Enterprise Level Controls General Controls For Information Technology Application Controls For Transaction Processing
Enterprise Level Controls General Controls For Information Technology Application Controls For Transaction Processing
Introduction
Enterprise Level Controls
General Controls for Information Technology
Application Controls for Transaction
Processing
Chapter
10-1
Chapter
10-2
Chapter
10-4
Logical Security
Limit
Integrated Security
Combines
Chapter
10-5
Chapter
10-6
Access to Data,
Hardware, and
Software
Utilization of strong passwords
8
Biometric identification
Distinctive
Chapter
10-9
Data Encryption
Data
Data Encryption
Chapter
10-11
eavesdropping
Hardware or software malfunctions
Errors in data transmission
Control Procedures
Checkpoint
control procedure
Routing verification procedures
Message acknowledgment procedures
Chapter
10-12
Chapter
10-14
Personnel Policies
Separation of Duties
Separate Accounting
Separation of Duties
Chapter
10-16
Division of Responsibility
in IT Environment
Chapter
10-17
Division of Responsibility
in IT Environment
Chapter
10-18
Personnel Policies
Identifying Suspicious Behavior
Protect
Safeguarding Computer
Files
Chapter
10-20
Chapter
10-21
Business Continuity
Planning
Definition
Comprehensive
Components
Disaster Recovery
Fault
Tolerant Systems
Backup
Chapter
10-22
Disaster Recovery
Definition
Process
and procedures
Following disruptive event
Site
Flying-Start Site
Cold Site
Chapter
10-23
Major Approaches
Consensus-based
protocols
Watchdog processor
Utilize disk mirroring or rollback processing
Chapter
10-24
Backup
Batch processing
Risk
Types of Backups
Hot
backup
Cold Backup
Electronic Vaulting
Chapter
10-25
Batch Processing
Chapter
10-26
Computer Facility
Controls
Locate Data Processing Centers in Safe Places
Protect
Buy Insurance
Chapter
10-27
Study Break #1
A _______ is a comprehensive plan that helps protect the
enterprise from internal and external threats.
A. Firewall
B. Security policy
C. Risk assessment
D. VPN
Chapter
10-28
Chapter
10-29
Study Break #2
A _____ site is a disaster recovery site that includes a computer
system similar to the one the company regularly uses, software,
and up-to-date data so the company can resume full data
processing operations within seconds or minutes.
A. Hot
B. Cold
C. Flying start
D. Backup
Chapter
10-30
Study Break #3
Fault-tolerant systems are designed to tolerate computer errors
and are built on the concept of _________.
A. Redundancy
B. COBIT
C. COSO
D. Integrated security
Chapter
10-32
Chapter
10-33
Application Controls
for Transaction
Processing
Purpose
Embedded
Application Controls
Input
Controls
Processing Controls
Output Controls
Chapter
10-34
Application Controls
for Transaction
Processing
Chapter
10-35
Input Controls
Purpose
Ensure validity
Ensure accuracy
Ensure completeness
Categories
Observation,
Edit
tests
Additional input controls
Chapter
10-36
Observation, Recording,
and Transcription of Data
Confirmation mechanism
Dual observation
Point-of-sale devices (POS)
Preprinted recording forms
Chapter
10-37
Preprinted Recording
Form
Chapter
10-38
Edit Tests
Input Validation Routines (Edit Programs)
Programs
or subroutines
Check validity and accuracy of input data
Edit Tests
Examine
Edit Tests
Chapter
10-40
Edit Tests
Chapter
10-41
Chapter
10-42
Processing Controls
Purpose
Focus
Contribute
Two Types
Control
Data
totals
manipulation controls
Chapter
10-43
Audit Trail
Chapter
10-44
Control Totals
Common Processing Control Procedures
Batch
control total
Financial control total
Nonfinancial control total
Record count
Hash total
Chapter
10-45
Data Manipulation
Controls
Data Processing
Following
Compiler
Utilization of Test Data
Chapter
10-46
Output Controls
Purpose
Ensure validity
Ensure accuracy
Ensure completeness
Major Types
Validating
Processing Results
Regulating Distribution and Use of Printed Output
Chapter
10-47
Output Controls
Validating Processing Results
Preparation
of activity listings
Provide detailed listings of changes to master files
control
Pre-numbered forms
Authorized distribution list
Chapter
10-48
Study Break #4
A ______ is a security appliance that runs behind a firewall
and allows remote users to access entity resources by using
wireless, handheld devices.
A. Data encryption
B. WAN
C. Checkpoint
D. VPN
Chapter
10-49
Chapter
10-50
Study Break #5
Organizations use ______ controls to prevent, detect, and
correct errors and irregularities in transactions that are
processed.
A. Specific
B. General
C. Application
D. Input
Chapter
10-51
Chapter
10-52
Copyright
Copyright 2012 John Wiley & Sons, Inc. All rights reserved.
Reproduction or translation of this work beyond that permitted in
Section 117 of the 1976 United States Copyright Act without the
express written permission of the copyright owner is unlawful.
Request for further information should be addressed to the
Permissions Department, John Wiley & Sons, Inc. The purchaser
may make backup copies for his/her own use only and not for
distribution or resale. The Publisher assumes no responsibility for errors,
omissions, or damages, caused by the use of these programs or from the
use of the information contained herein.
Chapter
10-53
Chapter 10
Chapter
10-54