Professional Documents
Culture Documents
Learning Objective 1
• Explain basic control concepts and why computer control and security are important.
• Compare and contrast the COBIT, COSO, and ERM control frameworks.
• Describe the four types of control objectives that companies need to set.
• Describe the events that affect uncertainty and the techniques used to identify them.
• Explain how to assess and respond to risk using the Enterprise Risk Management model.
Learning Objective 2
A. Overview
The term information security involves protecting information and information systems from
unauthorized access, use, disclosure, disruption, modification, or destruction in order to
provide –
a. Confidentiality: preserving authorized restrictions on access and disclosure.
b. Integrity: guarding against improper information modification or destruction.
c. Availability: ensuring timely and reliable access.
The information security management system (ISMS) is an organizational internal control
process that controls the special risks associated with information within the organization.
1. The ISMS has the basic elements of any information system, such as
hardware, databases, procedures, and reports.
2. The ISMS is part of the larger enterprise risk management (ERM)
process by which management balances risk versus opportunities.
(Based on Bodnar)
B. The Information Security In The Organization
The information security system must be managed by a chief security officer (CSO).
a. This individual should report directly to the board of directors in order to maintain
complete independence.
b. A primary duty of the CSO is to present reports to the BOD for approval covering
each phase of the life cycle:
b. COSO
i. Framework for enterprise internal controls (control-based approach)
ii. Components of COSO Frameworks
2. Risk assessment
3. Control activities
c. COSO-ERM
i. Expands COSO framework taking a risk-based approach
ii. Components of Coso-ERM Frameworks
1. Internal environment
2. Objective setting
3. Event identification
4. Risk assessment
5. Risk response
6. Control activities
7. Information and communication
8. Monitoring
H. Internal Environment
a. Management’s philosophy, operating style, and risk appetite
b. Commitment to integrity, ethical values, and competence
c. Internal control oversight by Board of Directors
d. Organizing structure
e. Methods of assigning authority and responsibility
f. Human resource standards
I. Objective Setting
a. Strategic objectives
i. High-level goals
b. Operations objectives
c. Reporting objectives
d. Compliance objectives
J. Event Identification
Identifying incidents both external and internal to the organization that could affect
the achievement of the organizations objectives
Key Management Questions:
• What could go wrong?
• How can it go wrong?
• What is the potential harm?
• What can be done about it?
K. Risk Response
a. Reduce
i. Implement effective internal control
b. Accept
i. Do nothing, accept likelihood and impact of risk
c. Share
i. Buy insurance, outsource, or hedge
d. Avoid
i. Do not engage in the activity
L. Control Activities
a. Proper authorization of transactions and activities
b. Segregation of duties
c. Project development and acquisition controls
d. Change management controls
e. Design and use of documents and records
f. Safeguarding assets, records, and data
g. Independent checks on performance
M. Monitoring
a. Perform internal control evaluations (e.g., internal audit)
b. Implement effective supervision
c. Use responsibility accounting systems (e.g., budgets)
d. Monitor system activities
e. Track purchased software and mobile devices
f. Conduct periodic audits (e.g., external, internal, network security)
g. Employ computer security officer
h. Engage forensic specialists
i. Install fraud detection software
j. Implement fraud hotline