Study unit 8.2 Flashcards

1
Q

What is communication and enforcement of integrity and ethical values in the control environment of system development & implementation controls

A

Ethical culture in IT governance
Important, as IT personnel have access to confidential info opportunity to cause disruptions
Management should lead by example
Code of ethics: communicated, complied with by management, enforce remedial action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is commitment to competence in the control environment of system development & implementation controls

A

Considerable demands with regards to skills and knowledge in the IT department
IT management committed to match attributes to an individual’s job description
Immense consequences of employee not being able to do their job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the organisational structure and assignment of authority and responsibility in the control environment of system development & implementation controls

A

Two major objectives: clear reporting lines & segregation of duties
Address segregation of IT & user department; segregation of duties within IT
CEO should appoint CIO - suitably qualified and experienced
*CIO should interact with board, steering and audit committees, executive management
Supervision, execution and review segregated as far as possible
Job descriptions, authority levels and assigned responsibilities documented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the IT management’s philosophy and operating style in the control environment of system development & implementation controls

A

Attitude towards controls

Actions set tone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the HR policies and practices in the control environment of system development & implementation controls

A

People = very important part of control system
*controls mean nothing if not adhered to
Honest, competence & trustworthiness
Good & proper policies & practices
*proper recruiting, background & qualification checks
*immediate exclusion from system upon resignation or dismissal
*compulsory leave
*training & development
*written HR policies
*rotation of duties
*strict policies with regards to private use of computer facilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the physical access controls in the system development function

A

locked and secured to the desk
visible and not near window
locked at night and at weekend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the security policy in the system development function

A

Least privilege: employees who do not need any access to perform their functions, should not be given any access
Fail safe: wherever possible, if a control fails, whatever is being protected by that control should remain safe
Defence in depth: defence not dependent on one control, but a combination of controls
Logging: activities taking place should be recorded by the computer or system
*logging is not an effective control unless the logs are regularly and frequently reviewed and followed up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the logical access controls in the system development function

A

Authentication
*unique password
*one time pin
*entering a piece of information which an unauthorised individual would not know about the genuine user
*connecting a devise to the USB port of the terminal
Authorisation
*read access vs write access
*once the system has authenticated the user, access will only be given to those programmes and datafiles to which the user is authorised to have access, and as pointed out, this should be only to programmes and data the user requires to do his job
Root access/systemwide access/superuser
*given to limited IT personnel
Segregation of duties
*duties are split between personnel to help detect/prevent errors and irregularties
Identification/and access to toxic combinations
*user will not be granted access to load payments and authorise payments on EFT system
Logging
*recording access and violations for later investigations
Access tables
*All authorised PCs
*all authorised users
*all passwords
*all programs
*all modes of access read vs write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What controls should be over passwords in the system development function

A
Alphabet and numeric characters/symbols/upper and lower case
Should be random - not easily guessed
Only allow 3 attempts
Log all failed attempts and should be reviewed
Do not display on PCs
Kept confidential
Change regularly - monthly, quarterly
Time out facility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is other access control considerations in system development function

A

Data communication
*the implementation of specialized software which is responsible for - controlling access to the network, network management, data and file transmission, error detection and control and data security
*encryption of data which is being transmitted
*the protection of physical cabling
Firewalls
Libraries
*Physically access controlled
*the information on the storage device could also be password protected
*issue from the library should be authorised and recorded
*externally labelled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the program change controls control procedures

A

Program change standards must be adhered to
Requests for changes documented on prenumbered, preprinted forms and listed in register
Change requests should be evaluated and approved by
*used dept
*IT manager/CIO
*steering committee
Changes affected by programmers - not operators or users
Major change = mini project
Changes first made to development program and not production program
Changes tested by programmer and independent programmer
Changes tested by business users to perform acceptance tests and sign
Changes discussed with users and internal audit, sign change control form if approved
Documentation affected by change - updated, entire change documented
Amended program copied to live environment by independent technical administrator, all changes automatically logged by the computer
IT manager should review the log of changes and reconcile to change requests and register

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the risk implications of program change controls

A

Changes in system = documented and versioned, to avoid risk of not being able to roll back a system in event of error, or go back to incorrect version
Risk of unauthorised changes if no/inadequate change management exists
No change management = no version control
Stakeholders initiate change by documenting requirements of change. Without change management, risk is that stakeholders may constantly change the requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the in-house development and implementation of systems of system development

A
Standards
Project approval
Project management
User requirements
Systems specifications & programming
Testing
Final approval
Training
Conversion
*conversion project
*data clean-up
*conversion method
*preparation & entry
Post-implementation review
Documentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the risk implementations of system development

A

Cost
Design may not suit user requirements
Programs may contain errors & bugs
Financial reporting requirements not incorporated or understood by programmer
Poor functional and technical requirements
May not incorporate enough controls
Inappropriate vendor/package selection; inappropriate decision to build
New application/software not interface appropriately with existing software
Result in retiring of older applications & incorrect decommissioning of applications
users ability to use it
Inadequate skills and resources
Insufficient documentation
Failure to evaluate and record lessons learnt for future use
No SLA & OLA
Info transferred from old system may be erroneous, invalid or incomplete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is end user computing risk implications

A

Data entry, logical & formula errors in spreadsheet, leading to incorrect output
Difficult to manage and enforce version control in end use developed applications
If application has not been sufficiently documented & not applied for what it was designed, unintentional errors may occur
Password protection
Doesn’t cater for backup and disaster recovery
Not always audited for completeness & accuracy
Backups not made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the audit & control procedures of end user computing

A

Inspect end user computing policies and processes for documented, authorisation and regularly reviewed
Inspect procedures for documented and easily accessible and available
Training - more than one person should be trained
Password protection
Version control and change management controls to track changes to documents
Ascertain whether users are aware about backups and hosting

17
Q

Why is documentation required for system development

A
Improve overall operating efficiency
Audit evidence
Communication
Undue reliance on key personnel
Training
18
Q

What is the documentation standards for system development

A
System descriptions
Detailed descriptions of program logic
Operator and user instructions
Backup and disaster recovery
Security procedures
User training manuals
Implementation and conversion of new systems
19
Q

What is the backup strategies of business continuity controls

A
Backup policy and procedures
Regular Off-site
3 generations
Fireproof safe
Commence automatically or manually
Review logs to ensure completion
Tapes clearly marked
Critical data copied to mirror site in real time
20
Q

What does the IT risk management do in business continuity controls

A

Assess all types of threats
Assessments are documented and reported to board
Responses are recorded, implemented and monitored
Committee members with IT knowledge
Integral part of total risk assessment procedures
Link to King

21
Q

What is the disaster recovery strategy of business continuity controls

A

Disaster recovery strategy
Reputational risk management
Disaster simulation exercises
Social media management

22
Q

What is the environmental controls of business continuity controls

A
Physical location
Fire and flood
Power surges
Heat and humidity
Physical access controls
23
Q

What is the business continuity controls of social media

A

Define a social media crisis
Social media response team
Response sessions as preparation of real scenarios
Regular searches of company’s name
Trend analysis of most common scenario’s in market
Social policy document
Reflect on events during year