CHAPTER 2- AUDITIING IT GOVERNANCE CONTROLS Flashcards
________ is a relatively new subset of corporate governance that focuses on the management and assessment of strategic IT resources.
Information technology (IT) governance
Under the ___________model, all data processing is performed by one or more large computers housed at a central site that serves users throughout the organization
centralized data processing
Centrally organized companies maintain their data resources in a central location that is
shared by all end users. In this shared data arrangement, an independent group headed
by the __________is responsible for the security and integrity of the database.
database administrator (DBA)
The __________ manages the computer resources used to perform the day-to-day processing of transactions. It consists of the following organizational functions:
data conversion, computer operations, and the data library
data processing group
The _________function transcribes transaction data from hard-copy source documents into computer input.
data conversion
The electronic files produced in data conversion are later processed by the central computer, which is managed by the _________groups.
computer operations
The __________ is a room adjacent to the computer center that provides safe storage for the off-line data files. Those files could be backups or current data files.
data library
__________gather facts about the user’s problem, analyze the facts, and formulate a solution. The product of their efforts is a new information system.
Systems professionals
_________ are those for whom the system is built. They are the managers who receive reports from the system and the operations personnel who work directly with the system as part of their daily responsibilities.
End users
_________are individuals inside or outside the firm who have an interest in the system, but are not end users. They include accountants, internal auditors, external auditors, and others who oversee systems development.
Stakeholders
The term ____ refers to making changes to program logic to accommodate shifts in user needs over time
maintenance
Systems development and maintenance professionals should create (and maintain) systems for users, and should have no involvement in entering data, or running
applications (i.e., computer operations). Operations staff should run these systems and
have no involvement in their design.
Separating Systems Development from Computer Operations
The DBA function is responsible for a number of critical tasks pertaining to database security, including creating the database schema and user views, assigning database access authority to users, monitoring database usage, and planning for future expansion. Delegating these responsibilities to others who perform incompatible tasks threatens database integrity.
Separating Database Administration from Other Functions
The ______group works with the users to produce detailed designs of the new systems.
systems analysis
The__________group codes the programs according to these design specifications.
programming
True or false
When the original programmer of a system is also assigned maintenance responsibility, the potential for fraud is increased. Program fraud involves making unauthorized changes to program modules for the purpose of committing an illegal act
True
Under program fraud
The _______ group is responsible for designing, programming, and implementing new systems projects.
new systems development
_____ involves reorganizing the central IT function into small IT units that are placed under the control of end users.
Distributed Data Processing (DDP)
_________ is actually a variant of the centralized model; the difference is that terminals (or microcomputers) are distributed to end users for handling input and output. This eliminates the need for the centralized data conversion groups, since the user now performs this tasks. Under this model, however, systems development, computer operations, and database administration remain centralized.
Alternative A
_________ is a significant departure from the centralized model. This alternative distributes all computer services to the end users, where they operate as standalone units.
The result is the elimination of the central IT function from the organizational structure.
Alternative B
decentralized
An ________ provides the linkage between a company’s financial activities (transactions) and the financial statements that report on those activities.
audit trail
Achieving an adequate segregation of duties may not be possible in some distributed environments. The distribution of the IT services to users may result in the creation of small independent units that do not permit the desired separation of incompatible functions.
Inadequate Segregation of Duties
End-user managers may lack the IT knowledge to evaluate the technical credentials and relevant experience of candidates applying for IT professional positions. Also, if the organizational unit into which a new employee is entering is small, the opportunity for personal growth, continuing education, and promotion may be limited. For these reasons, managers may experience difficulty attracting highly qualified personnel. The risk of programming errors and system failures increases directly with the level of employee incompetence
Hiring Qualified Professionals
Because of the distribution of responsibility in the DDP environment, standards for developing and documenting systems, choosing programming languages, acquiring hardware and software, and evaluating performance may be unevenly applied or even nonexistent. Opponents of DDP argue that the risks associated with the design and operation of a DDP system are made tolerable only if such standards are consistently applied
Lack of Standards
What are the advantages of DDP?
Cost Reductions.
Improved Cost Control Responsibility.
Improved User Satisfaction.
Backup Flexibility.