Chapter 8 Flashcards
Definition of Hardware and Software?
Hardware -
Digital computer and peripheral equipment
Software -
Various programs and routines for operating the system
Advantages and disadvantages of IT-Based Systems
- May enhance reliability of financial information
- Process transactions uniformly
- Reduce human errors
May increase certain risks
Program defects may result in all transactions being processed incorrectly
Errors/fraud may not be as easily detectable
Systems possesses one or more of the following elements:
- Batch processing
- Online capabilities
- Database storage
- IT networks
- End user computing
The principle hardware component is known as the (CPU)
Central Processing Unit
- Uses a series of on and off circuits to communicate (binary language)
Application software includes programs designed to perform a specific data processing task. True or false?
True
Describe peripheral devices
Devices for inputting information (e.g., input terminals, scanners, electronic cash registers, bar code readers)
Devices for secondary storage (e.g., magnetic tape, magnetic disk, optical disk drives)
Devices for information output (e.g., display terminals, printers)
Define batch processing
Input data gathered and processed periodically in discrete groups. Often more efficient than other types of systems, but do not always provide up-to-minute information.
Example: Accumulate all of a day’s sales transactions and process them as a “batch” at end of day
Define IT Networks
Computers linked together through telecommunication links that enable computers to communicate information back and forth. Allows distributed data processing - resources, data, and programs shared by a large number of users based on their specifications (LAN and WAN)
Disadvantages of Database storage
Redundant information stored in several files
Increased storage costs
May cause data inconsistencies due to file discrepancies
Describe the three methods used to establish networks
Internet – exchange of information through remote locations
Intranet – internet software for use in closed networks
Extranet – intranets that include external business partners
Names of two types of Online Systems
Online transaction processing (OLTP):
- Process various types of transactions
- Individual transactions entered directly from the originators at remote locations
Online analytical processing (OLAP)
-Enables user to query a system for various analyses
Examples: Data warehouses, decision support systems, expert systems
Define End User Computing
User departments are responsible for the development and execution of certain IT applications. Involves a decentralized processing system – user department generates and uses its own information.
(non-programmers can create working applications to better integrate themselves into computing environment for problem-solving)
Define Electronic Data Interchange (EDI)
enable company and customers/suppliers to exchange business data electronically over a private line of communication (more secure than the internet) – must have strong IT controls to ensure privacy (e.g., firewalls, data encryption)
More automation reduces potential for human errors and increases potential for systematic errors. True or false?
True
Is audit trail necessary in printed form?
Not often in printed form, but definitely still necessary.
Define an End-user Application
designed with end user in mind for a specific, custom purpose. NOT a personal computer.
IT Responsibilities can be broken down into (there are a ton!)
Information systems Management
Systems Analysis
Application Programming
Database Administration
Data entry
IT Operations
Program and File Librarians
Data control
Telecommunication Specialists
systems Programming
Define Telecommunication Specialists
Responsible for maintaining and enhancing IT networks (including monitoring for improper access)
Which IT responsibility supervises the operation of the department and report to vice president of finance/controller, or serve on vice president level as CIO reporting directly to president
Information Systems Management
Which IT responsibility reviews and tests all input procedures, monitors processes, reviews exception reports, reprocesses exceptions, and reviews and distributes IT logs (also reviews operator intervention and library usage logs)?
Data Control
History shows the person responsible for frauds in many situations set up the system and controlled its modifications. True or False?
True, so segregation of duties.
Programming separate from controlling data entry
Computer operator from functions having custody or detailed knowledge of programs
Define IT Operations
Run and monitor central computers, maintain detailed log of all operator intervention (NOTE: vital for IT operations to be separate from programming to prevent unauthorized program changes)
Which responsibility is defined as follows: Prepare and verify input data for processing (today, typically done by user departments)
Data Entry
Which responsibility is responsible for designing the information system?
Systems Analysis
Organizational controls is NOT effective in mitigating collusion, true or false?
True
What is internal auditing in IT interested in?
evaluating the overall efficiency and effectiveness of information systems operations and related controls throughout the company
Computer operators ____ (should or should not) have access to programming.
should not
Describe Programmed Control Activities
written into programs to ensure accuracy of input and processing
Adequate security controls to safeguard hardware, files, and programs against loss, damage, and unauthorized access. True or false?
True
Examples: User ID and password controls – changed and updated for personnel changes regularly with a log of failed access attempts; Data transmission controls to prevent access/changes to transmitted network information – e.g., encryption, private network lines; Physical controls – e.g., employee badges, locks
How might one control unauthorized changes to data, introduction of unauthorized data or programs, unauthorized viewing of data, and viruses?
Firewalls, physical control over terminals, password systems, data encryption, antivirus software
If Use of IT does not significantly impact audit trail, audit ____ (through/around) the computer
around (manual testing to compare with computer output)
How might one control unauthorized access?
Physical Controls/Segregation of Duties
How might one control Destruction or infrastructure of data
Segregation of Duties/ program and user controls
How might one control Unauthorized changes?
Controls over access, segregation of duties, testing of programs, backup copies
If much of audit trail is eectornically embedded, audit ____ (through/around) the computer
Through
Define a Generalized Audit Software
programs are computer programs that can be used to test reliability of client’s programs and perform other audit procedures digitally. Pretty much automate substantive procedures
Define the “Tagging and Tracing Approach”
Auditor inserts an audit module in the
client’s application system to identify
specific types of transactions. Allows auditors to continuously audit
transactions processed by the client, unlike
the other two methods which contain irregular testing
Auditors processing their own “dummy” test data using the client’s system simultaneously. This approach if known as the
Test Data Approach -
- Test data should include all relevant conditions that the auditor wants tested.
- Application programs tested by the auditors’ test data must be the same as
those the client used throughout the year. - Test data must be eliminated from the client’s records.
Sometimes o The auditor uses auditor-controlled generalized audit software to perform parallel operations to the client’s software by using the same data files. This is known as the
Parallel Simulation Approach
Once auditor has access to client records, can apply substantive procedures to them using generalized audit software to
- Examine client’s records for overall quality, completeness, and valid conditions
- Rearrange data and perform analyses
- Select audit samples
- Compare data on separate files
- Compare results of audit procedures with client’s records