You are on page 1of 19

Chapter 1: Auditing and Internal Control and internal control assessments for compliance

with SOX
External audit - an independent attestation
performed by an expert—the auditor— who Internal auditing - an independent appraisal
expresses an opinion regarding the presentation function established within an organization to
of financial statement. examine and evaluate its activities as a service
to the organization.
- Also known as attest service which is
performed by Certified Public Internal auditors perform a wide range of
Accountants (CPAs) who work for public activities on behalf of the organization,
accounting firms that are independent including:
of the client organization being audited.
• Conducting financial audits
• Examining an operation’s compliance
- Key concept in this process is
with organizational policies
independence. The judge must remain
• Reviewing the organization’s
independent in his or her deliberations.
compliance with legal obligations
The rules in conducting financial audits to be • Evaluating operational efficiency
followed by an auditor have been defined by • Detecting and pursuing fraud within the
the following: firm.
• SEC Internal auditors are often certified as a
• Financial Accounting Standards Board Certified Internal Auditor (CIA) or a Certified
(FASB) Information Systems Auditor (CISA).
• American Institute of CPA (AICPA), and
While external auditors represent outsiders,
• By Federal law: Sarbanes– Oxley [SOX]
internal auditors represent the interests of the
Act of 2002
organization.
Attest service - defined as an engagement in
Fraud audits have, unfortunately, increased in
which a practitioner is engaged to issue, or does
popularity as a corporate governance tool. The
issue, a written communication that expresses a
objective of a fraud audit is to investigate
conclusion about the reliability of a written
anomalies and gather evidence of fraud that
assertion that is the responsibility of another
may lead to criminal conviction.
party.
Audit Committee - the board of directors of
Advisory services - professional services offered
publicly traded companies that form a
by public accounting firms to improve their
subcommittee which has special responsibilities
client organizations’ operational efficiency and
regarding audits. This committee usually
effectiveness. The domain of advisory services is
consists of three people who should be
intentionally unbounded so that it does not
outsiders and at least one member must be a
inhibit the growth of future services that are
“financial expert.”
currently unforeseen.
The product of the attestation function is a
Advisory services include actuarial advice,
formal written report that expresses an opinion
business advice, fraud investigation services,
about the reliability of the assertions contained
information system design and implementation,
in the financial statements as to whether these
are in conformity with GAAP.
Auditing standards are divided into three Conducting an audit is a systematic and logical
classes: process that applies to all forms of information
systems.
General qualification standards
The task of the auditor is to determine whether
1. The auditor must have adequate
the financial statements are fairly presented.
technical training and proficiency.
To accomplish this goal, the auditor establishes
2. The auditor must have independence of
audit objectives, designs procedures, and
mental attitude.
gathers evidence that corroborate or refute
3. The auditor must exercise due
management’s assertions.
professional care in the performance of
the audit and the preparation of the These assertions fall into five general categories:
report
1. The existence or occurrence assertion affirms
Field work standards that all assets and equities contained in the
balance sheet exist and that all transactions in
1. Audit work must be adequately
the income statement occurred.
planned.
2. The auditor must gain a sufficient 2. The completeness assertion declares that no
understanding of the internal control material assets, equities, or transactions have
structure. been omitted from the financial statements.
3. The auditor must obtain sufficient,
3. The rights and obligations assertion maintain
competent evidence.
that assets appearing on the balance sheet are
Reporting Standards owned by the entity and that the liabilities
reported are obligations.
1. The auditor must state in the report
whether financial statements were 4. The valuation or allocation assertion states
prepared in accordance with generally that assets and equities are valued in
accepted accounting principles. accordance with GAAP and that allocated
2. The report must identify those amounts such as depreciation expense are
circumstances in which generally calculated on a systematic and rational basis.
accepted accounting principles were not
5. The presentation and disclosure assertion
applied.
alleges that financial statement items are
3. The report must identify any items that
correctly classified (e.g., long-term liabilities will
do not have adequate informative
not mature within one year) and that footnote
disclosures.
disclosures are adequate to avoid misleading
4. The report shall contain an expression of
the users of financial statements.
the auditor’s opinion on the financial
statements as a whole. Evidence is collected by performing tests of
controls, which establish whether internal
Statements on Auditing Standards are regarded
controls are functioning properly, and
as authoritative pronouncements because every
substantive tests, which determine whether
member of the profession must follow their
accounting databases fairly reflect the
recommendations or be able to show why a SAS
organization’s transactions and account
does not apply in a given situation.
balances.
Audit opinion – included in an audit report 2. Tests of Controls - The objective of the tests
among other things. This opinion is distributed of controls phase is to determine whether
along with the financial report to interested adequate internal controls are in place and
parties both internal and external to the functioning properly. To accomplish this, the
organization. auditor performs various tests of controls.

Audit risk - the probability that the auditor will 3. Substantive Testing - The third phase of the
render an unqualified (clean) opinion on audit process focuses on financial data. This
financial statements that are, in fact, materially phase involves a detailed investigation of
misstated. Material misstatements may be specific account balances and transactions
caused by errors or irregularities or both. through what are called substantive tests.
Acceptable audit risk (AR) is estimated based
Organization management is required by law to
on the ex ante value of the components of the
establish and maintain an adequate system of
audit risk model.
internal control.
Inherent risk - associated with the unique
BRIEF HISTORY OF INTERNAL CONTROL
characteristics of the business or industry of the
LEGISLATION
client. Firms in declining industries have greater
inherent risk than firms in stable or thriving The first was the Securities Act of 1933, which
industries. had two main objectives: (1) require that
investors receive financial and other significant
Control risk - the likelihood that the control
information concerning securities being offered
structure is flawed because controls are either
for public sale; and (2) prohibit deceit,
absent or inadequate to prevent or detect
misrepresentations, and other fraud in the sale
errors in the accounts.
of securities. The second act, the Securities
Detection risk - the risk that auditors are willing Exchange Act, 1934, created the Securities and
to take that errors not detected or prevented by Exchange Commission (SEC) and empowered it
the control structure will also not be detected with broad authority over all aspects of the
by the auditor. securities industry, which included authority
regarding auditing standards.
Tests of controls and substantive tests are
auditing techniques used for reducing audit risk Copyright Law—1976 - This law, which has had
to an acceptable level. The stronger the internal multiple revisions, added software and other
control structure, as determined through tests of intellectual properties into the existing
controls, the lower the control risk and the less copyright protection laws.
substantive testing the auditor must do.
Foreign Corrupt Practices Act (FCPA) of 1977 -
THE STRUCTURE OF AN IT AUDIT: Among its provisions, the FCPA requires
companies registered with the SEC to do the
1. Audit Planning - The first step in the IT audit
following:
is audit planning. Before the auditor can
determine the nature and extent of the tests to 1. Keep records that fairly and reasonably
perform, he or she must gain a thorough reflect the transactions of the firm and its
understanding of the client’s business. A major financial position.
part of this phase of the audit is the analysis of
audit risk.
2. Maintain a system of internal control that (4) changing conditions—conditions may
provides reasonable assurance that the change over time so that existing effective
organization’s objectives are met controls may become ineffectual.

Sarbanes–Oxley Act of 2002 - As a result of


The internal control system should provide
several large financial frauds and the resulting
reasonable assurance that the four broad
losses suffered by stockholders, pressure was
objectives of internal control are met. This
brought by the U.S. Congress to protect the
reasonableness means that the cost of achieving
public from such events. This led to the passage
improved control should not outweigh its
of the Sarbanes–Oxley Act (SOX) on July 30,
benefits.
2002. In general, the law supports efforts to
increase public confidence in capital markets by
THE PDC MODEL
seeking to improve corporate governance,
internal controls, and audit quality.
Preventive controls are passive techniques
INTERNAL CONTROL OBJECTIVES, PRINCIPLES, designed to reduce the frequency of occurrence
AND MODELS of undesirable events. Preventive controls force
compliance with prescribed or desired actions
An organization’s internal control system and thus screen out aberrant events. Prevention
comprises policies, practices, and procedures to is the first line of defense in the control
achieve four broad objectives: structure
1. To safeguard assets of the firm.
2. To ensure the accuracy and reliability of Detective controls are devices, techniques, and
accounting records and information. procedures designed to identify and expose
3. To promote efficiency in the firm’s operations. undesirable events that elude preventive
4. To measure compliance with management’s controls. Detective controls reveal specific types
prescribed policies and procedures of errors by comparing actual occurrences to
preestablished standards. Detection of
Management Responsibility - This concept problems is the second line of defense in the
holds that the establishment and maintenance control structure
of a system of internal control is a management
responsibility. Corrective Controls Corrective actions must be
taken to reverse the effects of detected errors.
Limitations - Every system of internal control There is an important distinction between
has limitations on its effectiveness. These detective controls and corrective controls.
include the following: Detective controls identify undesirable events
(1) the possibility of error — no system is and draw attention to the problem; corrective
perfect, controls actually fix the problem. For any
(2) circumvention —personnel may circumvent detected error, there may be more than one
the system through collusion or other means, feasible corrective action, but the best course of
(3) management override — management is in action may not always be obvious.
a position to override control procedures by
personally distorting transactions or by directing COSO INTERNAL CONTROL FRAMEWORK
a subordinate to do so, and - COSO meaning → Committee of Sponsoring
Organizations
assessed. This may be accomplished by separate
procedures or by ongoing activities.

5. Control activities - are the policies and


Five Components of COSO Framework: procedures used to ensure that appropriate
actions are taken to deal with the organization’s
1. Control Environment - the foundation for the identified risks. Control activities can be
other four control components. The control grouped into two distinct categories: physical
environment sets the tone for the organization controls and information technology (IT)
and influences the control awareness of its controls.
management and employees.
a. Physical Controls - This class of controls
SAS 109 requires that auditors obtain sufficient relates primarily to the human activities
knowledge to assess the attitude and awareness employed in accounting systems. These
of the organization’s management, board of activities may be purely manual, such as the
directors, and owners regarding internal control physical custody of assets, or they may involve
the physical use of computers to record
2. Risk Assessment - Organizations must transactions or update accounts. Physical
perform a risk assessment to identify, analyze, controls do not relate to the computer logic that
and manage risks relevant to financial performs accounting tasks. Rather, they relate
reporting. Risks can arise or change from to the human activities that trigger and utilize
circumstances such as: Changes in the operating the results of those tasks.
environment that impose new or changed
competitive pressures on the firm, new Six Categories of Physical Control Activities
personnel who have a different or inadequate • Transaction Authorization - The
understanding of internal control, etc. purpose of transaction authorization is
to ensure that all material transactions
3. Information and Communication - The processed by the information system
accounting information system consists of the are valid and in accordance with
records and methods used to initiate, identify, management’s objectives.
analyze, classify, and record the organization’s • Segregation of Duties - One of the most
transactions and to account for the related important control activities is the
assets and liabilities. The quality of information segregation of employee duties to
that the accounting information system minimize incompatible functions.
generates impacts management’s ability to take Segregation of duties can take many
actions and make decisions in connection with forms, depending on the specific duties
the organization’s operations and to prepare to be controlled.
reliable financial statements. • Supervision - Implementing adequate
segregation of duties requires that a
4. Monitoring – Management must determine firm employ a sufficiently large number
that internal controls are functioning as of employees. Achieving adequate
intended. It is the process by which the quality segregation of duties often presents
of internal control design and operation can be difficulties for small organizations.
• Accounting Records - The accounting names in other frameworks, including
records of an organization consist of general computer controls and
source documents, journals, and information technology controls.
ledgers. These records capture the
economic essence of transactions and Chapter 2: Auditing IT Governance Controls
provide an audit trail of economic
Information technology (IT) governance - is a
events. The audit trail enables the
relatively new subset of corporate governance
auditor to trace any transaction through
that focuses on the management and
all phases of its processing from the
assessment of strategic IT resources. The key
initiation of the event to the financial
objectives of IT governance are to reduce risk
statements.
and ensure that investments in IT resources add
• Access Control - The purpose of access
value to the corporation.
controls is to ensure that only
authorized personnel have access to the Three IT governance issues that are addressed
firm’s assets. Unauthorized access by SOX and the COSO internal control
exposes assets to misappropriation, framework:
damage, and theft. Therefore, access
controls play an important role in 1. Organizational structure of the IT function
safeguarding assets. 2. Computer center operations
• Independent Verification - Verification 3. Disaster recovery planning
procedures are independent checks of
the accounting system to identify errors STRUCTURE OF THE CORPORATE IT FUNCTION
and misrepresentations. Verification
differs from supervision because it takes I. Centralized Data Processing Model - all data
place after the fact, by an individual processing is performed by one or more large
who is not directly involved with the computers housed at a central site that serves
transaction or task being verified. users throughout the organization.

b. IT Controls - Information technology drives


the financial reporting processes of modern
organizations. Automated systems initiate,
authorize, record, and report the effects of
financial transactions. As such, they are
inextricable elements of the financial reporting
processes considered by SOX and need to be
controlled. COSO identifies two broad groupings
of IT controls:
• Application controls - ensure the
validity, completeness, and accuracy of a. Database Administration – Centrally
financial transactions. These controls organized companies maintain their data
are designed to be application specific. resources in a central location that is shared by
• General controls - they are not all end users.
application-specific but, rather, apply to
all systems. General controls have other
b. Data Processing - manages the computer 2. End users - are those for whom the system is
resources used to perform the day-to-day built. They are the managers who receive
processing of transactions. It consists of the reports from the system and the operations
following organizational functions: data personnel who work directly with the system as
control/data entry, computer operations, and part of their daily responsibilities.
the data library.
3. Stakeholders - are individuals inside or
• Data Control/Data Entry - The data outside the firm who have an interest in the
control/data entry function receives system but are not end users. They include
hard copy source documents from end accountants, internal auditors, external
users and transcribes these into digital auditors, and others who oversee systems
format for computer processing in development.
batch systems.
Maintenance - refers to making changes to
• Computer Operations - The electronic
program logic to accommodate shifts in user
files produced in data conversion are
needs over time
later processed by the central
computer, which is managed by the SEGREGATION OF INCOMPATIBLE IT FUNCTIONS
computer operations groups.
Operational tasks should be segregated to:
• Data Library - The data library is a room
adjacent to the computer center that
1. Separate transaction authorization from
provides safe storage for the off-line
transaction processing.
data files. Those files could be backups
2. Separate record keeping from asset custody.
or current data files. For instance, the
3. Divide transaction-processing tasks among
data library could be used to store
individuals such that short of collusion between
backup data on DVDs, CD-ROMs, tapes,
two or more individuals fraud would not be
or other storage devices.
possible.

(Data librarian -responsible for the


A. Separating Systems Development from
receipt, storage, retrieval, and custody
Computer Operations
of data files, controls access to the
library.)
The segregation of systems development and
c. Systems Development and Maintenance - operations activities is of the greatest
The information systems needs of users are met importance. The relationship between these
by two related functions: system development groups should be extremely formal, and their
and systems maintenance. The former group is responsibilities should not be commingled.
responsible for analyzing user needs and for Systems development and maintenance
designing new systems to satisfy those needs. professionals should create (and maintain)
systems for users, and should have no
Participants in System development activities involvement in entering data, or running
include the ff: applications (i.e., computer operations).
1. Systems professionals - include systems Operations staff should run these systems and
analysts, database designers, and programmers have no involvement in their design.
who design and build the system.
B. Separating Database Administration from Program fraud involves making
Other Functions unauthorized changes to program
modules for the purpose of committing
Another important organizational control is the an illegal act.
segregation of the DBA from other computer
The new systems development group is
center functions. The DBA function is
responsible for designing, programming, and
responsible for a number of critical tasks
implementing new systems projects. Upon
pertaining to database security, including
successful implementation, responsibility for
creating the database schema and user views,
the system’s ongoing maintenance falls to the
assigning database access authority to users,
systems maintenance group.
monitoring database usage, and planning for
future expansion. Delegating these II. Distributed Model - An alternative to the
responsibilities to others who perform centralized model is the concept of distributed
incompatible tasks threatens database integrity. data processing (DDP). Simply stated, DDP
involves reorganizing the central IT function into
small IT units that are placed under the control
C. Separating New Systems Development from
of end users. The IT units may be distributed
Maintenance
according to business function, geographic
Some companies organize their in-house location, or both.
systems development function into two groups:
Risks Associated with DDP Advantages of DDP
(1) systems analysis and (2) programming. The
Inefficient Use of Cost Reductions
systems analysis group works with the users to
Resources
produce detailed designs of the new systems.
Destruction of Audit Trails Improved Cost Control
The programming group codes the programs Responsibility
according to these design specifications. Inadequate Segregation of Improved User Satisfaction
This approach is associated with two types of Duties
control problems: Hiring Qualified Backup Flexibility
Professionals
• Inadequate documentation - Poor-
quality systems documentation is a Lack of Standards
chronic IT problem and a significant
challenge for many organizations
seeking SOX compliance. There are at Note: An audit trail provides the linkage
least two explanations for this between a company’s financial activities
phenomenon. First, documenting (transactions) and the financial statements that
systems is not as interesting as report on those activities.
designing, testing, and implementing
them. The second possible reason for Controlling the DDP Environment:
poor documentation is job security.
A. IMPLEMENT A CORPORATE IT FUNCTION
• Program fraud (Potential) - When the
original programmer of a system is also The completely centralized model and the
assigned maintenance responsibility, distributed model represent extreme positions
the potential for fraud is increased. on a continuum of structural alternatives. The
needs of most firms fall somewhere between is often a requirement of the vendor’s
these end points warranty.
• Central Testing of Commercial Software
and Hardware • Fire Suppression → Fire is the most
• User Services serious threat to a firm’s computer
• Standard-Setting Body equipment. Many companies that suffer
• Personnel Review computer center fires go out of business
because of the loss of critical records,
Audit Objective - The auditor’s objective is to such as accounts receivable.
verify that the structure of the IT function is
such that individuals in incompatible areas are • Fault Tolerance → is the ability of the
segregated in accordance with the level of system to continue operation when part
potential risk and in a manner that promotes a of the system fails because of hardware
working environment. failure, application program error, or
operator error.
Audit Procedures – examples include: review
relevant documentation and review the current (ex. Redundant arrays of independent
organizational chart etc. disks – RAID involves using parallel disks
that contain redundant elements of
B. THE COMPUTER CENTER data and applications; Uninterruptible
Accountants routinely examine the physical power supplies - Commercially
environment of the computer center as part of provided electrical power presents
their annual audit. several problems that can disrupt the
computer center operations, including
• Physical Location → directly affects the total power failures, brownouts, power
risk of destruction to a natural or man- fluctuations, and frequency variations.)
made disaster. (ex. processing plants,
gas and water mains, airports, high- • Audit Objectives → evaluate the
crime areas, flood plains, and geological controls governing computer center
faults) security.

• Construction → should be located in a • Audit Procedures → The following are


single-story building of solid tests of physical security controls:
construction with controlled access
a. Tests of Physical Construction
• Access → should be limited to the b. Tests of the Fire Detection System
operators and other employees who c. Tests of Access Control
work there. Physical controls, such as d. Tests of RAID
locked doors, should be employed to e. Tests of the Uninterruptible Power
limit access to the center. Supply
f. Tests for Insurance Coverage
• Air Conditioning → Computers function
best in an air-conditioned environment,
and providing adequate air-conditioning
C. DISASTER RECOVERY PLANNING provides duplicate data processing
facilities following a disaster.
Disasters such as earthquakes, floods, sabotage,
and even power failures can be catastrophic to • Mutual Aid Pact - A mutual aid pact is
an organization’s computer center and an agreement between two or more
information systems. organizations to aid each other with
their data processing needs in the event
• Natural disaster - such as hurricanes, of a disaster.
widespread flooding, and earthquakes • Empty Shell - The empty shell or cold
are the most potentially devastating of site plan is an arrangement wherein the
the three from a societal perspective company buys or leases a building that
because they can simultaneously impact will serve as a data center. In the event
many organizations within the affected of a disaster, the shell is available and
geographic area. ready to receive whatever hardware the
temporary user needs to run essential
• Man-made disasters - such as sabotage systems.
or errors, can be just as destructive to • Recovery Operations Center - A
an individual organization, but tend to recovery operations center (ROC) or hot
be limited in their scope of impact. site is a fully equipped backup data
center that many companies share. In
• System failures - such as power outages addition to hardware and backup
or a hard drive failure are generally less facilities, ROC service providers offer a
severe but are the most likely to occur. range of technical services to their
clients, who pay an annual fee for
The more dependent an organization is access rights.
on technology, the more susceptible it is to • Internally Provided Backup - Larger
these types of risks. organizations with multiple data
processing centers often prefer the self-
Companies develop recovery procedures and reliance that creating internal excess
formalize them into a disaster recovery plan capacity provides.
(DRP). All workable plans possess four common
features: 4. Specify backup and off-site storage
procedures - All data files, applications,
1. Identify critical applications - Recovery documentation, and supplies needed to
efforts must concentrate on restoring perform critical functions should be
those applications that are critical to the automatically backed up and stored at a
short-term survival of the organization secure off-site location.
2. Create a disaster recovery team - The
team members should be experts in • Operating System Backup - procedures
their areas and have assigned tasks. for obtaining a current version of the
Following a disaster, team members will operating system need to be clearly
delegate subtasks to their subordinates. specified
3. Provide (second) site backup - A
necessary ingredient in a DRP is that it
• Application Backup - purchasing backup Specific IT assets, in contrast, are unique to the
copies of the latest software upgrades organization and support its strategic objectives.
used by the organization Examples of specific assets include systems
• Backup Data Files - remote mirrored development, application maintenance, data
site, which provides complete data warehousing, and highly skilled employees
currency; reconstruction of the trained to use organization-specific software.
database is achieved by updating the
most current backed-up version with Transaction Cost Economics (TCE) theory - is in
subsequent transaction data conflict with the core competency school by
• Backup Documentation - backed up and suggesting that firms should retain certain
stored off-site along with the specific non-core IT assets in-house.
applications
• Backup Supplies and Source Cloud Computing - a variant of IT outsourcing; is
Documents - should create backup location-independent computing whereby
inventories of supplies and source shared data centers deliver hosted IT services
documents used in processing critical over the Internet. It is a model for enabling
transactions convenient, on-demand network access to a
• Testing the DRP - The most neglected shared pool of configurable computing
aspect of contingency planning is resources that can be rapidly provisioned and
testing the DRP. Nevertheless, DRP tests released with minimal management effort or
are important and should be performed service provider interaction.
periodically. Tests measure the
preparedness of personnel and identify Offers three primary classes of computing
omissions or bottlenecks in the plan. services:

OUTSOURCING THE IT FUNCTION 1. Software-as-a-Service (SaaS) is a


software distribution model in which
IT outsourcing include improved core business service providers host applications for
performance, improved IT performance client organizations over a private
(because of the vendor’s expertise), and network or the Internet.
reduced IT costs. 2. Infrastructure-as-a-Service (IaaS) is the
provision of computing power and disk
Core Competency Theory - argues that an space to client firms who access it from
organization should focus exclusively on its core desktop PCs.
business competencies, while allowing 3. Platform-as-a-Service (PaaS) enables
outsourcing vendors to efficiently manage the client firms to develop and deploy onto
non-core areas such as the IT functions. the cloud infrastructure consumer-
generated applications using facilities
Commodity IT assets - are not unique to a provided by the PaaS vendor.
particular organization and are thus easily
acquired in the marketplace. These include such Virtualization - The technology that has
things as network management, systems unleashed cloud computing. Virtualization
operations, server maintenance, and help-desk multiplies the effectiveness of the physical
functions. system by creating virtual (software) versions of
the computer with separate operating systems organization reporting the service
that reside in the same physical equipment. In provider’s description of its system will
other words, virtualization is the concept of include the services performed by the
running more than one “virtual computer” on subservice organization.
a single physical computer.
Chapter 3: Security Part I – Auditing
Network virtualization - increases effective Operating Systems and Networks
network bandwidth by dividing it into
independent channels, which are then assigned Operating system - is the computer’s control
to separate virtual computers. Network program. It allows users and their applications
virtualization optimizes network speed, to share and access common computer
flexibility, and reliability; most importantly, it resources, such as processors, main memory,
improves network scalability. databases, and printers.
The language translator modules of the
Storage virtualization - is the pooling of physical operating system are called compilers and
storage from multiple network storage devices interpreters.
into what appears to be a single virtual storage
device. The operating system performs three main
tasks:
Risks Inherent to IT Outsourcing:
• Failure to Perform 1. It translates high-level languages, such as
• Vendor Exploitation Java, C++, BASIC, and SQL, into the machine-
level language that the computer can execute.
• Outsourcing Costs Exceed Benefits
2. The operating system allocates computer
• Reduced Security
resources to users, workgroups, and
• Loss of Strategic Advantage
applications.
3. The operating system manages the tasks of
SSAE 16 Report Contents - The SSAE 16 attest
job scheduling and multiprogramming.
report provides a description of the service
provider’s system including details of how
Jobs are submitted to the system in three ways:
transactions are processed and results are
communicated to their client organizations
• directly by the system operator,
• from various batch job queues, and
The SSAE 16 standard was designed to address
the subservice organization issue. Two • through telecommunications links from
reporting techniques are outlined next. remote workstations.

a. Carve-out Method. When using the The operating system must achieve five
carve-out method, service provider fundamental control objectives:
management would exclude the
subservice organization’s relevant 1. The operating system must protect itself from
control objectives and related controls users.
from the description of its system. 2. The operating system must protect users
b. Inclusive Method. When using the from each other.
inclusive method of subservice
3. The operating system must protect users Threats to Operating System Integrity
from themselves.
4. The operating system must be protected from Operating system control objectives may not be
itself. achieved because of flaws in the operating
5. The operating system must be protected from system that are exploited either accidentally or
its environment. intentionally.

Operating system security - involves policies, Accidental threats include hardware failures
procedures, and controls that determine who that cause the operating system to crash.
can access the operating system, which
resources (files, programs, printers, etc.) they Intentional threats to the operating system are
can use, and what actions they can take. most commonly attempts to illegally access data
or violate user privacy for financial gain.
The following security components are found in
secure operating systems: Exposure Sources:

• Log-On Procedure - A formal log-on 1. Privileged personnel who abuse their


procedure is the operating system’s first authority.
line of defense against unauthorized
access. When the user initiates the 2. Individuals, both internal and external to the
process, he or she is presented with a organization, who browse the operating system
dialog box requesting the user’s ID and to identify and exploit security flaws.
password.
3. Individuals who intentionally (or accidentally)
• Access Token - If the log-on attempt is insert computer viruses or other forms of
successful, the operating system creates destructive programs into the operating system.
an access token that contains key
information about the user, including If operating system integrity is compromised,
user ID, password, user group, and controls within individual accounting
privileges granted to the user. applications that impact financial reporting may
also be compromised.
• Access control list - assigned to each IT
resource (computer directory, data file, Controlling Access Privileges
program, or printer), which controls - User access privileges are assigned to
access to the resources. These lists individuals and to entire workgroups authorized
contain information that defines the to use the system. Privileges determine which
access privileges for all valid users of the directories, files, applications, and other
resource. resources an individual or group may access.
They also determine the types of actions that
• Discretionary Access Privileges - The can be taken.
central system administrator usually
determines who is granted access to The auditor’s objective is to verify that access
specific resources and maintains the privileges are granted in a manner that is
access control list. consistent.
Audit Procedures Relating to Access Privileges that generates, and electronically displays, a
• Review the organization’s policies new and unique password every 60 seconds.
• Review the privileges of a selection of
user groups and individuals The auditor’s objective here is to ensure that
• The auditor should verify that the organization has an adequate and effective
individuals are granted access to data password policy for controlling access to the
and programs based on their need to operating system.
know
• Review personnel and employee Audit Procedures Relating to Passwords
records. • Verify that all users are required to have
passwords.
Password Control - A password is a secret code • Verify that new users are instructed in
the user enters to gain access to systems, the use of passwords and the
applications, data files, or a network server. importance of password control.
• Review password control procedures to
The most common forms of contra-security ensure that passwords are changed
behavior include: regularly

• Forgetting passwords and being locked out of Controlling Against Malicious and Destructive
the system. Programs Malicious and destructive programs
• Failing to change passwords on a frequent are responsible for millions of dollars of
basis. corporate losses annually. This class of programs
• The post-it syndrome, whereby passwords are includes viruses, worms, logic bombs, back
written down and displayed for others to see. doors, and Trojan horses.
• Simplistic passwords that a computer criminal
easily anticipates Threats from destructive programs can be
substantially reduced through a combination of
Reusable Passwords - The most common technology controls and administrative
method of password control is the reusable procedures.
password. The user defines the password to the
system once and then reuses it to gain future Destructive Programs - The key to computer
access. The quality of the security that a virus control is prevention through strict
reusable password provides depends on the adherence to organizational policies and
quality of the password itself. procedures that guard against virus infection.

One-Time Passwords - An alternative to the System Audit Trail Controls - System audit trails
standard reusable password is the one-time are logs that record activity at the system,
password (OTP). It was designed to overcome application, and user level. Operating systems
the aforementioned problems. Under this allow management to select the level of
approach, the user’s password changes auditing to be recorded in the log.
continuously. This technology employs a credit
card-sized smart card that contains a a. Keystroke monitoring involves recording both
microprocessor programmed with an algorithm the user’s keystrokes and the system’s
responses. This form of log may be used after
the fact to reconstruct the details of an event or include e-mail routing, transaction processing
as a real-time control to prevent unauthorized between business units, and linking to the
intrusion. outside Internet.

b. Event monitoring - summarizes key activities • Interception of Network Messages -


related to system resources. Event logs typically The individual nodes on most intranets
record the IDs of all users accessing the system; are connected to a shared channel
the time and duration of a user’s session; across which travel user IDs, passwords,
programs that were executed during a session; confidential e-mails, and financial data
and the files, databases, printers, and other files. The unauthorized interception of
resources accessed. this information by a node on the
network is called sniffing.
Audit trails can be used to support security • Access to Corporate Databases -
objectives in three ways: Intranets connected to central
• Detecting unauthorized access - protect corporate databases increase the risk
the system from outsiders attempting to that an employee will view, corrupt,
breach system controls; report changes change, or copy data.
in system performance that may • Privileged Employees - an
indicate infestation by a virus or worm organization’s internal controls are
• Reconstructing Events - Audit trail typically aimed at lower-level
analysis can be used to reconstruct the employees. However, middle managers,
steps that led to events such as system who often possess access privileges that
failures, or security violations by allow them to override controls, are
individuals. most often prosecuted for insider
• Personal Accountability - Audit trails crimes.
can be used to monitor user activity at Reluctance to Prosecute → A factor that
the lowest level of detail. This capability contributes to computer crime is many
is a preventive control that can organizations’ reluctance to prosecute the
influence behavior. criminals.

AUDITING NETWORKS Internet Risks:

The paradox of networking is that networks exist a. IP spoofing - is a form of masquerading


to provide user access to shared resources, yet to gain unauthorized access to a Web
the most important objective of any network is server and/ or to perpetrate an
to control such access. unlawful act without revealing one’s
identity. To accomplish this, a
Intranets - consist of small LANs and large wide perpetrator modifies the IP address of
area networks (WANs) that may contain the originating computer to disguise his
thousands of individual nodes. Intranets are or her identity.
used to connect employees within a single b. Denial of Service (DoS) Attack - A denial
building, between buildings on the same of service attacks is an assault on a Web
physical campus, and between geographically server to prevent it from servicing its
dispersed locations. Typical intranet activities legitimate users.
SYN Flood Attack - When a user establishes a CONTROLLING RISKS FROM SUBVERSIVE
connection on the Internet through Transfer THREATS
control protocol/Internet protocol (TCP/IP) (see
Internet protocols in the appendix), a three-way Firewall - system of software and hardware that
handshake takes place. prevents unauthorized access to or from a
private network. Typically, firewalls are
The SYN flood attack is accomplished by not implemented to prevent unauthorized Internet
sending the final acknowledgment to the users and hackers from accessing private
server’s SYN-ACK response, which causes the networks that are connected to the Internet.
server to keep signaling for acknowledgement
until the server times out. • Network-level firewalls - provide
efficient but low-security access control.
Smurf attack - involves three parties: the This type of firewall consists of a
perpetrator, the intermediary, and the victim. It screening router that examines the
is accomplished by exploiting an Internet source and destination addresses that
maintenance tool called a ping, which is used to are attached to incoming message
test the state of network congestion and packets.
determine whether a particular host computer
is connected and available on the network. • Application-level firewalls - provide a
higher level of customizable network
Distributed Denial of Service - A distributed security, but they add overhead to
denial of service (DDoS) attack may take the connectivity. These systems are
form of a SYN flood or smurf attack. The configured to run security applications
distinguishing feature of the DDoS is the sheer called proxies that permit routine
scope of the event. The perpetrator of a DDoS services such as e-mail to pass through
attack may employ a virtual army of so-called the firewall, but can perform
zombie or bot (robot) computers to launch the sophisticated functions such as user
attack. Because vast numbers of unsuspecting authentication for specific tasks.
intermediaries are needed, the attack often
involves one or more Internet relay chat (IRC)
networks as a source of zombies. Controlling Denial of Service attacks - As a
countermeasure to DDoS attacks, many
c. Risks from Equipment Failure - organizations have invested in intrusion
Network topologies consist of various prevention systems (IPS) that employ deep
configurations of (1) communications packet inspection (DPI) to determine when an
lines (twisted-pair wires, coaxial cables, attack is in progress. DPI uses a variety of
microwaves, and fiber optics), (2) analytical and statistical techniques to evaluate
hardware components (modems, the contents of message packets. It searches the
multiplexers, servers, and front-end individual packets for protocol non-compliance
processors), and (3) software (protocols and employs predefined criteria to decide if a
and network control systems). packet can proceed to its destination.

Encryption - is the conversion of data into a


secret code for storage in databases and
transmission over networks. The sender uses an
encryption algorithm to convert the original for decoding them. Each recipient has a
message (called cleartext) into a coded private key that is kept secret and a
equivalent (called ciphertext). At the receiving public key that is published.
end, the ciphertext is decoded (decrypted) back
into cleartext. Rivest-Shamir-Adleman (RSA) is a
highly secure public key cryptography
The earliest encryption method is called the method. This method is, however,
Caesar cipher, which Julius Caesar is said to computationally intensive, and much
have used to send coded messages to his slower than standard DES encryption.
generals in the field. Two fundamental Sometimes, both DES and RSA are used
components include: together in what is called a digital
envelope.
• Key - mathematical value that the
sender selects. Digital signature - is electronic authentication
• Algorithm - procedure of shifting each that cannot be forged. It ensures that the
letter in the cleartext message the message or document that the sender
number of positions that the key value transmitted was not tampered with after the
indicates. signature was applied.

Two methods of Encryption: Digital Certificate - The aforementioned process


proves that the message received was not
1. Private Key Encryption - Advance tampered with during transmission. It does not
encryption standard (AES) is a 128-bit prove, however, that the sender is who he or
encryption technique that has become she claims to be. The sender could be an
a U.S. government standard for private impersonator. Verifying the sender’s identity
key encryption. The AES algorithm uses requires a digital certificate, which is issued by a
a single key known to both the sender trusted third party called a certification
and the receiver of the message. authority (CA).

Triple-DES encryption is an Public key infrastructure (PKI) constitutes the


enhancement to an older encryption policies and procedures for administering this
technique called the data encryption activity. A PKI system consists of:
standard (DES). Triple DES provides
considerably improved security over 1. Certification Authority
most single encryption techniques. Two 2. Registration Authority
forms of triple-DES encryption are EEE3 3. Certification Repository
and EDE3. EEE3 uses three different keys
to encrypt the message three times. Message Sequence Numbering - g, a sequence
EDE3 uses one key to encrypt the number is inserted in each message, and any
message. such attempt will become apparent at the
receiving end.
2. Public Key Encryption - Public key
encryption uses two different keys: one Message Transaction Log - An intruder may
for encoding messages and the other successfully penetrate the system by trying
different password and user ID combinations. 2. Parity Check. The parity check
Therefore, all incoming and outgoing messages, incorporates an extra bit (the parity bit)
as well as attempted (failed) access, should be into the structure of a bit string when it
recorded in a message transaction log. is created or transmitted. Parity can be
both vertical and horizontal
Request-Response Technique - Using request- (longitudinal).
response technique, a control message from the
sender and a response from the receiver are
AUDITING ELECTRONIC DATA INTERCHANGE
sent at periodic, synchronized intervals.
(EDI)
Call-Back Devices - requires the dial-in user to To coordinate sales and production operations
enter a password and be identified. The system and to maintain an uninterrupted flow of raw
then breaks the connection to perform user materials, many organizations enter into a
authentication. trading partner agreement with their suppliers
and customers. This agreement is the
Criteria for assessing the firewall effectiveness foundation for a fully automated business
include: process called electronic data interchange (EDI).

• Flexibility Electronic Data Interchange (EDI) - the


• Proxy services intercompany exchange of computer-
• Filtering processable business information in standard
• Segregation of systems format.
• Audit tools EDI Standards - The standard in the United
• Probe for weaknesses States is the American National Standards
Institute (ANSI) X.12 format. The standard used
Controlling Risks from Equipment Failure internationally is the EDI for administration,
commerce, and transport (EDIFACT) format.
Line Errors - The most common problem in data
communications is data loss due to line error. Benefits of EDI:
The bit structure of the message can be • Data keying
corrupted through noise on the • Error reduction
communications lines. • Reduction of paper
• Postage
The following two techniques are commonly • Automated procedures
used to detect and correct such data errors • Inventory reduction
before they are processed. These are:
Financial EDI - Using electronic funds transfer
1. Echo Check - The echo check involves (EFT) for cash disbursement and cash receipts
the receiver of the message returning processing is more complicated than using EDI
the message to the sender. The sender for purchasing and selling activities. EFT
compares the returned message with a requires intermediary banks between trading
stored copy of the original. partners.
EDI Controls: PC Systems Risks and Controls

Transaction Authorization and Validation - Both


a. Operating System Weaknesses - In
the customer and the supplier must establish
contrast to mainframe systems, PCs
that the transaction being processed is to (or
provide only minimal security for data
from) a valid trading partner and is authorized.
files and programs contained within
Access Control: them. This control weakness is inherent
in the philosophy behind the design of
To function smoothly, EDI trading partners must PC operating systems.
permit a degree of access to private data files b. Weak Access Control - Security
that would be forbidden in a traditional software that provides log-on
environment. The trading partner agreement procedures is available for PCs. Most of
will determine the degree of access control in these programs, however, become
place active only when the computer is booted
EDI Audit Trail → The absence of source from the hard drive.
documents in EDI transactions eliminates the c. Inadequate Segregation of Duties -
traditional audit trail and restricts the ability of Employees in PC environments,
accountants to verify the validity, completeness, particularly those of small companies,
timing, may have access to multiple
applications that constitute
Audit Objectives Relating to EDI: incompatible tasks.
1. All EDI transactions are authorized, d. Multilevel password control - is used to
validated, and in compliance with the restrict employees who are sharing the
trading partner agreement. same computers to specific directories,
2. No unauthorized organizations gain programs, and data files. Under this
access to database records. approach, different passwords are used
3. Authorized trading partners have access to access different functions. Thus, each
only to approved data. employee is required to enter a
4. Adequate controls are in place to password to access his or her
ensure a complete audit trail of all EDI applications and data.
transactions. e. Risk of Theft - Because of their size, PCs
are objects of theft, and the portability
AUDITING PC-BASED ACCOUNTING SYSTEMS of laptops places them at the highest
risk.
The software market offers hundreds of PC-
f. Weak Backup Procedures - Computer
based accounting systems. In contrast to
failure, usually disk failure, is the
mainframe and client-server systems that are
primary cause of data loss in PC
frequently custom-designed to meet specific
environments. If the hard drive of a PC
user requirements, PC applications tend to be
fails, recovering the data stored on it
general-purpose systems that serve a wide
may be impossible.
range of needs.
g. Risk of Virus Infection - Virus infection
is one of most common threats to PC
Commercial systems usually have fully
integrity and system availability.
integrated modules. This means that data
transfers between modules occur automatically.

You might also like