You are on page 1of 3

1. Overview AIS Goal conflict occurs when a subsystem’s as all payroll data relating to a single employee.

mployee. File A set data items. physical view The way data are physically behavior. Pelaku merasa sah sah saja untuk melakukan piracy: Pembajakan melalui salinan atau distribusi tanpa
goals are inconsistent with the goals of another subsystem of logically related records, such as the payroll records of arranged and stored in the computer system. Schema A fraud. Computer fraud is any fraud that requires computer izin. Spamming: Mengirim pesan yang tidak dikehendaki
or with the system as a whole. Goal congruence occurs all employees. Database A set of interrelated, centrally description of the data elements in a database, the technology to perpetrate it (ex: destruction of software, oleh penerima secara berulang dalam jarak waktu yang
when a subsystem achieves its goals while contributing to controlled data files that are stored with as little data relationships among them, and the logical model used to Theft of assets covered up by altering computer records). singkat. Dictionary attack: Using special software to guess
the organization’s overall goal. Characteristics of Useful redundancy as possible. Batch processing Accumulating organize and describe the data. conceptual-level schema Computer Fraud Classification: Input Fraud (The simplest company e-mail addresses and send them blank e-mail
Information Relevant, Reliable, Complete, Timely, transaction records into groups or batches for processing The organization-wide view of the entire database that and most common way to commit a computer fraud is to messages. Splog: Blog yang mencantumkan link lain untuk
Understandable, Verifiable, Accessible. information at a regular interval such as daily or weekly. Online, lists all data elements and the relationships between alter or falsify computer input) ->  perpetrators need only menaikkan peringkat Google Rank link yang
overload Exceeding the amount of information a human realtime processing The computer system processes data them. external-level schema  An individual user’s view of understand how the system operates so they can cover direferensikan. Spyware: Perangkat lunak yang dirancang
mind can absorb and process, resulting in a decline in immediately after capture and provides updated portions of a database; also called a subschema. their tracks. Processor Fraud: unauthorized system use, untuk memata-matai pengguna. Steganography:
decision-making quality and an increase in the cost of information to users on a timely basis. Query A request for Subschema A subset of the schema; the way the user including the theft of computer time and services. Menyembunyikan file gambar atau suara berukuran besar
providing information. business process A set of related, the database to provide the information needed to deal defines the data and the data relationships. internal-level Computer Instructions Fraud: Computer instructions fraud pada suatu file host.  Superzapping: Penggunaan
coordinated, and structured activities and tasks, with a problem or answer a question. Four types of data schema A low-level view of the entire database describing includes tampering with company software, copying perangkat lunak khusus untuk mem-bypass pengawasan
performed by a person, a computer, or a machine, that processing activities Creating, Reading, Updating, Deleting how the data are actually stored and accessed. data software illegally, using software in an unauthorized pada sistem dan melakukan tindakan ilegal. Tabnapping
help accomplish a specific organizational goal.  give-get Enterprise Resource Planning(ERP) A system that dictionary Information about the structure of the data- manner, and developing software to carry out an upaya penggantian webpage pada tab tanpa diketahui
exchange Transactions that happen a great many times, integrates all aspects of an organization’s activities, such base, including a description of each data element. data unauthorized activity. Data Fraud: Illegally using, copying, pengguna perangkat melalui Javascript Time bomb/logic
such as giving up cash to get inventory from a supplier and as accounting, finance, marketing, human resources, definition language (DDL) DBMS language that builds the browsing, searching, or harming company data constitutes bomb: Perangkat lunak yang terlihat tidak melakukan apa-
giving employees a paycheck in exchange for their labor. manufacturing, inventory management, into one system. data dictionary, creates the database, describes logical data fraud. Output Fraud: illegal copying of private apa hingga pada waktu yang telah ditentukan tanpa
business processes or transaction cycles The major give- ERP Advantages provides integrated data, data input views, and specifies record or field security constraints. documents. Ways to Prevent and Detect Fraud: sepengetahuan pengguna, akan menghancurkan data-data
get exchanges that occur frequently in most companies. captured once, management gains visibility ERP data manipulation language (DML) DBMS language that organizations must create a climate that makes fraud less yang ada pada sistem.  Torpedo software: Malware yang
revenue cycle Activities associated with selling goods and Disadvantages High cost,high amount time changes database content, including data element likely, increases the difficulty of committing it, improves selain merusak sistem, juga membasmi malware (saingan)
services in exchange for cash or a future promise to required,complexity creations, updates, insertions, and deletions. data query detection methods, and reduces the amount lost if a fraud lain. Virus: Kode destruktif yang biasanya disisipkan pada
receive cash. expenditure cycle Activities associated with 3. Systems Documentation Techniques Documentation: language (DQL) High-level, English-like, DBMS language occurs. suatu file berekstensi .exe atau .bat. Zero-day attack
purchasing inventory for resale or raw materials in explains how a system works, including the who, what, that contains powerful, easy-to-use commands that 6. Fraud Komputer dan Teknik Abuse Spoofing: Pemalsuan Penyerangan pada bug sistem sebelum celah bug tersebut
exchange for cash or a future promise to pay cash. when, where, why, and how of data entry, data enable users to retrieve, sort, order, and display data. identitas dengan tujuan tertentu. Macam-macam bentuk diperbaiki.
production or conversion cycle Activities associated with processing, data storage, information output, and system report writer DBMS language that simplifies report spoofing: 1.E-mail spoofing 2.Caller ID spoofing 3.IP 7. Control and AIS Internal controls processes
using labor, raw materials, and equipment to produce controls. Documentation are often supplemented creation. data model An abstract representation of address spoofing 4.Address Resolution Protocol (ARP) implemented to provide reasonable assurance that the
finished goods. human resources/payroll cycle Activities narrative description: a written step-by-step explanation database contents. relational data model: A two- spoofing 5.SMS spoofing 6.Web-page spoofing 7.DNS following control objectives are achieved: asset safeguard,
associated with hiring, training, compensating, evaluating, of system components and interactions. RULE: proceed dimensional table repre- sentation of data; each row spoofing. Adware: Spyware yang merekam data pengguna records maintenance, accurate and reliable information,
promoting, and terminating employees. financing cycle from left to right, top to bottom Data Flow Diagrams represents a unique entity (record) and each column is a dan memunculkan iklan yang sesuai tanpa sepengetahuan financial reports based on criteria, operational efficiency,
Activities associated with raising money by selling shares (DFD): a graphical description of data sources, data flows, field where record attributes are stored. Tuple A row in a pengguna Bluebugging: Pengendalian remote pada managerial policies, and comply with applicable laws and
in the company to investors and borrowing money as well transformation processes, data storage, and data table that contains data about a specific item in a database telepon genggam untuk mengakses tanpa izin dari pemilik. regulations. threat/event Any potential adverse
as paying dividends and interest. general ledger and destinations. Using symbol. Control process and actions table. primary key Database attribute, or combination of Bluesnarfing: Pencurian data dengan media bluetooth. occurrence or unwanted event that could injure the AIS or
reporting system Information-processing operations should be ignored in here. Explode: the term used to attributes, that uniquely identifies each row in a table. Carding: Pencurian identitas kartu kredit dan transaksinya. the organization. exposure/impact The potential dollar
involved in updating the general ledger and preparing refine a high level or summary view DFD into successively foreign key An attribute in a table that is also a primary Chipping: Penanaman chip mikro pada kartu untuk loss should a particular threat become a reality.
reports for both management and external parties. lower levels to provide greater amounts of detail.  Data key in another table; used to link the two tables. update merekam aktivitas dan mencuri credentials. Data leakage: likelihood/risk The probability that a threat will come to
accounting information system A system that collects, source and data destination (data sink, arrow pointing in): anomaly  Improper database organization where a non- Penyalinan dokumen organisasi tanpa izin. Eavesdropping: pass. Fungsi Internal Control preventive controls Controls
records, stores, and processes data to produce are entities that send or receive data that the system uses primary key item is stored multiple times; updat- ing the Menguping percakapan yang bersifat pribadi. Economic that deter problems before they arise. detective controls
information for decision makers. predictive analysis The or produces. An entity can be both a source and a item in one location and not the others causes data espionage: Pencurian informasi ekonomi dan hak properti. Controls designed to discover control problems that were
use of data warehouses and complex algorithms to destination. They are represented by squares. Data Flow: inconsistencies. insert anomaly Improper data- base Hacking: Pengaksesan yang bersifat ilegal atau not prevented. corrective controls Controls that identify
forecast future events, based on historical trends and is the flow or movement of data among processes, stores, organization that results in the inability to add records to a unauthorized pada suatu entitas atau objek. Hijacking: and correct problems as well as correct and recover from
calculated probabilities. value chain linking together of all sources, and destinations. Arrow represents the direction database. delete anomaly:  Improper organization of a pengambilalihan kendali atas komputer orang lain untuk the resulting errors. Kategori internal control general
the primary and support activities in a business. value is of data flow. Process represent the transformation of data, database that results in the loss of all informa- tion about melakukan aktivitas terlarang, seperti mengirim spam controls Controls designed to make sure an organization’s
added as a product passes through the chain. primary circle represents transformation process (known as an entity when a row is deleted. relational database:  A tanpa sepengetahuan pengguna komputer. Botnet:  A information system and control environment is stable and
activities value chain activities that produce, market, and bubble, the altering of data from inputs to outputs). A data data- base built using the relational data model. entity network of powerful and dangerous hijacked computers well managed. application controls Controls that prevent,
deliver products and services to customers and provide store is a repository of data, horizontal lines and parallel to integrity rule A non- null primary key ensures that every that are used to attack systems or spread malware. detect, and correct transaction errors and fraud in
post-delivery service and support. A well-designed AIS can each other represent this. Flowcharts: is a pictorial, row in a table represents something and that it can be Zombie:  A hijacked computer, typically part of a botnet, application programs. four levers of control (Robert
add value to an organization by 1.Improving the quality analytical technique used to describe some aspect of an identified. referential integrity rule Foreign keys which link that is used to launch a variety of Internet attacks. Denial- simons) - belief system System that describes how a
and reducing the costs of products or services. information system in a clear, concise, and logical manner. rows in one table to rows in another table must have of-service (DoS) attack: serangan komputer di mana company creates value, helps employees understand
2.Improving efficiency. 3.Sharing knowledge. 4.Improving Flowcharts record how business processes are performed values that correspond to the value of a primary key in penyerang mengirimkan begitu banyak bom management’s vision, communicates company core
the efficiency and effectiveness of its supply chain. and how documents flow through the organization. They another table. Two approaches to database design email/permintaan halaman web, seringkali dari alamat values, and inspires employees to live by those values.
5.Improving the internal control structure. 6.Improving are also used to analyze how to improve business normalization & semantic data modeling.  Normalization palsu yang dihasilkan secara acak, sehingga server email boundary system System that helps employees act
decision making. supply chain An extended system that processes and document flows. Flowcharting symbol: Following relational database creation rules to design a atau penyedia layanan web server layanan Internet ethically by setting boundaries on employee behavior.
includes an organization’s value chain as well as its Input/Output, Processing (square denotes an auxiliary relational database that is free from delete, insert, and kelebihan beban. Man-in-the-middle (mITm) attack: diagnostic control system System that measures,
suppliers, distributors, and customers. The Value Chain 1. operation), Storage (show where data is stored), dan Flow update anomalies. semantic data modeling Using Seorang hacker yang menempatkan dirinya di antara klien monitors, and compares actual company progress to
Inbound logistics consists of receiving, storing, and and Miscellaneous (indicate the flow of data, where knowledge of business processes and information needs dan host untuk mencegat komunikasi di antara mereka budgets and performance goals. interactive control system
distributing the materials. 2.Operations. 3.Outbound flowcharts begin or end, where decisions are made, and to create a diagram that shows what to include in a fully Identity theft pencurian identitas untuk mendapatkan System that helps managers to focus subordinates’
logistics activities. 4.Marketing and sales activities. how to add explanatory notes to flowcharts).Types of normalized database (in 3NF). Designing a relational tujuan tertentu (misal nomor social security) Internet attention on key strategic issues and to be more involved
5.Service activities. The supply chain 1.Raw material Flowcharts: 1)Document Flowchart: A graphical database 1.Store all data in one uniform table 2.Vary the terrorism mengganggu lalu lintas internet pada in their decisions. foreign Corrupt Practices Act (fCPA)
supplier. 2.Manufacturer. 3.Distributor. 4.retailer. representation of the flow of documents and information number of column 3.The solution: a set of table. Basic komunikasi dan e-commerce Internet pump-and-dump legislation passed to prevent companies from bribing
5.Consumer. Support activities  1.Firm infrastructure. between departments or areas of responsibility within an requirement of a relational database 1.Every column in a Fraud penipuan yg menaikkan harga saham dan foreign officials to obtain business; also requires all
2.Human resources. 3.Technology activities 4.Purchasing organization. It is particularly useful in analyzing the row must be single valued 2.Primary key cannot be null. penjualannya dengan media internet Keylogger: spyware publicly owned corporations maintain a system of internal
activities. adequacy of internal control procedures 2)System 3.Foreign keys, if not null, must have values that yang mencatat dan mengingat ketikan credentials tanpa accounting controls. Sarbanes–Oxley Act (SOX) legislation
2. Transaction Processing and ERP System Data processing Flowchart: A graphical representation of the relationship correspond to the value of a primary key in another table sepengetahuan pengguna. Malware: Perangkat lunak yang intended to prevent financial statement fraud, make
cycle The four operations (data input, data storage, data among the input, processing, and output in an information 4.All nonkey attribute in a table must describe a bersifat menyalahgunakan. Password cracking Usaha financial reports more transparent, provide protection to
processing, and information output) performed on data to system 3)Program Flowchart: a graphical description of characteristic of the object identified by the primary key. pembobolan kode sandi untuk mendapatkan akses pada investors, strengthen internal controls at public
generate meaningful and relevant information. Source the sequence of logical operations that a computer 5. Fraud Threats to AIS (jenis ancaman terhadap sistem program, file, dan data. Phising: Suatu login page yang companies, and punish executives who perpetrate fraud.
Documents Documents used to capture transaction data performs. Business Process Diagram: a visual way to informasi akuntansi), Natural and political disasters Any dirancang persis laman asli untuk mendapatkan Public Company Accounting Oversight Board (PCAOB) A
at its source when the transaction takes place. Turnover describe the different steps or activities in a business threat that purely caused by natural and external credentials pengguna awam. Podslurping: Penggunaan board created by SOX that regulates the auditing
Documents Records of company data sent to an external process phenomenon such as floods or attacks by terrorists (The perangkat kecil dengan penyimpanan (iPod, Flash drive) profession; created as part of SOX. Aspek SOX - New rules
party and then returned to the system as input. Source 4. Relational Database Database A set of interrelated, systems are not at fault). Software errors and equipment untuk menyalin file tanpa izin. Posing: Pembuatan bisnis for auditors. Auditors must report specific information to
data automation The collection of transaction data in centrally coordinated data files that are stored with as malfunctions: operating system crashes, hardware yang seolah legal dan mengumpulkan data pribadi dalam the company’s audit committee, such as critical accounting
machine-readable form at the time and place of origin. little data redundancy as possible. database management failures, power outages and fluctuations. -> kesalahan proses transaksi tanpa adanya pengiriman barang yang policies and practices. New roles for audit committees
General ledger A ledger that contains summary-level data system (DBMS) The program that manages and controls sistem yang tidak sengaja. Unintentional acts Accidents dijual. QR barcode replacements: menimpa QR asli dengan Audit committee members must be on the company’s
for every asset, liability, equity, revenue, and expense the data and the interfaces between the data and the caused by human carelessness: accidents or innocent QR yang dibuat untuk menjebak pengguna Ransomware: board of directors and be independent of the company
account of the organization. Subsidiary ledger A ledger application programs that use the data stored in the errors and omissions. -> kesalahan manusia yang tidak Perangkat lunak yang ”menyandera” data pada suatu New rules for management, New Internal Control
used to record detailed data for a general ledger account database. database system The database, the DBMS, and sengaja Intentional acts (computer crimes): Sabotage, perangkat dan memaksa pemilik perangkat tersebut Requirements report must contain management’s
with many individual subaccounts, such as accounts the application programs that access the database through Corruption, fraud, social engineering,malware. -> ada membayar sejumlah uang untuk menebusnya. Rootkit: assessment of the company’s internal controls, attest to
receivable, inventory, and accounts payable. Coding The the DBMS. database administrator (DBA) The person tujuan jahat. Fraud is gaining an unfair advantage over Seperangkat software yang bekerja menyeluruh, biasanya their accuracy, and report significant weaknesses or
systematic assignment of numbers or letters to items to responsible for coordinating, controlling, and managing another person. Bisa disebut fraud kalo 1.A false untuk membobol akses ke inti dari sistem. Round-down material noncompliance. 3 Framework Internal Control
classify and organize them. Sequence codes Items are the database. data warehouse Very large databases statement, representation, or disclosure 2.A material fact, fraud fraud melalui pembulatan dua angka di belakang 1.Control Objectives for Information and Related
numbered consecutively so that gaps in the sequence containing detailed and summarized data for a number of 3.An intent to deceive 4.A justifiable reliance 5.An injury or desimal ke atas untuk meraup keuntungan pribadi Salami Technology (COBIT) - A security and control framework
code indicate missing items that should be investigated. years that are used for analysis rather than transaction loss suffered by the victim. Two types of frauds: technique: Mencuri bagian uang kecil dari transaksi besar that allows (1) management to benchmark the security
Block codes Blocks of numbers that are reserved for processing. business intelligence  Analyzing large amounts Misappropriation of Asset (pencurian inventory, pelaku secara berkelanjutan. Scareware: Perangkat lunak and control practices of IT environments, (2) users of IT
specific categories of data, thereby helping to organize the of data for strategic decision making. online analytical biasanya karyawan) dan fraudulent financial reporting malicious yang tidak memiliki fungsi melainkan hanya services to be assured that adequate security and control
data. Group codes Two or more sub-groups of digits that processing (OLAP) Using queries to inves- tigate (penyalahan informasi LK, pelaku biasanya manajemen). menakut-nakuti pengguna. Scavenging/dumpster diving: exist, and (3) auditors to substantiate their internal control
are used to code an item. Mnemonic codes Letters and hypothesized relationships among data. data mining Using WHO: Pelaku fraud sering disebut sebagai white-collar Mencari informasi penting yang bersifat rahasia pada opinions and advise on IT security and control matters.
numbers that are interspersed to identify an item. The sophisticated statistical analysis to “discover” criminals. WHY: Fraud Triangle, Terdapat tiga keadaan folder recycle bin atau trash. Sexting: Bertukar pesan yang 2.Committee of Sponsoring Organizations (COSO)- A
mnemonic code is derived from the description of the unhypothesized relationships in the data. Advantages of dimana seseorang berpotensi menjadi pelaku fraud. bersifat seksual dan vulgar secara eksplisit pada telepon privatesector group consisting of the American Accounting
item and is usually easy to memorize. Entity The item Database System data integration, data sharing, minimal Pressure, is a person’s incentive or motivation for genggam. Shoulder surfing: Mengintip/menguping saat Association, the AICPA, the Institute of Internal Auditors,
about which information is stored in a record. Attributes data redudancy & data inconsistencies, data committing fraud. Bisa karena alasan finansial, emosional seseorang yang memiliki kewenangan membuka suatu the Institute of Management Accountants, and the
The properties, identifying numbers, and characteristics of independence, cross-function analysis. record layout (merasa pekerjaan gak dihargain), dan lifestyle. data yang bersifat rahasia. Skimming: Penggesekan kartu financial Executives Institute. Internal Control—Integrated
interest of an entity that is stored in a database. Field The Document that shows the items stored in a file, including Opportunity,  is the condition or situation, including one’s secara ganda tanpa diketahui pemilik untuk mencatat framework (IC) A COSO framework that defines internal
portion of a data record where the data value for a the order and length of the data fields and the type of personal abilities to commit a fraud. Biasanya fraudster nomor kartu tersebut untuk penyalahgunaan. Social controls and provides guidance for evaluating and
particular attribute is stored. Record A set of fields whose data stored. logical view How people conceptually punya kesempatan kalo internal control perusahaan ga engineering: Teknik yang meyakinkan orang lain untuk enhancing internal control systems. Enterprise Risk
data values describe specific attributes of an entity, such organize, view, and understand the relationships among bagus. Rationalization, perpetrators to justify their illegal membocorkan informasi rahasia atau pribadi. Software Management—Integrated framework (ERM) A COSO
framework that improves the risk management process by brief period, to ensure that it meets its planned objectives. enkripsi: (1) Hasing, mengubah plaintext -> hash (2) Tanda (financial total,hash total, record count), Prompting, 1. Determine the threats (fraud and errors) facing the
expanding (adds three additional elements) COSO’s systems integrator An outside party hired to manage a tangan digital, hash yang dienkripsi dgn private key (3) Closed-loop verification) Data proses/Data matching, File company 2. Identify the control procedures 3. Evaluate
Internal Control—Integrated. internal environment The company’s systems development effort. analytical review digital certificate, dokumen mengandung kunci public labels, Recalculation of batch totals, Cross-footing and control procedures. Controls are evaluated in two ways: a.
company culture that is the foundation for all other ERM The examination of the relationships between different beserta pemiliknya (4) public key infrastructure, sistem yg zero-balance, Write-protection mechanismsConcurrent a systems review determines whether control procedures
components, as it influences how organizations establish sets of data. audit trail A path that allows a transaction to menerbitkan private & public key beserta digital certificate update controls output/ User review of output, are actually in place b. Tests of controls are conducted to
strategies and objectives; structure business activities; and be traced through a data processing system from point of (5) VPN, menggunakan encryption & authentification Reconciliation procedure, External data reconciliation, determine whether existing controls work as intended. 4.
identify, assess, and respond to risk. risk appetite The origin to output or backward from output to point of untuk transfer informasi melalui internet dgn aman Data transmission controls(Checksum, Parity bits). Evaluate control weaknesses. Sistem info audit goals: to
amount of risk a company is willing to accept to achieve its origin. computer security officer (CSO) An employee (menciptakan virtual private network) Minimizing risk of system downtime (Preventive review and evaluate the internal controls that protect the
goals and objectives. To avoid undue risk, risk appetite independent of the information system function who 9. Confidentiality & Privacy Controls 4 basic action to maintenance, Fault tolerance,Data center location and system; Auditor harus memastikan bahwa 6 tujuan audit
must be in alignment with company strategy. audit monitors the system,disseminates information about preserve sensitive information 1)identify & classify. design,Training,Patch management and antivirus ini terpenuhi 1 ) Overall security 2) Program Development
committee The outside, independent board of director improper system uses and their consequences, and (COBIT) 5 management practice APO01.06 points out that software). recovery and resumption of normal operation and Acquisition:  During systems review, auditors should
members responsible for financial reporting, regulatory reports to top management. chief compliance officer classification is the responsibility of information owners. (Backup procedures,Disaster recovery plan (DRP), Business discuss development procedures with management,
compliance, internal control, and hiring and overseeing (CCO) An employee responsible for all the compliance the appropriate set of controls can be deployed to protect continuity plan (BCP). fault tolerance( The capability of a system users, and information system personnel.(list types
internal and external auditors. policy and procedures tasks associated with SOX and other laws and regulatory it. 2)encrypt(the only way to protect information) system to continue performing when there is a hardware of errors & fraud, control procedures, audit procedures
manual A document that explains proper business rulings. forensic investigators Individuals who specialize in 3)control assess, Information Right Management (IRM) Failure) redundant arrays of independent drives (RAID) - A (system review, test of control), compensating control 3)
practices, describes needed knowledge and experience, fraud, most of whom have specialized training with law software for additional layer to protect that stored in fault tolerance technique that records data on multiple Program Modification: The auditor should verify that
explains document procedures, explains how to handle enforcement agencies such as the FBI or IRS or have digital format. Data loss prevention (DLP) like antivirus disk drives instead of just one to reducethe risk of data separate development and production programs are
transactions, and lists the resources provided to carry out professional certifications such as Certified Fraud program in reverse blocking that contain keyword that org loss. uninterruptible power supply (UPS) An alternative maintained and that changes are implemented by
specific duties. background check Aninvestigation of a Examiner (CFE). computer forensics specialists Computer want to protect outgoing massage. Digital watermark code power supply device that protects against the loss of someone independent of the user and programming
prospective or current employee that involves verifying experts who discover, extract, safeguard, anddocument embedded in doc that enables an org to identify power and fluctuations in the power level by using battery functions. The development program’s access control
their educational and work experience, talking to computer evidence such that its authenticity, accuracy, information that has been disclosed. COBIT 5 DSS05.06 - power to enable the system to operate long enough to table is reviewed to verify that only authorized users had
references, checking for a criminal record or credit and integrity will not succumb to legal challenges. neural control physical access to sensitive information stored in back up critical data and safely shut down. recovery point access to the system 4)  Processing Test Data: Process a
problems, and examining other publicly available networks Computing systems that imitate the brain’s physical documents. The importance of proper disposal of objective (RPO) - The amount of data the organization is hypothetical set of valid and invalid transactions. The
information. Dua model ERM 1. Objectives setting learning process by using a network of interconnected sensitive information. Access controls-protect willing to reenter or potentially lose. recovery time program should process all valid transactions correctly and
a.strategic objectives - High-level goals that are aligned processors that perform multiple operations confidentiality must be continuously reviewed and objective (RTO) The maximum tolerable time to restore an reject all invalid ones -> using test data generator. Test
with and support the company’s mission and create simultaneously and interact dynamically. fraud hotline A modified to respond to new threats created by organization’s information system following a disaster, Data Generator: software berdasarkan spesifikasi program
shareholder value. b.operations objectives -  Objectives phone number employees can call to anonymously report technological advances.  Control in virtual environments, representing the length of time that the organization is untuk menghasilkan data set utk mengetes program logic.
that deal with the effectiveness and efficiency of company fraud and abuse. sensitive data  should not be hosted on the same physical willing to attempt to function without its information 5)Concurrent Data Technique Continually monitor the
operations and determine how to allocate resources. 8. Controls for Information Security The Trust Services server with virtual machines that are accessible via the system. incremental backup A type of partial backup that system and collect audit evidence while live data are
c.reporting objectives - Objectives to help ensure the Framework organizes IT-related controls into five Internet 4)train employee. Privacy control, first step to involves copying only the data items that have changed processed during regular operating hours. Using: An
accuracy, completeness, and reliability of company principles that jointly contribute to systems reliability: protect is identify what information the org processes, since the last partial backup. This produces a set of integrated test facility (ITF) - inserts fictitious records that
reports; improve decision making; and monitor company (1)Security—access (both physical and logical) to the stored, who access it. Information need to be encrypted incremental backup files, each containing the results of represent a fictitious division, department, customer, or
activities and performance. d.compliance objectives - system and its data is controlled and restricted to while it transit and storage. Data masking- protecting one day’s transactions. differential backup - A type supplier in company master files. Processing test
Objectives to help the company comply with all applicable legitimate users(2)Confidentiality—sensitive privacy by replacing sensitive personal information with ofpartialbackup that involves copying all changes made transactions to update them will not affect actual records;
laws and regulations. 2. event identification- event A organizational information (e.g., marketing plans, trade fake data (tokenization). Spam ( unsolicited email that since the last full backup. Thus, each new differential Snapshot technique marking transactions with a special
positive or negative incident or occurrence from internal secrets) is protected from unauthorized disclosure. contains either edv or offensive content).  U.S. Congress backup file contains the cumulative effects of all activity code, recording them and their master file records before
or external sources that affects the implementation of (3)Privacy—personal information about customers, passed the Controlling the Assault of Non-Solicited since the last full backup disaster recovery plan (DRP) A and after processing, and storing the data to later verify
strategy or the achievement of objectives. inherent risk employees, suppliers, or business partners is collected, Pornography and Marketing (CAN-SPAM) Act in 2003. plan to restore an organization’s IT capability in the event that all processing steps were properly executed; System
The susceptibility of a set of accounts or transactions to used, disclosed, and maintained only in compliance with CAN-SPAM provides both criminal and civil penalties for that its data center is destroyed. cold site A disaster control audit review file (SCARF) - using embedded audit
significant control problems in the absence of internal internal policies and external regulatory requirements and violations of the law. Identity theft is the unauthorized use recovery option that relies on access to an alternative modules to continuously monitor transactions, collect data
control. residual risk The risk that  remains after is protected from unauthorized disclosure (4)Processing of someone’s personal information for the perpetrator’s facility that is prewired for necessary telephone and on transactions with special audit significance, and store
management implements internal controls or some other Integrity—data are processed accurately, completely, in a benefit. Privacy regulation. federal regulations, including Internet access, but does not contain any computing the data to later identify and investigate questionable
response to risk. Ways to respond risk reduce, share, timely manner, and only with proper authorization the Health Insurance Portability and Accountability Act equipment. hot site A disaster recovery option that relies transactions; Audit hooks- audit routines that notify
accept, avoid. Expected loss: Impact x Likelihood. Control (5)Availability—the system and its information are (HIPAA), the Health Information Technology for Economic on access to a completely operational alternative data auditors of questionable transactions, often as they occur.
activities policies, procedures, and rules that provide available to meet operational and contractual obligations. and Clinical Health Act (HITECH), and the Financial Services center that is not only prewired but also contains all Continous and Intermitten Simulation (CIS): menanamkan
reasonable assurance that control objectives are met and Two Fundamental Information Security Concepts Modernization Act (commonly referred to as the Gramm– necessary hardware and software. real-time mirroring modul audit dalam database sistem manajemen (DBMS)
risk responses are carried out. Authorization management (1)Security Is a Management Issue, Not Just a Technology Leach–Bliley Act, representing the names of its three Maintaining complete copies of a database at two yang memeriksa semua transaksi yang memperbarui
lacks the time and resources to supervise each company Issue, steps:(a)Assess threats & select risk response Congressional sponsors)- to protect customers personal separate data centers and updating both copies in real- database menggunakan kriteria yang mirip dengan SCARF.
activity and decision, it establishes policies for employees (b)Develop and communicate policy (c)Acquire & information. GAPP identifies and defines the following 10 time as each transaction occurs. Jika suatu transaksi memiliki signifikansi audit khusus,
to follow and then empowers them. digital signature a implement solutions (d) Monitor performance (2) internationally recognized best practices for protecting the 11. Sistem Informasi Audit Audit adalah proses sistematis maka Modul CIS secara mandiri memproses data (dengan
means of electronically signing a document with data that Defense-in-Depth and the Time-Based Model of privacy of customers’ personal information: untuk mendapatkan dan mengevaluasi bukti dan cara yang mirip dengan simulasi paralel), mencatat
cannot be forged. General authorization management can Information Security, is The idea of defense-in-depth is to 1)management protect privacy of customers. 2)notice- pernyataan-pernyataan mengenai kegiatan ekonomi dan hasilnya, dan membandingkannya dengan yang diperoleh
authorize employees to handle routine transactions employ multiple layers of controls in order to avoid having before collect personal information, as soon as practicable internal control dengan standar kriteria audit. Tipe-tipe oleh DBMS. Ketika perbedaan ada, mereka disimpan
without special approval. segregation of accounting duties a single point of failure. time-based model of security P = thereafter. 3)Choice and consent , 4)Collection, cookie is a audit: 1)Financial Audit: memeriksa reliability dan dalam log audit untuk penyelidikan selanjutnya. Jika trdpt
= Authorization—approving transactions and decisions. the time it takes an attacker to break through the text file created by a website and stored visitor hard disk integritas transaksi keuangan, pencatatan akuntansi, dan perbedaan serius, CIS dapat mencegah DBMS dari
Recording—preparing source documents; entering data organization’s preventive controls, D = the time it takes to 5)Use, retention, and disposal when info no longer useful laporan keuangan. 2)Sistem Informasi/Internal Control melakukan pembaruan. Jika auditor menemukan program
into computer systems; and maintaining journals, ledgers, detect that an attack is in progress, C = the time it takes to it should be disposed, 6)access provide individuals with Audit: pemeriksaan secara general dan secara kontrol yang terdapat unauthorized code atau serious errors,
files, or databases.Custody—handling cash, tools, respond to the attack and take corrective action. Those the ability to access, review, correct, and delete, aplikasi dari sebuah sistem informasi utk melihat apakah SI maka Analisis Program Logic yang mendetail sangat
inventory, or fixed assets; receiving incoming customer three variables are then evaluated as follows: If P > D + C, 7)Disclosure to third parties 8)security 9)quality tersebut “compliance” dengan kebijakan dan prosedur diperlukan, dimana analisis ini membutuhkan keahlian
checks; writing checks. systems administrator Person then the organization’s security procedures are effective. 10)monitoring & enforcement org should assign kontrol internal serta efektivitas dalam pengamanan aset. pada bahasa programming dan auditor menganalisis
responsible for making sure a system operates smoothly Otherwise, security is ineffective. Understanding Targeted employees to be responsible ensuring compliance, and 3)Operational Audit: berpusat pada penggunaan sumber perkembangan,operasional dan dokumentasi program
and efficiently. network manager Person who ensures that Attacks, steps: (1)Conduct reconnaissance, (2)Attempt periodically verify that their employees are complying. daya yang ekonomis dan efisien untuk mencapai tujuan serta menggunakan software berikut ini: a)Automated
the organization’s networks operate properly. security social engineering, (3)Scan and map the target, encryption is the process of transforming normal content, dan objectives yang telah ditetapkan. 4)Compliance Audit: Flowcharting Programs: perangkat lunak yang
management People that make sure systems are secure (4)Research, (5)Research, (6)Cover tracks. authentication called plaintext, into unreadable gibberish, called menentukan apakah entitas patuh (compliance) pada menerjemahkan kode sumber program dan menghasilkan
and protected from internal and external threats. change Verifying the identity of the person or device attempting ciphertext. Decryption reverses this process, transforming hukum, regulasi, kebijakan dan prosedur. Proses audit ini alur diagram (flowchart) dari logika program. b)Automated
management Process of making sure changes are made to access the system. biometric identifier A physical or ciphertext back into plaintext. Important factor strength of kerap menghasilkan rekomendasi untuk meningkatkan Decision Table Programs: software yg menginterpretasikan
smoothly and efficiently and do not negatively affect the behavioral characteristic that is used as an authentication any encryption system: (1) key length, (2) encryption proses dan kontrol untuk memastikan kepatuhannya dgn kode sumber program dan menghasilkan decision table
system. users People who record transactions, authorize credential. multifactor authentication The use of two or algorithm, and (3) policies for managing the cryptographic regulasi. 5)Investigative Audit: memeriksa kemungkinan dari logika program. c)Scanning Routines: software yang
data processing, and use system output. systems analysts more types of authentication credentials in conjunction to keys.Symmetric encryption that use the same key both to fraud, misappropriation of assets, waste dan kekerasan, mencari program untuk keterjadiannya (occurence) dari
People who help users determine their information needs achieve a greater level of security. multimodal encrypt and to decrypt. asymmetric encryption systems - atau aktivitas pemerintahan yang tidak baik. Proses Audit: suatu item yg spesifik. d)Mapping programs: software yg
and design systems to meet those needs. programmers authentication The use of multiple authentication that use two keys (one public, the other private); either 1)  Audit Planning: proses audit hrs direncanakan sehingga mengidentifikasi kode program yg belum dieksekusi.
People who use the analysts’ design to create and test credentials of the same type to achieve a greater level of key can encrypt, but only the other matching key can bs berfokus pada area yang memiliki faktor resiko e)Program Tracing: Secara berurutan mencetak semua
computer programs. computer operators People who security. authorization The process of restricting access of decrypt.Public key keys used in asymmetric encryption terbesar. 3 tipe resiko audit : a) Inherent Risk: resiko jika program yang dieksekusi langkah-langkah, bercampur
operate the company’s computers. information system authenticated users to specific portions of the system and systemsPrivate key used in asymmetric encryption tidak ada proses kontrol. b) Control Risk: resiko adanya dengan output, jadi urutan eksekusi program dapat
library Corporate databases, files, and programs stored limiting what actions they are permitted to perform. systems.key escrow - process of storing a copy of an kesalaha material di dalam pelaporan laporan keuangan diamati. f)Input Controls Matrix: sebuah matrix yg dapat
and managed by the system librarian. data control group compatibility test Matching the user’s authentication encryption key in a secure location. Hashing transforming dan internal control. c) Detection Risk: resiko auditor dan menunjukkan prosedur kontrol yg diterapkan untuk setiap
People who ensure that source data is approved, monitor credentials against the access control matrix to determine plaintext of any length into a short code called a prosedur yg dilakukannya gagal mendeteksi salah saji input record field; digunakan untuk mendokumentasikan
the flow of work, reconcile input and output, handle input whether that employee should be allowed to access that hash(Plaintext transformed into short code). material. Proses yg kedua yaitu 2) Audit Evidence: a) review input controls matrix dari sumber data controls.
errors, and distribute systems output. steering committee resource and perform the requested action. border router nonrepudiation  legally binding agreements that cannot be Observation (watching how data control personnel handle Audit Software - Computer-assisted audit techniques
An executive-level committee to plan and oversee the A device that connects an organization’s information unilaterally repudiated by either party. public key data processing work as it is received) b) Review of (CAATs) refer to audit software, often called generalized
information systems function. strategic master plan A system to the Internet. firewall A special-purpose infrastructure (PKI)  issuing pairs of public and private keys documentation to understand how a particular process or audit software (GAS), that uses auditor-supplied
multiple-year plan of the projects the company must hardware device or software running a general-purpose and corresponding digital certificates. virtual private internal control system is supposed to function c) specifications to generate a program that performs audit
complete toachieve its long-range goals. project computer that controls both inbound and outbound network (vPn) Using encryption and authentication to Discussions with employees d) Physical examination of functions, thereby automating or simplifying the audit
development plan A document that shows how a project communication between the system behind the firewall securely transfer information over the Internet, thereby tangible assets e) Confirmation f) Reperformance of process
will be completed. project milestones Points where and other networks. demilitarized zone (DMZ) A separate creating a “virtual” private network. calculations to verify quantitative information g) Vouching:
progress is reviewed and actual and estimated completion network located outside the organization’s internal 10. Processing Integrity & Availability Controls -Data dr transaksi diliat ke dokumen h) Analytical Review:
times are compared. system performance measurements information system that permits controlled access from Input/A turnaround document is a record of company data memeriksa hubungan dari data-data untuk melihat
Ways to evaluate and assess a system. data processing the Internet. Encryption: konten -> ciphertext. Decryption: sent to an external party and then returned by the hubungan atau tren yg tidak biasa. Proses ke tiga yaitu 3)
schedule A schedule that shows when each data ciphertext -> konten. Tujuan enkripsi: melindungi data external party for subsequent input to the system. Threat Evaluasi Audit Evidence -> 1) Materialitas: Amount of an
processing task should be performed. throughput The saat perjalanan melalui internet (kontrol preventif). Tiga input (Data that is: Invalid. error, fraud, or omission that would affect the decision of
amount of work performed by a system during a given faktor yg menentukan kekuatan enkripsi: (1) key length Unauthorized,IncompleteInaccurate). Data Entry control a prudent user of financial information. 2)reasonable
period of time. response time How long it takes for a (2)encryption algorithm (3)kebijakan mengelola (A sequence check tests whether a transaction file is in the assurance - Obtaining complete assurance that
system to respond. utilization The percentage of time a crypthographic keys. Dua jenis sistem enkripsi proper numerical or alphabetical Sequence, Batch totals information is correct is prohibitively expensive, so
system is used. postimplementation review Review, (1)symmetric, kuncinya sama (2)asymmetric, pake dua calculate numeric values for a batch of input records(Batch auditors accept a reasonable degree of risk that the audit
performed after a newsystem has been operating for a kunci yaitu public (disebar) & private (dirahasiakan). Jenis totals calculate numeric values for a batch of input records conclusion is incorrect. THE RISK-BASED AUDIT APPROACH

You might also like