You are on page 1of 15

INFOTECH 3: AUDITING ACCOUNTING INFORMATION SYSTEM IMPACT OF COMPUTERS ON THE ACCOUNTING AND AUDITING PROCESS

INTRODUCTION 1) INTERNAL STORAGE


- With the representation of information in electronic
AUDITING AND EDP
form inside the computer, the auditor us no longer able
AUDITING- a systematic process of objectively obtaining and evaluating to observe the processing of data to determine if the
evidence regarding assertions about economic actions and events to proper procedure are being used
ascertain the degree of correspondence between those assertions and 2) PROGRAMS CAN BE CHANGE WITHOUT THE AUDITOR’S
established criteria and communicating the results thereof. KNOWLEDGE
- Such change can occur through a console intervention,
or with codes that can modify themselves which the
AUDITING program is running
3) ELIMINATION OF AUDIT TRAIL
 SYSTEMATIC PROCESS - Partial elimination/disappearance of those documents,
- It is a structured as a dynamic activity in a logical records, journals, ledgers and other documents that
manner enable the auditor to trace a transaction
 OBTAINING AND EVALUATING EVIDENCE 4) MULTI-PROCESSING OR MULTI-PROCESSING
- Auditor is concerned about assertions relating to the - With the ability of computer systems to process several
reliability of the system of internal control and the applications simultaneously, files currently being
content of the files or outputs produced by computer received can be modified during data processing by
processing another program
- He performs both compliance testing and substantive 5) REMOTE PROCESSING (TELE-PROCESSING)
testing - A major threat is the potential loss of assets from
 ASCERTAIN THE DEGREE OF CORRESPONDENCE BETWEEN THOSE unauthorized access to programs and files
ASSERTIONS AND ESTABLISHED CRITERIA - Data might be lost during transmission
- It requires judgment on the auditor’s part as to what - Phishing- is the attempt to acquire sensitive information
constitutes a non-compliance such as usernames, passwords, bank accounts and
 COMMUNICATING THE RESULTS credit card details for malicious reasons, by
- To the client and other interested parties masquerading, as a trustworthy entity in an electronic
- Preparation of the audit report communication
6) SPEED, ON-LINE/REAL-TIME PROCESSING
WHO SHALL PERFORM THE AUDIT?
- Since amount balances are updated immediately upon
- A person or persons having adequate technical training entering the system, it could mean that before the
and proficiency as an auditor auditor had finished reading and adding the balances,
some of the balances may have already changed
7) MULTIPLE LOCATIONS
- Multi-processing, on-line/real-time system is
INTERNAL CONTROL SYSTEM
compounded by processing in several locations
o Several flows and offices in a building ADMINISTRATIVE CONTROLS
o Several buildings in a compound
o Several geographical locations - The plan of the organization and the methods and
8) RAPID CHANGES: TECHNOLOGY, BUSINESS NEEDS procedures to promote operational efficiency and
encourage adherence to prescribed managerial policies

ACCOUNTING CONTROLS
AUDITING APPROACHES
- The plan of the organization and the methods and
1) Auditing around the computer procedures used to safeguard assets and to check the
2) Auditing with the computer reliability of accounting data
3) Auditing through computer - AIS controls:
o General controls
AUDITING STANDARDS AND COMPUTER AUDITING CONCEPTS o Application controls
STANDARDS OF FIELDWORK

 COMPLIANCE TESTING AIS CONTROL


- The auditor must obtain sufficient understanding of the
entry and its environment, including its internal control 1. GENERAL CONTROL – having pervasive effects
 If they are weak or absent, they negate the
- To assess the risk of material misstatement of the
effects of the application method
financial statements whether due to error or fraud , and
- To design the nature, timing, and extent of further audit General Controls:
procedures
1) Organizational controls
INTERNAL CONTROL 2) Sound personnel practices
- Comprises the plan of the organization and all of the 3) Standard operating procedures
4) System development controls
methods and procedures adopted by a business to:
5) Documentation control
OBJECTIVES OF INTERNAL CONTROL
 Safeguard its assets 6) Hardware control
 Check the accuracy and reliability of its 7) System software controls
8) System security control
accounting data
 Promote operational efficiency and
effectiveness  SUBSTANTIVE TESTING
 Encourage adherence to prescribed managerial - The auditor must obtain sufficient appropriate audit
policies evidenced by performing audit procedures to afford a
reasonable basis for an opinion regarding the financial WHEN TO PERFORM THE PROCEDURES?
statements under audit
Auditing concurrently with processing
1) TEST OF DETAILS OF TRANSACTIONS AND BALANCES
- Complexities include automatic: - Information is available to the auditor while program is
 Authorization of sales within certain limits running
 Issuance of checks to vendors on due dates
2) ANALYTICAL REVIEW PROCEDURES Auditing after processing
- Performed to detect unused relationships among - Audit procedures are performed after a computer
financial information program is finished
- Review may include comparison of this years; amount
with last years’ actual results with budget or forecast; WHICH PART OF THE SYSTEM THE AUDIT SHOULD BE PERFORMED?
review of financial ratios Auditing computer programs
- Not significantly different from a manual or mechanical
system Auditing computer files

Auditing computer systems


 DUAL-PURPOSE TESTING
- Both types of tests, compliance and substantive, and
performed at the same time
GENERAL CONTROLS

1. ORGANIZATIONAL CONTROLS (PLAN OF ORGANIZATION)


WHO PERFORMS THE COMPUTER AUDITING TASK? - Relate to the segregation of duties in order to reduce
error or fraud:
Demands as to the expertise placed on the auditor: (1) Segregation of EDP and user functions
“if clients uses electronic processing in its accounting system, (2) Segregation of function within EDP
whether the application is simple or complex, the auditor (3) Segregation of functions among users
needs to understand the entire system sufficiently to enable him to identify
and evaluate is essential accounting control features.” (1) Segregation of EDP and User Functions
a. Error detection, correction and resubmission
WHERE IN THE PROCESSING CYCLE THE AUDIT SHOULD BE PERFORMED?  System tests performed during systems
Auditing the phases of processing development ensures the elimination of errors
 Where errors occur, generally they are
- Refer to the study and evaluation of internal control converted and resubmitted at source
Auditing the results of processing b. Segregation of incompatible functions
 Authorization
- Refer to the collection of evidential matter; emphasis is o As a general rule, EDP should not be
on the direct test of amount balances permitted to authorize transactions;
however, some authorization functions
are incorporated in the computer 2. SOUND PERSONNEL PRACTICES
program - Provide control over the quality of work by ensuring
o Examples: materials reordering system, that personnel are competent and honest
customer order processing - Provide policies that encourages compliance
 Execution (1) Hiring and Evaluation of Personnel
o Steps in the transaction processing a. Hiring Test
cycles and changes to master files are  Mostly behavioral and personality tests
to be performed by the users; today, b. Background check
execution is done automatically through  Checking the character references,
instructions in the program recommendations from previous employees,
o Examples: systems s-generated financial NBI and police clearances
entries, automatic reversing entries c. Fidelity bonds
 Accountability (2) Personnel scheduling
o EDP should not have custody of non- - Irregularities maybe discovered during an employee’s
EDP assets absence
o Access is normally indirect, e.g., the (3) Rotation of duties
computer program contains the - Enable the employee to master other tasks, thus,
instructions to release inventory for effectiveness is improved
shipment - When a task is performed by another, opportunities for
(2) Segregation of functions within EDP improvement can be identified
a. System development (4) Performance evaluation
 System analysis - A tool to identify strengths and areas of improvement
 Application programming - A food basis for rewards and remunerations
 Systems programming (5) Training and development
b. Operations - Enhances employee performance and potential for
c. Data base administration more responsible roles
 Independent librarian function - CPE
(3) Segregation of functions among users (6) Career’s Path
- A tool to formalize target positions
Compensatory Controls
- Helps identify training needs
- Generally manual controls, that are performed to - Encourages loyalty and dedication
compensate for the internal control weakness arising (7) Rewards and Remuneration
from the non-segregation of duties - Induces employees to perform their best
 Review and approval of purchasing department (8) Formalization of Personnel Practices
 Review of exception lists from credit approval - Conveys the company’s sincerity to its commitments
runs
(9) Psychological Control (2) Machine Operations
- Employees tend to display positive behavior if it goes - Include procedures for loading programs and storage
with a reward or punishment as the case may be devices
- Requirement that console error messages be responded
REVIEW AND TESTS OF COMPLIANCE- ORGANIZATIONAL CONTROLS
to uniformly.
1. Review organization charts. (3) Machine Performance
2. Review job description of EDP and users pertaining to error - Identification and correction of equipment snags help
handling. reduce the incidence of hardware-induced errors
3. Interview management and operating staff to determine the degree - Standards are set for elapsed time usage, maintenance
of effectiveness of supervision. time, expected downtimes and other conditions.
4. Prepare a systems flowchart for each transaction processing cycle - Periodic review of equipment maintenance and failure
and review the segregation of duties. logs, and comparison of actual equipment performance
5. Review pre-processing controls, such as prior approval of mater file with standards
change. (4) Job-run procedures
6. Review the audit program of internal auditors to determine the - These procedures generally outline the sequence of the
completeness and adequacy of their review and tests of internal programs to ensure that the required processes are
control. performed in the correct order
- Examples: variance report preparation
REVIEW AND TESTS OF COMPLIANCE- SOUND PERSONNEL PRACTICES  Update physical standards
1. Review hiring and evaluation procedures, for example, aptitude  Input volume of production
tests and background checks.  Enter actual quantities consumed
2. Review performance appraisals and its link to rewards and  Calculate variances
remuneration. (5) Console log and personnel time record
3. Review staff development programs and continuing professional - Should be prepared by the operating system to record
education. to all operating and application system activities,
4. Review promotion policies and recent promotions, to ensure that maintain an equipment utilization record and identify
movements post no threat to control. operator and user initiated actions
5. Review staff turnover statistics and frequency of staff firing to - It provides and important control over unauthorized
ensure that the attitude of staff poses no undue risk of control. system use
3. STANDARD OPERATING PROCEDURES (6) Housekeeping
- Identify procedures that ensure high quality processing - Procedures relating to the use of supplies, storage of
and limit the opportunity for errors, and unauthorized programs, and handling of files are designed to reduce
use of files, programs and reports. take risk of loss or destruction of programs and data
(1) Scheduling - It ensures that sensitive output does not fall into
- The operations of the computer should follow realistic unauthorized hands
schedules to allow for assembly and preventive
maintenance
(7) File Control Standards - The system development methodology will be of little
- Standards for the handling file are necessary to value if development projects are not adequately
minimize opportunities for misuse, damage or loss of manage
files (3) Programming conventions and procedures
- Standards include file names, retention dates Conventions
reconstruction procedures and storage location - Refer to the agreed standards, for example, in the use
- The files are controlled by a librarian of symbols, charts, texts, graphs or writing of manuals
(8) Adequate Supervision - Also pertains to the uniform procedures followed in
- Control and review of operating activities which include order to ensure the same accurate results every time a
periodic examination and comparison of console logs, job is performed
job records and personnel time records - Flowcharting conventions
(9) Emergency and Physical Security Procedures - Decision table conventions
- Plans and procedures to protect programs, files and - Coding conventions
equipment from fire, theft, natural disaster, power - Standard glossary and standard abbreviation
failure, or failure of communication - Standard program routines
- Emergency any physical security procedures should be - Debugging
written and included in the systems and procedures - Auditing conventions
manual o Coding Conventions
4. SYSTEM DEVELOPMENT CONTROLS a. Computer code or program code
- The best time to build-in the application controls is  The set of instructions forming a computer
during the development of a system program which is executed by a computer
- It would be easier compared with doing the program b. Data code
revisions later in order to incorporate the control  A number, letter, character, or any combination
(1) System development methodology thereof used to represent a data element or
a. SDLC data item
 Planning, analysis, design, development, and Data coding conventions provide a common
implementation understanding of the meaning of the codes
 Building-in of required application control o Significant digit code
 Users’ training and users’ procedures manual o Sequence code
b. Post implementation optimization o Mnemonic code
 Was there an evaluation that the new system o Last digit code
meets the business requirements? o Identifiers
c. Documentation o Check digit code
 Provides control over the prevention, detection o Standard glossary and standard abbreviations
and correction of errors - Terms and abbreviations that are unique to a particular
(2) Project management installation should be carefully defined
- Use of non-standard terms and abbreviations should be - Review and approval ensures that the system has
prohibited to make review of documentation easer adequate controls and is acceptable to all stakeholders
o Standard program routines
Technical Level
- A substantive (also called procedure, function, routine,
method, or subprogram) is a portion of code within a  Work outputs for each phase should be
larger program that performs specific task and is reviewed and approved by the systems and
relatively independent of the remaining code programming supervisors before submission to
- Any sequenceof the code that is intended to be called users, auditors and management for approval
and used repeatedly during the execution of a program.
This makes the program shorter and easier to write (and Output level
also to read when necessary)  Requires that users, auditors and management
- The main sequence of logic in a program can branch off review and approve the work output at the end
to a common routine when necessary. When finished, of each phase
the routine branches back to it (6) System testing
- A routine may also be useful in more than one program - An important control because it is the last opportunity
and save other programmers from having to units code to discover and correct problems before
that can be shared implementation of the system
o Standard job control routines - Purpose:
- Provides the interface between the application program  To ensure that the system will operate in
and the operating system conformance with the design specifications
o Debugging  To determine whether the systems’ operations
- Standard technique for debugging increases the chance meets user requirements
that errors will be found and provided a trail if program  To test all application control if they will work as
changes, thereby, reducing, the opportunity for intended
unauthorized program change  To verify that errors in input, processing and
o Auditing conventions output will be detected
- The programming standards manual should include a o Program tests
list of required controls and audit features - Testing of the processing logic of the programs
(4) User, Accounting, and Audit Participation o String tests
- Assures that users’ requirements are met by the system - Instead of a single program, they are applied to a string
- Users participation represents commitment and of logically related programs
approval o System tests
- Users recognize their responsibility and their - Applied to all programs in the systems to check if they
dependence on the output will function if they run at the same time
- Audit participation provides the opportunity to make
suggestions regarding improvements in internal control
(5) Technical, management, user, and auditor review and approval
o Pilot tests  Operational approval should be obtained from
- Involve the processing of actual transaction on the new the users after they had used the system a few
system on an after-the fact basis, then comparing the times, which served as the “acceptance test”
results from the existing system o Approval indicates their satisfaction
o Parallel tests with the way the system is operating
- The old and the new systems are ran simultaneously (9) Post-implementation review
using the same inputs, and the outputs are compared to Conducted to:
detect system errors  Determine if the system is operating as
(7) Final approval intended
- Provides and opportunity to examine the final best  Evaluate the effectiveness of the entire process
results to make a final judgment of developing the system
- Final approval should be given by management, users
“ the feedback from this review is useful to the external
and EDP personnel before the system is implemented
auditoras it indicates that controls are either functioning as
(8) Conversion and migration control
desired or not.”
- Controls to prevent and detect errors when converting
and migrating files to the new system (10) Program change control
 Data Conversion - Strong system development controls are negated if
 The translation of computer data from one subsequently, unauthorized modifications to the
format to another programs are performed due to inadequate program
 Data Migration change control
 The process of transferring data from one - Program changes results from a desire to improve the
system to another; generally, migration requires system, the need to adjust to changing business
data conversion conditions or the need to incorporate new operating,
 Control Procedure: accounting and control policies. These changes are
 File conversion approval should be obtained referred to as program maintenance
before te process begins to ensure that the files - The objective if program change control is to ensure
being converted are fully controlled that all program change authorized program change
 The original and new files can be reconciled requests are completed
through record, counts, hash totals or amount
totals Controls:
 Compare records from the original files and 1. Program changes should be in accordance with
with the new files to ensure that those are no established systems, programming and documentation
discrepancies standards
 Confirmation requests may be sent to third 2. Program changes should be restricted to system
parties asking them to confirm the data that personnel; operating personnel should not make
relates to them changes to programs – even temporary changes to
facilitate the running of a program
3. The changes should be reviewed and approved by the Purposes of Documentation:
user to ensure conformity with the purpose of the
1) Provides a source of information doe system analyst and
change
programmers who are responsible for maintaining and changing
4. Changes should be made to the test program and not in
existing systems and programs.
the production program to limit the opportunities to
2) Provides explanatory information necessary for review of proposed
make unauthorized changes to the production program
systems and programs
5. Changes should be tested thoroughly before
3) Serves as basis for training new personnel
implementation
4) Provides data necessary for responding to inquiries regarding the
6. Program changes and test results should be reviewed
operation of a computer program
and approved
5) Basis for communicating common information to systems analyst,
7. User and operating personnel should be retrained, if
programmers and computer operators
needed, to handle new procedure
6) It provides computer operators with current operating instruction
8. All documentation affected by the change should be
7) Preserves continuity when experienced personnel leave the
updated
organization
9. Control should be established over the conversion to
8) It is a source of information about accounting controls
the new program; the conversion is accomplished by:
 Changing the new program to a production WHAT CONSTITUTE ADEQUATE DOCUMENTATION
status
 Copying the old program to a back-up file and 1) Problem definition documentation
deleting it from the library of production - A permanent summary of the problem solved by the
programs systems
10. Conversion should not be permitted before approval of - It represents the basic source of information regarding
the test results and completion of changes to the purpose of the system
documentations - In organizations that utilizes a standard systems
11. Final approval should be given by data processing development approach, the original source of the
management and the user problem definition information is the Project Plan, also
5. DOCUMENTATION CONTROLS called Project Charter or System Planning Study Report
Documentation Inclusions:
- Consists of documentation and records which describe
the system and procedures for performing data a. Description of the reasons for implementing the system
processing task including the objectives and scope of the project
- A means of communicating both the essential elements b. System specifications describing the operations
of a system and the logic followed by the computer performed by the systems
programs c. Evidence of approval and any subsequent changes in
- An integral part of a system design and documentation the systems specifications
process
2) System documentation f. Change summary
- A record of the way information flows through the  List of all changes that have been ,made and
system from input to file medium and then onto output their effective dates along with copies of
- It permits the tracing of the theoretical flow of authorization of the changes
accounting data from the original entry to the system 3) Program documentation
output - Focuses in detailed information regarding lack program
 Useful for the auditors in evaluating the in the system
adequacy of the audit trail provided by the - The detailed information is used to maintain effective
systems control over program changes and to define the current
status of each program
Inclusions:
Inclusions:
a. System flowchart
b. Input descriptions a. Brief narrative description of the functions of the
 Identify the type of source document use programs.
 For example, this may be a description of the b. Programs flowcharts, or detailed logical narrative
time keeping system as a source of time data in showing how the program operates, e.g., whether all
a payroll or labor distributions system account balances should be printed or just those with
c. Output description abnormal balances.
 Show each type of output generated by the c. Listing of parameters used in the program such as tax
system withholding table
 Define where the output is stored, what files d. A list of application controls such as data entry
are updated, the medium of providing the users validation and output controls
(screen displays or printed copies), the use of e. Detailed description of file formats and record layouts;
the output who uses it, when is it used and the typical information includes the names of all fields
frequency of need within a record, field location, field sizes, and field data
d. File description character type.
 Lists individual files and describe the scope and Code Customer # Customer Customer Credit
functions of each file Right Name Address Limit
 For example a customer master file may be Justified Right
described as continuing customer data i.e. Justified
customer name, delivery address, billing 1 2-18 19-28 29-68 69-75
address, contact number, credit limit, payment 999 XX99 XX99 999
terms, etc. f. A description of code values, for example, codes used
e. Control description to identify transaction being processed.
 Summarize the main controls features that are Code Customer # Customer Customer Credit
design into the system, e.g. general controls Right Name Address Limit
Justified Right
and application programs controls
Justified 5) Users documentation
1 2-18 19-28 29-68 69-75 - A step by step guide that the user can refer to as they
999 XX99 XX99 999 use the system
- Useful in training new/replacement personnel
Common Code: - Valuable for the auditor in understanding the users’ role
in the processing of control provided by the user.
A - add a customer M – modify a customer
D - delete a customer P – print content of master file Inclusions:

g. A record of all program changes, including tests results, a. A non-technical description of the system including
authorization for the changes, and their effective data the benefits the user may derive from it.
b. A description of the types of source documents
4) Operations documentation required, such as purchase orders.
- The information provided to enable the computer c. A description of the form and purpose of each
operator to run the computer program output received by the users.
- It is known as systems and procedures manual or simply d. Detailed instructions for the use of control
operation manual procedures with identification of responsibility for
the performance of these control procedures.
Inclusions:
 Responsibility is defined by position and not by
a. A brief narrative that indicates the purpose of the individual person
program. e. Procedures for correcting errors in input data or in
b. An input/output chart that lists all the input and processing that are detected by the user
outputs required for processing the program and the f. Instructions for handling additions, detections, or
sequence in which they are to be used. corrections to files.
c. A description of input/output forms and formats, g. Procedures for cut-off of data submitted for
including an output distribution cost, provided for the processing, including dates and times for final
operator’s guidance. submission of data.
d. A list of set-up instructions and operating systems h. A checklist for review of reports for completeness
requirements. and accuracy.
e. A list of all program error messages and halts with the
description of the action to be taken in response to
each error message and halt condition.
f. Detailed instructions regarding recovery and restart
procedures to be used in the event of hardware or
software malfunction
g. A list of estimated normal and maximum runtime.
h. A list of instructions to the operator in case of
emergency.
6. HARDWARE CONTROLS - The peripherals or remote equipment send back (echo) a
- provided by hardware manufacturers signal verifying that the command has been received and
o today’s computers are design to be very reliable complied with
and most of them have built-in hardware controls 4) Equipment check
o even with this, it is essential that the auditor - Controls built in into the circuity of the computer to ensure
evaluate the impact of hardware controls o the that the equipment is functioning properly and where
system reliability necessary, automatic error correction
1) Redundant character check - These automatic error correction are either:
2) Duplicate process check o Automatic error diagnosis, or
3) Echo check o Automatic retry
4) Equipment check 5) Validity check
5) Validity check - To ensure that actions taken by the computer are valid
6) Power protection o Operation validity: ensures that only valid
7) Operational manual controls institutions are performed
o Character or filed validity check: compares data
1) Redundant Character Check characters or field that are written or read with a
- A bit, two bits, or a set of bits for the purpose of detecting set of all valid characters or field
errors o Address validity: check of storage location in
- Data are stored in binary codes: sequence of zeros and ones memory or in a peripheral device
(bits) 6) Power protection
- A single parity but is the creation of an additional bit for - Protects the hardware from power fluctuations (spikes or
each character processed surges)
- The computer counts the number of 1 bits in each character - Enable the computer to continue operations in case of
to determine if the count is odd or even power interruptions (4Ps)
- In an odd parity bit check , the computer will add a parity bit 7) Operational manual controls
“0” if the count is odd, and a “1” if the count is even a. Equipment failure logs
2) Duplicate Process Check b. Environmental controls
- Uses the principle of complimentary operations to detect  Dust, temperature, humidity
and correct errors c. Formal recovery procedures
- An operation is performed twice, then the results are d. Preventive and corrective maintenance
compared; any difference indicates a hardware induced
error 7. SYSTEMS SOFTWARE CONTROLS
3) Echo check SYSTEM SOFTWARE
- The purpose is to ensure that commands sent to peripherals - A set program routines that perform level functions of
or remote equipment are obeyed and the data are received management, application program support, tasks
correctly common to many application
- Includes both the control of all operations and the  Library software control reports:
allocation of the resources, i.e. CPU time, memory, program testing identifying the version
input/output devices among the various application of each program, rundate, last copied,
programs last changed to ensure that the current
authorized version is used.
1) Controls to handle errors 3) Controls for file protection
2) Controls for program protection - To protect unauthorized use or modification of data
3) Controls for file protection a. Checking internal file labels – to prevent processing
4) Security protection of wrong files, and premature destructions
5) Self protection b. Storage protection – prevents inadvertent
overwriting
1) Controls to handle errors c. Memory clear – remove the risk of sensitive data
a. Read or write error routines being available for subsequent access
 Retry, diagnose, propose action – close, etc., 4) Security protection
prevents erroneous overwriting of existing a. Maintenance of logs and activity information
record or files b. Password monitoring
b. Record length checks 5) Self-protection (manual)
c. Storage device checks a. Segregation of duties
 Signals if a storage device is not operational  Assignment of responsibilities for system
2) Controls for program protection software, application software, library and
- Prevents application programs with interfering with operations should be separated
each other during processing b. Hardwiring
a. Boundary protection  Encode the software logic in hardware;
 Assignment of memory practitioners to modification can only be done by the removal
program in a multiprogramming environment and replacement of the hardware
b. Control over external reference (sub-routines) in
linkage editing 8. SYSTEMS SECURITY CONTROLS
c. Library program software SYSTEM SECURITY
 Restriction of access to use and change of - The protection of computer facilities, equipment,
programs: programs and data from destruction by environmental
 Passwords: used to limit access to hazards, by equipment error, software error or human
programs under test status only but not error, or by computer abuse
on the programs used in production
ENVIRONMENTAL HAZARD
 Encryption: secret coding that prevents
- Include fires, floods, tornadoes, earthquake, and other
understanding of the program without
acts of God. Generally occur infrequently but with a
the necessary key high cost of occurrence
ERRORS b. Facility security controls
- Include damage to disk storage by faulty disk drives, i. Location controls
mistakes in application programs that destroy or ii. Construction controls
damage data, and operator amounting of incorrect files. iii. Access controls
Generally frequent but at low cost per incident  Conventional logs
 Magnetic stripe cards
COMPUTER ABUSE  Devices that can read physical characteristics,
- The violation of a computer system to perform e.g. finger prints
malicious damage, crime or invasion of privacy  Signature verification system
 Malicious damage includes looting and c. Library controls
sabotage i. Library function for access controls
 Crime includes embezzlement, industrial  Authorized users
espionage, and the sale of commercial secrets  Usage log
 Invasion of privacy includes discovery of ii. Physical file control
confidential salary information, and the review  Internal header and trailer labels
of sensitive data by or competing company  External labels
(financial information)  Protection rings
 Read-only switch
SYSTEMS SECURITY CONTROLS d. On-line access controls
- Are general controls that prevent failures in system i. Physical security of terminals
security and provide for recovery from failures in  Use of terminal locks
system security; they are generally categorized as: ii. Authorization controls
1) Controls that provide a secure system  Authorized users
2) Controls for detecting failures in system security  Programs and data files that each user
3) Controls for recovery from system security failures can access should be identified in the
authorization scheme
The three general categories pertain to:  Authorized terminals
1. Prevention iii. Identification controls
2. Detection  Terminal identification
3. Correction and recovery  User identification (passwords)
 Physiological key
1) Controls that provide a secure system  Hand points, thumb points
a. Security management  Special key
i. Establish security objectives  Magnetic stripe cards
ii. Evaluate security risks  Optically encoded badge
iii. Develop security plan
iv. Assign responsibilities SOME RULES CONCERNING PASSWORDS
v. Test system security  Passwords should not be chosen because they are easy to
vi. Evaluate system security remember
 Should not be shared nor displayed
 Passwords file should be protected by the operating system iii. Data/source documents
 Unsuccessful attempts should be monitored iv. Personnel
 Should be changed periodically  Who is responsible for what
 More effective when used in combinations with other techniques  Substitute in case of injury

e. Data communication access control


i. Fragmentation – communication of a message one
point (fragment) at a time
ii. Intermixing – communication of several messages
simultaneously
iii. Encryption – encoding of data to disguise their
meaning

2) Controls for detecting failures in system security


a. Unauthorized access detection devices
i. Micro-switches –detects the presence of an intruder
by breaching or completing an electrical circuit
ii. Beams- could be light, laser, ultraviolet or infrared
iii. Ultrasonic (soundwaves) and radar detectors –
these detect movements
iv. Microphones – sound can trigger an alarm
b. Fire detection devices
i. Heat-sensitive devices- fusable links built into the
nozzles of sprinkler system
ii. Smoke sensitive devices
c. Authentication
i. Further identification information made periodically
ii. Disconnecting and calling back the terminal
iii. Authenticity code
d. System monitoring
i. CCTV
ii. Disconnection after repeated unsuccessful
iii. Log of all access failures

3) Controls from recovery from system security failures


a. Failure bypass procedures
b. Recovery plan (business continuity plan)
c. Recovery procedures
i. Computer facilities and equipment
ii. Software

You might also like