Chapter 15

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Two of the most popular software packages are:

-Audit Control Language (ACL) -Interactive Data Extraction and Analysis (IDEA)

The three main purposes of WANs are

-To provide remote access to employees or customers -To link two or more sites within the firm -To provide corporate access to the Internet routers and firewalls

A general template that a steering team or the internal audit function can use:

1.Evaluate the overall benefit and cost 2.Develop a strategy 3.Plan and design 4.Implement continuous auditing 5.Performance monitoring

Five fundamental control objectives that operating system must achieve

1.Protect itself from users 2.Protect users from each other 3.Protect users from themselves 4.Be protected from itself 5.Be protected from its environment

Data warehouse

A centralized collection of firm-wide data for a relatively long period of time

MAC (Media Access Controls)

A designated address that is connected to each device via the network and only sees traffic

A local area network (LAN)

A group of computers, printers, and other devices connected to the same network that covers a limited geographic range.

Embedded audit module

A programmed audit module that is added to the system under review. A programmed module added to the system so that the auditors can monitor and collect data over online transactions.

Firewalls

A security system comprised of hardware and software that is built using routers, servers, and a variety of software; allows individuals on the corporate network to send/receive a data packet from the Internet

To audit a system, auditors use the test data technique to

A set of input data to validate system integrity.

A database

A shared collection of logically related data which meets the information needs of a firm

Database system

A term typically used to encapsulate the constructs of a data model, database management system (DBMS), and database.

Station

A wireless endpoint device equipped with a wireless Network Interface Card (NIC)

The integrated test facility (ITF) approach

An automated technique that enables test data to be continually evaluated during the normal operation of a system.

Technology plays a key role in

Analyzing trends and patterns of transactions Identifying exceptions and anomalies, and testing controls.

Generally Accepted Auditing Standards (GAAS)

Are broad guidelines regarding an auditor's professional responsibilities

CAATS

Are imperative tools for auditors to conduct an audit in accordance with heightened auditing standards.

Management controls of risk & info system security include:

Assigning roles/responsibilities Creating policies/procedures Conducting risk assessment on a regular basis Determine which types of information that may or may not be sent over wireless networks.

Parallel simulation

Attempts to simulate the firm's key features or processes.

Hubs

Broadcasts through multiple ports

Wireless Network

Comprised of two fundamental architectural components: Access point and stations

General security objectives for both wired LANs and wireless LANs include:

Confidentiality Integrity Availability Access Control

Routers

Connects different LANs software-based intelligent devices, examines the Internet Protocol (IP) address

What is continuous auditing?

Continuous auditing is to perform audit-related activities on a continuous basis. Testing in continuous audits often consists of continuous controls monitoring and continuous data assurance.

Related audit activity

Control assurance

Mobility

Convenient online access without a physical network using cables for connections.

What is data mining?

Data mining is the process of searching for patterns in the data in a data warehouse. Data mining is the process of searching and analyzing the data in a data warehouse for decision making. Data mining is used to identify patterns in making predictions.

Data governance is the convergence of which of the following items?

Data quality, data management, and data policies Business process management on data Risk management on data

In today's electronic world, most accounting records are stored in a ______________

Database

Integrity

Detect any intentional or unintentional changes to the data during transmission.

The most common security threats for wireless LANs include:

Eavesdropping Man-in-the-Middle Masquerading Message Modification Message Replay Misappropriation Traffic Analysis Rogue Access Points

Confidentiality

Ensure that communication cannot be read by unauthorized parties.

Availability

Ensure that devices and individuals can access a network and its resources whenever needed.

True or false: A local area network is a group of computers, printers, and other devices connected to the same network and covers a large geographic range such as a city, a county, or a state.

False

True or false: Wide area networks devices include hubs and routers.

False

Select the benefits of using wireless technology.

Freely setting up or removing wireless networks at different locations Convenient online access without a physical network using cables for connections

Flexibility and Scalability

Freely setting up or removing wireless networks at different locations.

Generalized Audit Software (GAS)

Frequently used to perform substantive tests and is used for testing of controls through transactional-data analysis. •Directly read and access data from various database platforms •Provides auditors an independent means to gain access to data for analysis and the ability to use high-level, problem-solving software to invoke functions to be performed on data files.

One widely used tool in auditing a system is generalized audit software (GAS). GAS is frequently used to perform substantive tests and is used for testing of controls through transactional-data analysis.

GAS provides auditors with an independent means to gain access to various types of data for analysis.

Which of the following frameworks/regulations is most relevant to data governance?

GDPR

Technical controls

Implemented and executed through mechanisms contained in computing-related equipment Including access-point management and encryption setup (using WPA/WPA2). Change the default configuration of all access points that have been deployed.

According to the Institute of Internal Auditors' (IIA) professional practice standard section 1220.A2

Internal auditors must consider the use of computer-assisted, technology-based audit tools and other data analysis techniques when conducting internal audits.

What is the black-box approach in auditing systems? Select all statements that apply.

It is adequate when automated systems applications are relatively simple. The advantage of this approach is that the systems will not be interrupted for auditing purposes. It is to audit around the computer.

What is the white-box approach in auditing systems? Select all statements that apply.

It requires auditors to understand the internal logic of the system/application being tested. Auditors need to create test cases to verify specific logic and controls in a system.

Wide area networks (WANs)

Links different sites together; transmits information across geographically dispersed networks; and covers a broad geographic area such as a city, region, nation, or an international link.

A ____________ (LAN) is a group of computers, printers, and other devices connected to the same network and covers a limited geographic range such as a home, small office, or a campus building.

Local Area Network

Access Point

Logically connects stations to a firm's network.

Security Controls in Wireless Networks can be categorized into three group:

Managemen Operational Technical Controls

Common benefits of using technology:

Mobility Rapid Deployment Flexibility and Scalability

Compare and contrast data warehouses and operational databases. Operational databases are updated as transactions are processed and data warehouses are not. The data in a data warehouse are volatile because it includes big data. The data in a data warehouse are updated when transactions are processed.

Operational databases are updated as transactions are processed and data warehouses are not.

A continuous audit

Performing audit-related activities on a continuous basis.

Operational controls are related to

Protecting a firm's premise and facilities, Preventing and detecting physical security breaches Providing security training to employees, contractors, or third party users. Conduct appropriate training on wireless networks and provide regular updates on organizational policies and procedures to employees.

Switches

Provides a path for each pair of connections

Information Systems Auditing Standards (ISASs)

Provides guidelines for conducting an IS/IT audit (issued by ISACA)

Access Control

Restrict the rights of devices or individuals to access a network or resources within a network.

Virtual Private Network (VPN)

Securely connects a firm's WANs by sending/receiving encrypted packets via virtual connections over the public Internet to distant offices, salespeople, and business partners.

The operating system (OS) must achieve fundamental control objectives to consistently and reliably perform its functions. Which of the following are the control objectives of the OS?

The OS must protect users from each other. The OS must protect itself from users. The OS must be protected from itself. The OS must protect users from themselves.

Man-in-the-Middle

The attacker actively intercepts communications between wireless clients and access points to obtain authentication credentials and data.

Message Modification

The attacker alters a legitimate message sent via wireless networks by deleting, adding to, changing, or reordering it.

Masquerading

The attacker impersonates an authorized user and gains certain unauthorized privileges to the wireless network.

Message Replay

The attacker passively monitors transmissions via wireless networks and retransmits messages, acting as if the attacker was a legitimate user.

Traffic Analysis

The attacker passively monitors transmissions via wireless networks to identify communication patterns and participants.

Eavesdropping

The attacker passively monitors wireless networks for data, including authentication credentials.

Rogue Access Points

The attacker sets up an unsecured wireless network near the enterprise with an identical name and intercepts any messages sent by unsuspecting users that log onto it.

Misappropriation

The attacker steals or makes unauthorized use of a service.

Data governance

The convergence of data quality, data management, data policies, business process management, and risk management surrounding the handling of data in a firm

The Operating System

The most important system software Because it performs the tasks that enable a computer to operate

Data mining

The process of searching for patterns in the data in a data warehouse and data analyzing these patterns for decision making Online Analytical processing (OLAP)-Tools used in data mining

Regarding data transmission security of wireless networks, all access points should be configured with encryption to maintain confidentiality and data integrity. Select correct statements on data transmission security. Multiple select question.

The wi-fi protected access (WPA) algorithm can provide effective authentication and encryption for data transmission. All access points should be configured with encryption to maintain confidentiality.

Rapid Deployment

Time saving on implementing networks because of reduction in using physical cables/media.

Identify the main purposes for a wide area network (WAN).

To provide corporate access to the Internet To provide remote access to employees or customers To link various sites within the firm

Accountants increasingly participate in designing internal control systems and improving business and IT processes in a database environment

True

How can a business make a wide area network secure? (Check all that apply).

Use a virtual private network Use dedicated leased lines

Operational databases

Used for daily operations and often includes data for the current fiscal year only

A cheaper alternative to leased lines, yet carry the disadvantage of not having guaranteed QoS.

VPNs

In our electronic world, all or most accounting records are stored in a database. A database is:

a shared collection of logically related data that meets the information needs of a firm

The operating system performs the tasks that enable a computer to operate. It is comprised of system utilities and programs that: allocate computer resources to users and applications. it is the main function in managing a database. ensure the integrity of the system. control the flow of multiprogramming.

allocate computer resources to users and applications. ensure the integrity of the system. control the flow of multiprogramming.

Operating system security should be included

as part of IT governance in establishing proper policies and procedures for IT controls.

According to the Institute of Internal Auditors' (IIA) professional practice standard, internal auditors must consider the use of computer ____________ technology-based audit tools and other data analysis techniques when conducting internal audits.

assisted

The term "computer-assisted audit techniques (CAATs)" refers to any ____________ Audit techniques that can be used by an auditor to perform audits or achieve audit objectives.

automated

When a firm considers whether or not to implement continuous auditing, it should first evaluate the overall ________ and __________ of having continuous auditing as part of the firm's overall governance, risk, and compliance (GRC) effort.

benefit or benefits cost or costs

Testing in continuous audits often consists of

continuous controls monitoring and continuous data assurance.

The audit activities related to continuous auditing range from continuous ____________ assessment to continuous ____________ assessment

control risk

Related management activity

control monitoring

Computer-assisted audit techniques enable auditors to gather and analyze audit _____________ to test the adequacy and reliability of financial information and internal controls in a computerized environment.

evidence

During the course of an audit, the IS auditor should obtain sufficient, reliable, and relevant _______________ to achieve the audit objectives. The audit findings and conclusions are to be supported by appropriate analysis and interpretation of this__________

evidence

LAN devices include

hubs and switches.

Management controls are security controls that focus on ____________ of risk and information system security.

management

Data is

often the core asset of many companies

The attacker of a wireless network sometimes uses a ____________ access point to set up an unsecured wireless network near the enterprise with an identical name and to intercepts any messages sent by unsuspecting users that who log onto it.

rogue

Local area network (LAN) devices include hubs and switches. From a security perspective _____________ provide a significant improvement over __________

switches hubs

The data in a data __________ are pulled periodically from each of the operational databases (ranging from a couple of times a day to once a year) and often maintained for 5 to 10 years.

warehouse

Technical Challenges

•Access to all relevant data in a timely manner •Accumulating and quantifying the risks and the exposures that have been identified •Defining the appropriate analytic that will effectively identify exceptions to controls •Developing a suitable scoring/weighting mechanism to prioritize exceptions •Balancing the costs and efforts of reviewing large volumes of exceptions against the exposures of the exceptions themselves

Two approaches to use CAATs in Auditing Systems

•Auditing around the computer (the black-box approach) •Auditing through the computer (the white-box approach)

The Operating System is comprised of system utilities and programs that

•Ensure the integrity of the system. •Control the flow of multiprogramming and tasks of scheduling in the computer. •Allocate computer resources to users and applications. •Manage the interfaces with the computer.

Implementation of Continuous Auditing

•Extensible Markup Language (XML) •Extensible Business Reporting Language (XBRL) •Database management systems •Transaction logging and query tools •Data warehouses •Data mining or computer-assisted audit techniques (CAATs)

Auditing around the Computer (the Black-Box Approach)

•First calculating expected results from the transactions entered into the system •Then comparing these calculations to the processing or output results •The advantage of this approach is that the systems will not be interrupted for auditing purposes. The black-box approach could be adequate when automated systems applications are relatively simple.

Non-technical Barriers

•Perceived negative impact of continuous auditing on the firm. •Priority of implementation in determined key areas. •Readiness of the internal audit group to develop and adopt continuous auditing •Unrealistic expectations of the benefits of continuous auditing

Use CAATs in Auditing Systems

•Test of details of transactions and balances •Analytical review procedures •Compliance tests of IT general and application controls •Operating system and network vulnerability assessments •Application security testing and source code security scans •Penetration Testing

Auditing through the Computer (the White-Box Approach)

•The white-box approach requires auditors to understand the internal logic of the system/application being tested. •The auditing through the computer approach embraces a variety of techniques: test data technique, parallel simulation, integrated test facility (ITF), and embedded audit module.


Kaugnay na mga set ng pag-aaral

Business Ethics Test 1 Shelton (Fall 2020) {book and video lectures}

View Set

Capstone Advanced TQM Module Tutorial Quiz

View Set

MKG5450-850 Final Exam; All Quizzes

View Set

Conceptual Physics: Chapter 16: Heat Transfer

View Set

Cont. Management Final Exam Review

View Set