General Computer Controls Flashcards
Name 7 general controls for computers
- System development and implementation controls
- System maintenance controls
- Organisational and management controls
- Access controls to data and programs
- Computer operating controls
- System software controls
- Business continuity controls
What is an on-line system?
A computer system where data is captured via a terminal as the transaction occurs and the data is immediately edited, processed and written to computer file.
Name the advantages of on-line system.
- Files are up to date
- Accuracy of entry
- The risk of non-recording of transactions is small
- The system is fast
Name the disadvantages of on-line system.
- Absence of visible entry and audit trails
- Higher risk of unauthorized:
- access to the system and data
- processing on the system
- changes to data
Give the characteristics of an on-line system.
- On-line (direct)entry of data
- Authorization of input by the system through validation tests
- On-line access to the system by users
- Absence of visible audit trails
- Risk that programmers could gain unauthorized access to the system
What are the risk indicators specific to IT environment?
- Risks which relate to the integrity of financial information (relevant to both management and auditors)
- Risks relate principally to Management’s requirements
What are the risks relating to the integrity of financial information relating to access?
- Uncontrolled access to data leading to:
- duplication
- corruption
- manipulation
- sabotage
- unauthorized processing of data
- Unauthorized changes to transaction data
- Unauthorized changes to master files (standing data)
- Uncontrolled access to programs leading to unauthorized changes
- Access through a third party such as service provider
- Corruption of data by viruses
What are the risks relating to the integrity of financial information relating to input?
- Absence of input documentation
2. Lack of visible audit trail providing evidence of authorization
What are the risks relating to the integrity of financial information relating to transfer of data?
- Unauthorized access through telephone lines, wireless connections, etc which could result in duplication, corruption or manipulation of data on transfer
- Data could be lost or corrupted in transmission
What are the risks relating to the integrity of financial information relating to staff issues?
- Loss of supervision in a decentralized/distributed processing environment
- Staff may be limited experience of or lack training on computers
- Segregation of duties may be weaker
What are the risks relating to the integrity of financial information relating to processing?
- Multiple functions performed by single person
- Where systems are integrated, individual errors may affect different systems
- System generated transactions
- Uniform processing duces the risk of clerical error but may increase the risk of consistent error
- Errors might not be noticed owing to high speed of processing and the volumes involved
What are the risks relating to the integrity of financial information relating to output?
- Absence of reports /loss of audit trail
2. There is often less manual review of information
What are the risks relating to the integrity of financial information relating to continuity?
- Loss of data
What are the risks relating to the integrity of financial information relating to specific issues?
- Financial loss due to electronic fund transfer
- Failure to clear computer suspense files
- Abuse of credit cards
What are the risks relating to the integrity of financial information relating to general issues?
- Types of computer used
- Types of software: developed or bought
- The processing method applied and any changes thereto
- Effectiveness of the control environment and Management’s attitude towards computer controls
- Effectiveness of computerized controls and potential weaknesses in:
- general controls
- application controls
- Nature of the business/ transactions
- The size of the entity and the volume of transactions
- Materiality of data/transaction processed
What are the risks relating principally to management’s requirements relating to access?
- Confidentiality of data
- Unauthorized use of data
- Business continuity could’ve affected by viruses,hackers or denial of service attacks
- Privacy of third parties’ data
What are the risks relating principally to management’s requirements relating to computer fraud?
- Possible fraud
What are the risks relating principally to management’s requirements relating to quality of management information?
- Completeness of information
- Availability of information
- Usefulness of data provided
- Whether data is up to date
- Loss of continuity leading to temporary lack of data
What are the risks relating principally to management’s requirements relating to operating issues?
- Inability of system to cope with volumes could result in poor customer service
- Contractual liability arising from dealing with third parties
- Non-compliance with tax law, regulation or software license conditions
- Loss of control where third parties are involve
- Adequacy and competence of IT staff
- Dependence on communication
- Dependence on technology
- Cost control
- Staff morale problems arising from changes in systems
What are some control risks in an IT environment?
- Program processing data inaccurately
- Inaccurate data
- Failure to make necessary changes to systems
- Unauthorized access to data
- Inappropriate manual intervention
- A breakdown in segregation of duties
- Unauthorized changes to systems or programs
- Unauthorized changes to data in master files
- Loss of data or inability to access data as required
What are some benefits of IT controls?
- Consistent processing
- Accurate complex calculations for larger volumes of data
- Enhanced timeliness, availability and accuracy of information
- Additional, and more accurate, analysis of information
- Enhanced monitoring of performance of the entity’s activities and compliance with policies and procedures
- Reduce the risk of control override
- Improved security over systems and data
What is the objective of general computer controls?
Maintenance of integrity of data and programs
Effective functioning of the computer system
Identify the feasibility studies need to be done when purchasing a new computer system
- User needs
- Specification and requirements of available packages
- Costs
- Assistance and support by suppliers
- Adaptability and expansion ability of the package
- Standing and reputation of the supplier
- Conclusion supported by enquiring with staff and testing
Name the steps in purchasing a new computer system package
- Feasibility study
- Authorization by management, users and computer staff
- Implementation
- System conversion
List the advantages of a purchased system
- Immediate installation
- Pre-determined costs, often cheaper
- Criteria reviewed at demonstration before buying therefore reduce risk
- Usually de-bugged and error-free
- Documentation sold with package
- Supplier usually offer training
- Supplier support
- Continual upgrade with new version at reasonable cost
List the disadvantages of a purchased system
- Not tailor-made to requirements
- Pre-written and not adaptable for changes
- Processing speed and storage space not always sufficient
- Written to supplier standards
- Often overseas, not cater for SA requirements
- Manual often inadequate and low quality
List the steps in system conversion for a new system
- Plan
- Prepare for conversion
- Control by data control group
- Testing after conversion
- System documentation updated
- Back up new system/files
- Post implementation review
What needs to be included in planning of system conversion?
- Date and time schedules prepared
- Cut-off point determined
- Conversion method defined
What needs to be done for preparation of conversion?
- Preparation of standing data files on the new system
- Balancing files on the old system
- Training staff
- Prepare premises
- Authorization of data to be transferred
What are the testing done after system conversion?
- Balancing of files on new with balances in old - control totals
- Print-out of converted data and compare with source data/report from the old system
- Follow up items on exception reports
- Approval by users
System documentation updated should include the following…
- Approval documents
- Application documents, including course codes
- File documentation, including file layouts
- Operation documentation (instruction/ manuals)
- Documentation concerning testing
- Approval at various stages
What are the purposes of system documentations?
- Record investigation, development, design and approval
- Provide basis of communication between systems analysts and
Programmers - As processing manual
- Source references
- For review and change to system
- Staff training
- Basis of evaluation of internal controls
Steps involved in developing a system in-house.
- Project authorization
- Project management
- Determine user needs
- Purchase of hardware and software
- Standards in respect of system development and programming
- System specification and programming
- Testing of system
- Approval
- Training
- System documentation
- Back ups
- Conversion
- Post implementation review
- Long term plan
What is involved in project authorization?
- System development plan
- Steering committee conduct feasibility study and define selection criteria
- Result from requests by users and management
- Feasibility study
- Authorization after analyzing user needs and performing proper system analysis
- System specification should be developed regardless of any specific technology hardware which may be available
- Project authorized before commencement by computer steering committee
What is involved in project management when developing a system in house?
- Project team made up of management and user computer staff
- Development in stages
- Functions of the system analysis and programmers are to be defined
- Deadlines and time schedules must be prepared for each task and stages of the project
- Formal plan of action and development
What is involved in the system maintenance controls?
- Changes to a system after implementation to correct errors or meet the changing needs of users
- Requests for changes/ corrections promptly completely carried out
- Only authorized changes should be made
- Compliance with standard
- Controls over program changes
- Testing and final approval
- Changes made to test version not live version
- Changes fully documented
- Changes backed up and stored in program library
- Train users
- Post-implementation review
What is included in organizational and management controls?
- Division of duties, review and virus protection are met
- Level of responsibility determined
- Division of duties
Division of duties…
- Separate IT department
- Computer department segregated from user department
- Within the computer environment
- Management
- Supervision and review
- Staff policies
- All computer output to be reviewed by user department
- Controls against viruses
- Email policy to be in place
What should be considered when segregation of duties from computer department to user department?
- Computer department not to to originate or authorize transactions
- Computer department not to have control over non-computer assets
- Computer department not to authorize master file changes
- User department to review all master file changes
- User department to maintain independent control totals
- User department to have custody over stationery
What are some organizational and management controls within staff policies?
- Employment of honest qualified, competent reliable IT staff
- Rotation of IT staff duties
- IT staff must regularly take leave
- Scheduling of work
- Training and career development
- Supervision and review
- Cancellation of access on dismissal
Access controls to data and programs
- Procedures designed to restrict access to on-line terminals, devices, programs and data
- User authorization
- User authentication
- Program security
- Data file security
- Access to terminals and files
- Access through other electronic devices
Access controls framework:
Programmed controls and user controls
Programmed control for access control:
- Terminal controls -limit access to specific applications
- Identification of users
- Authorization of users
- Authorization of use
- Use access control software
- Monitoring access and processing
- Communication line and networks
- Password control
- Restrict access
- Data to be encrypted
- Establish separate systems for vulnerable and sensitive applications
- Program library control
- Utilities control
- User programming controls
- Terminals and other electronic devices
What can be used for user authentication?
- Unique login ID
- Passwords
- Access cards
- Biometric data
Name the programmed controls for terminals and other electronic devices.
- Device disconnect after 5 mins of inactivity
- Terminal is disconnected and shut down after 3 unsuccessful attempts to gain access
- Investigation to each disconnection
- Simultaneous log on by one user at more than one terminal is prohibited
- Restricted hours of operation
- Polling by central computer of remote devices to ID unauthorized users
Name the ways programmed control is used to identify users
- Passwords and their identification numbers
- Verify user’s computer serial number
- Verify user’s Internet protocol (IP) address
- Use of biometric data
- Magnetic card
Programmed control for authorization of users
- Log-on IDs
- Passwords
- required to sign on and off
- limit access to system/ part of system
- limit access to certain terminals
- limit processing/access to certain time of day
Programmed controls for authorization of use
- Passwords structured for authorized levels of access
- Multi-level passwords
- One time passwords
- Introduce a system of system owners