GENERAL CONTROLS Flashcards

(34 cards)

1
Q

GENERAL CONTROLS

A

General IT controls are the basic rules and checks that apply to all systems in the company which help make sure that the application controls can work properly by keeping the IT systems running properly and securely.
- If general controls are weak, all the systems might be at risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(1) SYSTEM DEVELOPMENT AND IMPLEMENTATION CONTROLS

A

the rules and checks that make sure new systems, or major changes to existing systems, are designed, built, and installed properly — with as few bugs, errors, or surprises as possible.
They must be properly developed, authorised and meet user’s needs.
there is SELF DEVELOPED SYSTEM OR PURCHASED PACKAGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SELF DEVELOPED SYSTEM
a. Project authorisation and Management

A

To make sure the development of the system is officially approved and properly managed from start to finish.
- Was the system project formally approved?
- Is there a project manager?
- Is there a plan with deadlines, budgets, and responsibilities?
- Are progress and costs being monitored?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

b. System specification and user needs

A

To make sure the new system is designed to meet actual business needs — not just what IT thinks is needed.
Two methods of specifying systems
1. Traditional - written system specifications by means of discussions between data processing department and users.
2. Prototype systems - Design a prototype then allow users to try it out and refine the system through a series of prototype

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

c. System design and Programming standards

A

To ensure the system is designed properly and that the code follows proper rules and standards and
- ensure new system work well with other systems already in use
- ensure system has built-in checks and controls
- ensure there is supervision over system design
- Ensure system complies with predetermined standards
- it should always be done on a program library and not live data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

d. Testing of new system

A

To make sure the system is fully tested before it goes live
1. program testing - checking if the system is doing what it is suppose to do and doesn’t do what is irrelevant and wrong
2. System testing - if all the parts of the system, which were built and tested individually, work together correctly as one full system.
3. Live Testing - the system is tested in real-life, working conditions, but in a controlled way to reduce risk.
- Parallel running: You run both the new system and the old system at the same time, for the same transactions to compare results and see if th new system works properly
Pilot running: You introduce the new system to a small portion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PURCHASED PACKAGE SYSTEM
a) Specification and selection of packages;

A

Discussions with other users, Observing operation of package.
QUESTIONS:
* Facilities offered by program;
* Freedom from program errors;
* Speed and efficiency;
* Ease of use;
* Quality of support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

b) Implementation and testing of packages.

A

Testing:
* Independent testing;
* Review of experiences of other users.
Implementation:
* Involvement of:
* User departments;
* Data processing;
* Management;
* Quality assurance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PURCHASED SYSTEM
ANDVANTAGES AND DISADVANTAGES

A

ADVANTAGES:
* Less implementation time (immediate implementation);
* Lower cost and cost is predetermined;
* Tested thoroughly - thus very reliable.
DISADVANTAGES
* Dependent on vendors for maintenance;
* Too general /inflexible to cater for needs;
* Change maintenance difficult OR impossible;
* Written overseas (Vat and Tax differs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SYSTEM CONVERSION

A

General controls during conversion to the new system (self developed / purchased) - consist of 6 sub-sections:
I. Planning and preparation;
Il. Control over conversion of data-by-data control group;
III. Update system documentation;
IV. Testing;
V. Backup of new system;
VI. Post-implementation review.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(1) PLANNING AND PREPARATION

A
  • Prepare timetables for conversion;
  • Define methods used (e.g. parallel / pilot);
  • Determine cut-off dates;
  • Prepare data files for conversion
  • Training of staff;
  • Balance files on old system ;
  • Prepare premises (constant power / air-con).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(2) CONTROL OVER CONVERSION OF DATA-BY-DATA CONTROL GROUP

A
  • Supervision by senior management;
  • Auditor involvement.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(3) UPDATE SYSTEM DOCUMENTATION

A
  • System flowcharts;
  • System descriptions;
  • Operating manuals.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(4) TESTING

A
  • Balancing old files with new files;
  • Third party confirmations;
  • Follow up of exception reports;
  • Comparison with data run on old system (parallel);
  • Manual comparison of data;
  • Approval by users.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. SYSTEM MAINTENANCE CONTROLS
A

To ensure changes to the system is authorised and meet the user’s needs.
System change controls ensure that all changes we make to our systems are:
* Complete;
* Valid;
* Properly tested;
* All information is backed-up and recovery procedures are in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. ORGANISATIONAL AND MANAGEMENT CONTROLS
A

focuses on how the structure and leadership of the IT function are designed to prevent chaos, ensure accountability, and support proper use of systems.
- Segregation of duties - Split responsibilities
- Written policies for System use, Password security, Data backups
CONTROLS AGAINST VIRUSES
STAFF - Inform them about dangers, limit the use of the computers and the reporting procedures in case of infection
SUPERVISION AND REVIEW - By CIS manager, divisional managers, System investigations by internal and external audit.

17
Q

ACCESS CONTROLS

A

Restrict unauthorised access to terminals and data

18
Q
  1. Terminals
A
  • TINS
  • Limited access to system
  • Automatic log off after 5 minutes of non-use;
  • Shut down after 3 unsuccessful login attempts;
  • Limited to 1 workstation log on;
  • Investigation into each disconnection;
  • Simultaneous login prohibited.
19
Q
  1. Identification of users
A
  • User ID’s & passwords;
  • Verify IP address;
  • Magnetic cards;
  • Voice recognition / fingerprints (use of biometric data).
20
Q
  1. Authorisation of users
A

users are only allowed to access what they are authorised for.

21
Q
  1. Monitor of Access and Processing
A
  • Audit trails reviewed for daily activities;
  • Console logs and activity registers;
  • Application software (unauthorised access);
  • Firewalls.
22
Q
  1. Communication lines and networks
A

secure the connection between computers and servers, especially for remote access or across offices.
* Passwords;
* Dial & dial back;
* Identification data;
* Different routes for sensitive data;
* Encryption of data.

23
Q
  1. Password controls
A
  • Password strength:
  • Not easily guessed not shown on screen
  • Changed regularly;
  • Automatic system request;
  • Re-use of password prohibited.
  • Confidentiality emphasised;
  • Cancelled on resignation/ dismissal;
  • Cancelled after period of inactivity;
  • Used for authorisation;
  • Limit access to part of system;
  • Limit access to certain times of day;
  • Authorisation levels linked.
24
Q
  1. Program libraries
A

These are folders or databases where software programs and updates are stored.
* Access to backup programs controlled by access software;
* Passwords;
Updating of a backup authorised.

25
8. Utilities
(These include antivirus, backup, disk repair, file management, security, and networking programs) * Stored separately; * Use logged and reviewed.
26
5. COMPUTER OPERATING CONTROLS
Ensuring procedures applied correctly and consistently during processing. EXAMPLES * There must be continuous monitoring and review of the functioning of the computer hardware; * There must be standardised procedures and operating procedures for the users of the system to follow; * The must be adequate user manuals in place; * Scheduling of processing; * Set-up and execution of programs;
27
6. SYSTEM SOFTWARE CONTROLS
To ensure installation, development and maintenance of software packages are authorised and effective. EXAMPLES a) In the processing by users on personal computers there must be control over the software on the PC to ensure that it is not copied or pirated; b) Acquisition and development controls previously discussed. c) Security over system software d) databased systems e) Networks f) Processing on micro computers
28
BUSINESS CONTINUITY CONTROLS
Prevent/Limit system interruption (Downtime) - the plans, actions, and systems put in place to help a business survive and recover from unexpected interruptions.
29
(1) General controls
Data is backed up regularly and kept off-site in a fireproof safe; * UPS (Uninterrupted Power Supply) * The entity's server room is air-conditioned to prevent overheat * Plan, document and test the disaster recovery plan to ensure that it will be effective in the event of a disaster.
30
(2) Physical environment
Protection against the elements: * Fire: extinguishers etc.; * Water: away from water pipes; * Power: backup supply; * Environment: air con etc.
31
(3) Emergency plan and disaster recovery procedures
* Establish procedures or Responsibilities * Prepare list of files & data to be recovered; * Provide alternative processing facilities; * Plan, document & test the disaster recovery plan.
32
(4) Backups
* Regular backups on rotational basis; * On-line/ Real time backups; * Store back-up files on separate premises; * Hardware backup facilities; * Store in fireproof safe; * Retention of files / records for required times.
33
(5) Other controls
* Adequate insurance; * No over reliance on staff; * Virus protection / prevention; * Physical security; * Cable protection.
34
(6) Personnel controls
* Segregation of duties; * Job rotation; * Hiring/firing procedures; Employment contracts; * Use of hardware/software; * Confidentiality.