GENERAL AND APPLICATION CONTROLS PLACEMENT OF CONTROLS CONTROLS CAN RESIDE IN: MANAGEMENT POLICIES AND PROCEDURES JOB DESCRIPTIONS OPERATING PROCEDURES COMPUTER SOFTWARE COMPUTER HARDWARE PHYSICAL SECURITY MEASURES controls often work best when combined with other controls. GENERAL CONTROLS 1. ORGANIZATIONAL CONTROLS/SEGREGATION OF DUTIES authorization of transactions vs. recording of transactions custody of assets vs. maintenance of related accounting records information services dept. vs. other depts. data base administrator vs. programmers systems development vs. computer operations program development vs. program testing rotation of assignments within an operational group enforced vacations bonding insurance for employees that handle cash 2. SYSTEMS DEVELOPMENT & MAINTENANCE CONTROLS (for example POS Terminal conversion) AUTHORIZATION OF NEW SYSTEMS AND CHANGES SYSTEMS DEVELOPMENT LIFE CYCLE METHODOLOGY –SDLC 1. ANALYZE NEEDS-REQUIREMENT RESOURCES (USERS) 2. DESIGN-PLAN 3. IMPLEMENT 4. TEST 5. FEEDBACK-EVALUATION (when changing the system-you run parallel, old/new concurrent) WRITTEN SPECIFICATIONS USER, INTERNAL AUDITOR (works for the company), EXTERNAL AUDITOR(works for an outside firm) PARTICIPATION. MUST HAVE TEAM & BUDGET (cost & timeline) FORMAL TESTING AND APPROVAL (sign off each step) USE OF A STEERING COMMITTEE 3. SYSTEMS DOCUMENTATION CONTROLS MANUALS, NARRATIVES, FLOWCHARTS PROVIDE A BASIS FOR RECONSTRUCTION OF THE SYSTEM IN CASE OF DAMAGE OR DESTRUCTION SYSTEM SHOULD BE DOCUMENTED TO PROVIDE BASIS FOR EFFECTIVE OPERATION, USE, AUDIT, AND FUTURE SYSTEM ENHANCEMENT CONTROLS MITIGATE THE RISK THAT PERSONNEL ARE NOT PROPERLY TRAINED DOCUMENTATION SHOULD BE PREPARED, APPROVED, MAINTAINED, AND DISSEMINATED IN ACCORDANCE WITH FORMAL ESTABLISHED DOCUMENTATION STANDARDS PREPARATION STANDARDS APPROVAL STANDARDS MAINTENANCE STANDARDS-how often updated or reviewed DISSEMINATION STANDARDS-distributed on need to know basis, who gets copies 4. PHYSICAL SECURITY MEASURES FOR HARDWARE, SOFTWARE, AND DOCUMENTATION HARDWARE SECURITY MEASURES SECURED COMPUTER AREA SMOKE AND WATER DETECTORS FIRE SUPPRESSION DEVICES BURGLAR ALARMS SURVEILLANCE CAMERAS INDIVIDUAL LOCKS (piggybacking-someone leaving the door open or not signing off the computer opens the door for unauthorized users) SECURITY PERSONNEL IDENTIFICATION OF PERSONNEL BIOMETRIC (using physical characteristics to verify one’s identity to the computer system) HARDWARE AUTHENTICATION SOFTWARE AND DOCUMENTATION SECURITY MEASURES INFORMATION SERVICES LIBRARY AUTHORIZED USE LOGGING PROCEDURES FOR CHECKOUT 5. RECOVERY CONTROLS Technology Issues) (always in the AICPA Top 10 PREMATURE TERMINATION CONTROLS-the power source is terminated, need a battery source FATHER -SON VERSIONS OF MASTER FILES BEFORE-AND-AFTER IMAGES OF DATA BASE RECORDS PROCEDURES FOR REINSTATING FILES PROCEDURES FOR RERUNNING PROGRAMS PROCEDURES FOR RECALLING CONTAMINATED OUTPUT ROLLBACK PROCESSING (checkpoint) DISK SHADOWING, DISK MIRRORING (save 2 copies) POWER FAILURE CONTROLS UNINTERRUPTIBLE POWER SOURCES ALTERNATIVE PROCESSING FACILITIES o COLD SITE-wiring (no equipment) o WARM SITE-equipment available; no data; cost more than cold o HOT SITE-has everything(software, data files, computers); cost more than hot EMERGENCY REPAIRS TEAM NATURAL DISASTER, ACCIDENTS, SABOTAGE CONTINGENCY PLANNING SPECIAL TRAINING TEAM SIMULATION EXERCISES-earthquake/fire drills ALTERNATIVE PROCESSING FACILITIES OFF-SITE STORAGE OF COPIES OF PROGRAMS, FILES, AND SYSTEMS DOCUMENTATION 6. SOFTWARE BASED PROGRAM AND DATA ACESS CONTROLS USER AUTHENTICATION IDENTIFICATION CODES PASSWORD SYSTEM - LEVELS OF ACCESS (how much you can see) a good password is a combo of letter & number, it should be case sensitive and be able to take symbols; changed frequently; “cracked” password allows id to be stolen-piggybacking LOG OUT, LOG OFF (timed out/turns off) ALLOWABLE USER FUNCTIONS-CONTROL UNAUTHORIZED ACCESS LIMIT FUNCTIONS BY USERS ASSIGN SCOPE OF ACCESS TO DATA RESTRICT ACCESS TO DATA FILES LIMIT USE OF TERMINALS-DUMB TERMINALS (no CPU), DESIGNATED TERMINALS, DISKLESS (no disk drives--to block viruses, unauthorized taking of work home, loading unauthorized softwares) WORKSTATIONS, USE OF CENTRAL FILE SERVERS (restrict view of data) CREATION OF AUDIT TRAIL (tested by CISA—audit the black box) UNALTERABLE LOG OF ACTUAL AND ATTEMPTED ACCESSES ASSIGNED RESPONSIBILITY TO REVIEW LOG LOG IS CREATED BY THE OPERATING SYSTEM OF THE COMPUTER 7. DATA BASE CONTROLS USER AUTHENTICATION ALLOWABLE USER FUNCTIONS CREATION OF AUDIT TRAIL USE OF LOGICAL VIEWS OF DATA DATA ENCRYPTION 8. TELECOMMUNICATION CONTROLS DATA ACCESS CONTROLS MESSAGE SECURITY CONTROLS-- # MESSAGE, USE PASSWORD, KEEP TRACK OF # OF BITS, PACKETS IN THE MESSAGE (sent should equal received) AUTOMATIC DIAL BACK OR CALL BACK (dials into system, verifies your access by calling you back where you should be, if not verified turns you off) e.g activating a credit card by phone,GPS USE OF A HARD WIRED NETWORK VERIFICATION OF AUTHORIZATION OF RECEIVING STATION DATA ENCRYPTION-key is needed to view the information Public key-recipient gets this to decode the message Private key-codes the message SECURITY MODEM--REQUIRES USE OF PASSWORDS FOR ACCESS TO THE NETWORK NETWORK DATA BASE--DETERMINES WHICH WORKSTATIONS ARE AUTHORIZED TO CONNECT TO OTHERS AND WHICH CAN ACCESS CERTAIN SOFTWARE AUTOMATIC LOG OFF DATA ACCURACY AND COMPLETENESS CONTROLS =MESSAGE INTEGRITY CONTROLS PROTECT COMMUNICATION CHANNELS AND NETWORKS FROM LOSS OR DISTORTION OF DATA OR ROUTING DATA TO WRONG DESTINATIONS PARITY BIT --9TH BIT, EVEN OR ODD 9th bit is generated by the machine-lets you know that an error has occurred in the data transmission (already programmed to be an even or an odd) 8 bits to a byte-uses 0(off) & 1(on) ERROR DETECTION CODES IN TRAILER (last record, with summary info.) HEADER (comes first, identification record, tells you what is coming and how many pages) ACKNOWLEDGMENT SIGNALS DOWNTIME CONTROLS ! ALTERNATIVE COMMUNICATION CHANNELS DIAL UP TELEPHONE LINES VS. LEASED LINES www.calcpa.org/TBRG 9. COMPUTER OPERATIONS CONTROLS MAINTENANCE CONTROLS SCHEDULED MAINTENANCE (cleaning the machine) OPERATIONS CONTROLS AUTHORIZED OPERATIONS SCHEDULED OPERATIONS ACTIVITY LOG (keeps track of all activities) ASSIGNED RESPONSIBILITY TO REVIEW LOG WORKSTATION OPERATING PROCEDURES 10. COMPUTER HARDWARE CONTROLS-built into the computer by the manufacturer DUAL READ CHECK - data are read twice during input and compared FIRMWARE-sequence of instructions (software) is substituted for hardware circuits and cannot be altered by the applications programmer DUPLICATE CIRCUITRY-double wiring of key hardware elements ensures no malfunctioning ECHO CHECK -data received by output device is transmitted back to the source unit for comparison with the original data (info echoed between printer/cpu, monitor/mouse, monitor/tower) PARITY CHECK-bit of information is added to the data being processed in order to help ensure that no bits are lost in data transfers between input-process-output functions INTERLOCK-hardware device that prevents more than 1 peripheral unit from communicating with the CPU at the same time BOUNDARY PROTECTION-protection against unauthorized entry (read or write) to a tape, disk, or other storage device VALIDITY CHECK -bit pattern is checked to determine that the combination of the "on" and "off" bits is valid within the character set of the computer (not valid code check, this is checking combo of 0 and 1) FILE PROTECTION RING-removable plastic or metal ring prevents improper use of a magnetic tape file REVERSE MULTIPLICATION -roles of the original multiplicand and multiplier are reversed and the new product is compared with the original product UNINTERRUPTIBLE POWER SYSTEMS-battery and generator systems are provided for temporary backup in the event of power failure until normal electricity is restored GRACEFUL DEGRADATION-when certain hardware components malfunction others can be programmed to continue processing but on less efficient basis(safe mode-the machine is not running at full capacity, but will work) OVERFLOW CHECK-data are checked and a signal is activated when data are lost through arithmetic operations that exceed the planned capacity of receiving fields or registers (making sure information is saved properly) COMPUTER APPLICATION CONTROLS BASIC OBJECTIVES OF APPLICATION CONTROLS ARE: 1. ALL AUTHORIZED TRANSACTIONS ARE COMPLETELY PROCESSED ONCE & ONLY ONCE 2. TRANSACTION DATA ARE COMPLETE & ACCURATE 3. TRANSACTION PROCESSING IS CORRECT AND APPROPRIATE TO THE CIRCUMSTANCES. 4. PROCESSING RESULTS ARE UTILIZED FOR THE INTENDED BENEFITS. 5. THE APPLICATION CAN CONTINUE TO FUNCTION. (detects the errors & fix in a timely manner) INPUT CONTROLS: AUTHORIZATION CONTROLS GENERAL AUTHORIZATIONS--CLASS OF TRANSACTIONS SPECIFIC AUTHORIZATIONS --1 TRANSACTION i.e. FILE MAINTENANCE TRANSACTIONS DONE BY SIGNATURES OR AUTHORIZATION CODES PASSWORDS--LEVELS OF ACCESS (a good password is a combo of letter & number, it should be case sensitive and be able to take symbols) DATA CAPTURE CONTROLS-need good screens in order to capture all the data you need SOURCE DOCUMENTS ELECTRONIC DATA CAPTURE REDUNDANT STORAGE DEVICES FORM DESIGN CLASSIFICATION AND IDENTIFICATION CONTROLS SOURCE CODE REFERENCE NUMBER TAG ACCOUNT NUMBER USE OF CONSECUTIVE NUMBERING-sequential DATA ENTRY CONTROLS SCREEN INPUT PROMPTS-tells you if something is not completed or put in wrong SCREEN MENUS READBACK FORMATTED INPUT VISUAL VERIFICATION-human actual sees it (rationality) EXCEPTION INPUT--ERRORS DATA VERIFICATION CONTROLS – EDIT CHECKS--see record layout question VALID DATA TYPE- alpha (A), numeric (N), combo (AN) VALID FIELD LENGTH- # at the bottom of field VALID COMBINATION OF FIELDS-compare the fields to each other (is the city in the state, is the zip in the state) LOGICAL RELATIONSHIPS-Greater Than, Less Than, = COMPLETENESS CHECKS--CHECKS FOR BLANK SPACES OR FIELDS SEQUENCE CHECKS OF TRANSACTION, DOCUMENT OR BATCH NUMBERS REASONABLENESS CHECK OF NUMERIC AMOUNTSe.g the minimum balance should be reasonable to the current balance amount VALID CODE CHECK--VALID ACCOUNT NUMBER OR CODE (LOOK UP VALUE IN A TABLE) LIMIT TEST--TEST OF AMOUNTS –(range test, acceptable lower and higher limits e.g. gpa is between 0-4)) OVERFLOW TESTS--SIZE OF FIELD SIGN TEST--CHECKING APPROPRIATE SIGN -POSITIVE OR NEGATIVE NUMBERS CHECK DIGIT-used to catch transposition errors -- an algorithm or formula that is used with the customer number calculates the check digit—a transposed customer or account number produces an incorrect check digit FORMAT CHECK More INPUT CONTROLS: TRANSMITTAL DOCUMENT (BATCH CONTROL TICKET) BATCH SEQUENCE-SERIAL NUMBERS CONTROL REGISTER-BATCH CONTROL LOG (TIME, TOTAL) AMOUNT CONTROL TOTAL DOCUMENT CONTROL TOTAL LINE CONTROL TOTAL HASH TOTAL=NON ACCOUNTING TOTAL BATCH CONTROL TOTAL=ACCOUNTING TOTAL (FINANCIAL USE) DATING BY COMPUTER – COMPUTER AUTOMATICALLY ASSIGNS DATE TO THE TRANSACTION (DEFAULT) KEY VERIFICATION-DATA IS ENTERED/KEYED IN TWICE BY TWO SEPARATE OPERATORS EXPIRATION-COMPUTER CHECKS DATES (DISCOUNT PERIOD) PROCESSING CONTROLS: WRITTEN PROCEDURES MECHANIZATION STANDARDIZATION PRENUMBERED DOCUMENTS DEFAULT OPTION BATCH CONTROLS RECORD COUNT CONTROL TOTAL HASH TOTAL BATCH TRANSMITTAL TICKET BATCH CONTROL REPORT CONTROL TOTAL ANALYSIS--BATCH BALANCING, RUN-TO-RUN TOTALS DOCUMENT AUDITS REDUNDANT PROCESSING RECONCILIATION PURPOSES USE OF SUMMARY PROCESSING TICKLER FILE-waiting for an event to occur and then remaining transactions update or close HEADER AND TRAILER RECORD LABELS AND TOTALS AUTOMATED ERROR CORRECTION OUTPUT CONTROLS: Controls over REPORTS, CHECKS, DOCUMENTS COMPLETENESS AND ACCURACY CONTROLS HEADER AND TRAILER PAGES OUTPUT SECURITY CONTROLS MINIMUM NUMBER OF COPIES AUTHORIZED PROCEDURES FOR DISPOSAL OF EXCESS OUTPUT CUSTODY OF PREPRINTED DOCUMENT FORMS LOG OF ISSUED &VOIDED PREPRINTED DOCUMENT FORMS RESPONSIBILITY FOR SENSITIVE MATERIAL DUAL CUSTODY OF NEGOTIABLE DOCUMENTS PRIVACY OF TERMINALS RECONCILIATION ERROR DISCREPANCY REPORTS UPSTREAM RESUBMISSION-resubmit corrections at the beginning of the process to go through edit check again USE OF PERIODIC AUDIT SUSPENSE FILE, SUSPENSE ACCOUNT-errors that are stuck in the system, they need to be fixed FILE CONTROLS: GENERAL OR APPLICATION CONTROL? Depends on the textbook you look at FILE CUSTODY CONTROLS SECURE LOCATION FILE LIBRARY AUTHORIZED USE LOGGING PROCEDURES FOR CHECKOUT ASSIGNED RESPONSIBILITY FORMAINTENANCE RECORD RETENTION POLICIES FILE PROCESSING CONTROLS FILE LABEL - INTERNAL (stored electronically inside the disk) & EXTERNAL FILE LABELS (actual label on outside of disk) FILE PROTECTION RING MACHINE READABLE FILE DIRECTORY FATHER-SON VERSIONS OF MASTER FILES BEFORE AND AFTER RECORD IMAGING VERIFICATION OF INTEGRITY OF INDEX FILES, POINTERS, AND OTHER LINKAGES FILE BACKUP CONTROLS SECURE OFF-SITE LOCATION SCHEDULED BACK-UP (back up hard drive)