1. Information Technology Governance Flashcards
What are 3 steps of manual AIS (accounting information system) and corresponding automated AIS term for each step?
- Journalize: record entries = input
- Post: to general ledger = process
- Summarize: prepare a trial balance = output
What are 3 steps of automated AIS?
- Input: record or capture event data in system, (input to storage)
- Process: update data storage
- Output: retrieve master data from storage
What are 4 main categories of AIS accounting records?
- Source “documents”/data capture
- Data accumulation records/journals
- Subsidiary ledgers/registers
- General ledger, FS, reports
What is the least predictable element in most accounting systems?
People.
What are 5 elements of accounting systems?
People, procedures, hardware, software, data (automated or programmed controls increasingly important)
What are 2 elements of manual accounting systems?
People and procedures (manual controls still relevant).
What is manual historically and now?
H: An AIS with no computers.
N: Instructions for users (user procedures manual, operations manual)
What are 6 potential differences between manual and computer system controls?
- Segregation of duties
- Audit trail
- Transaction processing
- Computer initiated transactions
- Risk of errors and defalcations
- Management review
Describe manual and computer system controls in each 6 elements.
- Segregation of duties
M: Possible in medium to large organizations
C: Combine previously segregated functions, include compensating (automated) controls - Audit trail
M: Physical (paper) trails
C: Electronic audit trails - Transaction processing
M: More clerical errors
C: Potential for systematic (logic) errors - Computer initiated transactions
M: None = less efficient
C: Increase efficiency - Risk of errors and defalcations
M: no remote access, paper records, manual processes, separate functions
C: Remote access risk, data concentration, less human observation, manipulation of errors in application programs - Management review
M: Isolated data = not useful for analytics
C: Greater data accessibility, embedded controls
What are 4 risks in computer-based systems?
Systems, programs, and people (FUNI)
- Reliance on Faulty systems or programs (F)
- Unauthorized changes in master files, systems, or programs (U)
- Failure to make Needed changes (N)
- Inappropriate Intervention (by people) (I)
What is IT security goals?
Security, availability, processing integrity, confidentiality, privacy
What is COBIT?
The Control Objectives for Information and Related Technology.
What is the purpose of COBIT?
- Align IT and business goals/strategies.
- Link business risks, controls needs and IT.
- Common language for users, auditors, management, and business process owners in identifying risks and structuring controls.
- Provide framework: how much IT security must management invest in? - IT security and control. Auditing and oversight.
What is the framework flow of COBIT?
Business requirement - IT resources - IT processes.
What is COBIT framework definition?
To provide the information that the organization needs to achieve its objectives, IT resources need to be managed by a set of naturally grouped processes.
Why is COBIT framework needed?
Process orientation to exercise responsibilities, achieve goals and manage risks.
COBIT framework: what are 7 criteria for business objectives?
Effectiveness, efficiency, confidentiality, integrity, availability, compliance, reliability.
COBIT framework: What are 5 IT resources?
Data, application systems, technology, facilities, people.
COBIT framework: what are 4 IT processes?
Plan and organize, acquire and implement, deliver and support, monitor and evaluate.
What is the difference between COSO and COBIT and what are both focusing on?
COSO: Organizational control and processes
COBIT: IT controls and processes
Both: focus on monitoring of organizational processes