Computer Operations

advertisement
Information Systems
Operations
IS Operations (Chapter 9)
Practicum: Cendant Corporation
Schedule
Week
Topic
Readings
Practicum
12-Sep-05
Identifying Computer Systems
Chapter 2
Evaluating IT Benefits and
Risks
Jacksonville
Jaguars
19-Sep-05
IS Audit Programs
Chapter 3
The Job of the Staff Auditor
A Day in the Life of
Brent Dorsey
26-Sep-05
IS Security
Chapter 4
Recognizing Fraud
The Anonymous
Caller
Utility Computing and IS Service
Organizations
Chapter 5
Evaluating a Prospective
Audit Client
Ocean
Manufacturing
10-Oct-05
Physical Security
Chapter 6
Inherent Risk and Control
Risk
Comptronix
Corporation
17-Oct-05
Logical Security
Chapter 7 & 8
Evaluating the Internal
Control Environment
Easy Clean
24-Oct-05
IS Operations
Chapter 9
Fraud Risk and the Internal
Control Environment
Cendant
Corporation
31-Oct-05
Controls Assessment
Chapter 10
IT-based vs. Manual
Accounting Systems
St James Clothiers
Encryption and Cryptography
Chapter 11
Materiality / Tolerable
Misstatement
Dell Computer
14-Nov-05
Computer Forensics
Chapter 12
Analytical Procedures as
Substantive Tests
Burlington Bees
21-Nov-05
New Challenges from the Internet: Privacy,
Piracy, Viruses and so forth
Chapter 13
Information Systems and
Audit Evidence
Henrico Retail
28-Nov-05
Auditing and Future Technologies
Chapter 16
Flowcharting Transaction
Cycles
Southeast Shoe
Distributor
3-Oct-05
7-Nov-05
Changes to our Schedule

Because we are one week behind



I want to drop the 28 Nov 2005 class
And move each of the prior classes back a week
Dropped:
Topic: Auditing and Future Technologies
Chapter: 16
Practicum: Flowcharting Transaction Cycles (Southeast Shoe Distributor)

This material will be integrated into the existing
lectures
What are ‘Operations’
Development
and Test
Production
Outsourcing
and Utility Computing
Two Components

Or you might consider them two sides to one system

Business Operations


All the tangible physical things that go on in a corporation
Computer Operations
Transactions
Business Operations
External Real
World Entities
and Events that
Create and
Destroy Value
Internal
Operations
of the Firm
Transactions
'Owned' Assets
and Liabilities
Corporate Law
g
osting Postin
ent / P nt /
urem easurme
Meas
M
Audit
Program
Internal Control Review
Over Operations
The Parallel (Logical)
World of Computer Operations

Internal Control
Memo
Computer
Systems
Ledgers:
Databases
Journal Entries
Reports:
Statistics
Business &
Computer
Operations
Transactions
External Real
World Entities
and Events that
Create and
Destroy Value
Internal
Operations
of the Firm
The Physical World
Transactions
Corporate Law
Substantive T
ts
Analytical Tes
Audit Report /
Opinion
Tests of Transactions
Audit
Program
tation
Attes
Auditing
ests
'Owned' Assets
and Liabilities
Accounting
Systems
The Parallel (Logical)
World of Accounting
Ledgers:
Databases
Journal Entries
Reports:
Statistics
Look Familiar?
Computer Operations

Only a subset of business operations are computerized
(automated)

Computers do the following well:




High-speed arithmetic operations
Storage and search of massive quantities of data
Standardization of repetitive procedures
All other Business Operations require human intervention
Human Intervention

Even computer operations require human
intervention at some level


E.g., turning the computer on and off
In both business and computer operations

Human interventions demand the most auditing
Computerized procedures

Fully automated (computerized) procedures


Can be audited once with a small data set
And these results can be considered to hold over time
@ Boeing?
The ‘Glass House’
Mass Storage

Z Microsystems
TranzPacs






Shared chassis - shared peripherals.
Less space, less weight, less power, less cost.
Hot-swappable sealed computer modules
(SCM) and disk modules.
Mix & match platforms and OS's.
Independent stand-alone systems.
Shared peripheral clusters.

Mass Storage at NASA
Server Farms
Systems Life Cycle
Production
Release
Requirements
Specification
Time
Replacement
Design &
Programming
Audit Here!
Resource Use
Testing
Operations Objectives
What to look for in an audit





Production jobs are completed in time
Output (information) are distributed on time
Backup and recovery procedures are adequate
(requires risk analysis)
Maintenance procedures adequately protect
computer hardware and software
Logs are kept of all changes to HW & SW
Automation & Operations Objectives




Operations should be about following predetermined
procedures
The appeal rests largely on the ability to reduce or alter the
role of people in the process
The intent is to take people out of the loop entirely,
Or to increase the likelihood that people will do what they are
supposed to do, and that they do it accurately



People are flexible and clever
We sometimes don’t want to take people out of the loop on a lot
of systems
The problem is when a lot of things break at the same time.

There’ll probably be a few things that are hard to fix, a cascade of effects.
Case Study: Manual
versus Automated
Scheduling
pp.
187-189
Question: Why is automation important?
Backup and Recovery Objectives
Best Practices

Determination of appropriate recovery and resumption objectives for
activities in support of critical markets.


Core organizations should develop the capacity to recover and resume activities within
the business day on which the disruption occurs.
The overall goal is to resume operations within two hours


Maintenance of sufficient geographic dispersion of resources to meet
recovery and resumption objectives.



back-up sites should not rely on the same infrastructure components used by the
primary site, and
back-up operations should not be impaired by a wide-scale evacuation or
inaccessibility of staff that services the primary site
Routine use or testing of recovery and resumption arrangements.


Testing should not only cover back-up facilities of the firm,
 but connections with the markets,
 third party service providers
 and customers
Connectivity, functionality and volume capacity should be covered.
How Does Backup & Recovery
Fit into your Risk Assessment Framework?

Your Toolkit:
Computer Inventory, Risk Assessment Matrix, Dataflow Diagrams and
Systems Components Hierarchy
Asset (Ex 2.1)
Risk Assessment (Ex. 2.2 with improvements)
Asset Value
($000,000 to
Owner)*
Transaction Flow
Description
Total Annual Transaction
Value Flow managed by
Asset($000,000)*
Primary OS
Owner
Applicati
on
Win XP
Receiving
Dock
A/P
0.002
RM Received from
Vendor
23
Theft
Win XP
Receiving
Dock
A/P
0.002
RM Received from
Vendor
23
Obsolescence
and spoilage
Audit Objectives
Reporting Risks
(External Audit)
Control Process Risks
(Internal & External
Audits)
Transaction Flows
Business Application
Systems
Operating Systems
(including DBMS, network
and other special systems)
Hardware Platform
Physical and Logical
Security Environment
Asset Loss Risks
(Internal Audits)
Risk Description
Cost of
single
occurrence
($)
Probability of
Occurrence (# per
Year)
Expected
Loss
100
100
10000
35
350
12250
Prioritizing Backup & Recovery
Tasks



Find the critical transactions (High value; High
volume)
Identify the critical applications for processing these
transactions
Identify the critical personnel


including those you may not have hired or defined jobs for
Who are essential to processing these transactions
Case Study: NYSE after 9/11
CNET interview with NYSE's chief technology officer Roger Burkhardt

Were most of the trading firms in the area that connect with your systems all up and running by 9:30 am on Monday
(September 17)? Were there any from outside or in the area unable to participate in trading that morning?
We had lost a lot of telephone lines that bring in data to our computer centers and also voice lines to the floor, which would have
meant that we would not have had full access by all members. That raised some public policy issues, particularly for the retail
investor; if their broker-dealer is the one who doesn't have connectivity, they would be disadvantaged.

"I think September 11 was the biggest challenge that our technical team has had to face in recent years." So NYSE
faced a connectivity issue on a uniquely massive scale?
There was a connectivity issue that affected not just our market, but all markets. There was also the fact that there were a
number of firms that were scrambling to get into their back-up facilities. A number of large firms like Morgan Stanley and Merrill
Lynch were affected. And then there were firms like Goldman Sachs, just down the street from here, who were like us in that
their building was undamaged. In fact, the Merrill Lynch building was also undamaged, but they were just not allowed to come in
because the authorities quite rightly wanted to focus on rescue operations. That affected all the markets. Clearly, if you want a
market, you want it to be a fair market, with breadth of access. You don't want one retail investor to not be able to get through to
sell or buy.

So by Monday, how did you manage to connect all the firms that connect to your systems?
We worked with member firms for the balance of that week to help them re-establish connectivity. We worked very closely with
Verizon, whose staff did a tremendous job. We have a subsidiary called Securities Industry Automation Corporation. It's been
around for over 25 years and provides data processing and communications capabilities for the securities industry. It was initially
set up by the NYSE and the American Stock Exchange, but also provides services to a broader part of the industry--for
example, market data systems for equities and options. It also is the collection point for all the post trade information for all
instruments. What is important about that is that because so many of us use them, they have telephone lines coming in from
everybody. They play this hub role where they can effectively use communications set up for one purpose in an emergency to
recover something else.

"With the potential for cyber threats, the advice I get is, 'Don't tell anyone about anything we are using.'" What other
platforms are you using?
I just used that as an example that we are not a trailing edge adopter. And I am a little sad about this because I enjoy talking
about a bunch of technologies here from many great companies like HP, IBM and others. But with the potential for cyberthreats,
the advice I get is, "Don't tell anyone about anything we are using. “
Business Operations
Computer Operations are a subset of
business operations
Case Studies
CS
9.3 to 9.7 pp. 195-202
Question: Can you recognize the control
weaknesses
What is the ‘Risk’ from inadequate control in each.
Practicum:
Fraud Risk &
The Internal Control Environment
Cendant Corporation
Download