Auditing In Advanced Information Technology System Flashcards
List the effect of electronic data interchange (EDI)
- Quick reaction time
- Continuous processing
- Strict application of condition of payments
- Impact on unauthorized access more significant
- Increase importance of security control
- Computer application must meet interface standard
- Certain user controls become obsolete
- Lack of paper trails
- Human judgement and intervention falls away
- Contractual liabilities addressed thru agreements
List the advantages of EDI
- Cost saving
- Speed increased
- Reduced risk of errors
- Improved inventory and cash management
- Improved trade relation with suppliers
List the general risks relating to EDI
- Increased reliance on trading partners
- Increased reliance on technology
- Less human involvements less chance of detecting errors
- Dependency on service provider
- Legal risks
- Business risks
List the internal risks in EDI
- Security risks
- Implementation risks
- Processing risks
List the external risks with EDI
- Controls at trading partners and VANS
- Loss of sensitive data due to unauthorized access
- Legislation regarding business transactions
- Loss of EDI facility
- Error during transmission of data
- Manipulation of transaction during transmission
List the controls for increased reliance on trading partners
- Development and acceptance of proper contractual data interchange agreement
- Good relations between trading partners
- Third party review of trading partners on regular basis
List the controls for increased reliance on technology
- Hardware and software continuously tested
- Strict development standards
- Control over physical access to critical hardware
- Error correction procedures
- Backup
List the controls for less human involvement
- Automated controls
- Training on management to understand information and to react timeously
- Limits and exception built into trading agreement
- Authorization of transaction by users during initial development of the system
List the controls for dependency on VANS
- Assess reliability of service provider
2. Contractual agreement with service provider
List controls for legal risks
- Adherence to legal requirement
- Contractual rights and obligations must be clearly defined in agreement
- Employee bound by code of conduct
Name the control for business risk
Information risk management policies and procedures
List the security risks involved in internal risks
- General lack of security policy for the organization as a whole
- Absence of executive sponsorship for security issues
- Security breach due unauthorized access
- Manipulation of software applications
- Blackmail
List the controls for security risk
- Security policy and procedures implemented and regularly reviewed
- Programmed access controls
- Audit trails of access to EDI and follow up unauthorized access
- Backup, recovery and restoration facilities
- Error correction procedures
- Physical security
- Personnel security
- Administrative security
- Communication security
- Risk management
List the controls for implementation risks
- Data retention requirements determined in respect of period, medium, legal requirements
- Perform risk analysis
- Obtaining technical advice
- Auditor must be involved
- Normal system development procedures
List the controls for processing risks in EDI
- Edit tests by system
- Exception reports printed and followed up by management
- Sequential numbering and follow up missing items
- Reconciliation of control accounts and transactions
- Validation tests by system
- Transaction logs and audit trails
- Division of duties
- Protection of data transmitted through encryption
- High risk transactions are encrypted
List the controls for trading partner and VANS
- Contractual agreement
- Good relationship
- Third party review
- Verify the identity of trading partners
List the controls for loss of sensitive data due to unauthorized access
- Business agreement between partners
- Good business relationship
- Encryption of transaction and data
- Third party review
List the controls for EDI facility
- Regular testing of system
- Choice of network supplier
- Failover