Chapter 3 Availabilty of Information System
Chapter 3 Availabilty of Information System
CHAPTER 3
AVAILABILTY OF INFORMATION SYSTEM
Objective
1. Discuss about the Availability of Information System
2. Explain the Database Management
3. Explain the Conversion Audit
Availability risk is one of the major technology risks. With an increase in the
coupling of business processes with information systems, which are in turn
exposed to technology risks, there is a dire need to have a disaster recovery
plan in place. While insurance can provide compensation for the loss of
resources, a disaster recovery plan puts various IS resources in place, if such
disaster ever occurs. It is, therefore, a corrective control.
A business continuity plan begins with business impact analysis and involves
risk evolution and loss estimates for the outage. On the basis of outage costs,
disaster recovery resources are put in place. Owing to cost/benefit
consideration, disaster recovery resources cannot be put in place for all types
of disasters. These are put in place for the likely disasters and for critical
applications. The estimations made and priorities set for the disaster recovery
plans also give financial auditors an idea about the risks and importance of
application. This can also be a factor while planning for audit in a computerized
environment.
AUDITING IN CIS ENVIRONMENT
.Access Control
All users must get just-minimum- access which has two aspects to it:
Second even authorized users should not have full access. The
access should be need based. For this, all operating systems have two
types of facilities, namely, authentication and authorization. Authentication
allows only the authorized users to access the systems. Authorization,
allows just-minimum-access to the files and directory. To manage both
these facilities in all operating systems there is a facility called systems
administration. The first thing the auditors should do, when they start
working under the new operating system is to get to know the authorization,
authentication and system administration functions relating to these
facilities. Fortunately, all operating systems have more or less the same
type of facilities, so the learning becomes quicker.
Database Management
The IT Act has prescribed that all record retention rules are also applicable to
electronic records. The Reserve Bank of India has also prescribed record
retention rules for the banks and the IFAC has issued standards for database
systems used in accounting information system. Oracle is the most-commonly
used RDBMS in India and world over, providing facilities to implement access
controls through sign-on procedures and authorization. Authorization is
implemented through object ownership, granting of privileges, and creation of
roles and assignment of roles to the users.
The aim of substantive testing, or, for that matter, all types of testing is to
evaluate the assertions made in the financial statement. That is, whether the
financial statement depicts the true and fair picture. Since the auditor cannot
do much to the inherent risks and control risks, he has to plan his audit to use
such tools and techniques, as to reduce the detection risks. Computer assisted
tools and techniques help here and more so general tool-set providing facilities
to conduct substantive testing.
ACL is the market leader in the arena of general audit software. The software
provides the facilities needed by an auditor to evaluate all the seven types of
assertions made in any financial statement. In addition, it also offers the facility
to create work papers crucial in any audit assignment, besides providing an
option to understand the data and files.
ACL Software offers tools to understand the quantitative features of the data
as well as the qualitative features of the data. Moreover, it provides facilities to
conduct substantive testing.
ACL has an excellent feature to create the command log. This keeps a check
on the auditor, improves the audit quality and also proves useful for work
papers. Each ACL document, by default, has a log file. In addition, it can also
be used for testing the controls implemented on the system like the security
facilities of an operating system and database. Therefore, it can also help in
systems audit.
Conversion Audit
Reference:
Compilation of lecture
notes by Dean Bacay