You are on page 1of 17

CHAPTER 1: AUDITING, ASSURANCE, & fair representation of organization’s

INTERNAL CONTROL transactions and account balances.


✓ SEC’s role
AUDITING ✓ Accountancy Act of 2004
Auditing is a systematic process of objectively ✓ PRC-BOA
obtaining and evaluating evidence regarding CPA
assertions about economic actions and events to EXTERNAL vs. INTERNAL
ascertain the degree of correspondence between External auditing:
those assertions and establishing criteria and o Independent auditor (CPA)
communicating the results to interested users. o Independence defined by SEC/S-OX/AIC
o Required by SEC for publicly traded
INTERNAL AUDITS companies
Internal auditing: independent appraisal function o Referred to as a “financial audit”
established within an organization to examine and o Represents interests of outsiders, “the
evaluate its activities as a service to the organization public” (e.g., stockholders)
• Financial Audits o Standards, guidance, certification governed
• Operational Audits by PICPA, PRC-BOA, SEC; delegated by
• Compliance Audits SEC who has final authority
• Fraud Audits Internal auditing:
• IT Audits o Auditor (often a CIA or CISA)
✓ CIA o Is an employee of organization imposing
✓ IIA independence on self
IT AUDITS o Optional per management requirements
• IT audits: provide audit services where o Broader services than financial audit; (e.g.,
processes or data, or both, are embedded in operational audits)
technologies. o Represent interests of the organization
o Standards, guidance, certification governed
• Subject to ethics, guidelines, and standards
by IIA and ISACA
of the profession (if certified)
CISA
FINANCIAL AUDITS
Most closely associated with ISACA
• An independent attestation performed by an
• Joint with internal, external, and fraud audits
expert (i.e., an auditor, a CPA) who
• Scope of IT audit coverage is increasing
expresses an opinion regarding the
• Characterized by CAATTs
presentation of financial statements
• IT governance as part of corporate
• Key concept: Independence
governance
• {Should be} Similar to a trial by judge
• Culmination of systematic process
FRAUD AUDITS
involving:
• Fraud audits: provide investigation services
✓ Familiarization with the organization’s
where anomalies are suspected, to develop
business
evidence to support or deny fraudulent
✓ Evaluating and testing internal controls
activities.
✓ Assessing the reliability of financial data
• Auditor is more like a detective
• Product is formal written report that
• No materiality
expresses an opinion about the reliability of
• Goal is conviction, if sufficient evidence of the assertions in financial statements; in
fraud exists conformity with GAAP
✓ CFE ATTEST definition
✓ ACFE ✓ Written assertions
EXTERNAL AUDITS ✓ Practitioner’s written report
• External auditing: Objective is that in all
material respects, financial statements are a
By: Roxy <333
✓ Formal establishment of measurement .05 = .4 * .6 * DR
criteria or their description ... then DR=4.8%
✓ Limited to: ▪ Why is AR = 5%?
▪ Examination ▪ What is detection risk?
▪ Review ▪ Can CR realistically be 0?
▪ Application of agreed-upon procedures ▪ Relationship between DR and substantive
AUDITS procedures
• Systematic process ▪ Relationship between tests of controls and
• Five primary management assertions, and substantive tests
correlated audit objectives and procedures o Illustrate higher reliability of the internal
✓ Existence or Occurrence controls and the Audit Risk Model
✓ Completeness o What happens if internal controls are
✓ Rights & Obligations more reliable than last audit
✓ Valuation or Allocation o Last year: .05 = .4 * .6 * DR [DR = 4.8]
✓ Presentation or Disclosure o This year: .05 = .4 * .4 * DR [DR = 3.2]
➢ Phases [Figure 1-3] o The more reliable the internal controls,
1. Planning the lower the CR probability; thus the
2. Obtaining evidence lower the DR will be, and fewer
✓ Tests of Controls substantive tests are necessary.
✓ Substantive Testing o Substantive tests are labor intensive
o CAATTs
o Analytical procedures Role of Audit Committee
3. Ascertaining reliability • Selected from board of directors
✓ MATERIALITY • Usually three members
4. Communicating results • Outsiders (SEC now requires it)
✓ Audit opinion • Fiduciary responsibility to shareholders
• Serve as independent check and balance
Audit Risk Formula system
AUDIT RISK: • Interact with internal auditors
▪ The probability that the auditor will give an • Hire, set fees, and interact with external
inappropriate opinion on the financial auditors
statements: that is, that the statements will • Resolved conflicts of GAAP between
contain materials misstatement(s) which the external auditors and management
auditor fails to find What is an IT Audit?
INHERENT RISK: o most accounting transactions to be in
▪ The probability that material misstatements electronic form without any paper
have occurred documentation because electronic storage is
✓ Material vs. Immaterial more efficient. These technologies greatly
▪ Includes economic conditions, etc. change the nature of audits, which have so
▪ Relative risk (e.g., cash) long relied on paper documents.
CONTROL RISK:
▪ The probability that the internal controls will THE IT ENVIRONMENT
fail to detect material misstatements • There has always been a need for an
DETECTION RISK:
effective internal control system.
▪ The probability that the audit procedures
• The design and oversight of that system has
will fail to detect material misstatements
typically been the responsibility of
▪ Substantive procedures
accountants.
AUDIT RISK MODEL:
• The I.T. Environment complicates the paper
▪ AR = IR * CR * DR
systems of the past.
▪ example inventory with:
o Concentration of data
IR=40%, CR=60%, AR=5% (fixed)
By: Roxy <333
o Expanded access and linkages ✓ Monitoring
o Increase in malicious activities in systems ✓ Control activities
vs. paper #1:Control Environment -- elements
o Opportunity that can cause management ▪ The integrity and ethical values
fraud (i.e., override) ▪ Structure of the organization
• Audit planning ▪ Participation of audit committee
• Tests of controls ▪ Management’s philosophy and style
• Substantive test ▪ Procedures for delegating
CAATTs ▪ Management’s methods of assessing
performance
INTERNAL CONTROL ▪ External influences
is policies, practices, procedures designed to … ▪ Organization’s policies and practices for
• safeguard assets managing human resources
• ensure accuracy and reliability #1: Control Environment – Techniques
• promote efficiency ▪ Assess the integrity of organization’s
management
• measure compliance with policies
▪ Conditions conducive to management fraud
▪ Understand client’s business and industry
BRIEF HISTORY - COSO
▪ Determine if board and audit committee are
Committee on Sponsoring Organizations - 1992
actively involved
1. AICPA, AAA, FEI, IMA, IIA
▪ Study organization structure
2. Developed a management perspective model
#2: Risk Assessment
for internal controls over a number of year
▪ Changes in environment
3. Is widely adopted
▪ Changes in personnel
▪ Changes in I.S.
EXPOSURES AND RISK
▪ New IT’s
• Exposure - Absence or weakness of a
▪ Significant or rapid growth
control
▪ New products or services (experience)
• Risks - Potential threat to compromise use
▪ Organizational restructuring
or value of organizational assets
▪ Foreign markets
Types of risk
▪ New accounting principles
▪ Destruction of assets
▪ Theft of assets
#3:Information & Communication-Elements
▪ Corruption of information or the I.S.
▪ Initiate, identify, analyze, classify and record
▪ Disruption of the I.S.
economic transactions and events.
THE P-D-C MODEL ▪ Identify and record all valid economic
▪ Preventive controls transactions
▪ Detective controls ▪ Provide timely, detailed information
▪ Corrective controls ▪ Accurately measure financial values
✓ Which is most cost effective? ▪ Accurately record transactions
✓ Which one tends to be proactive measures? ▪ Auditors obtain sufficient knowledge of
✓ Can you give an example of each? I.S.’s to understand:
▪ Predictive controls ✓ Classes of transactions that are
material
Consideration of Internal Control in a Financial ✓ Accounting records and accounts used
Statement Audit ✓ Processing steps:initiation to inclusion
▪ COSO in financial statements (illustrate)
✓ The control environment ✓ Financial reporting process (including
✓ Risk assessment disclosures)
✓ Information & communication
By: Roxy <333
#4: Monitoring ▪ The integrity of the AIS
▪ By separate procedures (e.g., tests of ▪ The integrity of the data in the
controls) record
▪ By ongoing activities (Embedded Audit ▪ Examples
Modules – EAMs and Continuous Online IT Risks Model
▪ Auditing - COA) • Operations
#5: Control Activities • Data management systems
• New systems development
• Systems maintenance
• Electronic commerce (The Internet)
• Computer applications

CHAPTER 2: AUDITING IT GOVERNANCE


CONTROLS
STRUCTURING THE IT FUNCTION
• Centralized data processing
• Organizational chart
✓ Database administrator (DBA)
✓ Data processing manager/dept.
o Data control
Physical Controls (1-3) o Data preparation/conversion
1. Transaction authorization o Computer operations
Example: o Data library
• Sales only to authorized customer • Systems development & Systems
maintenance
• Sales only if available credit limit
✓ Participants
2. Segregation of duties
✓ End users
Examples of incompatible duties:
✓ IS professionals
• Authorization vs. processing [e.g.,
✓ Auditors
Sales vs. Auth. Cust.]
✓ Other stakeholders
• Custody vs. recordkeeping [e.g., Segregation of incompatible IT functions
custody of inventory vs. DP of
• Objectives:
inventory]
✓ Segregate transaction authorization from
• Fraud requires collusion [e.g., separate transaction processing
various steps in process] ✓ Segregate record keeping from asset
3. Supervision custody
• Serves as compensating control when ✓ Divide transaction processing tasks among
lack of segregation of duties exists by individuals such that short of collusion
necessity between two or more individuals would not
Physical Controls (4-6) be possible.
4. Accounting records (audit trails; examples)
5. Access controls SEGREGATION OF INCOMPATIBLE IT
• Direct (the assets) FUNCTIONS
• Indirect (documents that control the 1. Separating systems development from
assets) computer operations
• Fraud 2. Separating DBA from other functions
• Disaster Recovery ▪ DBA is responsible for several critical tasks:
6. Independent verification ✓ Database security
• Management can assess: ✓ Creating database schema and user view
▪ The performance of individuals
By: Roxy <333
✓ Assigning database access authority to The distributed model
users ▪ Distributed Data Processing (DDP)
✓ Monitoring database usage ▪ Alternative A: centralized
✓ Planning for future changes ▪ Alternative B: decentralized / network
3. Segregate data library from operations ▪ Risks associated with DDP
▪ Physical security of off-line data files ✓ Inefficient use of resources
▪ Implications of modern systems on use of ✓ Mismanagement of resources by end users
data library: ✓ Hardware and software incompatibility
✓ Real-time/online vs. batch processing ✓ Redundant tasks
✓ Volume of tape files is insufficient to justify ✓ Destruction of audit trails
full-time librarian ✓ Inadequate segregation of duties
✓ Alternative: rotate on ad hoc basis ✓ Hiring qualified professionals
✓ Custody of on site data backups ✓ Increased potential for errors
✓ Custody of original commercial software and ✓ Programming errors and system failures
licenses ✓ Lack of standards
4. Segregate Systems Development from
Maintenance ▪ Advantages of DDP
▪ Two types of improvements from this ✓ Cost reduction
approach: ✓ End user data entry vs. data control group
1. Better documentation standards - Necessary ✓ Application complexity reduced
for transfer of responsibility ✓ Development and maintenance costs
2. Deters fraud - Possibility of being reduced
discovered ✓ Improved cost control responsibility
✓ IT critical to success then managers must
STRUCTURING THE IT FUNCTION control the technologies
Audit objectives ✓ Improved user satisfaction
▪ Risk assessment ✓ Increased morale and productivity
▪ Verify incompatible areas are properly ✓ Backup flexibility
segregated ✓ Excess capacity for Disaster Recovery
✓ How would an auditor accomplish this Planning (DRP)
objective?
▪ Verify incompatible areas are properly ▪ Controlling the DDP environment
segregated ✓ Need for careful analysis
▪ Verify formal vs. informal relationships exist ✓ Implement a corporate IT function
between incompatible tasks Central systems development
✓ Why does it matter? o Acquisition, testing, and
Segregation of incompatible IT functions implementation of commercial software
▪ Audit procedures: and hardware
✓ Obtain and review security policy User services
✓ Verify policy is communicated o Help desk: technical support, FAQs,
✓ Review relevant documentation (org. chat room, etc.
chart, mission statement, key job Standard-setting body
descriptions) Personnel review
✓ Review systems documentation and o IT staff
maintenance records (using a sample) ✓ Audit objectives:
✓ Verify whether maintenance o Conduct a risk assessment
programmers are also original design o Verify the distributed IT units employ
programmers entity-wide standards of performance that
✓ Observe segregation policies in practice promotes compatibility among hardware,
✓ Review operations room access log operating software, applications, and data
✓ Review user rights and privileges ✓ Audit procedures:
By: Roxy <333
o Verify corporate policies and standards • Tests for insurance coverage
are communicated • Tests of operator documentation controls
o Review current organization chart,
mission statement, key job descriptions to SYSTEM-WIDE CONTROLS
determine if any incompatible duties exist Disaster recovery planning (DRP)
o Verify compensating controls are in place
where incompatible duties do exist
o Review systems documentation
o Verify access controls are properly
established

THE COMPUTER CENTER


Computer center controls
• Physical location
✓ Avoid human-made and natural hazards
✓ Example: Chicago Board of Trade
• Construction
✓ Ideally: single-story, underground utilities,
windowless, use of filters
✓ If multi-storied building, use top floor
(away from traffic flows, and potential
flooding in a basement)
• Access
✓ Physical: Locked doors, cameras • Critical applications identified and ranked
✓ Manual: Access log of visitors • Create a disaster recovery team with
• Air conditioning responsibilities
✓ Especially mainframes • Site backup
✓ Amount of heat even from a group of PCs ✓ “Hot site” – Recovery Operations Center
• Fire suppression ✓ “Cold site” – empty shell
✓ Automatic: usually sprinklers ✓ Mutual aid pact
✓ Gas, such as halon, that will smother fire ✓ Internally provided backup
by removing oxygen can also kill anybody ✓ Other options
trapped there • Hardware backup
✓ Sprinklers and certain chemicals can • Software backup: operating system
destroy the computers and equipment • Software backup: application software
✓ Manual methods (based on critical application step)
• Power supply • Data backup
✓ Need for clean power, at a acceptable level • Supplies (on site)
✓ Uninterrupted power supply • Documentation (on site)
Audit objectives ✓ User manuals
• Verify physical security controls are ✓ System and software technical manuals
reasonable • Test!
• Verify insurance coverage is adequate Disaster Recovery Plan
• Verify operator documentation is adequate 1. Critical Applications – Rank critical
in case of failure applications so an orderly and effective
Audit procedures restoration of computer systems is possible.
• Tests of physical construction 2. Create Disaster Recovery Team – Select team
• Tests of fire detection members, write job descriptions, describe
• Tests of access control recovery process in terms of who does what.
• Tests of backup power supply
By: Roxy <333
3. Site Backup – a backup site facility including Fault tolerance
appropriate furniture, housing, computers, and • 44% of time IS unavailable is due to system
telecommunications. Another valid option is a failures!
mutual aid pact where a similar business or • Controls
branch of same company swap availability ✓ Redundant systems or parts
when needed. ✓ RAID (Redundant Array of Independent
4. Site Backup – a backup site facility including Risks)
appropriate furniture, housing, computers, and ✓ Uninterrupted Power Supply (UPS)
telecommunications. Another valid option is a ✓ Multiprocessors
mutual aid pact where a similar business or Audit objective
branch of same company swap availability • To ensure the organization is employing an
when needed. appropriate level of fault tolerance
5. System Software Backup – Some hot sites Audit procedures
provide the operating system. If not included in • Verify proper level of RAID devices
the site plan, make sure copies are available at • Review procedures for recovery from
the backup site system failure
6. Application Software Backup – Make sure • Verify boot disks are secured
copies of critical applications are available at
the backup site CHAPTER 3: AUDITING OPERATING
7. Data Backup – One key strategy in backups is SYSTEMS AND NETWORKS
to store copies of data backups away from the
business campus, preferably several miles away Operating system performs three main tasks:
or at the backup site. Another key is to test the
• Translates high-level languages into machine-
restore function of data backups before a crisis. level language. (Compilers & Interpreters)
8. Supplies – A modicum inventory of supplies
• Allocates computer resources to users,
should be at the backup site or be able to be
workgroups & applications.
delivered quickly.
• Manages tasks of job scheduling and
9. Documentation – An adequate set of copies of
multiprogramming.
user and system documentation.
1) computer operator
10. TEST! – The most important element of an
2) various job queues
effective Disaster Recovery Plan is to test it
3) telecommunications
before a crisis occurs, and to test it periodically
(e.g., once a year)
OPERATING SYSTEMS PC
Audit objectives
• Verify management’s DRP is adequate
Audit procedures
• Verify a second-site backup is adequate
• Review the critical application list for
completeness
• Verify backups of application software are
stored off-site
• Verify that critical data files are backed up
and readily accessible to DRP team
• Verify resources of supplies, documents, and
documentation are backed up and stored off-
site
• Verify that members listed on the team
roster are current employees and that they
are aware of their responsibilities
By: Roxy <333
combination of upper/lower case letters,
SMARTPHONES numbers, special characters.
• Virus & Worms
o foreign programs that spread through system
o virus must attach to another program, worms
are self-contained
• Trojan Horse
o foreign program that conceals itself with
another legitimately imported program
• Logic Bomb
o foreign programs triggered by specific event
• Back Door
o alternative entry into system
o Intentional (programmers)
OPERATING SYSTEM SECURITY o Security hole
• Log-On Procedure
✓ first line of defense--user IDs and passwords OPERATING SYSTEMS CONTROLS
• Access Token Access Privileges
✓ contains key information about user • Audit objectives: verify that access privileges are
• Access Control List consistent with separation of incompatible
✓ defines access privileges of users functions and organization policies
• Discretionary Access Control / Privileges • Audit procedures: review or verify…
✓ allows User to grant access to another user ✓ policies for separating incompatible functions
✓ a sample of user privileges, especially access
OTHER GOOD SECURITY POLICIES to data and programs
• Formalized procedures for software ✓ security clearance checks of privileged
acquisition employees
• Security clearances of prospective employees ✓ formally acknowledgements to maintain
• Formal acknowledgment by users of their confidentiality of data
responsibilities to company ✓ users’ log-on times
• Security group to monitor security violations
• Formal policy for taking disciplinary action Password Control
against security violators • Audit objectives: ensure adequacy and
effectiveness password policies for controlling
THREATS TO OPERATING SYSTEM access to operating system
INTEGRITY • Audit procedures: review or verify…
• Privileged Personnel Abusing their ✓ passwords required for all users
Authority ✓ password instructions for new users
o Systems Administrators & programmers ✓ passwords changed regularly
must be given unlimited access to the OS to ✓ password file for weak passwords
perform maintenance. ✓ encryption of password file
• Browsing ✓ password standards
o looking through memory for sensitive ✓ account lockout policies
information (e.g., in printer queue)
• Masquerading Audit Trail Controls
o pretend to be authorized user by getting ID • Audit objectives: whether used to (1) detect
and passwords – shoulder surfing unauthorized access, (2) facilitate event
o The most common method to get your reconstruction, and (3) promote accountability
password is for someone to look over your • Audit procedures: review or verify…
shoulder! Make sure your password is a ✓ how long audit trails have been in place
By: Roxy <333
✓ archived log files for key indicators 2. SMURF & SYN ATTACK
✓ monitoring and reporting of security
violations
Malicious & Destructive Programs
• Audit objectives: verify effectiveness of
procedures to protect against programs such as
viruses, worms, back doors, logic bombs, and
Trojan horses (refer to list)
• Audit procedures: review or verify…
✓ training of operations personnel concerning
destructive programs
✓ testing of new software prior to being
implemented
✓ currency of antiviral software and frequency
of upgrades

INTERNET AND INTRANET RISKS


• Communications is a unique aspect of the
computer networks: SOURCES OF INTERNET & INTRANET
o different than processing (applications) or RISKS
data storage (databases)
• Network topologies – configurations of: Internal and external subversive activities
o communications lines (twisted-pair wires, Audit objectives:
coaxial cable, microwaves, fiber optics) ✓ prevent and detect illegal internal and Internet
o hardware components (modems, network access
multiplexers, servers, front-end ✓ render useless any data captured by a
processors) perpetrator
o software (protocols, network control ✓ preserve the integrity and physical security of
systems) data connected to the network
Equipment failure
INTERNET RISKS ✓ Audit objective: the integrity of the
1. DOS Attack electronic commerce transactions by
o In a DOS Attack, the sender sends hundreds determining that controls are in place to detect
of messages, receives the SYN/ACK packet, and correct message loss due to equipment
but does not response with an ACK packet. failure
This leaves the receiver with clogged IC for Subversive Threats
transmission ports, and legitimate messages Firewalls provide security by channeling all
cannot be received. network connections through a control gateway.
• Network level firewalls
o Low cost and low security access control
o Do not explicitly authenticate outside users
o Filter junk or improperly routed messages
o Experienced hackers can easily penetrate the
system
• Application level firewalls
o Customizable network security, but
expensive
o Sophisticated functions such as logging or
user authentication
• Denial-of-service (DOS) attacks

By: Roxy <333


o Security software searches for connections of systems, audit tools, and probing for
which have been half-open for a period of weaknesses.
time. • Review data encryption security procedures
• Encryption • Verify encryption by testing
o Computer program transforms a clear • Review message transaction logs
message into a coded (cipher) text form • Test procedures for preventing unauthorized
using an algorithm calls
✓ Private Encryption • IC for Equipment Failure
✓ Triple DES Encryption (EEE3 & EDE3) • Line errors are data errors from
✓ Public Key Encryption communications noise.
✓ RSA • Two techniques to detect and correct such data
✓ Digital Envelope = RSA + DES errors are:
✓ echo check - the receiver returns the
Standard Data Encryption Technique message to the sender
✓ parity checks - an extra bit is added onto
each byte of data similar to check digits

Auditing Procedures for Equipment Failure


• Using a sample of a sample of messages from
the transaction log:
✓ examine them for garbled contents caused
by line noise
✓ verify that all corrupted messages were
IC for Subversive Threats successfully retransmitted
• Digital signature – electronic authentication • Vertical and Horizontal Parity
technique to ensure that…
✓ transmitted message originated with the Electronic Data Interchange
authorized sender • Electronic data interchange (EDI) uses
✓ message was not tampered with after the computer-to-computer communications, standard
signature was applied format for messaging between two dissimilar
• Digital certificate – like an electronic systems. Exchange of computer-processible
identification card used with a public key business info in standard format.
encryption system • Audit objectives:
✓ Verifies the authenticity of the message ✓ Transactions are authorized, validated, and in
sender compliance with the trading partner
• Message sequence numbering – sequence agreement.
number used to detect missing messages ✓ No unauthorized organizations can gain
• Message transaction log – listing of all access to database
incoming and outgoing messages to detect the ✓ Authorized trading partners have access only
efforts of hackers to approved data.
• Request-response technique – random control ✓ Adequate controls are in place to ensure a
messages are sent from the sender to ensure complete audit trail.
messages are received Notes on EDI:
✓ Is an inter-organization endeavor.
• Call-back devices – receiver calls the sender
✓ IS of the trading partners process the
back at a pre-authorized phone number before
transactions.
transmission is completed
✓ Transactions are transmitted in standardized
format
Auditing Procedures for Subversive Threats
✓ Directly to trading partner.
• Review firewall effectiveness in terms of
flexibility, proxy services, filtering, segregation
By: Roxy <333
✓ Use of a third party value added network ✓ Review procedures for verifying trading
(VAN) partner identification codes
✓ Benefit ✓ Review agreements with VAN
✓ FINANCIAL EDI – uses intermediary such as ✓ Review trading partner files
banks (OBK,RBK & ACH). • Tests of Access Controls
✓ Converting remittance information to ✓ Verify limited access to vendor and
electronic form is a challenge. customer files
✓ Verify limited access of vendors to database
✓ Test EDI controls by simulation
EDI Risks
• Authorization - automated and absence of • Tests of Audit Trail Controls
human intervention ✓ Verify exists of transaction logs are key
• Access - need to access EDI partner’s files points
• Audit trail - paperless and transparent ✓ Review a sample of transactions
(automatic) transactions
EDI Controls
• Authorization - use of passwords and value
added networks (VAN) to ensure valid partner
• Access - software to specify what can be
accessed and at what level
• Audit trail - control log records the
transaction’s flow through each phase of the
transaction processing

AUDITING PC BASED ACCOUNTING


SYSTEMS
PC Risks & Controls
✓ Operating System Weaknesses
✓ Weak Access Control
✓ Inadequate Segregation of Duties
✓ Risk of Theft
✓ Weak Back up Procedures
✓ Risk of Virus Infection
✓ Audit Objective with PC Security
✓ Audit Procedures with PC Security

DATABASE MANAGEMENT CONTROLS


Two crucial database control issues:
1. Access controls
• Audit objectives: (1) those authorized to use
databases are limited to data needed to
perform their duties and (2) unauthorized
individuals are denied access to data
Auditing Procedures for EDI 2. Backup controls
• Tests of Authorization and Validation Controls
By: Roxy <333
• Audit objectives: backup controls can • Direct access file backup - back-up master-file
adequately recovery lost, destroyed, or at pre-determined intervals
corrupted data • Off-site storage - guard against disasters
and/or physical destruction
ACCESS CONTROLS • Audit procedures: verify…
• User views - based on subschemas. A ✓ that production databases are copied at
database schema (/ˈski.mə/ skee-ma) of a regular intervals
database system is its structure described in a ✓ backup copies of the database are stored off
formal language supported by the database site to support disaster recovery
management system (DBMS) and refers to the
organization of data as a blueprint of how a CHAPTER 4: AUDITING DATABASE
database is constructed (divided into database SYSTEMS
tables in case of Relational Databases).
• Database authorization table - allows specific WHAT IS A DATABASE
authority rules
• Data encryption - encoding algorithms ✓ A database is an organized collection of data.
• Biometric devices - fingerprints, retina prints, The data are typically organized to model
or signature characteristic relevant aspects of reality in a way that supports
• Audit procedures: verify… processes requiring this information. For
✓ Who has responsibility for authority tables example, modeling the availability of rooms in
& subschemas? hotels in a way that supports finding a hotel with
✓ Granting appropriate access authority vacancies.
✓ Are biometric controls used? ✓ Database management systems (DBMSs) are
✓ Encryption? specially designed applications that interact with
the user, other applications, and the database
Subschema Restricting Access itself to capture and analyze data. A general-
purpose database management system (DBMS)
is a software system designed to allow the
definition, creation, querying, update, and
administration of databases.
✓ DBMS responsible for maintaining the integrity
and security of stored data, and for recovering
information if the system fails.

EXAMPLES OF DBMS
✓ MySQL
✓ MariaDB
✓ PostgreSQL
BACKUP CONTROLS ✓ SQLite
• Database backup – automatic periodic copy of ✓ Microsoft SQL Server
data ✓ Oracle
• Transaction log – list of transactions which ✓ SAP
provides an audit trail ✓ Dbase
✓ FoxPro
• Checkpoint features – suspends data during
✓ IBM DB2
system reconciliation
✓ LibreOffice
• Recovery module – restarts system after a
✓ Base and FileMaker Pro
failure
• Grandparent-parent-child backup –the number
of generations to backup is up to company
policy
By: Roxy <333
Flat-File Versus Database Environments Data Redundancy and Flat-File Problems
• Computer processing involves two • Data Storage - creates excessive storage costs
components: data and instructions (programs). of paper documents and/or magnetic form
• Conceptually, there are two methods for • Data Updating - any changes or additions
designing the interface between program must be performed multiple times
instructions and data: • Currency of Information – has the potential
o File-oriented processing: A specific data file problem of failing to update all affected files
was created for each application. • Task-Data Dependency - user unable to obtain
o Data-oriented processing: Create a single additional information as his or her needs
data repository to support numerous change
applications.
• Disadvantages of file-oriented processing
include
o redundant data and programs
o varying formats for storing the redundant
data

Advantages of the Database Approach


o Data sharing/centralized database resolves
flat-file problems
o No data redundancy: Data is stored only
once, eliminating data redundancy and
reducing storage costs
• Users access data via computer programs that o Single update: Because data is in only one
process the data and present information to place, it requires only a single update,
the users. reducing the time and cost of keeping the
• Users own their data files. database current
o Current values: A change to the database
• Data redundancy results as multiple
made by any user yields current data values
applications maintain the same data elements.
for all other users.
• Files and data elements used in more than one
o Task-data independence: As users’
application must be duplicated, which results
information needs expand, the new needs
in data redundancy.
can be more easily satisfied than under the
• As a result of redundancy, the characteristics flat-file approach.
of data elements and their values are likely to Disadvantages of the Database Approach
be inconsistent. o Can be costly to implement - additional
• Outputs usually consist of preprogrammed hardware, software, storage, and network
reports instead of ad-hoc queries provided resources are required
upon request. This results in inaccessibility of o Can only run in certain operating
data. environments - may make it unsuitable for
• Changes to current file-oriented applications some system configurations
cannot be made easily, nor can new o Because it is so different from
developments be quickly realized, which the file-oriented approach, the database
results in inflexibility. approach requires training users - may be
inertia or resistance.
By: Roxy <333
Elements of the Database Environment retrieve, process, and store data to / from the
database
• Entire user programs may be written in the
DML, or selected DML commands can be
inserted into universal programs, such as
COBOL and FORTRAN
• Can be used to ‘patch’ third party applications
to the DBMS

Query Language
• The query capability permits end users and
professional programmers to access data in
Four Elements the database without the need for
1. Database management system conventional programs.
2. Users ✓ Can be an internal control issue since users
3. Database administrator may be making an ‘end run’ around the
4. Physical database controls built into the conventional programs
• IBM’s structured query language (SQL) is a
Internal Controls and DBMS fourth-generation language that has emerged as
• The database management system stands the standard query language.
between the user and the database per se. ✓ Adopted by ANSI as the standard language
• Thus, commercial DBMS’s (e.g., Access or for all relational databases
Oracle) actually consist of a database plus… Functions of the DBA
✓ software to manage the database, especially
controlling access and other internal controls
✓ software to generate reports, create data-
entry forms, etc.
• The DBMS has special software to control
which data elements each user is authorized to
access.

Data Definition Language (DDL)


• DDL is a programming language used to PHYSICAL DATABASE
define the database per se. • Lowest level of database and the only level that
✓ It identifies the names and the relationship exists in physical form
of all data elements, records, and files that • Logical collection of records and files that
constitute the database. constitute the firm’s data source.
• DDL defines the database on three viewing DATA STRUCTURE COMPONENTS
levels ✓ Data Organization – physical arrangement of
✓ Internal view – physical arrangement of files
records (1 view) ✓ Data Access Methods – technique to locate
✓ Conceptual view (schema) – representation records
of database (1 view) SIX CRITERIA INFLUENCING THE
✓ User view (subschema) – the portion of the SELECTION OF DATA STRUCTURE
database each user views (many views)
Database Conceptual Models
Data Manipulation Language (DML) • Refers to the particular method used to
• DML is the proprietary programming organize records in a database. a.k.a. “logical
language that a particular DBMS uses to data structures”

By: Roxy <333


• Objective: develop the database efficiently so • Linkages are established through logical
that data can be accessed quickly and easily operations of the DMBS rather than explicit
• There are three main models: addresses that are structured into the database.
✓ hierarchical (tree structure)
✓ network
✓ relational
• Most existing databases are relational. Some
legacy systems use hierarchical or network
databases.

HIERARCHICAL MODEL
• Navigational Database – traversing the files
following a predefined path; explicit linkages
through networks. (Figure 4.10)
• Limitations1: A parent record may have one or
more child records
• Limitation2: No child can have more than one Distributed Data Processing (DDP)
parent. • Data processing is organized around several
information processing units (IPUs) distributed
throughout the organization.
• Each IPU is placed under the control of the end
user
• DDP does not always mean total
decentralization.
• IPUs in a DDP system are still connected to one
another and coordinated.
• Typically, DDP’s use a centralized database.
• Alternatively, the database can be distributed,
similar to the distribution of the data processing
capability.
NETWORK MODEL
Centralized Databases in DDP Environment
• ANSI thru CODASYL
• The data is retained in a central location.
• Most popular model of network is IDM
• Remote IPUs send requests for data
• Navigational thru multiple linkage
• Central site services the needs of the remote
• A child can have multiple parents
IPUs
RELATIONAL MODEL • The actual processing of the data is performed
at the remote IPU.
• The relational model portrays data in the form
of two dimensional ‘tables’. • Advantages of DDP
✓ Cost reductions in hardware and data entry
• Its strength is the ease with which tables may
task
be linked to one another.
✓ Improved cost control responsibility
• a major weakness of hierarchical and network
✓ Improved user satisfaction since control is
databases
closer to the user level
• Relational model is based on the relational ✓ Backup of data can be improved through the
algebra functions of restrict, project, and join. use of multiple data storage sites
• Implicit linkages, rows are dependent on the • Disadvantages of DDP
primary key and independent of the other ✓ Loss of control
attributes ✓ Mismanagement of resources
✓ Hardware and software incompatibility
By: Roxy <333
✓ Redundant tasks and data • Effective for situations with a high degree of data
✓ Consolidating incompatible tasks sharing, but no primary user. Supports read-only
✓ Difficulty attracting qualified personnel queries
✓ Lack of standards • Data traffic between sites is reduced
considerably.
Distributed Databases: Partitioned Database
Approach (Partitioning) CONCURRENCY CONTROL: Concurrency
• Splits the central database into segments that Problems and Control Issue
are distributed to their primary users. • Database concurrency is the presence of
• Advantages: complete and accurate data at all IPU sites.
✓ users’ control is increased by having data • With replicated databases, maintaining current
stored at local sites. data at all locations is difficult
✓ transaction processing response time is • Time stamping is used to serialize transactions.
improved. Prevents and resolves conflicts created by
✓ volume of transmitted data between IPUs is updating data at various IPUs
reduced. Distributed Databases and the Accountant
✓ reduces the potential data loss from a • The following database options impact the
disaster. organization’s ability to maintain database
integrity, to preserve audit trails, and to have
The Deadlock Phenomenon accurate accounting records.
• Especially a problem with partitioned databases ✓ Centralized or distributed data?
• Occurs when multiple sites lock each other out ✓ If distributed, replicated or partitioned?
of data that they are currently using. ✓ If replicated, total or partial replication?
✓ One site needs data locked by another site. ✓ If partitioned, what is the allocation of the
• Special software is needed to analyze and data segments among the sites?
resolve conflicts.
✓ Transactions may be terminated and restarted. DATABASE MANAGEMENT CONTROLS
Two crucial database control issues:
The Deadlock Condition 1. Access controls
• Audit objectives: (1) those authorized to use
databases are limited to data needed to
perform their duties and (2) unauthorized
individuals are denied access to data
2. Backup controls
• Audit objectives: backup controls can
adequately recovery lost, destroyed, or
corrupted data
✓ Mutual exclusion to data resource and the
transactions are in wait until the locks are ACCESS CONTROLS
removed. • User views - based on subschemas.
✓ DEADLOCK RESOLUTION - terminating on • A database schema (/ˈski.mə/ skee-ma) of a
or more transactions to complete processing of database system is its structure described in a
the other transactions in the deadlock. formal language supported by the database
management system (DBMS) and refers to the
Distributed Databases: Replication organization of data as a blueprint of how a
• Effective when there is high degree of sharing database is constructed (divided into database
but no primary user tables in case of Relational Databases).
• The duplication of the entire database for • Database authorization table - allows specific
multiple IPUs authority rules
• Data encryption - encoding algorithms
By: Roxy <333
• Biometric devices - fingerprints, retina prints,
or signature characteristics
• Inference Controls – prevent users from
inferring, through query features, specific data
values that should not be accessed.
• Positive Compromise, Negative Compromise
& Approximate Compromise
• Audit procedures: verify…
✓ Who has responsibility for authority tables
& subschemas?
✓ Granting appropriate access authority
✓ Are biometric controls used?
✓ Are inference controls used?
✓ Encryption?

BACKUP CONTROLS
• Database backup – automatic periodic copy of
data
• Transaction log – list of transactions which
provides an audit trail
• Checkpoint features – suspends data during
system reconciliation
• Recovery module – restarts system after a
failure
• Grandparent-parent-child backup –the number
of generations to backup is up to company
policy
• Direct access file backup - back-up master-file
at pre-determined intervals
• Off-site storage - guard against disasters
and/or physical destruction
• Audit procedures: verify…
✓ that production databases are copied or
backed up at regular intervals
✓ Verify automatic back up
✓ backup copies of the database are stored off
site to support disaster recovery
By: Roxy <333

You might also like