IT Flashcards

(285 cards)

1
Q

Elements of Accounting Systems

A
  1. People
  2. Procedures
  3. Hardware
  4. Software
  5. Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risks in Computer-Based Systems

A
Systems, programs and people (FUNI)
•Reliance on FAULTY systems or programs
•UNAUTHORIZED changes in master files, systems, or programs
•Failure to make NEEDED changes
•Inappropriate INTERVENTION (by people)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

COBIT purpose

A

Align IT and business goals/strategies

Link business risks, control needs and IT

Common language for users, auditors, management, and business process owners in identifying risks and structuring controls.

Determine how much to invest in IT control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

COBIT Framework Defined

A

To provide the information that the organization needs to achieve its objectives, IT resources needed to be managed by a set of naturally grouped processes.

Process orientation to exercise responsibilities, achieve goals and manage risks.

CIRCLE (a) IT processes (b) Business requirements (c) IT resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

COBIT Information Attributes

A
  1. Effective
  2. Efficient
  3. Confidential
  4. Integrity
  5. Available
  6. Compliant
  7. Reliable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

COBIT and COSO

A

Both concerned with monitoring of organizational processes

FOCUS:
•COSO: organizational control and processes
•COBIT: IT controls and processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

According to the COBIT model, identify 5 physical resources that, together, comprise an IT system

A
  1. People
  2. Applications
  3. Technology
  4. Facilities
  5. Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

According to the COBIT model, what are the four IT domains?

A
  1. Planning and organization
  2. Acquisition and implementation
    •the process of identifying automated solutions.
  3. Delivery and support
    •the process of ensuring security and continuous service.
  4. Monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three major components of the COBIT model?

A
  1. Domains and processes
  2. Information criteria
  3. IT resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ERP Goals

A
  • Integration (goal visibility): Integrate all data into 1 data base with user-Defined views
  • Cost Savings: decrease system maintenance costs (only one system to maintain)
  • Employee Empowerment: Improves Communication and decision making by increasing information availability
  • “Best Practices”: include most successful business processes of an industry.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Enterprise Architecture Defined

A

An organizations enterprise architecture is its efforts to understand, manage, and plan for IT assets. An organizations IT security governance plan must articulate with, and be informed by, the organizations enterprise architecture plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Enterprise-Wide or Enterprise Resource Planning (ERP) Systems Defined

A

ERPS provide transaction processing, management support, and decision-making support in a single, integrated, organization-wide package. By integrating all data and processes of an organization into a unified system, ERPs attempt to manage and eliminate the organizational problem of consolidating information across departments, regions, or divisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Online Transaction Processing (OLTP) System

A

The modules comprising the core business functions: sales, production, purchasing, payroll, financial reporting, etc. These functions collect the operational day for the organization and provide the fundamental motivation for the purchase of an ERP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Online analytical Processing (OLAP) System

A

Incorporates data warehouse and data mining capabilities within the ERP.

*provides an integrated view of transactions in all parts of the system.

•primarily concerned with collecting data (not analyzing it) across the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PaaS Defined

A

The use of the cloud to CREATE (not access) software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SaaS Defined

A

The use of the cloud to ACCESS software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Three important functions (segregate) of IT department rolls

A
  1. Application Development: SAFEGUARD ASSETS (applications in development)
  2. Systems Administration and Programming: Grant AUTHORIZATION (access)
  3. Computer Operations: EXECUTE events, safeguard archived IP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Segregation of Duties: Data Control (Clerk)

A

Control document flows, schedule batches for data entry and editing, reconcile control totals (reconciling + authorizing function)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Segregation of Duties: Computer Operators

A

Operate the (mainframe) computer, load program and data files, run programs (execute transactions)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Segregation of Duties: File Librarian

A

Maintain files and data that are not online in file library, check files in and out to support scheduled jobs. Should not have access to operating equipment or data outside of library.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Inadequate Scope and Agility

A

IT investments in business units, inadequately scaled to meet changing business needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Digitization Defined

A

Moving data to electronic form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Governance Defined

A

The processes and structures, to oversee the activities of the organization in pursuit of organizational objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Oversight Defined

A

Process of managing and monitoring an organizations operations to achieve internal control and effectively manage risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Product Differentiation Defined
Setting your product apart from your competitors'
26
Common Problems with IT Investments
* Lack of IT strategic focus - many IT investments are "bottom up". * Lack of strategic investment - over-investment in existing businesses and inadequate investment in "transformative" technologies. * Inadequate scope and agility - IT investments in business units, inadequately scaled to meet changing business needs.
27
Governance is primarily the responsibility of
THE BOARD
28
Operational, Transaction Processing, Systems (TPS)
Support large volume, day-to-day activities of business. •purchasing of goods/svcs, mfg activities, sales to customers, cash collections, payroll. Transaction types •Non-financial (placing orders for goods, accepting orders from customers) •Financial (billing a customer, receiving pmt, paying employees) GENERATE DEBIT AND CREDIT ENTRIES INTO ACCOUNTS.
29
Knowledge Management Systems (KM)
Components: | Knowledge base, knowledge database, provides means to collect, organize, and develop relations among information.
30
Management Information System (MIS)
Support routine, lower to mid level management. * Primarily synthesize (analyze) data from TPSs (internal data) * Tasks: structured problems Ex: compare planning info (budgets, forecasts) data with outcomes. , AR Aging
31
Accounting Information System (AIS) is a subset of:
Management Information Systems (MIS) •AIS generated debits and credits (ex: A/R transactions -- aging)
32
Decision Support Systems (DSS)
Support mid and upper level management. Tasks: manage non-routine problems and long-range planning. Often integrate external (market-level) with TPS data. Include significant analytical and statistical capabilities.
33
Two types of DSS (decision support systems)
DATA DRIVEN: process large amounts of data to find relations and patterns. Ex: data warehousing and data mining. MODEL DRIVEN: use models to forecast outcomes, model-driven analytics.
34
DSS Examples Used by Audit Firms
Client risk Assessment Client acceptance and retention Internal control documentation and testing Compute audit sample sizes
35
Group Support Systems (GSS)
Facilitate group collaboration May include functions such as calendars, meeting scheduling, and document sharing.
36
Executive Support Systems (ESS) or Strategic Support Systems (SSS)
``` Similar to DSS •Support forecasting and long-range, strategic decisions •Greater use of external data •primarily to support top management. •DSS for dummies ``` •can be for a specific purpose (monitoring competitive price)
37
Flat File Systems
Early IT Systems Separate programs and data sheets Each application has separate data and programs (think going into multiple places to change the same thing) •Data sharing across applications through separate programs •Select data records from one application and reformat for other application. •data redundancies.
38
Database Systems
Pool data into logically related files (the database). MIS always implemented into a database environment.
39
Data Warehouses and Mining
System to collect, organize, integrate, and store entity-wide data. Easy access to large quantities of varied data from across the organization.
40
Data Mining
Exploration, aggregation, and analysis of data in the data warehouse using analytical tools and exploratory techniques.
41
Data Warehousing
Relational data of archived operational transactions and other data. Often incorporated in a data-driven DSS May include external data.
42
Drill Down
Move from summary to detailed information. Associated with data warehouses Ability to move from summary to granular information.
43
Slicing and Dicing
View data in multiple ways.
44
A specialized version of a data warehouse
A data mart
45
Bit
Binary digit Zero or one
46
Byte
Logical grouping of bits Must be to the power of 2 (2^n)
47
Field (attribute)
* logical group of bytes * identify a characteristic or attribute of an entity (invoice, customer, product, etc) * in databases, fields are also known as "attributes"
48
Record
* a group of related fields (attributes) | * describe an example of an entirety (a specific invoice, a particular customer)
49
File (Table)
•collection of related records for one specific entity ( an invoice file, a customer file, a product file)
50
Database
A set of logically related files.
51
Systems Software
Programs that run computer and support system management (operating system is more important)
52
Programming Languages
* Used to create applications. * Now, most are "third" or "fourth generation" languages, many are object-oriented programming languages (OOPL) (Ex: Java) * All must be converted to "first generation" language (Ex: 0s and 1s) (from source to object code)
53
Application Software
End-user programs that you know and love. Categories: General (word processors, spreadsheets, databases) Specific (a marketing IS for a clothing designer) Runs on a specific operating system and hardware environment.
54
Operating System
* Interface between user and hardware. * Defined what commands can be issued and how (typing in a command, pointing and clicking) Ex: Microsoft, Mac. * Controls all input and output in computer systems.
55
Database Management System (DBMS)
"Middleware" program (between the Software and hardware, or application software and operating system) Manages the database.
56
Data Definition Language (DDL)
* User can define tables and fields and relations among the tables * Uses meta-data (data about data) to define the database elements * Example commands: create, drop, alter (of fields and tables)
57
Data Manipulation Language (DML)
* User can add, delete or update records | * Example commands: update, insert, delete (of records)
58
Data Query Language (DQL)
* User can extract information. * Most relational databases use structured query language (SQL) to extract fat (text approach) * Query-By-Example (QBE): graphic interface with "drag and drop" fields to create query (graphic approach)
59
Database Controls - DBMS includes:
* No collisions - concurrent access management (only one person in at a time) * No hackers or creepers - Access controls * Data definition standards, data element standards * Backup and recovery procedures * Update privileges * Data elements and relationship controls
60
Inputs and Output terminology
Peripherals = input and output devices = I/O devices
61
Input devices
Input devices instruct the CPU and supply data to be processes. Ex: keyboard, mouse, trackball, touch-screen technology, microphones and voice recognition technology, point of sale (POS) scanners.
62
Output devices
Transfer data from the processing unit to other formats. * printers,plotters--paper output * monitors, flat panel displays, CRT (cathode ray tube) displays--visual output * speakers, voice output communication aids (VOCAs)--auditory output
63
Central Processing Unit (CPU)
CONTROL UNIT: interprets program instructions ARITHMETIC LOGIC UNIT (ALU): performs arithmetic calculations
64
Primary storage (main memory)
Stores programs and data when in use. 1. Random Access Memory (RAM)-- stores data temporarily (information in process in computer system) 2. Read-Only Memory (ROM)-- permanently stores data needed by computer
65
Solid State Drivers (SSDs)
Form of secondary storage. Flash drives, USB, jump, thumb drives No moving parts. Similar to the RAM.
66
Server
A computer that provides resource on a computer network.
67
Computer hardware
Physical equipment of the computer system.
68
How does system capture data and update master file? Two primary methods.
1. Batch: group transactions for processing (then are sorted into item number sequence) 2. On-line, real-time (OLRT): Continuous, immediate Processing.
69
Batch Processing
Transaction and mater files must be sorted on a common key •Low volume, periodic transactions. Transactions are independent or unimportant. •Called "sequential-access files" because the records are in sequence. •Alternative is "random-access files" (ex: hardware storage devices)
70
On-Line, Real-Time (OLRT) Processing
Continuous, immediate transaction processing. Near simultaneous transaction entry and master files updating. Requirements: random access storage devices, networked computer system or internet. •single transaction, random processing technology, immediate update.
71
Point-of-Sale (POS) System Technology
Scanners capture data from product bar codes (fast, accurate, cheap) Computer system connected to, or integrated with, electronic cash register. POS Systems or terminals networked to central computer.
72
Big Data
Creation, analysis, storage and dissemination of extremely large data sets. •Feasible due to advances in computer storage technologies (ex: the cloud), advanced data analytics, and massive computing power. Gartner definition: "high volume, velocity, and/or variety Information assets that demand new, innovative forms of processing for enhanced decision making, business insights or process optimization."
73
Dark Data
Data from business activities that may be reused in analytics, business relationships, or directly monetized (sold). Activity, operational or social media data that is unused or underused. Sometimes a synonym for "meta-data" (data about data)
74
IaaS
Use of the cloud to access HARDWARE
75
Role of the systems analyst in an IT environment
Designing systems, prepares specifications for programmers, and serves as intermediary between users and programmers. •should not have access to an entity's data in a large firm. (Violation of segregation of duties)
76
Database administrator
Responsible for establishing user names and authorizing access to specific data files and fields
77
IT security principles: 5 trust services principles
1. Security 2. Availability (is the system operational and useable as specified in commitments and agreements? Do I/Cs support system availability?) 3. Processing integrity (concerns the completeness, validity, accuracy timeliness and authorization of system processing) 4. Confidentiality (is the information protected consistent with the orgs commitment in agreements?) 5. Privacy (does the Systems collection, use, retention, disclosure, etc followed)
78
10 GAPP (Generally Accepted Privacy Principles)
1. Management (accountability) 2. Notice (tell others of policies and procedures) 3. Choice and consent (US= users can opt out of collection of personal info) 4. Collection (only for identified purposes) 5. Use and retention (consistent with statements about use - retain only as long as needed or by law) 6. Access (people can access, review and update their info) 7. Disclosure to third parties (according to policy) 8. Security for privacy (protect against unauthorized access) 9. Quality (personal info is accurate, complete and relevant) 10. Monitoring and enforcement (monitors the entities compliance)
79
IT security is not just The responsibility of the IT department but also
A top management issue.
80
Categories of Criteria for assessing achievement of IT security principles
1. Organization and management 2. Communications 3. Risk management and design implementation of controls 4. Monitoring of controls 5. Logical and physical access controls 6. System operations 7. Change management
81
Time-Based Model of Controls
Given enough time and resources, preventive control can be circumvented. Accordingly, detection and correction must be timely. P=time it takes an intruder to break through the organizations preventive controls D=time it takes to detect that Ana track is in progress C=time to respond to the attack If P > (D+C), then security procedures are effective
82
Defense-in-depth Strategy
The strategy of implementing multiple layers of controls to avoid having System break down
83
Cyber-Risk Assessment: COSO Principle 6
Organization specifies objectives with sufficient clarity to enable identification and assessment of risks relating to objectives. Assessing cyber risks begins with understanding the value of information systems to an organization.
84
Risk identification and Fraud: COSO Principles 7 & 8
Principle 7: Organization identifies, analyzes and manages risks. Principle 8: Organization considers fraud risks. Assess likelihood and severity of cyber risk impact. Consider industry-specific attack. *initiative should be lead by senior management.
85
COSO principle 9
Organization identifies and assesses changes that could impact internal control. Risks; Rapidly changing technologies and amber criminals' quick adaption to changes yield new methods of exploiting vulnerabilities.
86
Control Activities to address cyber risks: COSO principles 10, 11, 12
10: Organization selects and develops control activities that contribute to mitigate risks. 11: Organization selects and develops general control activities over technology to support the achievement of objectives. 12: Organization deploys control activities through policies that establish expectations and procedures that implement policies. * control activities related to cyber risks should relate to the organizations' objectives and cyber risk profile. (Ex: defense-in-depth Approach. Manage cyber risks through careful design and implementation of controls)
87
Communicating about cyber risks and controls: principle 13
Organization obtains, generated and uses relevant, quality information to support internal control. •Information needs follow from cyber risk Assessment and control design processes. •Formally document information requirements to support processes and controls. •Availability of "big data" can create information overload problems. •Transform control system data into actionable, high-quality information to support cyber-related controls.
88
Communicating about cyber risks and controls: principle 14
Organization internally communicates information, including objectives and responsibilities for internal control, necessary to support internal control functioning. •Communication about cyber risks should include all personnel, personnel responsible for managing and monitoring cyber risks and controls, and the Board of Directors.
89
Communicating about cyber risks and controls: principle 15
Organization communicates with external parties regarding internal control.
90
Define Cybercrime
Illegal activity that used a computer as its means of communication, or in which a computer is the target of the crime.
91
Define cyber risk
The likelihood of a financial loss, a disruption or damage to an organization form failure of, or an attack on, it's IT Systems.
92
All policies, including IT policies, should....
Link to entity's strategy and objectives. Need a process for evolving with change.
93
IT Policies: according to COSO
* Policies central to internal control * Reflect managements intentions regarding actions * Procedures are actions to implement policies
94
Important IT Policies
1. Values and Service Culture: what is expected of IT function personnel in interactions with clients and others? 2. Contractors, Employees and Sourcing: why, when and how entity selects IT Human Resources from employees vs. outside contractors. 3. Electronic Communications Use: policy related to employee use of the internal, intranet, email, blogs, chat rooms and telephones. 4. Use and Connection Policy: Entity's position on the use of personal devices and applications in workplace and connection to the entity's systems. 5. Procurement: policy on procurement processes for obtaining IT services. 6. Quality: statement of IT performance standards 7. Regulatory Compliance: statement of regulatory requirements for IT systems. 8. Security: policy related to guarding against physical or electronic threats to IT. May include disaster recovery preparation policies. 9. Service management and operational service problem solving: policies for ensuring quality of live IT services.
95
E-Commerce
Marketing, buying, and selling of products and services via the internet * Narrower -> Transactions between organization and trading partners. * Business-to-business (B2B) ecommerce: the electronic processing of transactions between businesses. (ex: Processing of business transactions, electronic data interchange (EDI), supply chain management (SCM) and EFT •Business-to-consumer (B2C) ecommerce: selling goods and services to consumers, usually on Internet and web-based technology. •Relies on intermediaries or brothers to facilitate the sales transaction (eBay)
96
E-Business
Used internet to improve business performance through connectivity. * Business process that relies on electronic dissemination of information or automated transaction processing. * can be within or between organizations. * Most via the Internet using web-based technology's
97
E-commerce example (B2E)
Business-to-employee e-commerce: sharing information and interacting with employees.
98
E-commerce example: B2G
Business-to-government e-commerce: contract bidding, property disposal, audit procurement.
99
E-Commerce Risks
* availability/downtime * privacy, security and confidentiality * authentication and nonrepudiation (after the fact, can't claim that transaction never occurred) * integrity
100
Risks of Failing to Implement EC
1. Customers go elsewhere 2. Limited growth 3. Limited markets
101
E-Commerce Business Models
1. E-marketplaces and exchanges 2. Viral marketing 3. Online direct marketing 4. E-rendering Systems (putting out bids for products we need?) 5. Social networking
102
E-Commerce depends on trust in two parties.
1. Trading partner | 2. The trading site or service provider
103
Identify five risks of e-commerce
1. Risk of System unavailability •availability/downtime 2. Privacy, security and confidentiality risks 3. Authentication risks 4. Nonrepudiation risks 5. System integrity risks
104
E-Procurement
Where a company seeks bids to provide a product or service.
105
Customer Relationship Management (CRM)
Technologies for managing client e-relationships. Ex: customer data, profitability, personalized marketing Database of customer data •sales force automation: tracking contacts and follow-ups Marketing automation: "triggered" marketing (ex: Kroger promoting grocery products only to interested customers) Customer service automation •customer service automation: automating common customer interactions Analytics •sales history and projections, marketing campaign success, trends, and performance indicators
106
Electronic Data interchange (EDI)
* computer-to-computer exchange of business data. * structured data and processing protocols to reduce costs and speed processing (purchase orders, confirmations, invoices, etc.) * facilitates JIT (just-in-time) inventory * ex: Walmart and suppliers (direct EDI connections) * often, direct links between trading partners through intermediaries (called "service bureaus" or VANs) * Most EDI transactions on Value Added Networks (VANs)
107
Value Added Networks (VANs) provide...
Audit trails, controls, and security Often used in conjunction with EDIs
108
EDI alternatives
Translation software converts between standardized EDI format and internal company format.
109
EDI Benefits
* paperless (saves storage, filing, process costs * zero data entry * reduce errors in information exchange * required by customers (ex: Walmart can force supplies to adopt a system comparable to theirs) * real time data, no delays (faster invoicing and payments)
110
E-Banking
•demanded by customers ``` •management of e-banking requires: Senior management of BoD oversight Technology under Senior IT leadership Operational management monitoring and measuring risk ```
111
Electronic Funds Transfer (EFT)
Technology for electronically transferring money. Increase speed and reduce cost
112
Electronic Wallets
Not payment systems Programs for managing credit cards, user names, passwords and address information in easy-to-use, centralized location.
113
Supply Chain Management (SCM)
Process of transforming raw materials into finished product and delivering goods. Process of planning, implementing, and controlling supply chain operations SCM OFTEN INCLUDES EDI (ex: Walmart)
114
Risk: Unauthorized Cloud Activity Response = ?
Preventive and detective controls to prevent unauthorized procurement of cloud services. •a cloud use policy that articulates how, when, and for what uses, cloud computing is allowed. •a list of approved cloud vendors Policy: who can contract for cloud services and under what conditions.
115
Risk: Lack of Cloud Service Provider (CSP) Transparency Response = ?
Vendor selection & assessment of CSP controls * approved list of cloud vendors includes only vendors who provide sufficient info to enable informed risk assessments of the integrity of CSP operations. * list of required info from CSP may depend on type of service provided (IAAS, SAAS, PAAS)
116
Risk: CSP Reliability and Performance Response = ?
Effective incident management plan and procedure. Contract with backup CSPs in case of system failure with primary CSP. Implement CSP availability monitoring.
117
Risk: Cyber-Attack Response = ?
Incident management plan that considers increased likelihood of attack on CSP.
118
Define Cloud Computing
Using a network of remote servers hosted on the Internet to store, manageC and process data, rather than a local server or in-house network.
119
What is a CSP?
Cloud service providers offer network services, infrastructure, or business applications in the cloud. Hosted in a data center than can be accessed by companies or individuals using network connectivity.
120
End-User Systems Development Risks
* No knowledge or application of SDLC (systems development life cycle). * Not integrated with existing systems * Inadequate system testing and documentation. * Poor data controls, system design * Poor integration with existing systems. * Management may rely on these systems without knowing their risks.
121
Small Business Environment (SBE) Characteristics
* Exclusively microcomputers * No centralized IT department (outsourced IT?) * Poor segregation of Duties (incompatible functions often combined)
122
Controlling SBE Computing Risks
Physical access: unprotected Computing site(s)? •Give > attention to locked doors & secure storage Logical (electronic) access: require UNs and strong PWs, automatic log outs Data Backup: outsource, or, establish
123
How to consolidate data from multiple locations? (3 approaches)
1. Centralized system •data and processing at central location. 2. Decentralized system •individual location processing and data 3. Distributed (hybrid) database system •distribute to locations according to need
124
Centralized System
All data processing at one location. Users access via telecommunications channel ADVANTAGES: enables better data security, consistency in processing. DISADVANTAGES: high transmission costs, input/output bottlenecks at high traffic times (end of period), slow response to info requests.
125
Decentralized System
Each location maintains separate system and data. Summarized data sent to central office. Use of this system is declining. Can be customized Systems. ADVANTAGES: low transmission cost, low processing power and storage needs at central site, lower input/output bottlenecks, higher response to local needs. DISADVANTAGES: higher data redundancy and poor information integration, higher security issues and hardware costs.
126
Distributed Database System Characteristics
Compromise: Seek the best of centralized and decentralized. Database distributed across locations according to needs. Increasingly common ADVANTAGES: better communications between locations (all connected to distributed database), more current and complete information, reduce or eliminate need for expensive central processing center. DISADVANTAGES: similar to centralize systems cost of communications among locations, access and update conflicts among locations.
127
Define computer network
Two or more computing devices connected by a communications channel.
128
Define Node
Network access point. •controlling is critical to security. (Who is on the network and why?) A connected device (computers, printers, headphones, etc.) identified by type (linked to device protocols) Measure of network complicity. Each Node is assigned a DNS and IP address Network monitor displays nodes.
129
Define DNS
Domain Name System: translates network Node into IP address (internet protocol)
130
Computer Network Components: Switch (0,1) and/or router
Route traffic and may include security features (identifying nodes engaged in activity you don't want on your network). Routers are smarter, more complex and cost more than switches.
131
Computer Network Components: Network Interface Card (NIC) or Network Adapter Card (NAC)
•Circuit board and software on each Node. •Matched to transmission media. Ex: in each computer (to translate between the network language and the computer language)
132
Computer Network Components: transmission media
* Communication link between nodes (here a cable). | * May be wired or wireless.
133
Types of Nodes
CLIENT: usually an end user's microcomputer, uses but does not provide network resources SERVER: provides services or resources to network, end-users access server resources but generally don't use directly. LOCAL AREA NETWORK (LANs): use dedicated communication lines, cover limited area. WIDE AREA NETWORK (WANs): uses public or shared communication lines. STORAGE AREA NETWORK (SANs): type of LAN, dedicated to connecting storage devices to serves and other devices, centralized data storage, increased use in cloud computing. PERSONAL AREA NETWORK (PANs): created by individual person, wireless or wired.
134
Wired/wireless communication media (from slowest, cheapest and least secure to fastest, most expensive and most secure)
WIRED Twisted pair Coaxial cable Fiber optic cable WIRELESS Microwave transmission (primarily used in WANS) Wi-Fi or spread/spectrum radio transmission Bluetooth (used in PANs)
135
Wired and wireless advantages
WIRELESS: Scalable, flexible, often lower cost, mobility. WIRED: reliable, security, speed, occasionally lower cost. large LANs and WANs often include both.
136
Network Management Tools (Controls)
``` A. Response time reports B. Downtime reports C. Online monitors D. Network monitors E. Protocol analyzers F. Simple network management protocol (SNMP): way of monitoring network traffic G. Help desk reports ```
137
Internet Defined
A "network of networks" •worlds largest client/server network. ``` Common protocol = 2 parts: TCP (Transmission Control Protocol) •breaks up sent messages into IP packets IP (Internet Protocol) •all nodes assigned an IP address for delivery of information. ```
138
Protocol Defined
Rules by which a network operates and controls flow and priority of messages.
139
Packet (or block) Defined
A means by which information is transmitted. Sent files are broken down into packets which contains: Header: routing information (address), length protocol (maybe), originating info. Data: main message Trailer: used in some Systems, error detection bits, end of message identifier
140
Email - two components
1. Mail servers -- hosts that deliver, forward and store mail 2. Clients -- link users to servers. Allow you to read, compose, send, and store email.
141
Uniform resource locator (URL)
Web address of a resource
142
Browser Defined
Translates the URL to an IP address Sends a request for URL via HTTP (hypertext transfer protocol)
143
Simple Mail Transfer Protocol (SMTP)
For email services.
144
Internet Message Access Protocol (IMAP)
Permits access to remote mailboxes (e.g. On a server) as if they were locks (e.g. On a client system)
145
File transfer protocol (FTP)
For uploading and downloading files.
146
Instant messaging (IM)
Common for informal, internal corporate communications.
147
Voice over IP (VoIP)
For internet-based phone communications.
148
Markup (or tagging) languages
Codes that indicate how parts of a file are to be processed or displayed.
149
HTML (Hypertext markup language)
Core markup language (Way of tagging text for display) for web pages.
150
XML (extensible markup language)
For encoding (tagging) documents in machine-readable form.
151
XBRL (extensive business reporting language)
XML-based. For encoding and tagging financing information. *This is the future. •used in filing with SEC on EDGAR •some companies now report their F/S in both paper and XBRL formats.
152
Monitoring Employee Internet Use
Detect and/or prevent unauthorized uses. •non-work tasks, legal issues National security/political control Packet sniffers (view and capture sent information) Desktop surveillance (keystroke + website logging)
153
Internet Service Providers (ISPs)
Provide access through: direct connections to Internet backbone (high speed, high capacity communication lines)
154
Intranets and Extranets
Private (limited access) networks built using Internet protocols. •allows access to network resources through web browsers rather proprietary interface. •reduces training and system development time. •rapidly replacing traditional proprietary LANs and WANs. •easier to use, greater security. •intranet portal--the entry site (URL) for an intranet.
155
Intranets
Available only within and organization (school, business, association) •intranets are often used to connect geographically separate LANs within a company.
156
Extranets
Extent intranet to associates •extend to suppliers, customers, business partners. Could have security issues that are not found wth intranet.
157
VPN (Virtual private network)
Technology to secure communications. | •extending an intranet to an extranet.
158
Web 2.0
Web based, collaboration and community-generated content using tools such as blogs and wiki.
159
RDS (really simple syndication)/ATOM feeds
Need and information source by (free) subscription.
160
Security Token
One-time password (device displays; user inputs devise password, user ID, and account password) New password ~30-60 seconds
161
Biometric
Physical characteristic for access (thumbprint, Regina patterns)
162
Firewalls
All firewalls are hardware and/or software to review and filter network traffic (e.g. Block no compliant data packets based on set parameters) TYPES/LEVELS Network, application and personal.
163
Network firewall
On a network (e.g. Server) Filters data packets based on header information (source and destination IP addresses and Communication port) Blocks non compliant transmissions based on rules in access control list. Very fast (examine headers only)
164
Application firewall
Inspect data packet content Can perform deep packet inspection (detailed packet examination)
165
Personal firewalls
Software enabling end-users to block unwanted network traffic. Usually on a home network or computer.
166
Intrusion Detection Systems
IDS: monitors network for anomalies. What is unusual--3 identification methods 1. Signature-based (site patterns/sources) 2. Statistical-based (unusual activity-modeling) 3. Neural Networks (learns from created database)
167
Intrusion Prevention System
IPS e.g. Honeypot/honeynet -- allow hackers access to a decoy system.
168
Piggybacking Defined
Unauthorized user follows and uses authorized user credentials
169
Electrical System Risks
* Failure (outage) * Reduced voltage (brownout) * Sags, spikes, and surges * electromagnetic interference (EMI)
170
What purpose does setting file Attributes serve
This logically restricts the ability of the user to read, write, Update, and/or delete records in a file.
171
Define social engineering
A zest of techniques used by attackers to fool employees into giving them access to information resources.
172
Encryption Defined
Process of converting a plaintext message into a secure-coded form (ciphertext). Decryption - reverse encryption (to read a message).
173
Encryption key(s)
device or code that makes the message unique. Needed to encrypt or decrypt. •an input or parameter •device encryption e.g. On s laptop, smart phone Key length -- longer keys are slower but harder to crack
174
Single-key or private key encryption
One algorithm to encrypt and decrypt Sender creates and sends ciphertext, tells which algorithm (key) Receiver reverses process Old=data encryption standard New and better = Advanced Encryption Standard
175
Public/private-key encryption
Paired algorithms •one to encrypt, one to decrypt •if public encrypts, private decrypts •if private encrypts, public decrypts Safer but more complicated (slower) Common in sending of message (data in transit)
176
"Honey" encryption
Wrong guesses about encrypting key yield falsified data that looks correct but isn't.
177
Quantum encryption
Quantum encryption where data are encrypted using the Alice-in-Wonderland-like qualities of quantum computers.
178
Digital certificate
Electronic document that contains information Purpose: provide identity and crest secure communication.
179
Certificate or certification authority (CA)
Created by Microsoft to acquire key pair, user applied for CA. CA registers public key on server and sends private key to user. (Ie. additional layer of approval to get key)
180
Digital certificates
Legally recognized identification. Uses public/private key technology.
181
Digital Signatures
Facilitate secure exchanges (e.g. E-commerce) * uses public/private key paid to authenticate sender. * provides authentication and nonrepudiation. * weakness: public/private key pair can be acquired without verification. (Does not provide confidentiality)
182
Forms of asymmetric encryption
* SSL (secure socket layer) * S-HTTP (secure hypertext transport protocol) * SET (secure electronic transactions protocol) - used for consumer purchases
183
Types of Disasters
1. Natural: i.e. Earthquakes, floods 2. Unintentional Human: i.e. Loss of power, gas leak 3. Intentional Human: i.e. Terrorist attacks, hackers, vengeful employees
184
Recovery Point Objective
Acceptable data loss recovery time Objective (acceptable downtime). Determining: criticality of application, cost, time to recovery, security.
185
Backup Facility Types
``` Cold site: no computers $ Warm site: computers no data $$ Hot site: everything $$$ Mirrored site: fully redundant $$$$ Reciprocal Agreement: $?$ ```
186
Disaster Recovery: Cold Site
Off-site location with electrical and other physical requirements for processing. No equipment or files (added when needed) 1-3 day start-up typically Cheaper
187
Disaster Recovery: Warm Site
Off-site location with similar computer hardware. Does not include backed-up data (delivered when needed) More expensive than cold-site
188
Disaster Recovery: Hot Site
Completely equipped including data Near-immediate (within hours) operation Big money (e.g. Medical, credit card systems)
189
Disaster Recovery: Mirrored Site
Fully redundant, fully staffed, fully equipped. Real-time replication of mission critical systems E.g. Credit card processing
190
Reciprocal Agreement (aka mutual aid pact)
Agreement between toe it more organizations to aid each other with data processing if disaster strikes. May be cold, warm, or hot
191
Organizational Continuity Planning
* identify and plan for disruptions * integrate into business culture * recall risk management lesson / risk appetite and management.
192
BRM stands for
Business risk management or organizational risk management.
193
BCP stands for
Business continuity planning
194
OCP stands for
Organizational continuity plan | •process of risk Assessment, contingency planning, and long-term continuity maintenance.
195
BIA stands for
Business impact analysis •risk analysis portion of BCP (business continuity planning) Identifies maximum tolerable interruption periods of an organization by function and activity to assess risk importance and consequences.
196
OCP and BCP steps
1. Create a OCP policy and program 2. Determine critical functions / business risks 3. Determine continuity strategies 4. Develop and implement BCM response 5. Exercise, maintain, and update plan 6. Embed BCM plan into the culture
197
Incident Management
Map level of incidents to events to responses E.g. 0=negligible event (e.g. Power strike) 7= crisis (pandemic virus or terrorist) •responses mapped to level of incidents.
198
Plan for data back-up
* recover from equipment failures, power failures and errors * maintain at least one remote archive off-site * use redundant (multiple) backups.
199
Types of data backup procedures
* full: all data * increment: data changed from a certain time * differential: data changed since the last full backup
200
Backup & Recovery Control Principles
1. At least one off-site archive 2. Controls over storage libraries mirror those for data processing sites 3. Many organizations outsource - choosing a vendor, consider availability, standardization, capacity, speed, and price 4. Backup procedures may be full, increment, or differential 5. Maintain inventory of backups that identifies data set name, volume serial number, data created, accounting period, and storage location 6. Consider privacy, security and confidentiality of data (e.g. HIPPA) 7. Restoration procedures integrated into organizations continuity plan (OCP) 8. Backup and restoration procedures regularly tested and reviewed.
201
"Grandfather, father, son" system
Used when all systems were batch processing and is mostly associated with batch processing. ``` Son = newest Grandfather = 2 generations ```
202
Checkpoint and restart backup procedure
Common in batch processing. Checkpoint •point where processing accuracy is verified •periodic backups •if problem, return to most recent checkpoint and restart
203
Rollback and recovery backup procure
Common to online, real-time processing Record processing transactions log Periodically record master file contents If problem, return to good master file and reprocess subsequent transactions
204
Fault tolerant systems
Operate despite component failure (include redundancy and corrections for component failure) E.g. Space flight, ecommerce, bank credit card processing *dont want outages or downtime Network-enabled backup procedure.
205
High-availability clusters (HACs)
Computer clusters designed to improve service availability: common in e-commerce. If a part of the system goes down, the other components will pickup the slack. Network-enabled backup procedure.
206
Remote (online) backup by managed provider
Advantages: automated, outsource to experts, off-site, can be continuous. Network-enabled backup procedure.
207
Storage Area Networks (SANs)
Replicate data from multiple sites Data immediately available Efficient storage for servers Network-enabled backup procedure.
208
Mirroring
Maintain EXACT COPY of data set Files are stored in same format as System (e.g. Not zipped) Advantage: very fast Disadvantage: storage, expensive Used for mission critical systems Network-enabled backup procedure.
209
No responsible financial services organization can operate without ______ and _____
Backup and recovery
210
Who commits cyber-crimes?
Nation-states and spies: foreign nations Industrial spies: seek intellectual property and trade secrets for competitive advantage Organized crime: e.g. Blackmails that threaten to harm data resources Hacktivists: social or political statements e.g. Anonymous Hackers/crackers: for fun and challenge
211
Categories of Computer Crime
Computer or system as target--e.g. Denial of service (DoS) attacks and hacking Computer as subject--unlawful access to attack others. e.g. DoS infections. Computer as tool--access data or resources. E.g. Unauthorized access breaches, phishing, key loggers Computer as symbol/user as target--variation in computer as tool. Deceive user to obtain access e.g. Social engineering
212
Preventing and Detecting Computer Crimes
1. Make crime harder (less likely) 2. Increase the costs (difficulty) of crime 3. Improve detection methods 4. Reduce losses
213
Computer Attack Methods: back door
* software allowing unauthorized entry to System by omitting login * once common among programmers to facilitate development
214
Computer Attack Methods: denial of service (DoS)
Prevent legitimate users accessing system. Flood server with incomplete access requests Often use botnets (zombie computers)
215
Computer Attack Methods: eavesdropping
Unauthorized interception of private communication.
216
Computer Attack Methods: email bombing or spamming
Sending thousands or millions of emails to an address.
217
Computer Attack Methods: logic bomb
Program planted in System dormant until event or time (e.g. Date, employer deleted from active status)
218
Computer Attack Methods: Malicious Software (Malware)
Exploit system and user vulnerabilities to gain or damage computer. Examples: VIRUS: unauthorized program that copies itself; may damage data. WORM: virus that replicates across Systems; e.g. By sending email floods TROJAN HORSE: Program hidden inside benign file; can insert back door into system
219
Packet Sniffing
Packet analyzers, network analyzers, and sniffers. •have network control (legitimate) and data capture (nefarious) uses. Packet=formatted block of data carried by a computer network Packet sniffing=capture packets of data as they move across a network
220
Password Crackers
Software used to generate potential passwords and test to gain access. Finds weak passwords easily.
221
Session Hijacking and Masquerading
Internet Protocol (IP) address--unique identifying number for each device on a networked system. Hacker can identify IP address (e.g. Packet sniffing) and use to access network Masquerade=hacker mimics legitimate user.
222
Social Engineering
Seek access by tricking employees FISHING: fooling recipients into divulging personal financial data
223
Spam
Irrelevant or inappropriate email (or text or whatever messaging system comes next) messages sent to either: •a large number of recipients. •the same recipient many times (email bombing)
224
War Chalking, Driving and Walking
War Chalking: draw symbols in public places to indicate available Wi-Fi network access. War Driving: seeking access to Wi-Fi while diving War Walking: seeking access to Wi-Fi while walking, may lead to war Chalking.
225
Cyber Incident Response Process
1. Planning for and testing protocol 2. Event detection procedures 3. Ever logging procedures 4. Triage and incident analysis 5. Containment and removal of threats 6. Decision and action regarding event announcement or secrecy 7. Incident recovery 8. Closure 9. Event reporting 10. Monitoring and system revisions
226
Source Program Library Management System (SPLMS)
* an essential change control (COSO - importance in managing changes within a system of I/C) * software and instructions for people * for new or changed programs, SPLMS manages migration from application development test environment to production library (live status) * SPLMS controls and validates program changes by comparing new to old code
227
Four Functions of SPLMS
1. Store programs in the SPL (source program library) 2. Retrieve programs for updating and maintenance 3. Delete obsolete programs 4. Audit trail; document program changes *may be part of database system, operating system or purchased separately
228
What is the value (the why) of document accounting systems
1. Required by law (e.g. The foreign corrupt practices act, and SOX, SEC regulations, HIPPA) 2. The build and evaluate complex systems 3. For training (for new employees) 4. For creating sustainable/surviving systems 5. For auditing (internal and external) 6. For Process (re)engineering
229
System documentation
Overview of program, data files, processing logic, interactions with other programs and systems * big picture of entire system * may include requirements, architecture and design of the system
230
Program Documentation
Detailed description of inputs, logic, and outputs for software •includes program flow charts, source code listings, record layouts
231
Operator Documentation
Also called "run manual" How to load and execute programs and data. Includes needed equipment, files, supplies, commands, error messages
232
What type of control is Documentation
General and primarily preventive
233
Input and origination controls
Ensure reliability of application program data and processes. Understanding enables auditor to assess risks if absent or weak. Some may function as input or processing controls (eg. control totals) Best "input" control is often to automate data entry i.e. To not have manual (human) input
234
Origination: scanning instead of human entry
Goals: accuracy, completeness, efficiency
235
OLRT Systems Control: Closed Loop Verification
Use entered data to display additional (confirming data) Helps ensure valid and correct entry E.g. After customers account code entered, the system displays additional information about the selected customer. Goals: C (all data entered), A (entered data accurate), E
236
Batch control total methods
1. Financial total - add invoice amounts 2. Hash total - add invoice #s 3. Record count-count # of invoices Record count goal = A & C
237
Sequence check Defined
Confirm numerical sequence (of check or invoice numbers •usually automated but may be manual Goal: C (all valid are included), V (no invalid are included)
238
Key Verification
Re-key (re-enter) and compare critical data •ex: require password entry twice Goal: Validity
239
Completeness or missing data check
Can't continue until data is entered Goal: completeness
240
Field check (data type/data format check)
Is data of correct type? Ex: alphabetic, numeric, characters E.g. A zip code can only have numbers. Goal: Accuracy
241
Limit tests
Numeric field with specified value(s). E.g. Need to enter a number for age that can't be past 120 Goals: validity and accuracy
242
Range test
Validate upper and lower limit. Ex: price per gallon of gas $2 < x < $10
243
Sign test
has correct sign (+ or -) Ex: # purchased > 0
244
Valid code test (validity test)
Does entered account # exist? In database, called referential integrity Goals: validity and accuracy
245
Reasonableness check (logic test)
Do two or more fields agree? Ex: don't allow pay rate = "$3,500" and pay period = "hourly" Goals: validity and accuracy
246
Preprinted forms and pre formatted screens
Decrease data entry errors, speed data entry Goals: accuracy, completeness and efficiency
247
Default values
Pre-supplied data valued for fields Ex: sales order date = current date Goals: accuracy and efficiency
248
Automated data capture
* automated equipment to reduce manual data entry * ex: bar code scanners * reducing human involvement reduces errors
249
4 types of application controls
1. Processing 2. File 3. Output 4. Input
250
Application Controls: Processing
Efficiency •accurate and complete master file update •detect unauthorized transactions •maintain data integrity
251
Application Controls: Processing (and Input)
Run-to-run Controls: use batch totals (input controls) to agree the batch from one procedure (run) to another. *used in batch processing.
252
Application Controls: Processing
Audit trail control •used mostly in OLRT processing •transaction log = electronic audit trail
253
Transaction Logs (processing and output)
May include data values, time, terminal number, IP address, user name Importance: •GOALS: accuracy, completeness and validity •BACKUP AND RECOVERY: essential to checkpoint and restart, and rollback and recovery systems
254
File Types
Master files (ex: payables, receivables, updated regularly with transactions) Standing files (rarely changed master files) Transaction files (events that are used to update master files) System control parameter files
255
Examples of Hardware Controls
1. Check digit (parity bit) •0 or 1 included in byte to indicate if sum bits = odd or even 2. Read after write check •verifies that data was correctly written to disk •mostly used in local file operations 3. Echo check •verify transmission by "echo back" received transmission to sender •primary use = telecommunications systems 4. Boundary protection •with multiple programs and/or simultaneous users •prevents one program from overwriting data and instructions of another program
256
Additional file controls
Internal labels--Read by system (or removable storage) External labels--Read by humans Version controls--Protocols for ensuring use of the correct file version File access and updating controls--procedure to restrict file updates and access to authorized users
257
Application Controls: Output
Transaction logs of printed output (built into most systems) Access to sensitive reports through permissions and access controls (e.g. Authorization matrix)
258
Access Control (Outputs): Spooling printed files
Send files to queue for printing, in order sent Control issue: sensitive output Ex: sensitive product sales data, require printer password entry before file is printed, printed files are held by data control clerk for pickup
259
Hardware controls
Controls built into the computer equipment to ensure that data are transmitted and processed accurately.
260
The Accounting Cycle as a Set of Accounting Procedures
Competent, timely execution of the following: 1. Analyze transactions and business documents. 2. Journalist transactions. 3. Post journal entries to accounts. 4. Determine account balances and prepare a trial balance. 5. Journalize and post adjusting entries. 6. Prepare financial statements and reports. 7. Journalize and post-closing entires. 8. Balance the accounts and prepare a post-closing trial balance. 9. Repeat.
261
Accounting Cycles as Categories of Activity // basic exchanges typically grouped into five major transaction cycles:
Revenue cycle--interactions with customers (give goods; get cash) Expenditure cycle--interactions with suppliers (give cash; get goods) Production cycle--give labor and raw materials; get finished product Human Resources/Payroll Cycle--hire,utilize, and develop labor; give cash and benefits General ledge, reporting, financing cycle--give cash; get cash; report financial outcomes
262
Common Risks Across Cycles
Loss, alteration, or unauthorized disclosure of data. Accounting system is not functioning as required by law, regulation, or organizational policy.
263
Control Goals Across Cycles
Completeness - All: * transactions are properly authorized. * record transactions are valid. * valid and authorized transactions are recorded. * transactions are recorded accurately. * safeguarding - assets are safeguarded from loss or theft. * efficiency - business activities are performed efficiently and effectively. * compliance - the organization complies with all applicable laws and regulations. * reporting - all financial disclosures are full/fair * data integrity - accurate data is available when needed.
264
Accounting Cycle Defined
Systematic process of recording and processing financial transactions and events. A way of categorizing similar business and accounting activities.
265
Define The Human Resources/payroll cycle
* records activity related to employees and payroll. * gets funds from the financing cycle, provides labor to the production cycle, and provides data to the GL and reporting system.
266
Define The Financing Cycle
•gets funds from the revenue cycle, provides funds to the expenditure and HR/payroll Cycles, and provides data to the GL and reporting system.
267
Define The Production Cycle
•gets labor from HR/Payroll, gets money from financing, gets raw materials from expenditure, provides data to GL and reporting, provides finished goods to revenue.
268
Define The Revenue Cycle
* Gets finished goods from production * provides data to GL and reporting * provides funds to the financing. Core Activities: Sales: receive customer orders, approve customer credit/sales authorization. Physical (or virtual) custody of products/svcs: fill the order and prepare for shipping, ship AR: bill as needed, management receivables Cash: collection and receipt of payments, reconciliation/control activities
269
Define The Expenditure Cycle
Gets money from financing, provides data to the GL and reporting, provides raw materials to production. Core activities: Request and authorize purchase, acquiring goods, taking custody and paying for goods.
270
Remittance Advice
Purpose: helps match payments to invoices. Comments and Controls: Sent by customers to selling company to indicate payment.
271
Risks of Systems Development
1. It doesn't work the way it was designed to. 2. Cost over-runs: cost more than it should have. 3. Time: it falls behind schedule.
272
Reasons for Systems Development Failure
* Lack of senior management knowledge of, and support and involvement in, major IT projects. * Difficulty in specifying requirements. * Emerging technologies (hardware and software) may not work. * Lack of standardization project management and methods. * Resistance to change; lack of proper "change management". * Scope and Project creep. (Ex. Going over budget) * Lack of user participation and support. * Inadequate testing and training. * Poor project management--underestimating of time, resources, and scope.
273
Who is involved with Systems Development Life Cycle (SDLC)
1. IT Steering Committee •Concerned with the strategic plan for IT within the organization. •Review, approve and prioritize Systems Development proposals. •include IT department and functional user areas 2. Lead Systems Analyst •manages development team and project. •direct contact with end users. Usually responsible for developing overall programming logic and functionality. 3. Systems Analysts and Application Programmers •design, create and test system, programs, and controls in partnership with users 4. End users •Identify problems and often suggest first-pass solutions.
274
Stages in the SDLC *need to know the order of steps
``` SYSTEM PLANNING AND BUILDING 1. Planning and feasibility 2. Analysis / Requirements 3. Design 4. Development IMPLEMENTING, TESTING AND MAINTENANCE 5. Testing 6. Implementation 7. Maintenance ```
275
SDLC: Planning and Feasibility
3 dimensions of feasibility: 1. Technical: Can it be built? 2. Economic: Is it cost effective? 3. Operational: Will it meet user needs? If feasible, crest a project plan: •Critical success factors: What just happen to succeed? •Scope: Project purpose and most important goals. •Major risks: $?, delivery date? Technology? •Milestones and responsibilities: Who will do what, when?
276
SDLC: Analysis / Requirements
Systems analysts partner with end users to: •Understand business processes and purposes. •Document system requirements Requirements Defined: Document that identifies system functionality Framework for system design and development Parties sign to signify agreement on requirements. (Contract).
277
Joint Application Development (JAD)
Collaboration of IT personnel and end users to define system. Part of analysis/requirements in SDLC
278
Accountants/internal auditors role in Analysis/Requirements (SDLC)
* Prepare or evaluate RFPs (request for proposals) for hardware or software. * Vendor evaluations: Reliability (financial and product), service commitment, training, tech support + documentation.
279
SLDC: Design
Design: Define systems' technical specifications. Two components: 1. Technical architecture specification: Define hardware, systems software and networking technology of systems. 2. Systems model specifications: (a) Graphical models (flowcharts, etc.) describing system components and processes. (b) Create system menus and screen formats.
280
SDLC: Development
* Programmer sues design specifications to develop the program and data files. * Purchases hardware and IT infrastructure specified in design.
281
SDLC: Testing
Does system meet the design specifications in the requirements definition? TEST: •With both correct and erroneous data •At expected operational loads TYPES OF TESTING: •Individual processing unit: Each component works •System testing: Modules work together •Inter-system testing: System works with other systems •User acceptance: System meets business needs
282
SDLC: Implementation
Includes: •Data conversion (old data into new format) •User training
283
SDLC: Maintenance
Monitor and update programs and/or procedures •Remember Y2K? System updates return to start of SDLC process. (Size will determine if you go through the whole process or just Components)
284
What is the pilot implementation method for new systems?
Similar to phased implementation, except divide users into smaller groups and train by groups (vs. by modules)
285
What is the "cold turkey" (AKA the "plunge" or "Big Bang" implementation method for new systems?
Old system is dropped and the new system is put in place all at once. RISKY!