Information Systems Control

Download Report

Transcript Information Systems Control

Information Systems Control
Dr. Yan Xiong
College of Business
CSU Sacramento
January 27,2003
This lecture is based on Martin (2002) and Romney and
Steinbart (2002)
Agenda
AIS Threats
 Internal Controls
 General controls for
information systems
 Internet controls
 Contingency management

AIS Threats
Natural and political
disasters:
– fire or excessive heat
– floods
– earthquakes
– high winds
– war
AIS Threats

Software errors and
equipment malfunctions
– hardware failures
– power outages and fluctuations
– undetected data transmission
errors
AIS Threats

Unintentional acts
•
•
•
•
•
accidents caused by
human carelessness
innocent errors of omissions
lost or misplaced data
logic errors
systems that do not meet
company needs
AIS Threats

Intentional acts
• sabotage
• computer fraud
• embezzlement
• confidentiality breaches
• data theft
Agenda
AIS Threats
 Internal Control
 Cost-benefit Analysis
 General controls for
information systems
 Internet controls
 Contingency management

Internal Control
The COSO (Committee of Sponsoring Organizations)
study defines internal control as the process
implemented by the board of directors, management,
and those under their direction to provide reasonable
assurance that control objectives are achieved with
regard to:
– effectiveness and efficiency of operations
– reliability of financial reporting
– compliance with applicable laws and regulations
Internal Control Classifications

The specific control procedures used in
the internal control and management
control systems may be classified using
the following four internal control
classifications:
1 Preventive, detective, and corrective
controls
2 General and application controls
3 Administrative and accounting controls
4 Input, processing, and output controls
Types of Controls
Preventive: deter problems
before they arise
 segregating duties
 Detective: discover control
problems as soon as they arise
 bank reconciliation
 Corrective: remedy problems
discovered with detective controls
 file backups

Internal Control Model

COSO’s internal control model has
five crucial components:
1 Control environment
2 Control activities
3 Risk assessment
4 Information and communication
5 Monitoring
The Control Environment
The control environment consists of many
factors, including the following:
1 Commitment to integrity and ethical
values
2 Management’s philosophy and
operating style
3 Organizational structure
The Control Environment
4
5
6
7
The audit committee of the board
of directors
Methods of assigning authority
and responsibility
Human resources policies and
practices
External influences
Control Activities
Generally, control procedures fall into one of five
categories:
1 Proper authorization of transactions and
activities
2 Segregation of duties
3 Design and use of adequate documents and
records
4 Adequate safeguards of assets and records
5 Independent checks on performance
Proper Authorization of Transactions
and Activities



Authorization is the empowerment
management gives employees to
perform activities and make
decisions.
Digital signature or fingerprint is a
means of signing a document with a
piece of data that cannot be forged.
Specific authorization is the granting
of authorization by management for
certain activities or transactions.
Segregation of Duties


Good internal control demands that
no single employee be given too
much responsibility.
An employee should not be in a
position to perpetrate and conceal
fraud or unintentional errors.
Segregation of Duties
Custodial Functions
Handling cash
Handling assets
Writing checks
Receiving checks in mail
Recording Functions
Preparing source documents
Maintaining journals
Preparing reconciliations
Preparing performance reports
Authorization Functions
Authorization of
transactions
Segregation of Duties



If two of these three functions are the
responsibility of a single person,
problems can arise.
Segregation of duties prevents employees
from falsifying records in order to conceal
theft of assets entrusted to them.
Prevent authorization of a fictitious or
inaccurate transaction as a means of
concealing asset thefts.
Segregation of Duties

Segregation of duties prevents an
employee from falsifying records to
cover up an inaccurate or false
transaction that was inappropriately
authorized.
Design and Use of Adequate
Documents and Records


The proper design and use of
documents and records helps ensure
the accurate and complete recording
of all relevant transaction data.
Documents that initiate a transaction
should contain a space for
authorization.
Design and Use of Adequate
Documents and Records

The following procedures safeguard
assets from theft, unauthorized use, and
vandalism:
– effectively supervising and segregating
duties
– maintaining accurate records of assets,
including information
– restricting physical access to cash and
paper assets
– having restricted storage areas
Adequate Safeguards of Assets and Records

What can be used to safeguard assets?
– cash registers
– safes, lockboxes
– safety deposit boxes
– restricted and fireproof storage areas
– controlling the environment
– restricted access to computer rooms,
computer files, and information
Independent Checks on Performance


Independent checks to ensure that
transactions are processed
accurately are another important
control element.
What are various types of
independent checks?
– reconciliation of two independently
maintained sets of records
– comparison of actual quantities
with recorded amounts
Independent Checks on Performance
double-entry accounting
– batch totals
Five batch totals are used in
computer systems:
1 A financial total is the sum of a
dollar field.
2 A hash total is the sum of a field
that would usually not be added.
–

Independent Checks on Performance
3
4
5
A record count is the number of
documents processed.
A line count is the number of lines
of data entered.
A cross-footing balance test
compares the grand total of all the
rows with the grand total of all the
columns to check that they are
equal.
Information and Communication


The fourth component of COSO’s
internal control model is information
and communication.
Accountants must understand the
following:
1 How transactions are initiated
2 How data are captured in machinereadable form or converted from
source documents
Information and Communication
How computer files are accessed and
updated
4 How data are processed to prepare
information
5 How information is reported
6 How transactions are initiated
All of these items make it possible for the
system to have an audit trail.
An audit trail exists when individual
company transactions can be traced
through the system.
3


Monitoring Performance


The fifth component of COSO’s
internal control model is monitoring.
What are the key methods of
monitoring performance?
– effective supervision
– responsibility accounting
– internal auditing
Risk Assessment


The third component of COSO’s internal
control model is risk assessment.
Companies must identify the threats they
face:
– strategic — doing the wrong thing
– financial — having financial resources
lost, wasted, or stolen
– information — faulty or irrelevant
information, or unreliable systems
Risk Assessment

Companies that implement electronic
data interchange (EDI) must identify
the threats the system will face, such
as:
1 Choosing an inappropriate
technology
2 Unauthorized system access
3 Tapping into data transmissions
4 Loss of data integrity
Risk Assessment
5
6
7
Incomplete transactions
System failures
Incompatible systems
Risk Assessment




Some threats pose a greater risk
because the probability of their
occurrence is more likely.
What is an example?
A company is more likely to be the
victim of a computer fraud rather
than a terrorist attack.
Risk and exposure must be
considered together.
Cost and Benefits

Benefit of control
procedure is difference
between
 expected loss with control
procedure(s)
 expected loss without it
Loss / Fraud Conditions
Threat: potential adverse
or unwanted event that can
be injurious to AIS
 Exposure: potential maximum
$ loss if event occurs
 Risk: likelihood that event will occur
 Expected Loss: Risk * Exposure

Loss / Fraud Conditions
For each AIS threat:
Exposure
Maximum
Loss ($)
X
Risk
Likelihood
of Event
Occurring
=
Expected
Loss
Potential
$ Loss
Exposures
Possible
Threat
Disaster
Power Outage
System Down
Human Error
Fraud
Data Theft
Sabotage
Symbol
D
O
H
E
F
T
S
Exposure Risk
H
L+
M
H
L
L
M
M
M
L
L
M
H
L
Risk Assessment of Controls
Threat
Risk
Exposure
Control Needs
Costs
Implement
Yes
Cost
Beneficial?
No
Payroll Case
Condition
Without
Cost Payroll
$10K
$10K
Risk of Error
15%
1%
Error Cost
$1.5K
$0.1K
$1.4K
Validate Cost
0
$0.6K
$(0.6K)
Expected
Benefit
With
Difference
$0.8K
Agenda
AIS Threats
 Internal Controls
 General controls for
information systems
 Internet controls
 Contingency management

General Controls


General controls ensure that overall
computer environment is stable
and well managed
General control categories:
1 Developing a security plan
2 Segregation of duties within the
systems function
General Controls
3
4
5
6
7
8
9
Project development controls
Physical access controls
Logical access controls
Data storage controls
Data transmission controls
Documentation standards
Minimizing system downtime
General Controls
10.
11.
12.
Protection of personal computers
andclient/server networks
Internet controls
Disaster recovery plans
Security Plan
Developing and continuously
updating a comprehensive
security plan one of most
important controls for company
 Questions to be asked:
 Who needs access to what information?
 When do they need it?
 On which systems does the information
reside?

Segregation of Duties
In AIS, procedures that
used to be performed by
separate individuals combined
 Person with unrestricted access
 to computer,
 its programs,
 and live data
 has opportunity to both perpetrate
and conceal fraud

Segregation of Duties
To combat this threat,
organizations must
implement compensating
control procedures
 Authority and responsibility
must be clearly divided
NOTE: must change with increasing
levels of automation

Segregation of Duties
Divide following functions:
• Systems analysis
• Programming
• Computer operations
• Users
• AIS library
• Data control
Analyze
Duty Segregation
What about small firms?
Design
Specs
Archive
Program
Programs
Use
Operate
Output
Project Development
Controls
Long-range master plan
 Project development plan
 Periodic performance
evaluation
 Post-implementation review
 System performance
measurements

Master
Development
Plan
Project
Development
Plan
STARTED
PROJECT
Development Controls
Periodic
Performance
Review
Post
Implement
Review
Performance
Measures
COMPLETED
PROJECT
SYSTEM
OPERATION
Physical Access Controls
Placing computer equipment
in locked rooms and restricting
access to authorized personnel
 Having only one or two
entrances to computer room
 Requiring proper employee ID
 Requiring visitors to sign log
 Installing locks on PCs

Logical Access Controls


Users should be allowed access only to
the data they are authorized to use and
then only to perform specific authorized
functions.
What are some logical access controls?
– passwords
– physical possession identification
– biometric identification
– compatibility tests
Access Control Matrix
PASS-
FILES
PROGRAMS
WORD
A
B
1
2
ABC
0
1
0
0
DEF
1
2
0
0
KLM
1
1
1
1
NOP
3
0
3
0
0 – No access
1 – Read / display
2 – Update
3 – Create / delete
Data Storage Controls
Information gives company
competitive edge and makes
it viable
 Company should identify
types of data used and level
of protection required for each
 Company must also document
steps taken to protect data
 e.g., off-site storage

Data Transmission
Controls

Reduce risk of data
transmission failures
– data encryption (cryptography)
– routing verification procedures
– parity bits
– message acknowledgment techniques
Information
Transmission System
Information
Source
Message
Transmitter
Channel
Receiver
Signal
Noise
Destination
Information
Transmission Controls
Routing
Verification
Message
Data
Encryption
Decrypt
SEND
Encrypt
Parity
Bit
RECEIVE
Message
Acknowledgement
Even Parity Bit System
Parity Bit
There are five
“1” bits in message
1
0
1
1
Message in Binary
0
1
1
0
1
A “1” placed in parity
bit to make an even
number of “1”s.
Data Transmission Controls
Added importance when
using electronic data
interchange (EDI) or
electronic funds transfer (EFT)
 In these types of environments,
sound internal control is achieved
using control procedures

Data Transmission Control
Controlled physical access
to network facilities
 Identification required for all
network terminals
 Passwords and dial-in phone
numbers changed on regular basis
 Encryption used to secure stored
and transmitted data
 Transactions log

Documentation
Standards
Documentation procedures
and standards ensure clear
and concise documentation
 Documentation categories:
• Administrative documentation
• Systems documentation
• Operating documentation

Minimizing System
Downtime
Significant financial
losses can be incurred
if hardware or software
malfunctions cause AIS to fail
 Methods used to minimize system
downtime
• preventive maintenance
• uninterruptible power system
• fault tolerance

Protection of PCs and
Client/Server Networks

PCs more vulnerable to
security risks than
mainframe computers
 Difficult to restrict physical access
 PC users less aware of importance
of security and control
 More people familiar with the
operation of PCs
 Segregation of duties is difficult
Protection of PCs and
Client/Server Networks
Train users in PC-related
control concepts
 Restrict access by using
locks and keys on PCs
 Establish policies and procedures

Protection of PCs and
Client/Server Networks
Portable PCs should not
be stored in cars
 Back up hard disks regularly
 Encrypt or password protect files
 Build protective walls around
operating systems
 Use multilevel password controls
to limit employee access to
incompatible data

Agenda
AIS Threats
 Control concepts
 General controls for
information systems
 Internet controls
 Contingency management

Internet Controls

Internet control is installing a
firewall, hardware and software that
control communications between a
company’s internal network (trusted
network) and an external network.
Internet Controls
Passwords
 Encryption technology
 Routing verification
procedures
 Installing a firewall

Internet Risks
A
Split into packets
B
May travel different paths
Message
originating
at Point A
?
Did Point B receive
this message?
?
Did anyone else
see the message?
Intended
Destination
Point B
?
Was the message
really sent by
Point A?
Messaging Security
Confidentiality
 Integrity: detect tampering
 Authentication: correct party
 Non-repudiation: sender can’t deny
 Access controls: limit entry to
authorized users

Symmetric Encryption
Sender
Receiver
Identical
Keys
Clear
Text
Message
Clear
Text
Message
PKI
Public Key Infrastructure
 Most commonly used
 Two keys:
 public key – publicly available
 private key – kept secret
 Two keys related through secret
mathematical formula
 Need both to process transaction

Biometric Usage
For user authentication
 By order of use
 finger scanners
 hand geometry
 face-recognition
 eye scan
 voiceprints
 signature verification

Digital Signature
Also called Certificate
 Issued by trusted third party
 Certification Authority (CA)
 Electronic passport to prove identity
 Provides assurance messages are valid
 Uses encryption to verify
identity of unseen partner

Firewall

Firewall is barrier
between networks
not allowing information
to flow into and out of
trusted network
Attempted
Access
Internet
Firewall
Firewalls
External
Screen
Valid
Traffic
Sensitive
Database
Valid
Access
Internal
Screen
Firewall Types
Packet Filter:
 simplest type
 doesn’t examine data
 looks at IP header
 Proxy Firewall (Server):
 hides protected private network
 forwards requests from private to
public network (not within)

Firewall Types

Demilitarized Zone:
 more secure
 several layers of firewall protection
 different levels of protection to
different portions of company’s
network
 runs between private network and
outside public network
Bypassing Firewalls
Internet
Firewall
SERVER
Inventory
Customer Info
Ordering
R&D
Department
Agenda
AIS Threats
 Control concepts
 General controls for
information systems
 Internet controls
 Contingency management

Contingency
Management
Disaster Recovery
is reactive
 Contingency Management
is proactive
 Continuity Planning latest term
 Accounting standards in terms
of Disaster Recovery

Disaster Recovery Plan

Purpose: to ensure
processing capacity can be
restored as smoothly and
quickly as possible in the
event of:
 a major disaster
 a temporary disruption
Disaster Plan Objectives
Minimize disruption,
damage, and loss
 Temporarily establish
alternative means of
processing information
 Resume normal operations as soon
as possible
 Train and familiarize personnel with
emergency operations

Plan Elements
Priorities for recovery
process
 Backup data and program
files
 Backup facilities
 reciprocal agreements
 hot and cold sites
 shadow mode (parallel)

Back Up Data
Rollback:
 predated copy of each
record created prior to
processing transaction
 If hardware failure
 records rolled back to
predated version
 transactions processed from
beginning

Back Up Data Decisions

How often? (e.g., weekly)

Exposure * Risk = Expected Loss
Where do you store backup data
 on-site (e.g., fireproof safe)
 off-site (incurs costs)
 How quick to recover?
 What is recovered first?

Remote Access
Computer World, 1/21/02
 Companies eying remote access
as contingency management tool
 Scrambling to develop remote
access systems
 Result of September 11
 If main facilities down, still can
communicate with one another

Recovery Plan
Recovery plan not
complete until tested by
simulating disaster
 EDS
 Plan must be continuously
reviewed and revised so it
reflects current situation
 Plan should include insurance
coverage

Cardinal Health
Redundant systems for
critical order processing
 Redundant WAN trunks
 System data backed up daily
 backup media kept off-site
 Backup replica site
 different part of country
 switched on within 30 minutes

The Money Store
Databases backed up
every evening
 Back-up files stored at
 on-site
 information storage vendor
 Automatic archival process that
periodically pulls / stores back-up
data files

The Money Store

Call Centers
 in 3 locations nationally
 separated so that a natural
disaster will not hit all three
simultaneously
 calls electronically rerouted to
other two sites
 in Sacramento, rent vacant
building as emergency site
Topics Covered
AIS Threats
 Control concepts
 General controls for
information systems
 Internet controls
 Contingency management
