Uploaded by Kathleen Firme

Lesson-1

advertisement
Lesson 1 – Overview of IT Audit and Internal Control (A Foundation) and Auditing IT Planning and
Organization Part I
Overview:
This part examines the foundation of Information Technology (IT) Audit and control. This
foundation has evolved through the recognition of the need for strong IT controls by professional
organizations, business, and government. For the novice IT auditor, it provides a prospective of how far
the evolution of IT controls guidance and techniques has come. This section examines the emerging issues
in IT auditing today and in the future. It focuses on legal environment, its impact on information reviews,
and the important roles of IT auditors will play in examination of issues from IT contracts to compliance
with internet laws. Other major areas for IT auditors are the issues of security and privacy of IT. Lastly, we
provide an outlook for the information systems (IS) audit profession, a view of the future.
Learning Objective:
After studying this lesson, the student should:
• Understand the relationship between information technology and accounting.
• The information standard in today’s global business environment.
• The computer-based system transactions and laws that govern with issues of computer crime,
security and privacy of internet.
• The privacy on the Information Superhighway.
• The challenges IT auditor faces today.
• Discuss IT crimes and explain the three main categories of crimes involving computers.
• Summarize the Sarbanes–Oxley Act of 2002 federal financial integrity legislation.
• Describe and discuss the purposes of Computer and Homeland Security Act and Web Copyright
Law.
• Describe and discuss Privacy Legislation and the Federal Government Privacy Act
• Summarize the Health Insurance Portability and Accountability Act of 1996 and discuss its main
purposes and compliance.
-related crimes affect the auditing profession.
• Describe the types of auditors and their duties, functions and responsibilities, and the roles of
IT auditors.
• Discuss the different auditors’ Standards of Practice and the organizations that have issued
standards or guidance to the auditor.
• Discuss the importance of GAAP and GAAS to IT auditor.
• Learn the audit process for IT and the demands that will be placed on the profession in the
future.
• Learn the important objectives of this function are better control, complete audit trails, and
compliance with organizational policies.
• Have knowledge on what IT auditors face with many concerns about the exposure of computer
information systems to a multitude of risks.
• Know the concerns that arise from the objectives for the audit process and function.
• Know what IT auditors must prepare for and move into a world that literally depends on large,
heavily integrated computer systems.
Information Technology (IT) Environment: Why are Controls and Audit
Important?
IT Today and Tomorrow
Information technology (IT) is broadly used in all areas of commerce around the world. It is
imperative that the developing world of commerce needs a parallel growth of knowledge for IT
processes and control that is basically significant for every business’s stance on information. The
manner of pacing on how information should be available for businesses is a primary concern for
every each of them.
To name a few, control-oriented organizations such as American Institute of Certified Public
Accountant (AICPA), Canadian Institute of Chartered Accountants (CICA) and Association of
Certified Fraud Examiners (ACFE) recognizes the importance of further research, studies and
development regarding improved control for IT processes in businesses. This is to avoid
howsoever the growing numbers of cases of white-collar crimes, information theft, computer
fraud, information abuse, and other information/technology control concerns that is being heard
more repeatedly by the following security organizations, to wit: SANS (SysAdmin, Audit, Network,
Security) Institute, U.S. Government Accountability Office (GAO), Federal Bureau of Investigation
(FBI), Federal Trade Commission (FTC), Computer Security Institute (CSI), and Computer
Emergency Response Teams (CERT).
In addition, Control Objectives for Information and Related Technology (COBIT) is the
most recent addition to the major studies conducted regarding IT controls. It basically defines a
set of generic processes for the management of IT. Its components include:
1. Framework: Organize IT governance objectives and good practices by IT domains and processes,
and links them to business requirements.
2. Process descriptions: A reference process model and common language for everyone in an
organization. The processes map to responsibility areas of plan, build, run and monitor.
3. Control objectives: Provide a complete set of high-level requirements to be considered by
management for effective control of each IT process.
4. Management guidelines: Help assign responsibility, agree on objectives, measure performance,
and illustrate interrelationship with other processes.
5. Maturity models: Assess maturity and capability per process and helps to address gaps.
Colloquium for Information Systems Security Educators (CISSE) has been a leading proponent for
implementing the course of Instruction in information security (InfoSec) and Information
Assurance in education ever since 1996. Due to the fast dispersion of computer technologies and
the ease of information accessibility, knowledgeable and trained IT auditors are needed to ensure
that effective IT controls are in its comprehensive location to preserve data integrity and manage
access to information.
Information Integrity, Reliability, and Validity: Importance in Today’s Global Business
Environment
Based on historical events, organizations are crucially reliant on information’s accuracy
and availability. Information proven by facts and is timely communicated is an essential
mechanism a business need in its day-to-day operation. It serves as basis and foundation of trust
between the entity and the stakeholders.
Previous events reported pertaining to business dependency on information technology
has somehow evidently occurred during 1998 when an AT&T major switch failed on its software
and procedural processes that lasts for 18 hours which had prevented customers in accessing
their funds. The second event was regarding the communication satellite that had undergone
uncontrollable rotation that directly affected the pager communication systems around the world
as “useless” and companies using this kind of technology for e-account transactions were not able
to process their information for 24 hours where they have ended up paying by cash.
Moreover, having a deeper understanding about information’s standards will pave the
way on efficiency and efficacy of fair and just sharing of data communication among businesses,
to wit:
a. Integrity –completeness, honesty, and fairness of information.
b. Reliability – the extent to which information yields the same results on repeated trials.
c. Validity –is the state of being well-grounded, just, and relevant.
The instance that will make this kind of information be relegated and accessed by the
users will be accomplished through the help of global area networks. Still, information technology
continues to play a major role in this situation. However, stringent control and reasonable
dissemination of the related data should somehow be considered in the progressing years to
prevent data privacy violations, system errors, and internet-crime related cases that may befall in
the developing business environment.
E-Commerce and Electronic Fund Transfer
In the developing world today, it is undeniably gotten that transactions among businesses
and customers grew even larger than before. Payments have been frequently dealt through cash,
checks, or thru online banking. The financial system became more advanced, integrated, and
sophisticated which by far is supported by e-transaction platform particularly known as Electronic
Funds Transfer (EFT).
Electronic Funds Transfer (EFT) is a system for transferring money from one bank to
another without using a ‘paper money’. The funds flow could be either a single institution or
across a multiple institution. It has become broadly known and initiated via mobile phones,
personal computers, internet networks, and improved cryptography. In short, this transaction has
no direct engagement or intervention of a bank staff. It has started to play its role in the industry
since 19th century in funds transferring which is a usual thing in a commercial transaction. Finally,
it emerged to become accessible and comprehensive for electronic money transfers thru
computer-based systems.
It is well-known by a number of names throughout countries and different payment
systems e.g., “electronic check” or “e-check” in United States, “bank transfer” or “bank payment”
in United Kingdom and lastly, “giro transfer” in several European countries. Generally, the main
advantage of EFT is time. Other benefit is immediate payment, which brings an up to date cash
flow. It reflects a real-time e-receipt and proof of transactions on which it is being engaged with.
Besides, it is indisputable that users of this platform are basically satisfied with the result and
convenience it provides for the commerce world and the society as well.
Federal Security Legislation
The IT auditor should recognize that the U.S. federal government has passed a number of
laws to deal with issues of computer crime and security and privacy of IS. Private industry has in
the past been reluctant to implement these laws because of the fear of the negative impact it
could bring to a company's current and future earnings and image to the public. An example of a
number of past laws in place is as follows.
Computer Fraud and Abuse Act of 1986
The Computer Fraud and Abuse Act of 1986 makes it a crime for anyone to access
without authorization a computer or computer system used by a financial institution, US
government agency, or any organization or individual involved in interstate or foreign
commerce or communication. In addition to criminalizing many forms of computer
hacking, intrusion, or actions that exceed authorized use, the law also addresses
computer espionage, computer trespassing, committing fraud using a computer, or
causing or threatening to cause damage to a computer. Although the law focuses on
behavior by outsiders against an organization or its computing infrastructure, it highlights
the need for organizations to establish effective security controls and to monitor their
own environments to protect against outside attacks and to ensure that none of its own
computing resources are used in ways that would violate the law. The Computer Fraud
and Abuse Act has been amended several times by subsequent legislation, increasing the
number and types of actions considered crimes under the law and resulting in a broader
definition of computers subject to its provisions. Because the statutory definition of
“protected computer” includes any computing device used in interstate or international
communication, the law can be interpreted to include mobile equipment such as cellular
phones or other devices capable of Internet connectivity.
Computer Security Act of 1987
The Computer Security Act of 1987 was a United States federal law enacted in
1987 due to congressional concerns and public awareness on computer security-related
issues and because of disputes on the control of unclassified information. It was intended
to improve the security and privacy of sensitive information in federal computer systems
and to establish minimally acceptable security practices for such systems. It required the
creation of computer security plans, and appropriate training of system users or owners
where the systems would display, process or store sensitive information.
Privacy on the Information Superhighway
The term “Information Superhighway” is attributed to the former US Vice President Al
Gore. He used the term to describe a communications network akin to a highway system. The
system will allow everyone to be connected to everyone else, have a universal standard, and
minimize bottlenecks.
One major concern in information superhighway is privacy. “Forging e-mail is notoriously
easy,” said Gary Jackson, the director of academic computing at the Massachusetts Institute of
Technology. The messages can be manipulated such that it looks as if someone else sent it which
makes verifying the origination of the message difficult. There is also a potential for the
unauthorized opening of electronic mail; this would be considered misuse of Internet facilities.
On the other hand, activities between two consenting adults are usually private and harmless.
Anyone who uses the Internet or puts any document out on the Internet needs to be concerned
with the copyright law and intellectual property protection. “All works of expression have at least
one thing in common: they are protected by copyright as soon as they are created and fixed in a
tangible medium”. The copyright law grants author the right of intellectual property and certain
exclusive rights to their works for a limited time. This applies to Usenet postings and e-mail
messages as well. Both are original works of authorship fixed in a tangible medium of expression.
There are two doctrines which will probably allow some copying of Usenet postings and e-mail
messages: fair use and implied license. Appropriate fair use may be considered if it was not used
in a commercial nature, the postings or message was not an artistic or dramatic work, only a short
quotation was copied, and there was little or no impact on any market for the posting or e-mail
message. With e-mail messages, one must also be concerned with other laws such as defamation,
invasion of privacy, and trade secrecy when contents of a private e-mail message are revealed.
Others support the idea of an implied license; they argue that anyone who posts their ideas to
Usenet “is granting an implied license for others to similarly copy or quote that posting, too”.
There has been little litigation testing these theories in court since most postings are not
registered with the Copyright office. In order for the defendant to win, he/she must show actual
damages. These cases do not usually result in any actual damages, and therefore it becomes too
expensive to sue for negligible damages.
However, a copyright only protects an author’s original expression and not the “ideas,
system or factual information that is conveyed in the copyrighted work”. It also does not apply to
U.S. Government works. Works of the U.S. Government cannot be copyrighted and are considered
public domain, thus becoming available to be freely used by anyone for any purpose.
Security Privacy and Audit
The computer is changing the world. Business operations are also changing, sometimes
very rapidly, because of the fast-continuing improvement of technology. Events such as
September 11, 2001, and financial upheavals from corporate scandals such as Enron and Global
Crossing have resulted in increased awareness. Yes, IT controls are very important. Today, people
are shopping around at home through networks. People use "numbers" or accounts to buy what
they want via shopping computers. These "numbers" are "digital money," the modern currency
in the world. Digital money will bring us benefits as well as problems. One major benefit of digital
money is its increased efficiency. However, it will also create another problem for us. "Security"
is perhaps the biggest factor for individuals interested in making online purchases by using digital
money. Also, it must be remembered that vigilance needs to be maintained over those who use
the Internet for illegal activities, including those who are now using it for scams, crime, and covert
activities that could potentially cause loss of life and harm to others. IT control and security are
everyone's business.
Most people fear giving their credit card numbers, phone numbers, or other personal
information to strangers. They are afraid that people will be able to use these to retrieve their
private or other valuable information without their consent. With identity theft and fraud on the
rise, much care is needed in the protection, security, and control of such information. Security,
indeed, is the biggest risk in using digital money on the Internet. Besides the problem of security,
privacy is a significant factor in some electronic payment systems. To encourage people to use
digital money, these electronic payment systems should ensure that personal and unrelated
information is not unnecessarily disclosed.
For the IT auditor, the need for audit, security, and control will be critical in the areas of
IT and will be the challenge of this millennium. There are many challenges ahead; everyone must
work together to design, implement, and safeguard the integration of these technologies in the
workplace.
Download