AIS-CHAPTER-4
AIS-CHAPTER-4
Encryption - Converts sensitive data into unreadable formats (cipher text) and requires a key to
decrypt it, protecting data from unauthorized access.
Types of Encryptions:
Symmetric encryption: Uses one key for both encrypting and decrypting data.
Public key encryption: Public key encrypts data, while the private key decrypts it.
Encryption Strength: Stronger encryption keys (like 256 bit) make it harder for hackers to
break the code.
Wireless Network Security:
WEP: Older encryption, vulnerable to attacks.
WPA: Improved security for wireless networks through stronger encryption and user
authentication.
SSID: A unique network password to prevent unauthorized access.
Virtual Private Networks (VPNs) - VPNs provide secure, encrypted communication tunnels
over public networks, enabling remote access to internal systems.
Secure Sockets Layer (SSL) -SSL encrypts data transferred via websites, especially during
transactions, and can be recognized by the “https://” in web addresses.
Malware Protection:
Viruses: Malicious programs that attach to files and cause damage.
Worms: Self-replicating programs that overwhelm system memory.
Antivirus Software: Detects and neutralizes viruses and worms.
Proactive Security Measures:
STRUCTURE ORGANIZATION
Organizations with extensive IT systems should govern the overall development and operation
of IT systems through the use of an IT governance committee, usually made up of top
executives.
- The committee, which would include officers such as the chief executive officer (CEO), chief
financial officer (CFO), chief information officer (CIO), and the heads of business units such
as the vice president of marketing, has several important responsibilities, including the
following:
- It governance committee consists of top management; its role is to develop policies and to
delegate duties such that those policies are properly implemented.
- It is important that the IT governance committee ensure that the organization maintains hiring
and promotion procedures which screen candidates and verify the background and references of
applicants.
- It governance committee should also see that the organization maintains written job
descriptions and requirements for IT positions.
THE DIVISION OF DUTIES AND THE POLICIES OF THE ORGANIZATION
The functional responsibilities within an IT system must include proper segregation of duties.
BUSINESS CONTUINITY
THE DATABASE
In an IT system, all or most accounting records and data are stored in electronic form
in the database.
The database also is an exposure area. It is a part of the IT system that is susceptible
to security, availability, processing integrity, and confidentiality risks.
THE DATABASE MANAGEMENT SYSTEM
The database management system (DBMS) is a software system that manages the
interface between many users and the database.
The inventory data can be stored in the database and shared by all three user groups. Each
individual user group may have a different level of access.
The DBMS poses security, confidentiality, availability, and processing integrity risk
exposures.
Both the data and the database management system are critical components that must be
adequately guarded to protect business continuity.
Loss of the data or alteration to the DBMS can halt operations.
LANS AND WANS
A local area network, or LAN, is a computer network covering a small geographic area.
In most cases, LANs are within a single building or a local group of buildings.
Most LANs are sets of personal computers or workstations that are connected in order to
share data and devices such as printers. Typically, the LAN is connected to a larger
computer, the server, where data and some programs reside and are shared over the LAN.
A group of LANs connected to each other to cover a wider geographic area is called a
wide area network, or WAN.
LANs and WANs are connected into the larger network of servers and computers within a
company, the LANs represent risk exposure areas.
WIRELESS NETWORKS
Wireless networks have become very popular in organizations because they allow
workers to connect to the network without being tethered to a network cable.
In the wireless network, signals are transmitted through the air rather than over cables.
These network signals are similar to radio signals; therefore, anyone who can receive
those radio signals may gain access to the network.
A popular activity is to find a company whose network signal bleeds outside the building
to the sidewalk around it. Potential abusers of this network make identifiable chalk marks
on the sidewalks so that others can find the network access. This activity has become
known as “warchalking.”
The legality and ethics of warchalking are debatable, but a company might avoid it by
instituting proper controls, such as wired equivalency privacy (WEP) or wireless
protected access (WPA), station set identifiers (SSID), and encrypted data.
THE INTERNET AND WORLD WIDE WEB
Many companies use the Internet to buy or sell via a website or to better serve customers
and/or employees.
The Internet connection required to conduct Web-based business can open the company
network to unauthorized users, hackers, and other network break-in artists.
An unauthorized user can compromise security and confidentiality and affect availability
and processing integrity by altering data or software or by inserting virus or worm
programs.
A typical network configuration for Internet connection to a company’s network that
there is a separate computer serving as the Web server. This computer Web server is
isolated from the company network via a firewall.
TELECOMMUTING WORKERS AND MOBILE WORKERS
A significant number of employees in the United States work from home, using some type of
network connection to the office. This work arrangement is commonly called telecommuting or
teleworking. telecommuting work arrangements are used by nearly 20 percent of workers over
the age of 18. Telecommuting can offer benefits to both employer and employee.
The employee gains flexibility and other advantages of being at home, while the
employer may save office space and overhead expenses for the worker.
The potential disadvantages of telecommuting are that the tele- worker loses daily face-
to-face interaction and may miss meetings with other employees or supervisors.
Telecommuting workers cause two sources of risk exposures for their organizations.
1. The necessary network equipment and cabling can be an entry point for hackers and
unauthorized users.
2.The teleworker’s computer is also an entry point for potential unauthorized users; it is
not under the direct control of the organization, because it is located in the teleworker’s
home.
Addressing Security Challenges:
Security Policies: Organizations must implement robust security policies that specifically
address the unique security needs of telecommuters and mobile workers.
Virtual Private Networks (VPNs): Telecommuters should connect to the company
network via a VPN, which creates a secure, encrypted connection, protecting sensitive
data during transmission.
Firewall and Antivirus Software: Telecommuters and mobile workers must use up-to-
date firewalls and antivirus software to protect their devices from malware and
unauthorized access.
Remote Wipe Capability: Companies providing mobile devices to employees should
implement "remote wipe" capabilities, allowing IT professionals to remotely delete
company data and applications from lost or stolen devices, safeguarding sensitive
information.
ELECTRONIC DATA INTERCHANGE
Electronic data interchange (EDI) is the company-to-company transfer of stan- dard
business documents in electronic form.
EDI is widely used by businesses to buy and sell goods and materials.
The EDI network entails security, confidentiality, availability, and processing integrity
risks, as it is another “entry point” for unauthorized users or hackers EDI transactions
must be properly guarded and controlled by general controls including authentication,
computer logs, and network break-in controls.
The advantages of public cloud computing,
1. Scalability- as a company grows, it can easily purchase new capacity from the cloud
provider. It need not buy servers or new data storage as the cloud provider already has the
capacity. If a company has a large increase in business volume during certain seasons, it
can easily scale up the capacity purchased from the cloud provider.
2. Expanded access- once the software and data are stored in the cloud, it can be accessed
by multiple devices from many different locations.
3. Infrastructure is reduced- the company has a reduced need for servers and data storage
since most of these resources are provided by the cloud provider. This also means that the
cloud provider handles data security and backup of data.
4. Cost savings- Cloud computing is usually a pay-for-service model. In other words, a
company pays the cloud provider only for the level of services it actually uses. Cloud
computing also allows a company to reduce its investment in IT hardware and the
personnel needed to support IT hardware.
Risks of cloud computing
1. Security- All processing, storing data, and reading data occur over the Internet; therefore,
the third-party provider must have good user authentication, firewalls, encryption, and virtual
private network connections. firewalls, encryption, and virtual private network connections.
2. Availability- Any interruptions in service cause the software and data to be unavailable.
Company relies on provider’s backup plans
3. Processing integrity- All control of software installation, testing, and
upgrading is transferred to the provider of cloud computing services.
4. Confidentiality- the control of maintaining confidentiality is transferred to the third-party
provider. This includes an extra risk that employees of the third-party provider can possibly
browse and misuse company data.
APPLICATION SOFTWARE AND APPLICATION CONTROLS
APPLICATION SOFTWARE
Is a computer program that help user to performs a specific task in the system.
Applications software accomplishes end user tasks such as word processing spreadsheets,
database maintenance, and accounting functions.
APPLICATION CONTROL
Application controls are used specifically in accounting applications to control inputs,
processing, and outputs.
Application controls are intended to ensure that inputs and processing are accurate and
complete and that outputs are properly distributed, controlled, and disposed.
Types of Control
Input Control
Processing Control
Output Control
Input Control
are intended to ensure the accuracy and completeness of data input procedures and the
resulting data.
FIELD CHECK
A field check examines a field to determine whether the appropriate type (alpha or
numeric) of data was entered. If the wrong data type is entered, the application should
reject that data and alert the user with an error message.
VALIDITY CHECKS
A validity check examines a field to ensure that the data entry in the field is valid
compared with a preexisting list of acceptable values.
LIMIT CHECK
A limit check has only an upper limit; for example, hours worked cannot exceed a value
of 70% hours per week. Hours worked would never be negative, and it is conceivable that
it could be zero in some cases. Therefore, there is no need for a lower limit in that field,
and a limit check would be appropriate.
RANGE CHECKS
A range check has both an upper and a lower limit. Some fields, such as quantity
requested, may logically suggest that the entity cannot be less than 1.
REASONABLENESS CHECK
A reasonableness check compares the value in a field with those fields to which it is
related to determine whether the value is reasonableness.
COMPLETENESS CHECKS
A completeness check assesses the critical fields in an input screen to make sure that a
value is in those fields.
SIGN CHECK
A sign check examine a field to determine that it has the appropriate sign, positive or
negative.
SEQUENCE CHECKS
A sequence check ensures that the batch of transactions is sorted in order, but does not
help find missing transactions because it checks only sequence, not completeness.
CONTROL TOTALS
Are subtotals of selected fields for an entire batch of transactions. For a batch of similar
transactions, such as payroll transactions for a pay period, control totals can be calculated
before data are processed.
RECORD COUNTS
Are a simple court of the number of records processed. The records can be courted prior
to and after input, and the totals should agree.
BATCH TOTALS
Are totals of financial data, such as total gross pay or total federal tax deducted.
HASH TOTALS
Are totals of fields that have no apparent logical reason to be added.
PROCESSING CONTROL
Processing controls are intended to prevent, detect, or correct errors that occur during the
processing in an application.
Processing controls are intended to ensure the accuracy and completeness of processing
that occurs in accounting applications.
This reconciliation of control totals at various stages of the processing is called run-to-run
control totals.
OUTPUT CONTROLS
Output Control are intended to help ensure the accuracy, completeness, and security of
outputs that result from application processing.
Many outputs in an IT system are reports from the various applications. An example of
an output report is a payroll check register. There are two primary objectives of output
controls:
To ensure the accuracy and completeness of the output, and to properly manage the
safekeeping of output reports to ascertain that security and confidentiality of the
information is maintained.
To ensure accuracy and completeness, the output can be reconciled to control totals.
◆ Management has a duty to maintain internal controls over IT systems for several reasons.
Mainly to safeguard asset and funds
IT systems themselves, such as computer hardware and software, are assets that must be
protected from theft, abuse, or misuse.
The managers of the SEC have a duty to enforce policies that protect the computers and
the IT systems.
Similarly, a company has a duty to its owners to enforce policies and controls to prevent
misuse
Access to IT systems may give unauthorized users access to other assets which could
possibly result to fraudulent acts
Besides fraud, there are many kinds of unethical behaviors related to computers: