CH4 Flashcards
IT RESPONSIBILITIES AND SEGREGATION OF DUTIES
-FILE LIBRARIAN
FILE LIBRARIES STORE AND PROTECT PROGRAMS AND TAPES FROM DAMAGE AND UNAUTHORIZED USE, AND FILE LIBRARIANS CONTROL THE FILE LIBRARIES. IN LARGE COMPUTING ENVIRONMENTS, MUCH OF THIS WORK HAS BEEN AUTOMATED. SOFTWARE PROGRAM LIBRARIANS ARE AVAILABLE AS PART OF THE PROGRAM CHANGE CONTROL PROCESS
IT RESPONSIBILITY AND SEGREGATION OF DUTIES
-DATA LIBRARIAN
IN LARGE COMPANIES, THE DATA LIBRARIAN HAS CUSTODY OF AND MAINTAINS THE ENTITY’S DATA.
IT RESPONSIBILITY AND SEGREGATION OF DUTIES
-SECURITY ADMIN
SECURITY ADMINS ARE RESPONSIBLE FOR THE ASSIGNMENT OF INITIAL PASSWORDS AND OFTEN THE MAINTENANCE OF THOSE PASSWORDS (IF THE END USER DOES NOT MAINTAIN THEIR OWN PASSWORDS). SECURITY ADMIN ARE RESPONSIBLE FOR THE OVERALL OPERATION OF THE VARIOUS SECURITY SYSTEMS AND THE SECURITY SOFTWARE IN GENERAL.
IT RESPONSIBILITY AND SEGREGATION OF DUTIES
-SYSTEM ADMIN
SYSTEM ADMIN IS COMPOSED OF:
- DATABASE ADMIN (DBA)
- NETWORK ADMIN
- WEB ADMING
IT RESPONSIBILITY AND SEGREGATION OF DUTIES
-SYSTEM ADMIN-DATABASE ADMIN
WITHIN A DATABASE ENVIRONMENT, DATABASE ADMIN ARE RESPONSIBLE FOR MAINTAINING AND SUPPORTING DATABASE SOFTWARE.
-DATABASE ADMINS ARE DIFFERENT FROM DATA ADMINS; A DATABASE ADMIN IS RESPONSIBLE FOR THE ACUTAL DATABASE SOFTWARE, WHILE A DATA ADMIN IS RESPONSIBLE FOR THE DEFINITION, PLANNING AND CONTROL OF THE DATA WITHIN A DATABASE.
THE FUNCTION OF A DATABASE ADMIN IS MORE TECHNICAL, AND THE FUNCTION OF A DATA ADMIN IS MORE ADMINISTRATIVE.
IT RESPONSIBILITY AND SEGREGATION OF DUTIES
-SYSTEM ADMIN-NETWORK ADMIN
NETWORK ADMIN SUPPORT COMPUTER NETWORKS. NETWORK PERFORMANCE MONITORING AND TROUBLESHOOTING IS A SPECIALLY IMPORTANT ASPECT OF THEIR WORK. A NETWORK ADMIN SETS UP AND CONFIGURES A COMPTER NETWORK SO THAT MULTIPLE COMPUTERS CAN SHARE THE SAME DATA AND INFO. AFTER A NETWORK IS ESTABLISHED, THE WORK IS MOSTL MONITORING AND TROUBLESHOOTING. SOMETIMES NETWORK ADMINS ARE CALLED TELECOMMUNICATIONS ANALYST OR NETWORK OPERATORS.
-IN SMALL ORG, SYSTEM ADMIN/ SYSTEM PROGRAMMING AND NETWORK ADMIN ARE OFTEN PERFORMED BY THE SAME PERSON OR PEOPLE. IN THOSE ORG, THE LINE BETWEEN SYSTEM ADMIN AND NETWORK ADMIN IS OFTEN HARD TO DRAW.
WEB ADMIN
RESPONSIBLE FOR INFO ON A WEBSITE
DATA INPUT CLERK
DATA INPUT PERSONNEL PREPARE, VERIFY AND INPUT DATA TO BE PROCESSED IF THAT FUNCTION HAS NOT BEEN DISTRIBUTED TO THE END USERS.
HARDWARE TECHNICIAN
A HARDWARE TECHNICIAN SETS UP AND CONFIGURES HARDWARE AND TROUBLESHOOTS ANY RESULTING HARDWARE PROBLEMS. MOST OF THE TIME, THE HARDWARE MAINTAINED INCLUDES PCS AND PERIPHERAL EQUIP; THE HARDWARE VEDORS NORMALLY MAINTAIN MAINFRAMES AND MIDRANGE COMPUTERS.
SEGREGATION OF DUTIES WITHIN INFO TECHNOLOGY
SEGREGATION OF DUTIES IS DEFINED AS DIVIDING RESPONSIBILITIES FOR DIFFERENT PORTIONS OF A TRANSACTION (AUTHORIZATION, RECORDING AND CUSTODY) AMONG SEVERAL DIFFERENT PEOPLE OR DEPARTMENTS.
SEGREGATION OF DUTIES WITHIN INFO TECHNOLOGY
-SYSTEM ANALYST VS COMPUTER PROGRAMERS
SYSTEM ANALYSTS HELP USERS DETERMINE THEIR INFO NEEDS, AND THE DESING AN INFO SYSTEM TO MEET THOSE NEEDS WHEREAS COMP PROGRAMMERS TAKE THE DESIGN PROVIDED BY SYSTEM ANALYSTS AND CREATE INFO SYSTEM BY WRITING THE COMP PROGRAMS.
- ANALYSTS OFTEN ARE IN CHARGE OF HARDWARE AND COMPUTER PROGRAMERS ARE IN CHARGE OF THE APPLICATION SOFTWARE.
- THEORETICALLY, IF THE PERSON WHO IS IN CHARGE OF SETTING UP THE HARDWARE IS ALSO IN CHARGE OF SETTING UP AND MAINTAINING THE SOFTWARE, THAT PERSON COULD EASILY BYPASS SECURITY SYSTEMS WITHOUT ANYONE KNOWING AND STEAL ORG INFO OR ASSETS.
SEGREGATION OF DUTIES WITHIN INFO TECHNOLOGY
-COMPUTER OPERATORS VS COMPUTER PROGRAMERS
IT IS IMPORTANT THAT COMPUTER OPERATORS AND COMP PROGRAMMERS BE SEGREGATED BECAUSE A PERSON PERFORMING BOTH FUNCTIONS OCULD MAKE UNAUTHORIZED AND UNDETECTED PROGAM CHANGES.
SEGREGATION OF DUTIES WITHIN INFO TECHNOLOGY
-COMPUTER OPERATORS VS COMPUTER PROGRAMERS
SECURITY ADMINS VS COMPUTER OPERATORS AND COMPUTER PROGRAMMERS
-SECURITY ADMIN ARE THE PEOPLE WHO ARE RESP FOR RESTRICTING ACCESS TO SYSTEMS, APPS, OR DATABASES TO THE APPROPRIATE PERSONNEL. IF THE PERSON WHO IS IN CHARGE OF RESTRICTING ACCESS IS ALSO A PROGRAMMER OR AN OPERATOR (OR ADMINISTRATOR) FOR THAT SYSTEM, THEN THAT PERSON COULD GIVE HIMSELF/HERSELF OR ANOTHER PERSON ACCESS TO AREAS THEY ARE NOT AUTHORIZED TO ENTER. THIS SECURITY BYPASS WOULD ALSO ALLOW THAT PERSON TO STEAL ORG INFO OR ASSETS (EMBEZZLING OF FUNDS) WITHOUT ANYONE KNOWING ABOUT IT.
POLICIES
IT POLICIES REPRESENT MANAGEMENT FORMAL NOTIFICATION TO EMPLOYEES REGARDING THE ENTITY’S OBJECTIVES. POLICIES SURROUNDING SYSTEM DESIGN SHOULD PROMOTE COMMUNICATION. POLICIES SHOULD DESCRIBE THE MEANS OF COMMUNICATING SIGNIFICANT INFO UPSTREAM. THERE SHOULD ALSO BE EFFECTIVE COMMUNICATION WITH EXTERNAL PARTIES, SUCH AS CUSTOMERS, SUPPLIERS, REGULATORS, AND SHAREHOLDERS.
POLICIES
-IMPLEMENTATION
AUTHORITY AND RESP ARE ASSIGNED THROUGH FORMAL JOB DESCRIPTIONS; EMPLOYEE TRAINING, OPERATING PLANS, SCHEDULES, AND BUDGETS; A FORMAL COMPANY CODE OF CONDUCT AND A WRITTEN POLICY AND PROCEDURES MANUAL.
EXAMPLES OF A DECISION SUPPORT SYSTEM INCLUDE (DSS):
- SENSITIVITY ANALYSIS APPLICATION
- FINANCIAL MODELING APPLICATION
- DATABASE QUERY APPLICATION
DECISION SUPPORT SYSTEMS (DSS) ARE COMPUTER-BASED INFO SYSTEM THAT PROVIDE INTERACTIVE SUPPORT TO MANAGERS OR OTHER DURING THE DECION-MAKING PROCESS.
- TPS PROCESS DATA RESULTING FROM BUSINESS TRANSACTIONS (MONTHLY, HISTORICAL IN NATURE; NOT PREDICTIVE).
- A FINANCIAL MODELING APP IS A DSS TO ASSIST MANAGEMENT IN EVALUATION FINANCING ALTERNATIVES.
- DATABASE QUERY APPLICATION ARE A DSS THAT READ AND REORGANIZE DATA TO MANAGEMENTS SPECIFICATIONS BUT DO NOT ALLOW ALTERNATIONS OF THE DATA.
- SENSITIVITY ANALYSIS IS A DS THAT USES A WHAT IF TECHNIQUE THAT ASKS HOW A GIVEN OUTCOME WILL CHANGE IF THE ORIGINAL ESTIMATES OF THE MODEL ARE CHANGED.
DECISION SUPPORT SYSTEM (DSS)
DSS ARE COMPUTER BASED INFO SYSTEMS THAT PROVIDE INTERACTIVE SUPPORT TO MANAGERS OR OTHERS DURING THE DECION-MAKING PROCESS.
MANAGEMENT REPORTING SYSTEMS
MANAGEMENT REPORTING SYSTEMS PROVIDE MANAGERS WITH THE INFO NEEDED FOR DAY TO DAY DECISION MAKING.
FORMALIZED SYSTEM
A FORMALIZED SYSTEM IS A GENERIC TERM USED TO DESCRIBE ANY SYSTEM OPERATING IN PROPER OR REGULAR FORM.
STRUCTURED SYSTEM
A STRUCTURED SYSTEM IS A SYSTEM IN WHICH EACH PROGRAM WITHIN A SYSTEM IS INDEPENDENT OF OTHER PROGRAMS WITHIN THE SYSTEMS. THIS ENABLES PROGRAMMING TEAMS TO WORK INDEPENDENTLY ON DIFFERENT PROGRAMS WITHIN THE SAME SYSTEM.
EXECUTIVE INFO SYSTEMS (EIS)
-AN EIS PROVIDES STRATEGIC INFO TAILORED TO THE NEEDS OF TOP MANAGEMENT. IT IS NOT WIDELY USED THROUGHOUT THE ORG. .
-EIS OR EXECUTIVE SUPPORT SYSTEMS, PROVIDE SENIOR EXECUTIVES WITH IMMEDIATE AND EASY ACCESS TO INTERNAL AND EXTERNAL INFOT TO ASSIT THE EXECUTIVES IN STRATEGIC, NOT DAYLY DECISION MAKING.
EIS HELPS EXECUTIVE MONITOR BUSINESS CONDITIONS IN GENERAL AND ASSISTS IN STRATEGIC PLANNING TO CONTROL AND OPERATE THE COMPANY.
-PROVIDES TOP EXECUTIVES WITH IMMEDIATE AND EASY ACCESS TO INFO IN A HIGHLY INTERACTIVE FORMAT.
SEGREGATION OF DUTIES IN AN IT ENVIRONMENT
THE DUTIES OF A SYSTEM ANALYST AND APPLICATION PROGRAMMERS CAN BE AND OFTER ARE COMBINED. THE DUTIES OF SYSTEM PROGRAMMERS AND APPLICATION PROGRAMMERS SHOULD NOT BE COMBINED.
- SEGRAGATION OF DUTIES IN AN IT ENVIRONMENT NORMALLY REVOLVES AROUND GRANTING AND/OR RESTRICTING ACCESS TO PRODUCTION DATA AND/OR PRODUCTION PROGRAMS.
- SEGREGATION OF DUTIES IN AN IT ENVIRONMENT IS DEFINED AS GIVING RESP FOR DIFFERENT PROTIONS OF A TRANSACTION AMONG SEVERAL DIFFERENT PEOPLE
- THE IT DEPT IS A SUPPORT GROUP IN THAT IT NORMALLY DOES NOT INITIATE OR AUTHORIZE TRANSACTIONS
WHICH OF THE FOLLOWING IS AN ADVANTAGE OF A COMPUTER BASED SYSTEM FOR TRANSACTION PROCESSING OVERA MANUAL SYSTEM?
- A COMPUTER BASED SYSTEM WILL ALMOST BE MORE EFFICIENT IN DOING SOMETHING THAT HAS TO BE DONE MULTIPLE TIMES. THUS, IF MULTIPLE FS HAVE TO BE PRODUCED, FOR EXAMPLE, AT MULTIPLE TIMES DURING THOSE CLOSING PROCESS, A COMPUTER BASED SYSTEM WILL NORMALLY BE MORE EFFICIENT.
- A COMPUTER BASED SYSTEM REQUIRES A SET OF INTERNAL CONTROLS THAT ARE JUST AS STRINGENT AS A MANUAL SYSTEM.
- THERE IS NOTHING ABOUT A COMPUTER BASED SYSTEM THAT GUARANTEES INCREASED ACCURACY.
- THERES NOTHING ABOUT COMPUTER BASED SYSTEM THAT ELIMINATES THE NEED TO RECONCILE CONTROL ACCOUNTS AND SUBSIDIARY LEDGERS. COMP SYSTEMS REALLY THE PROGRAMS IN THOSE SYSTEMS MAKE MISTAKES SOMETIMES, THEY ARE CALLED BUGS.
AREAS OF RESPONSIBILITY THAT ARE NORMALLY ASSIGNED TO A SYSTEM PROGRAMMER IN A COMPUTER SYSTEM ENVIRONMENT
-OPERATING SYSTEMS AND COMPILERS
SYSTEM PROGRAMMERS WORK WITH OPERATING SYSTEM AND COMPILERS.
SYSTEM PROGRAMMERS SELDOM IF EVER WRITE APP PROGRAMS. THE SETS AND MINDSETS OF SYSTEM PROGRAMS AND APP PROGRAMERS ARE ALMOST COMPLETELY DIFFERENT, NOT TO MENTION THAT SYSTEM PROGRAMMERS DOING BOTH WOULD VIOLATE GOOD IC PRINCIPLES.
-SYSTEM PROGRAMMERS COULD BE ASSIGNED THE
RESPONSIBILITY FOR DATA COMMUNICATIONS HARDWARE AND SOFTWARE.
SYSTEM PROGRAMMERS ARE NOT NORMALLY RESPONSIBLE FOR COMPUTER OPERATIONS PERSONNEL.
STATEMENTS REGARDING DATA, INFO AND INFO SYSTEMS.
TPS AND MANAGEMENT INFO SYSTEM ARE BOTH TYPES OF BIS (BUSINESS INFO SYSTEMS)
-AN AUDIT TRAIL ALLOWS INFO IN THE FS TO BE VOUCED TO THE ORIGINAL SOURCE DOCS. IT REPRESENTS THE ABILITY TO VOUCH SUMMARY INFO IN THE FS THROUGH THE ACCOUNTING RECORDS AND INTO SOURCE DOCS.
-BUSINESS DATA IS GENERALLY STORED IN TWO DIMENSIONAL TABLES THAT FORM RELATIONAL DATABASE.
DATA PROCESSED INTO A MEANINGFUL FORMAT IS INFO.
SYSTEMS ANALYST EXAMPLE
AN AD IN A LOCAL NEWSPAPER STATED THAT A SMALL LOCAL BUSINESS REQUIRED SOMEONE WHO CAN GET OUR NEW OFF-THE-SHELF PRODUCTION SOFTWARE TO DO WHAT WE WANT IT TO DO SO WE CAN GET ON WITH RUNNING OUR BUSINESS. THIS IS A TYPE OF SYSEM ANALYST JOB.
- A SYSTEM ANALYST JOB WOULD TAKE ON THE ROLE OF LEARNING A PURCHASED PACKAGE AND WOULD HAVE THE JOB OF INTEGRATING IT TO ANY EXISTING SOFTWARE.
THE SYSTEM ANALYST WOULD ALSO TAKE THE RESPONSIBILITY FOR TRAINING STAFF IN ITS USE.
- A SYSTEM ANALYST IS SOMETIMES REFERRED TO AS A SYSTEM INTEGRATOR WITH PURCHASED SYSTEMS SINCE THE INDIVIDUAL IS RESPONSIBLE FOR ADAPTING OR INTEGRATING THE PURCHASED SYSTEM INTO THE BUSINESS.
EMPLOYEE ACTION AS A SYSTEM PROGRAMMER AND APPLICATION PROGRAMER IS…
A SERIOUS INTERNAL CONTROL WEAKNESS THAT IS VERY DIFFICULT TO OVERCOME.
DATA BASE ADMIN
MAINTAINS AND SUPPORTS ITS DATABASE SYSTEMS
NETWORK ADMIN
IT SUPPORTS ITS OWN INTERNAL NETWORK BY MONITORING PERFORMANCE OF THOSE NETWORKS AND TROUBLESHOOTING ANY PROBLEMS
DATABASE ADMIN AND NETWORK ADMIN
CAN BE PERFORMED BY THE SAME PERSON, ALTHOUGH THAT IS NOT LIKELY SINCE THE SKILL SETS OF ADMIN AND NETWORK ADMINISTRATOR ARE BOTH HIGHLY TECHNICAL AND VERY SPECIALIZED.
IT DEPARTMENT
IS A SUPPORT GROUP AND NORMALLY DOES NOT INITIATE OR AUTHORIZE TRANSACTIONS. WHEN IT DOES INITIATE OR AUTHORIZE TRANSACTIONS, THOSE TRANSACTIONS NORMALLY ARE FOR SUCH ACTIVITIES AS LEASING HARDWARE, PAYING SOFTWARE LICENSE FEES, AND OTHER IT-RELATED ACTIVITIES.
PROGRAM MODIFICATION CONTROLS
PROGRAM MODIFICATIONS ARE CONTROLS OVER THE MODIFICATION OF PROGRAMS BEING USED IN PRODUCTION APPLICATIONS.
- PROGRAM MODIFICATION CONTROLS INCLUDE BOTH CONTROLS THAT ATTEMPT TO PREVENT CHANGES BY UNAUTHORIZED PERSONNEL AND ALSO TRACK PROGRAM CHANGES SO THAT THERE IS AN EXACT RECORD OF WHAT VERSIONS OF WHAT PROGRAMS WERE RUNNING IN PRODUCTION AT ANY SPECIFIC POINT IN TIME.
- PROGRAM CHANGE CONTROL SOFTWARE NORMALLY INCLUDES A SOFTWARE CHANGE MANAGEMENT TOOL AND CHANGE REQUEST TRACKING TOOL. PROGRAM CHANGE CONTROL OFTEN INVOLVES CHANGING WHAT ARE EFFECTIVELY THE SAME PROGRAMS IN TWHO DIFFERENT WAYS SIMULTANEOUSLY. NORMALLY AN ENVIRONMENT HAS BOTH PRODUCTION PROGRAMS AND PROGRAMS THAT ARE BEING TESTED. SOMETIMES, PRODUCTION PROGRAMS REQUIRE CHANGES PRODUCTION FIXES AT THE SAME TIME THE TEST VERSION OF TEH SAME PROGRAMS ARE BEING WORKED ONE. THIS PROCESS MUST BE CONTROLLED SO THAT ONE SET OF CHANGES DOES NOT INCORRECTLY OVERAY THE OTHER.
IN A LARGE MULTINATIONAL ORG, WHICH OF THE FOLLOWING JOB RESP SHOULD BE ASSIGNED TO THE NETWORK ADMIN?
-MANAGING REMOTE PROCESS
IN A LARGE MULTINATIONAL ORG OR EVEN A MEDUM MANAGING REMOTE ACESS WOULD BE THE RESPONSIBILITY OF A NETWORK ADMING.
EFFECTIVE SEGREGATION OF DUTIES WITHIN INFO TECH AN APP PROGRAMMER SHOULD HAVE WHAT RESPONSIBILITIES
-CODE APPROVED CHANGES TO A P/R PROGRAM
A P/R PROGRAM IS AN APP PROGRAM AND THE CHANGES HAVE BEEN PREVIOUSLY APPROVED.
AN APP PROGRAMER SHOULD NEVER BE ASSIGNED RESP TO CORRECT DATA ENTRY ERRROS FOR THE CASH DISBURSEMENT OR ANY OTHER SYSTEM.
APP PROGRAMMERS SHOULD NEVER HAVE ACCESS TO DATA OTHER THAN FOR VERY CONTROLLED SITUATIONS SUCH AS DATA FIXES.
APP PROGRAMMERS SHOULD NOT HAVE CUSTODY OF BILLING OR ANY OTHER APPLICATION SYSTEM PROGRAM CODE. CUSTODY SHOULD BE WITH THE LIBRARIAN EITHER A PERSON OR SYSTEM. AN APP PROGRAMMERS SHOULD ONLY HAVE CONTROLLED ACCESS TO THE PROGRAM CODE.
FIRST STEP IN A COMPANYS SYSTEM DEVELOPMENT LIFE CYCLE OF ITS INFO TECHNOLOGY DEVELOPED INTERNALLY
ANALYSIS.
- DESIGN
- TESTING
- LASTLY IMPLEMENTATION.
ECHO CHECKS
DEVICES THAT VERIFY TRANSMISSIONS
DATA PROCESSING
INVOLVES TREATMENT OF THE DATA INPUT
RESPONSIBILITY OF AN MIS OR EDP STEERING COMMITTEE
- A STEERING COMMITTEE SHOULD BE FORMED TO GUIDE AND OVERSEE SYSTEM DEVELOPMENT AND ACQUISITION.
- A STEERING COMMITTEE HAS BROAD OBJECTIVES THAT INCLUDE THE OVERSIGHT OF SYSTEMS DEVELOPMENT AND ACQUISITION AFTER AN ASSESSMENT OF DATA PROCEEDING NEEDS.
DATABASE ADMINS
A DATABASE ADMIN CONTROLS THE DATABASE, NOT THE DATA AND DUTIES GENERELLY INCLUDE:
- DESIGN OF FIRMS DATABASE
- MAINTAINING SECURITY MEASURES
- CONTROLLING DATA STRUCTURE.
A DATABASE ADMIN IS RESPONSIBLE FOR THE ACTUAL DATABASE SOFTWARE, WHILE DATA ADMIN IS RESPONSIBLE FOR THE DEFINITION, PLANNING AND CONTROL OF THE DATA WITHIN A DATABASE.
-THE FUNCTION OF A DATABASE ADMIN IS MORE TECHNICAL AND THE FUNCTION OF A DATA ADMIN IS MORE ADMINISTRATIVE.
AN EXAMPLE OF AN APPLICATION INPUT CONTROL
- EDIT CHECK
- AN EDIT CHECK IS AN APPLICATION INPUT CONTROL THAT VALIDATES DATA BEFORE THE DATA IS SUCCESSFULLY INPUTED. BATCHES CONTAINING TRANSACTIONS WITH ERRORS, INCORRECT BATCH TOTALS AND BATCHES WHRE DR DO NOT EQUAL CR ARE WRITTEN TO A SUSPENDED TRANSACTION FILE. THESE TRANSACTIONS ARE THEN CORRECTED AND RESUBMITTED. ALL TRANSACTIONS MUST BE CORRECTED AND RESUBMITTED BEFORE END-MONTH PROCESSING CAN BEGIN.
WHAT SHOULD BE ALWAYS INCLUDED IN A SYSTEM SPECIFICATION DOCUMENT FOR A FINANCIAL REPORT?
-DATA ELEMENTS
DATA ELEMENTS SHOULD ALWAYS BE INCLUDED IN THE SYSTEM SPECIFICATION DOCUMENT FOR A FINANCIAL REPORT. DAA ELEMENTS DEFINE THE BUILDING BLOCKS OF INFO PROVIDED IN A FINANCIAL REPORT
PRIMARY OBJECTIVE OF DATA SECURITY CONTROLS?
-TO ENSURE THAT STORAGE MEDIA ARE SUBJECT TO AUTHORIZATION PRIOT TO ACCESS, CHANGE OR DESTRUCTION.
THE OBJECTIVE OF SECURITY DATA IS TO ENSURE THAT STORAGE MEDIA ARE ONLY CHANGED OR DELETED AFTER APPROPRIATE AUTHORIZATION. THE OBJECTIVE IS TO PROTECT INFO.
CHANGE MANAGEMENT
AND RELATED CONTROL ACTIVITIES ANTICIPATE MONITORING THE USE OF SYSTEM SOFTWARE TO PREVENT UNAUTHORIZED ACCESS TO SYSTEM SOFTWARE AND COMPUTER PROGRAMS
POLICIES SUPPORT DOCS
SUCH AS PROCEDURES, FORMALIZE STANDARS RULES AND PROCEDURES TO ENSURE THAT ORG CONTROLS ARE PROPERLY EXECUTED. DATA SECURITY CONTROLS MAY BE INCLUDED IN PROCEDURES, BUT DEVELOPMENT PROCEDURES IS NOT THEIR OBJECTIVE.
THE CONTROL OBJECTIVE FOR INFO AND RELATED TECH (COBIT) FRAMEWORK INCLUDES ALL OF THE FOLLOWING INFO CRITERIA:
THE COBIT FRAMEWORK IDENTIFIES 7 INFO CRITERIA (ICE RACE) THAT INCLUDE
- INTEGRITY
- CONFIDENTIALITY
- EFFICIENCY
- RELIABILITY
- AVAILABILITY
- COMPLIANCE
- EFFECTIVENESS
COBIT
-EFFECTIVENESS
-THE IDEA THAT INFO WILL BE DELIVERED TIMELY IN A CORRECT, CONSISTENT AND USEFUL MANNER.
INTEGRITY
THE IDEA THAT INFO MUST BE ACCURATE AND COMPLETE AND VALID.
EFFECTIVENESS
INFO BE RELEVANT TO A BUSINESS PROCESS AND DELIVERED TIMELY IN CORREC, CONSISTENT AND USABLE MANNER.
THE COBIT FRAMEWORK IDENTIFIES 5 FOCUS AREAS FOR IT GOVERNANCE WHICH INCLUDE:
- STRATEGIC ALIGNMENT
- RESOURCE MANAGEMENT
- RISK MANAGEMENT
- PERFORMANCE MEASUREMENT
- VALUE DELIVERY
COBIT INFO CRITERIA
ICE RACE
COBIT DEFINES THE ENTERPRISE ARCHITECTURE FOR IT AS A
-COMBINATION OF IT RESOURCES AND DEFINED PROCESSES.
USING PROCESSES DEFINED BY THE COBIT FRAMEWORK, THE DOMAIN CATEGORY NORMALLY ASSOCIATED WITH THE DELIVERY OF IT SOLUTIONS TO A BUSINESS ARE REFERED TO AS.
ACQUIRED AND IMPLEMENT
- UNDER COBIT FRAMEWORK, THE ACQUIRE AND IMPLEMENT DOMAIN ADDRESSES THE DELIVERY OF IT SOLUTIONS TO USERS. THE COBIT FRAMEWORK INCLUDES THE 4 DOMAINS IN THE MNEMONIC “PO AIDS ME”
- PROCESS AND ORGANIZE
- ACQUIRE AND IMPLEMENT
- DELIVERY AND SUPPORT
- MONITOR AND EVALUATE
EXECUTIVE SUPPORT SYSTEM
EXECUTIVE SUPPORT SYSTEMS PROVIDE SENIOR EXECUTIVES WITH IMMEDIATE AND EAY ACCESS TO INTERNAL AND EXTERNAL INFO TO ASSIST THE EXECUTIVES IN STRATEGIC ISSUES SUCH AS NON ROUTINE DECISIONS THAT MAY INVOLVE ANALYSIS OF CYCLICAL DATA ACQUISITIONS AND COMPETITOR BEHAVIOR
AUDIT LOGS ARE AN EXAMPLE OF»>
TYPES OF SECURITY CONTROL
-AUDIT LOGS ARE DETECTIVE SECURITY CONTROLS. THEY ARE GENERALLY CHRONOLOGICAL RECORDS THAT PROVIDE DOCUMENTARY EVIDENCE OF THE SEQUENCE OF ACTIVITIES THAT CAN BE USED TO DETECT ERRORS OR IRREGULARITIES
EDI IS BEST DESCRIBED AS
COMPUTER TO COMPUTER TRANSACTIONS FOR DIRECT PROCESSING
-BY DEFINITION, EDI IS THE COMPUTER TO COMPUTER EXCHANGE OF BUSINESS DATA IN STRUCTURED FORMATS THAT ALLOWS DIRECT PROCESSING OF DATA BY THE RECEIVING SYSTEM.
EDI TRANSACTIONS MAY BE TRANSMITTED USING VAN, BUT EDI IS NOT A VAN BY DEFINTION
DATA WAREHOUSE
E COMMERCE
ORDERING GOODS OR SERVICES OVER THE INTERNET FROM A CORPORATE WEBSITE.
ELECTRONIC DATA INTERCHANGE (EDI)
IT TYPICALLY OCCURS BETWEEN PARTIES WITH A PREVIOUS RELATIONSHIP NORMALLY OVER A VAN (VALUE ADDED NETWORK) NOT THE INTERNET. HOWEVER, THE USE OF THE INTERNET FOR EDI IS BECOMING MORE COMMON.
B2B TRANSACTIONS ARE FREQUENTLY HANDLED THROUGH ELECTRONIC MEDIA. THEY TYPICALLY HAPPEN
THROUGH THE INTERNET, EDI, INTRANETS OR EXTRANETS.
- B2B TRANSACTIONS OCCUR THROUGH ANY NUMBER OF DIFFERENT NETWORKS INCLUDING THE INTERNET.
- B2B IS NOT REQUIRED TO TAKE PLACE ONLY THROUGH A SINGLE NETWORK
THE COMMUNICATIONS NETWORK TYPICALLY USED TO EFFECT ELECTRONIC DATA EDI BETWEEN BUSINESSES IS?
- VAN (VALUE ADDED NETWORK)
- EDI IS USUALLY EFFECTED THROUGH A VAN. HOWEVER, IT CAN BE EFFECTED THROUGH THE INTERNET
ADVANTAGE OF E-COMMERCE OVER EDI
- IS GENERALLY LESS EXPENSIVE THAN EDI
- FASTER THAN EDI BECAUSE IS CONDUCTED THROUGH THE INTERNET
- DO NOT REQUIRE THAT ORG ENTER A CONTRACT BEFORE TRANSACTING BUSINESS; EDI TRANSACTIONS DO
SUPPLY CHAIN MANAGEMENT
- IS CONCERNED WITH FOUR IMPORTANT CHARACTERISTICS FOR EVERY SALE:
- WHAT
- WHEN
- WHERE
- HOW MUCH
EDI CHARACTERISTIC
- REQUIRES ALL TRANSACTIONS TO BE SUBMITTED IN STANDARD (BY INDUSTRY) DATA FORMAT. HOWEVER, THERE ARE AT LEAST 2 SETS OF STANDARDS IN DIFFERENT PARTS OF THE WORLD
- EDIIS COMPUTER TO COMPUTER EXCHANGE OF BUSINESS DATA THAT OFTEN INVOLVES THE USE OF THE INTERNET
MAPPING
- IS THE PROCESS OF DETERMINING THE CORRESPONDENCE BETWEEN ELEMENTS IN A COMPANY’S TERMINOLOGY AND ELEMENTS IN STANDARD EDI TERMINOLOGY.
- ONCE MAPPING HAS BEEN COMPLETED TRANSLATION SOFTWARE CAN BE DEVELOPED TO CONVERT TRANSACTIONS FROM ONE FORMAT TO THE OTHER.
WHICH OF THE FOLLOWING IS USALLY A BENEFIT OF USING ELECTRONIC FUNDS TRANSFER FOR INTERNATIONAL CASH TRANSACTIONS
- USE OF ELECTRONIC FUNDS TRANSFER FOR ANY FUNDS TRANSFER REDUCES THE NEED FOR MANUAL DATA ENTRY, THUS REDUCING THE OCCURRENCE OF DATA ENTRY ERRORS.
- IT ALSO REDUCED PAPER AUDIT TRAIL
SECURITY OF MESSAGES IN AN ELECTRONIC DATA INTERCHANGE (EDI)
- ENCRYPTION PERFORMED BY PHYSICALLY SECURE HARDWARE IS MORE SECURE THAN ENCRYPTION PERFORMED BY SOFTWARE.
- ENCRYPTION PERFORMED BY PHYSICALLY SECURE HARDWARE IS MORE SECURE THAN THAT PERFORMED BY SOFTWARE BECAUSE SOFTWARE MAY BE MORE ACCESSIBLE FROM REMOTE LOCATIONS.
- IN ADDITION, BECAUSE HARDWARE DECRYPTS FASTER THAN SOFTWARE, MORE COMPLEX ALGORITHMS WHICH ARE MORE DIFFICULT TO CRACK MAY BE USED.