mistakes

3 Summary Statistics Information Systems Security Association 65% human errors 20% natural disasters and political terrorism 15% fraud (internal and external) (another association for you to join…)

4 Internal Control Management Control - broad focus Internal (Accounting) Control - narrower –policies and procedures

5 Internal Control Preventive, detective, corrective controls General and application controls Administrative and accounting controls Input, process, output controls

6 Focus Management and accounting controls exist for every purpose Do not get lost in the authors’ categories

7 Essential Background FCPA 1977 - evolved from bribery concerns –proper recording of transactions –safeguard assets –accurate assets COSO 1992 - AICPA, IIA, IMA, FEI –in-depth IC study Effective and efficient operations Reliable reporting Regulatory compliance

8 COBIT Info Sys Audit & Control Foundation Control Objectives for IT –benchmark security and control –users protected –auditors able to substantiate their opinions (Another organization for you to join…)

9 COSO IC Model Control environment Control activities Risk assessment Information and communication Monitoring (can you provide examples of each?)

10 Basic Needs Integrity and Ethical Values Management Philosophy and Operating Style Organizational Structure Assignment of Responsibility and Authority –Accounting Procedures Manual –Policy and Procedures Manual SEC Audit Committees

11 IC Activities Proper authorization Segregation of duties Design and use of documentation Safeguarding assets Review performance

12 Proper Authorization Dual signatures on checks –when ? Digital signatures

13 Segregation of Duties Custodial Functions Recording Functions Authorization Functions Examples –aviation –construction –collusion?

14 Adequate Documentation How to verify in a digital world?

15 Safeguard Assets (and Records?) Primarily, restrict access Implement IC procedures

16 Review Performance Redundant records –staff-level and administrators Audit - actual Vs. reported Batch totals - by hand Accounting - double-entry


Download ppt "Chapter 7 Control and AIS. Threats to AIS Natural disasters –DSM flood (p. 249) Political disasters –Terrorism Cyber crime (as opposed to general terrorism)"

Similar presentations


Ads by Google