General Computer Controls Flashcards
Name 7 general controls for computers
- System development and implementation controls
- System maintenance controls
- Organisational and management controls
- Access controls to data and programs
- Computer operating controls
- System software controls
- Business continuity controls
What is an on-line system?
A computer system where data is captured via a terminal as the transaction occurs and the data is immediately edited, processed and written to computer file.
Name the advantages of on-line system.
- Files are up to date
- Accuracy of entry
- The risk of non-recording of transactions is small
- The system is fast
Name the disadvantages of on-line system.
- Absence of visible entry and audit trails
- Higher risk of unauthorized:
- access to the system and data
- processing on the system
- changes to data
Give the characteristics of an on-line system.
- On-line (direct)entry of data
- Authorization of input by the system through validation tests
- On-line access to the system by users
- Absence of visible audit trails
- Risk that programmers could gain unauthorized access to the system
What are the risk indicators specific to IT environment?
- Risks which relate to the integrity of financial information (relevant to both management and auditors)
- Risks relate principally to Management’s requirements
What are the risks relating to the integrity of financial information relating to access?
- Uncontrolled access to data leading to:
- duplication
- corruption
- manipulation
- sabotage
- unauthorized processing of data
- Unauthorized changes to transaction data
- Unauthorized changes to master files (standing data)
- Uncontrolled access to programs leading to unauthorized changes
- Access through a third party such as service provider
- Corruption of data by viruses
What are the risks relating to the integrity of financial information relating to input?
- Absence of input documentation
2. Lack of visible audit trail providing evidence of authorization
What are the risks relating to the integrity of financial information relating to transfer of data?
- Unauthorized access through telephone lines, wireless connections, etc which could result in duplication, corruption or manipulation of data on transfer
- Data could be lost or corrupted in transmission
What are the risks relating to the integrity of financial information relating to staff issues?
- Loss of supervision in a decentralized/distributed processing environment
- Staff may be limited experience of or lack training on computers
- Segregation of duties may be weaker
What are the risks relating to the integrity of financial information relating to processing?
- Multiple functions performed by single person
- Where systems are integrated, individual errors may affect different systems
- System generated transactions
- Uniform processing duces the risk of clerical error but may increase the risk of consistent error
- Errors might not be noticed owing to high speed of processing and the volumes involved
What are the risks relating to the integrity of financial information relating to output?
- Absence of reports /loss of audit trail
2. There is often less manual review of information
What are the risks relating to the integrity of financial information relating to continuity?
- Loss of data
What are the risks relating to the integrity of financial information relating to specific issues?
- Financial loss due to electronic fund transfer
- Failure to clear computer suspense files
- Abuse of credit cards
What are the risks relating to the integrity of financial information relating to general issues?
- Types of computer used
- Types of software: developed or bought
- The processing method applied and any changes thereto
- Effectiveness of the control environment and Management’s attitude towards computer controls
- Effectiveness of computerized controls and potential weaknesses in:
- general controls
- application controls
- Nature of the business/ transactions
- The size of the entity and the volume of transactions
- Materiality of data/transaction processed
What are the risks relating principally to management’s requirements relating to access?
- Confidentiality of data
- Unauthorized use of data
- Business continuity could’ve affected by viruses,hackers or denial of service attacks
- Privacy of third parties’ data
What are the risks relating principally to management’s requirements relating to computer fraud?
- Possible fraud
What are the risks relating principally to management’s requirements relating to quality of management information?
- Completeness of information
- Availability of information
- Usefulness of data provided
- Whether data is up to date
- Loss of continuity leading to temporary lack of data
What are the risks relating principally to management’s requirements relating to operating issues?
- Inability of system to cope with volumes could result in poor customer service
- Contractual liability arising from dealing with third parties
- Non-compliance with tax law, regulation or software license conditions
- Loss of control where third parties are involve
- Adequacy and competence of IT staff
- Dependence on communication
- Dependence on technology
- Cost control
- Staff morale problems arising from changes in systems
What are some control risks in an IT environment?
- Program processing data inaccurately
- Inaccurate data
- Failure to make necessary changes to systems
- Unauthorized access to data
- Inappropriate manual intervention
- A breakdown in segregation of duties
- Unauthorized changes to systems or programs
- Unauthorized changes to data in master files
- Loss of data or inability to access data as required
What are some benefits of IT controls?
- Consistent processing
- Accurate complex calculations for larger volumes of data
- Enhanced timeliness, availability and accuracy of information
- Additional, and more accurate, analysis of information
- Enhanced monitoring of performance of the entity’s activities and compliance with policies and procedures
- Reduce the risk of control override
- Improved security over systems and data
What is the objective of general computer controls?
Maintenance of integrity of data and programs
Effective functioning of the computer system
Identify the feasibility studies need to be done when purchasing a new computer system
- User needs
- Specification and requirements of available packages
- Costs
- Assistance and support by suppliers
- Adaptability and expansion ability of the package
- Standing and reputation of the supplier
- Conclusion supported by enquiring with staff and testing
Name the steps in purchasing a new computer system package
- Feasibility study
- Authorization by management, users and computer staff
- Implementation
- System conversion