B6 - Process Management and Information Technology Flashcards
What is the purpose of the General IT controls?
They’re designed to ensure that the organization’s control environment (people, process and IT) is stable and well-managed. These are controls over the system as a whole.
What are types of the General IT controls?
- System development life-cycle standards and controls.
- Physical and logical controls over infrastructure
- Business resiliency management
- Change management procedures
- Software acquisition, development, operations, and maintenance controls.
What would be examples of general controls?
- Restricting access to a computer facility by use of biometrics devices
- Having backup file systems
- Performing background checks of personnel
- Segregation of duties of incompatible roles.
What does application controls include?
It includes input controls, processing controls, and output controls. They tend to be specific to the process or subsystem (e.g., “missing data check” on an input screen, reconciliation of totals and physical controls over inventory)
What is a preventive control?
Preventive controls stop problems before they occur (e.g., locked door, a security guard, segregation of duties). It relates to timing before an event occurs.
What is detective controls?
Detective controls call attention to errors that have already entered the system before an error causes a negative outcome or even worse, a disaster (e.g., reconciling account records to physical counts). It relates to timing after the event happened.
What are feedback controls?
Evaluate the results of a business process, and if the results are not good, management can adjust the process before disaster occurs. These are detective controls.
What are Feed Forward Controls?
Feed forward controls compare projected results (future) to a pre-determined standard and allow management to make a change to prevent an unwanted outcome, preventive controls. Used in a budget system (e.g., modern inventory ordering systems, sales are projected, current inventory levels are identified, and inventory is ordered)
What is a firewall?
Firewalls are designed to limit who is able to access a system (unauthorized users). Passwords are required to help minimize vulnerability.
What do firewalls do?
Firewalls screen data packets to determine if they are acceptable or unacceptable and block unacceptable packets from the system based on set parameters.
What is a multifactor authenticator?
Allows for a second authentication key from a second device (e.g., smartphone or other key generator needed at the time of log in)
How is asymmetric encryption used?
A public key is used to encrypt messages. A private key (which is never transmitted) is used to decrypt the message at the other end. Anyone can encrypt the message but only the intended recipient can decrypt it.
What is multimodal authentication?
Multimodal authentication uses multiple biometric data (e.g., fingerprints, facial scanning, eye scanning, etc.) to verify the identity of the individual accessing the data.
What is the purpose of a digital signature?
To ensure that the sender of the message is authentic. Digital signature uses asymmetric encryption.
What is a Public Key Infrastructure (PKI)?
Represents the mechanisms used to issue keys and digital certificates.
What is hashing?
It involves mapping large quantities of data into a smaller table for the purpose of recovering data more rapidly. It is also utilized in the encryption of advanced and digital signature.
What is data masking?
it involves breaking the linkage between data and the individual to whom the data is associated through the removal of personal identifier.
What is the role of the system analyst?
- The system analyst role falls under the application development team (yellow team)
- It analyzes and designs new applications and they lead teams of application (software) programmers who complete the actual coding.
- They talk to end users about their needs to develop the new application.
What is the role of the security administrator?
- the security administrator role falls in the system administrator and system programming team
(red team) - It ensures all components of the system are secure from threats both internal and external.
- Responsibility include security of software and system and granting appropriate access to systems via user authentication, password set up and maintenance.
What is the role of the Network Manager?
- Falls under the security administrator role (red team).
- Ensures all applicable devices link to the organization’s network and networks operate securely and continuously
- Manages remote access
What is the role of the web administrator?
- Falls under the security administrator role (red team).
- Operate and maintain the web server
What is the role of the Help Desk Personnel?
- Falls under the security administrator role (red team).
- Answer help-line calls and emails, resolve user problems, and obtain technical support and vendor support when necessary.
What is the role of the Database Administrator?
- Falls under the security administrator role (red team).
- System administrator that maintains and supports the database SOFTWARE.
- This include ensuring security and backup and recovery procedures.
What is the purpose of data security controls?
To ensure that storage media are only accessed, changed, or deleted after appropriate authorization. The objective is to protect information.
What is the purpose of change management and related control activities?
Anticipate monitoring the use of system software to prevent unauthorized access to system software and computer programs.
What are the steps in a disaster recovery plan?
- Assess the risk
- identify mission-critical applications and data
- Develop a plan for handling the mission-critical applications
- Determine the responsibilities of the personnel involved in disaster recovery
- Test the disaster recovery
What does Business Process Reengineering (BPR) refer to?
BPR refers to the implementation or radical transformation of business processes to achieve strategic objectives, such as improving customer satisfaction and service, cutting operational costs, and enhancing competitiveness.
Business process reengineering has longer implementation time because it involves radical change.
How does business process management works?
Business process management seeks incremental change
What is a Statistical Process Control (SPC)?
It is a means of quality control which uses statistics in order to control and monitor a process.
What is benchmarking?
It is a process where a company compares to peers to measure performance and understand where improvements can be made in the process.
What are the 5 steps in benchmarking?
- To identify the object of the benchmarking project. Single procedures or concepts are more appropriate for a benchmarking studying.
- Identify a company that excels in the particular procedure or concept you are studying.
- Study the company
- Analysis of the information you received by looking at the other company’s procedures.
- You apply what you learned to your own company.
What is the type of approach Just-in-time (JIT) inventory system use?
JIT uses a “pull” approach, where an item is produced only when it is needed down the line.
What are some characteristics of a just-in-time inventory system?
- lot size equal to one
- insignificant set-up times and costs
- Balanced and level workloads
- A reduction of WIP because of reduced materials pending processing.
What is the continuous improvement (Kaizen) model about?
Occurs at the manufacturing stage where the ongoing search for cost reduction takes the form of analysis of production processes.
What is value chain analysis?
It is concerned with the additional value a product gains by passing through all the activities of the production chain.
What is lean manufacturing?
It requires the use of only those resources required to meet the requirements of customers (resources invested only in value-added activities).
What is the focus of lean manufacturing?
Waste reduction and efficiency
What is the goal of the Six Sigma program?
it is a quality-improvement program that strives to reduce product or service defects to near zero levels.
What are the steps of the existing product and business process improvement of the Six Sigma program?
- Define the problem
- Measure key aspects of the current process (collect relevant data)
- Analyze data
- Improve or optimize current processes
- Control (develop statistical control process to monitor results)
What are the steps of the new product and business process development of the Six Sigma program?
- Define design goals
- Measure critical to quality issues (CTQ) (analyze the value chain to determine the features that provide value to the customer)
- Analyze Design Alternatives (develop different methodologies)
- Design optimization (use modeling techniques)
- Verify the design
- Design optimization
What are the 5 IT resources or physical resources?
- Data
- Application systems
- Technology
- Facilities
- People
What are the 7 desirable attributes of information?
- Efficiency
- Confidentiality
- Integrity
- Availability
- Compliance
- Reliability
- Effectiveness
What does efficiency relates to?
Provides information through the optimal (most productive and economical) use of resources.
What does confidentiality refers to?
Protection of sensitive information from unauthorized disclosure
What does integrity refers to?
Accuracy and completeness of information, validity in accordance with business values and expectations
What does availability refer to?
Information is available when required now and in the future. Also includes safeguarding of necessary resources and associated capabilities.
What does compliance refer to?
Comply with laws, regulations, and contractual arrangements to which the business process is subject also internal business policies.
What does reliability refer to?
Provision of appropriate information for management to operate the entity and exercise its fiduciary and governance responsibilities
What does effectiveness refer to?
Information is relevant and pertinent to the business process and is delivered in a timely, correct, consistent and usable manner.
What is the focus of IT Governance?
It focuses on the effective management of data and is ultimately the responsibility of management and the board of directors.
What are the components supporting IT Governance?
- Data Availability
- Architecture
- Metadata
- Policy
- Quality
- Regulatory Compliance and Practice
- Security
What does data availability under the components of IT Governance refers to?
Information that is not available to employees when they need it provides no benefit. It must be available at the right time to support IT governance goals.
What are the factors that impact the IT strategy?
- Available IT personnel
- Virtual/Physical Network Design
- Cybersecurity
- Centralized/Decentralized Network Design
- Disaster Recovery and Business Continuity
What is decentralized (distributed) processing?
It is a form of processing that uses multiple independent computers to validate a group (block) of transactions at a time. While those blocks are processed, they are added to a chain of all prior blocks that have ever been processed.
Who is responsible for structuring IT governance?
Executive management
Who is responsible for overseeing IT Governance and appointing executive positions?
The board of directors.
What is the role of a systems steering committee?
It is responsible for the oversight of the information system functions. It has a more holistic view than the project management team and it’s able to review and approve long-range plans inclusive of developing strategic goals, allocating budgets, monitoring projects, and addressing issues as they arise.
How is the high impact or risk assessment (likelihood of loss) described?
the organization cannot operate without the information resource for even a short period of time.
How is the medium impact or risk assessment (likelihood of loss) described?
Information resource is classified as medium if there is a work-around for its loss in the short term, but recovery is necessary for long-term operations
How is the low impact or risk assessment (likelihood of loss) described?
Information resource is classified as low impact if the organization could operate without the information resource for an extended period of time.
What is a node?
A node is any device connected to a network.
What is a router?
hardware pieces that manage network traffic by reading source and destination fields within information packets to determine the proper path for a data packet to flow. It assigns IP addresses to different devices.
What is a switch?
they connect and divide devices within a computer network. It connects other devices.
What is a gateway?
Gateway acts as intermediary between different networks. it transforms data from one protocol into another so that information can flow between networks.
What is a server?
A server provides computer power for other machines in the network. It also coordinates programs, data, and other computers so that the network can operate.
What is a firewall?
The protective device (hardware) or program (application) that protects an organization’s IT resources by filtering network traffic through security protocols.
What is a Virtual Private Network (VPN)?
A VPN provides an encrypted communication tunnel across the internet that allows remote users secure access to a network.
What is an Accounting Information System?
It’s a way to translate raw data into information. Some of the responsibilities of the AIS include:
1. Collecting and storing data about various activities and company transactions
2. Processing data and using it to generate financial reports
3. Secure critical organization financial information.
What are the steps of an Accounting Information System?
- We make debits and credits to record journal entries
- journal entries are posted to the general ledger
- general ledger becomes the foundation for the trial balance
- From the trial balance we make adjustments
- The adjusted trial balance can be used to prepare financial statements.
What are the sequence of events in an AIS?
- The transaction data from source documents is entered into the AIS by an end user.
- The original paper source documents are filed
- These transactions are recorded in the appropriate journal
- the transactions are posted to the general and subsidiary ledgers
- Trial balances are prepared.
- Financial reports are generated.
What is the purpose of a Management Information system (MIS)?
Enables companies to use data as part of their strategic planning process as well as the tactical execution of that strategy.
What are subsystems under Management information system (MIS)?
- Accounting Information system (AIS)
- Decision support system (DSS)
- Executive information system (EIS)
What is the greatest impact in the design of the MIS system?
The key driver comes from the ultimate goal of the reports, which is to help managers make decisions.
What is a Decision Support System (DSS)?
It’s a subsystem from MIS. Serves the management, operations, and planning (forecast) of all levels of an organization. Helps managers with routine decisions.
Under what type of MIS subsystem is artificial intelligence (AI) sitting?
Artificial Intelligence is referred to as an expert system and falls under the Decision Support System (DSS). It is designed to mimic the knowledge and decision-making abilities of the users who employ them so that decisions can be automated.
What is the Supply Chain Management System (SCM)?
Unifies business processes beginning with the original supplier and ending with the customer. Includes activities such as purchasing, material handling, production planning and control, logistics and warehousing, inventory control and production distribution and delivery by taking a holistic approach.
What are the questions (concerns) that should be asked in a Supply Chain Managements System (SCM)?
The questions are concerned with four important characteristics for every sale:
1. What was ordered?
2. When was it ordered?
3. Where is it being sold and delivered to?
4. How much was ordered?
What is the objective of the Supply Chain Managements System (SCM)?
The objective include flexibility and responsiveness in meeting the demand for customers and business partners.
What is an Enterprise Resource Planning system (ERP)?
its one system that supports all the activities of the organization. The ERP provides transaction processing, management support, and decision making support in a single package.
What are the goals of the ERP?
- integration of all data within one database with user defined views
- Maintenance cost savings
- Employee empowerment - improves communication and decision making
- utilizes best practices - most successful business processes are integrated in one,
What is E-business?
uses internet to improve business performance through connectivity (broad category)