ログイン

CHAPTER 2: AUDITING IT GOVERNANCE CONTROLS P1

CHAPTER 2: AUDITING IT GOVERNANCE CONTROLS P1
57問 • 1年前
  • Charles Jaojao
  • 通報

    問題一覧

  • 1

    is a relatively new subset of corporate gover- nance that focuses on the management and assessment of strategic IT resources.

    Information Technology (IT) Governance

  • 2

    Key ob- jectives of IT governance are to:

    1. reduce risk 2. ensure that investments in IT resources add value to the corporation

  • 3

    three IT governance issues that are addressed by SOX and the COSO internal control framework.

    1. Organizational structure of the IT function 2. Computer center operations 3. Disaster recovery planning

  • 4

    In this section, some im- portant control issues related to IT structure are examined. These are illustrated through two extreme organizational models—

    1. centralized approach 2. distributed approach

  • 5

    Under the _______ model, all data processing is performed by one or more large computers housed at a central site that serves users throughout the organization

    centralized data processing model

  • 6

    function is usually treated as a cost center whose operating costs are charged back to the end users.

    IT services

  • 7

    a central- ized IT services structure and shows its primary service areas: (3)

    1. database administration 2. data processing 3. systems development and maintainance

  • 8

    Centrally organized companies maintain their data resources in a central location that is shared by all end users.

    data administration

  • 9

    In this shared data arrangement, an independent group headed by the _______is responsible for the security and integrity of the database.

    database administrator (DBA)

  • 10

    manages the computer resources used to perform the day- to-day processing of transactions.

    data processing group

  • 11

    It consists of the following organizational functions: (3)

    1. data conversion 2. computer operation 3. data library

  • 12

    transcribes transaction data from hard-copy source documents into computer input.

    data conversion

  • 13

    The electronic files produced in data conversion are later processed by the central computer, which is managed by the computer operations groups.

    computer operations

  • 14

    is a room adjacent to the computer center that provides safe storage for the off-line data files.

    data library

  • 15

    library is used to store original copies of commercial software and their licenses for safekeeping.

    data library

  • 16

    who is responsible for the receipt, storage, retrieval, and custody of data files, controls access to the library.

    data librarian

  • 17

    The information systems needs of users are met by two related functions:

    1. system development 2. systems maintenance

  • 18

    is responsible for analyzing user needs and for designing new systems to satisfy those needs.

    system development

  • 19

    The participants in system development activities include: (3)

    1. systems professional 2. end users 3. stakeholders

  • 20

    include systems analysts, database designers, and programmers who design and build the system.

    systems professionals

  • 21

    gather facts about the user’s problem, analyze the facts, and formulate a solution. The product of their ef- forts is a new information system

    systems professionals

  • 22

    are those for whom the system is built. They are the managers who re- ceive reports from the system and the operations personnel who work directly with the system as part of their daily responsibilities.

    end users

  • 23

    are individuals inside or outside the firm who have an interest in the system, but are not end users.

    stakeholders

  • 24

    refers to making changes to program logic to accommodate shifts in user needs over time.

    maintenance

  • 25

    The previous chapter stressed the importance of segregating incompatible duties within manual activities. Specifically, operational tasks should be segregated to:

    1. separate transaction authorization from transaction processing 2. separate record keeping from asset custod 3. divide transaction-processing tasks among individuals.

  • 26

    is responsible for a number of critical tasks pertaining to database security, including creating the database schema and user views, assigning database access authority to users, monitoring database usage, and planning for future expansion.

    DBA function

  • 27

    Some companies organize their in-house systems development function into two groups:

    1. systems analysis 2. programming

  • 28

    works with the users to produce detailed designs of the new systems.

    systems analysis

  • 29

    codes the programs according to these design specifications.

    programming group

  • 30

    Although a common arrangement, this approach is associated with two types of control problems: (2)

    1. inadequate documentation 2. program fraud

  • 31

    Poor-quality systems documentation is a chronic IT problem and a significant challenge for many organizations seeking SOX compliance. There are at least two explanations for this phenomenon. First, documenting systems is not as interesting as designing, testing, and implementing them. Systems professionals much prefer to move on to an exciting new project rather than document one just completed.

    inadeqate documentation

  • 32

    The second possible reason for poor documentation is

    job security

  • 33

    When the original programmer of a system is also assigned mainte- nance responsibility, the potential for fraud is increased.

    program fraud

  • 34

    involves making unauthorized changes to program modules for the purpose of committing an illegal act.

    program fraud

  • 35

    Figure 2.2 presents a superior organizational structure in which the systems development function is separated into two different groups:

    1. new systems development 2. systems maintenance

  • 36

    is responsible for designing, pro- gramming, and implementing new systems projects.

    new systems development

  • 37

    Upon successful implementation, responsibility for the system’s ongoing maintenance falls to the

    systems maintenance group

  • 38

    This restructuring has implications that directly address the two control problems just described:

    1. First, documentation standards are improved 2. Second, denying the original programmer future access to the program deters pro- gram fraud.

  • 39

    An alternative to the centralized model is the concept of:

    distributed data processing (DDP)

  • 40

    The topic of DDP is quite broad, touching upon such related topics as:

    1. end-user computing 2. commercial software 3. networking 4. office automation

  • 41

    The IT units may be distributed according to:

    1. business function 2. geographic location

  • 42

    Risks Associated with DDP (5)

    1. inefficient use of resources 2. destruction of audit trails 3. inadequate segregation of duties 4. increased potential for programming errors and systems failure 5. lack of standards

  • 43

    three types of risks associated with inefficient use of organizational resources.

    1. risk of mismanagement of organization-wide IT resources by end users. 2. redundant tasks being performed within the end-user committee. 3. risk of incompatible hardware and software among end-user functions.

  • 44

    Advantages of DDP

    1. cost reduction 2. improved cost control 3. improved user satisfaction 4. backup

  • 45

    Controlling the DDP environment

    1. central testing of commercial software and hardware 2. user services 3. standard-setting body 4. personnel review

  • 46

    The follow- ing are areas of potential exposure that can impact the quality of information, accounting records, transaction processing, and the effectiveness of other more conventional internal controls. (6)

    1. physical location 2. construction 3. access 4. air conditioning 5. fire suppression 6. fault tolerance

  • 47

    Two examples of fault tolerance technologies are:

    1. Redundant arrays of independent disks (RAID) 2. uninterruptable power supplies

  • 48

    Audit objectives under the computer center (tests of physical security controls)

    1. test of physical construction 2. test of the fire detection system 3. test of access control 4. test of raid 5. test of the uninterruptible power supply 6. test for insurance coverage

  • 49

    Three catergories of disaster that can rob an organization of its IT resources

    1. natural 2. human-made 3. system failure

  • 50

    Natural disaster

    fire flood tornado

  • 51

    Human-made

    sabotage error

  • 52

    System failure

    power outages drive failure crash/lock

  • 53

    This is a comprehensive statement of all actions to be taken before, during, and after any type of disaster.

    Disaster Recovery Plan

  • 54

    4 common features of DRP

    1. identify critical applications 2. create disaster recovery team 3. provide site backup 4. specify backup and offsite storage procedures

  • 55

    Options available that are most common in providing second-site backup

    1. mutual aid pact 2. empty shell 3. recovery operations center 4. internally provided backup

  • 56

    Backup and offsite storage procedures

    1. operating system backup 2. application backup 3. backup data files 4. backup documentation 5. backup supplies and source documents 6. testing the DRP

  • 57

    Audit procedures under disaster recovery plan

    1. site backup 2. critical application list 3. software backup 4. data backup 5. backup supplies, document, and documentation 6. disaster recovery team

  • HBO

    HBO

    Charles Jaojao · 26問 · 1年前

    HBO

    HBO

    26問 • 1年前
    Charles Jaojao

    government accounting

    government accounting

    Charles Jaojao · 100問 · 1年前

    government accounting

    government accounting

    100問 • 1年前
    Charles Jaojao

    government accounting part 2

    government accounting part 2

    Charles Jaojao · 68問 · 1年前

    government accounting part 2

    government accounting part 2

    68問 • 1年前
    Charles Jaojao

    government accounting part 3

    government accounting part 3

    Charles Jaojao · 39問 · 1年前

    government accounting part 3

    government accounting part 3

    39問 • 1年前
    Charles Jaojao

    hbo

    hbo

    Charles Jaojao · 69問 · 1年前

    hbo

    hbo

    69問 • 1年前
    Charles Jaojao

    statistics

    statistics

    Charles Jaojao · 20問 · 1年前

    statistics

    statistics

    20問 • 1年前
    Charles Jaojao

    management

    management

    Charles Jaojao · 52問 · 1年前

    management

    management

    52問 • 1年前
    Charles Jaojao

    management 2

    management 2

    Charles Jaojao · 100問 · 1年前

    management 2

    management 2

    100問 • 1年前
    Charles Jaojao

    management 3

    management 3

    Charles Jaojao · 13問 · 1年前

    management 3

    management 3

    13問 • 1年前
    Charles Jaojao

    theology

    theology

    Charles Jaojao · 100問 · 1年前

    theology

    theology

    100問 • 1年前
    Charles Jaojao

    theology 2

    theology 2

    Charles Jaojao · 11問 · 1年前

    theology 2

    theology 2

    11問 • 1年前
    Charles Jaojao

    government accounting

    government accounting

    Charles Jaojao · 44問 · 1年前

    government accounting

    government accounting

    44問 • 1年前
    Charles Jaojao

    fundamentals

    fundamentals

    Charles Jaojao · 27問 · 1年前

    fundamentals

    fundamentals

    27問 • 1年前
    Charles Jaojao

    motivation

    motivation

    Charles Jaojao · 31問 · 1年前

    motivation

    motivation

    31問 • 1年前
    Charles Jaojao

    communication

    communication

    Charles Jaojao · 48問 · 1年前

    communication

    communication

    48問 • 1年前
    Charles Jaojao

    partnership

    partnership

    Charles Jaojao · 22問 · 1年前

    partnership

    partnership

    22問 • 1年前
    Charles Jaojao

    Financial Ratios

    Financial Ratios

    Charles Jaojao · 18問 · 1年前

    Financial Ratios

    Financial Ratios

    18問 • 1年前
    Charles Jaojao

    premidterm examination

    premidterm examination

    Charles Jaojao · 46問 · 1年前

    premidterm examination

    premidterm examination

    46問 • 1年前
    Charles Jaojao

    Pre-midterm examination part 1

    Pre-midterm examination part 1

    Charles Jaojao · 25問 · 1年前

    Pre-midterm examination part 1

    Pre-midterm examination part 1

    25問 • 1年前
    Charles Jaojao

    CHAPTER 1: AUDITING AND INTERNAL CONTROL P1

    CHAPTER 1: AUDITING AND INTERNAL CONTROL P1

    Charles Jaojao · 100問 · 1年前

    CHAPTER 1: AUDITING AND INTERNAL CONTROL P1

    CHAPTER 1: AUDITING AND INTERNAL CONTROL P1

    100問 • 1年前
    Charles Jaojao

    CHAPTER 1: AUDITING AND INTERNAL CONTROL P2

    CHAPTER 1: AUDITING AND INTERNAL CONTROL P2

    Charles Jaojao · 36問 · 1年前

    CHAPTER 1: AUDITING AND INTERNAL CONTROL P2

    CHAPTER 1: AUDITING AND INTERNAL CONTROL P2

    36問 • 1年前
    Charles Jaojao

    CHAPTER 1

    CHAPTER 1

    Charles Jaojao · 100問 · 1年前

    CHAPTER 1

    CHAPTER 1

    100問 • 1年前
    Charles Jaojao

    CHAPTER 1 P2

    CHAPTER 1 P2

    Charles Jaojao · 22問 · 1年前

    CHAPTER 1 P2

    CHAPTER 1 P2

    22問 • 1年前
    Charles Jaojao

    問題一覧

  • 1

    is a relatively new subset of corporate gover- nance that focuses on the management and assessment of strategic IT resources.

    Information Technology (IT) Governance

  • 2

    Key ob- jectives of IT governance are to:

    1. reduce risk 2. ensure that investments in IT resources add value to the corporation

  • 3

    three IT governance issues that are addressed by SOX and the COSO internal control framework.

    1. Organizational structure of the IT function 2. Computer center operations 3. Disaster recovery planning

  • 4

    In this section, some im- portant control issues related to IT structure are examined. These are illustrated through two extreme organizational models—

    1. centralized approach 2. distributed approach

  • 5

    Under the _______ model, all data processing is performed by one or more large computers housed at a central site that serves users throughout the organization

    centralized data processing model

  • 6

    function is usually treated as a cost center whose operating costs are charged back to the end users.

    IT services

  • 7

    a central- ized IT services structure and shows its primary service areas: (3)

    1. database administration 2. data processing 3. systems development and maintainance

  • 8

    Centrally organized companies maintain their data resources in a central location that is shared by all end users.

    data administration

  • 9

    In this shared data arrangement, an independent group headed by the _______is responsible for the security and integrity of the database.

    database administrator (DBA)

  • 10

    manages the computer resources used to perform the day- to-day processing of transactions.

    data processing group

  • 11

    It consists of the following organizational functions: (3)

    1. data conversion 2. computer operation 3. data library

  • 12

    transcribes transaction data from hard-copy source documents into computer input.

    data conversion

  • 13

    The electronic files produced in data conversion are later processed by the central computer, which is managed by the computer operations groups.

    computer operations

  • 14

    is a room adjacent to the computer center that provides safe storage for the off-line data files.

    data library

  • 15

    library is used to store original copies of commercial software and their licenses for safekeeping.

    data library

  • 16

    who is responsible for the receipt, storage, retrieval, and custody of data files, controls access to the library.

    data librarian

  • 17

    The information systems needs of users are met by two related functions:

    1. system development 2. systems maintenance

  • 18

    is responsible for analyzing user needs and for designing new systems to satisfy those needs.

    system development

  • 19

    The participants in system development activities include: (3)

    1. systems professional 2. end users 3. stakeholders

  • 20

    include systems analysts, database designers, and programmers who design and build the system.

    systems professionals

  • 21

    gather facts about the user’s problem, analyze the facts, and formulate a solution. The product of their ef- forts is a new information system

    systems professionals

  • 22

    are those for whom the system is built. They are the managers who re- ceive reports from the system and the operations personnel who work directly with the system as part of their daily responsibilities.

    end users

  • 23

    are individuals inside or outside the firm who have an interest in the system, but are not end users.

    stakeholders

  • 24

    refers to making changes to program logic to accommodate shifts in user needs over time.

    maintenance

  • 25

    The previous chapter stressed the importance of segregating incompatible duties within manual activities. Specifically, operational tasks should be segregated to:

    1. separate transaction authorization from transaction processing 2. separate record keeping from asset custod 3. divide transaction-processing tasks among individuals.

  • 26

    is responsible for a number of critical tasks pertaining to database security, including creating the database schema and user views, assigning database access authority to users, monitoring database usage, and planning for future expansion.

    DBA function

  • 27

    Some companies organize their in-house systems development function into two groups:

    1. systems analysis 2. programming

  • 28

    works with the users to produce detailed designs of the new systems.

    systems analysis

  • 29

    codes the programs according to these design specifications.

    programming group

  • 30

    Although a common arrangement, this approach is associated with two types of control problems: (2)

    1. inadequate documentation 2. program fraud

  • 31

    Poor-quality systems documentation is a chronic IT problem and a significant challenge for many organizations seeking SOX compliance. There are at least two explanations for this phenomenon. First, documenting systems is not as interesting as designing, testing, and implementing them. Systems professionals much prefer to move on to an exciting new project rather than document one just completed.

    inadeqate documentation

  • 32

    The second possible reason for poor documentation is

    job security

  • 33

    When the original programmer of a system is also assigned mainte- nance responsibility, the potential for fraud is increased.

    program fraud

  • 34

    involves making unauthorized changes to program modules for the purpose of committing an illegal act.

    program fraud

  • 35

    Figure 2.2 presents a superior organizational structure in which the systems development function is separated into two different groups:

    1. new systems development 2. systems maintenance

  • 36

    is responsible for designing, pro- gramming, and implementing new systems projects.

    new systems development

  • 37

    Upon successful implementation, responsibility for the system’s ongoing maintenance falls to the

    systems maintenance group

  • 38

    This restructuring has implications that directly address the two control problems just described:

    1. First, documentation standards are improved 2. Second, denying the original programmer future access to the program deters pro- gram fraud.

  • 39

    An alternative to the centralized model is the concept of:

    distributed data processing (DDP)

  • 40

    The topic of DDP is quite broad, touching upon such related topics as:

    1. end-user computing 2. commercial software 3. networking 4. office automation

  • 41

    The IT units may be distributed according to:

    1. business function 2. geographic location

  • 42

    Risks Associated with DDP (5)

    1. inefficient use of resources 2. destruction of audit trails 3. inadequate segregation of duties 4. increased potential for programming errors and systems failure 5. lack of standards

  • 43

    three types of risks associated with inefficient use of organizational resources.

    1. risk of mismanagement of organization-wide IT resources by end users. 2. redundant tasks being performed within the end-user committee. 3. risk of incompatible hardware and software among end-user functions.

  • 44

    Advantages of DDP

    1. cost reduction 2. improved cost control 3. improved user satisfaction 4. backup

  • 45

    Controlling the DDP environment

    1. central testing of commercial software and hardware 2. user services 3. standard-setting body 4. personnel review

  • 46

    The follow- ing are areas of potential exposure that can impact the quality of information, accounting records, transaction processing, and the effectiveness of other more conventional internal controls. (6)

    1. physical location 2. construction 3. access 4. air conditioning 5. fire suppression 6. fault tolerance

  • 47

    Two examples of fault tolerance technologies are:

    1. Redundant arrays of independent disks (RAID) 2. uninterruptable power supplies

  • 48

    Audit objectives under the computer center (tests of physical security controls)

    1. test of physical construction 2. test of the fire detection system 3. test of access control 4. test of raid 5. test of the uninterruptible power supply 6. test for insurance coverage

  • 49

    Three catergories of disaster that can rob an organization of its IT resources

    1. natural 2. human-made 3. system failure

  • 50

    Natural disaster

    fire flood tornado

  • 51

    Human-made

    sabotage error

  • 52

    System failure

    power outages drive failure crash/lock

  • 53

    This is a comprehensive statement of all actions to be taken before, during, and after any type of disaster.

    Disaster Recovery Plan

  • 54

    4 common features of DRP

    1. identify critical applications 2. create disaster recovery team 3. provide site backup 4. specify backup and offsite storage procedures

  • 55

    Options available that are most common in providing second-site backup

    1. mutual aid pact 2. empty shell 3. recovery operations center 4. internally provided backup

  • 56

    Backup and offsite storage procedures

    1. operating system backup 2. application backup 3. backup data files 4. backup documentation 5. backup supplies and source documents 6. testing the DRP

  • 57

    Audit procedures under disaster recovery plan

    1. site backup 2. critical application list 3. software backup 4. data backup 5. backup supplies, document, and documentation 6. disaster recovery team