Module 5 Flashcards

1
Q

What are are IT General controls?

A

Policies and procedures that relate to many applications and support the effective functioning of application controls by helping to ensure the continued proper operation of information systems

Whole item system (bubble around)
E.g username password, backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ITGC can be?

A

Manual
Automated
Combination of both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 4 areas ITGCs commonly cover?

A

Access to programs and data
Program changes and development
Operations (computer)
Continuity of operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the key risk for access to programs and data?

A

Loss, destruction or unauthorised use and alteration of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the key risk for program changes and development?

A

Changes may be unsuitable

New programs may not be fit for purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the key risk for computer operations?

A

Problems with system fail to be resolved in a timely manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the key risk for continuity of operations?

A

Unexpected distasters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is access to programs and data?

A

Access restricted to authorised persons only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is program changes and development?

A

Any changes or development must incorporate controls including appropriate authorisation and testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are computer operations?

A

Procedures are required to ensure the recording, analysis and timely resolution of problems

Day to day processing of information
Ensure efficiency to achieve objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are continuity of operations?

A

Take precautions against potential hazards and implement suitable backup procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the components of access to programs and data?

A

Awareness of information security policies by all staff
Appropriate restrictions of access to IT resources
Segregation of duties within key processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the common controls within restriction of access?

A

Physical access
User access
Administrator access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do you need to consider to ensure changes and development are appropriate and don’t negatively affect?

A

Authorisation
Development
Testing
Approval

DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Change should be made where?

A

In separate test environments to avoid any negative impact on info processing and application controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What should organisations consider with regards to computer operations?

A
Job processing (documented procedures)
Backup and recovery procedures
Incident and problem management procedures (doc)
17
Q

The ability to carry on trading after a distaste involves formulation a?

A

Disaster recovery plan as well as procedures to avoid disaster occurring

18
Q

How can the DRP be developed?

A

Internally or outsourced to a specialist

19
Q

What steps does designing a good DRP involve?

A

Identifying IT risk events
Assessing threat and impact
Preventing and reducing risk

20
Q

What are the objective of a good DRP?

A
Minimising interruption
Securing alternative internet access
Recovering lost data
Providing recovery procedures 
Training employees
21
Q

What are typical physical security measures for distasteful prevention?

A
Fire and smoke detectors 
Alarms
Plastic equipment covers 
Air con
Firewalls
22
Q

4 key areas ITGCs cover?

A

Access to programs and data
Program changes and development
Operations computer
Continuity of operations

APOC

23
Q

What do IT application controls apply to?

A

Processing of specific types of transactions

To ensure genuine accurate and compete transactions
At business process/transaction level

24
Q

What is the key difference between a manual and IT application control?

A

IT application contains some element of automation or involvement of IT

25
Q

What are the 6 common examples of IT application controls?

A
Audit log
Batch controls 
Programmed editing 
Calculation
Check digits
Exception reports
26
Q

What is an audit log?

A

Automatic log kept of activity that can be manually reviewed

27
Q

What are batch controls?

A

Operate where a manual count or total is made of inputs prior to being put into system.
Once input, but before processing, the manual count is agreed to the computer generated totals to ensure accuracy

28
Q

What is programmed editing?

A

Computer is programmed to anticipate entires fields

Tests on data entry incorporated e.g 1-100 over is rejected

29
Q

What is calculation?

A

Automatic calculations embedded within applications based on inputted info

30
Q

What are check digits?

A

A decimal digit added to a number for detecting the sorts of errors humans typically make on data entry.
The digit is driven by a formula and the system can perform an automatic check using it

31
Q

What are exception reports?

A

A report generated that identifies any transactions that are outside the normal expected range
Should be reviewed and investigated