Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

Audit financiar, XIII, Nr.

3(123)/2015, 90-99
ISSN: 1583-5812; ISSN on-line: 1844-8801

Abstract
The role o f information systems audit is to provide a
method for identifying, assessing and managing
information resources in order to fully exploit the
strategic potential o f information. Audit has a strategic
role to provide information, direction and coordination for
the management o f an organization's information
resources.
The aim o f the study is to highlight the benefits and
importance o f the information systems audit in Romania,
as a recurring process, additional to the traditional audit
missions, in the context o f the growing trend o f e-
commerce and the development o f information systems
as the basic utility for the operational activity and the
management o f the business.
The article comprises an empirical study which
highlights a number o f vulnerabilities and threats in the
online environment o f an electronic commerce company
Professor Pavel NĂSTASE, PhD
and formulates a number o f recommendations aiming to
Bucharest University o f Economic Studies, Romania, eliminate or reduce the identified risks.
e-mail: nastase.pavel@ase.ro
Keywords: information systems audit, electronic
Flavia CAIA, PhD Student commerce, information systems vulnerabilities,
information systems threats
Bucharest University o f Economic Studies, Romania,
e-mail: flavia. caia@cig. ase. ro JEL Classification: M42, L86

90 Audit financiar, anul XIII


Study Regarding Information Systems Audit for E-business

r**K*s&P

1. Introduction • Assess the effectiveness and efficiency related to


the use of resources;
Information technologies in economic activities open
new directions of development and evolution. Financial • Reduce risk and increase system security;
and internal auditors need to conduct their mission in a • Preventing and detecting errors and fraud (Tomar,
paperless environment and gaining knowledge of 2011 ).
applications and technologies requires an extra effort of
The objectives of e-commerce audit contain two parts:
familiarization, understanding and even the use of
economic operations and transactions of the audited
specific concepts and methods (Cardoş, 2010).
entities, and e-commerce related information system.
The emergence of electronic commerce (e-business) The first concerns the use of information systems,
has radically changed the way in which transactions are auditing financial statements, relevant activities of
conducted between organizations and the nature of business and information, and expressing an opinion,
operations, business relationships and the structuring of while the second objective is to audit the entity's
business. These changes resulted in significant changes information system, including the e-commerce system,
in the risk profile of e-commerce organizations and in the protecting the active security, the data integrity and the
processes associated to risk minimization. Although the effectiveness and efficiency of the system, and then to
basic principles and essential procedures regarding the express an opinion (Chen, H. and Zheng, K , 2013).
audit of e-business entities will not be different from
The information system permits the aggregation of
those applied by entities not based on e-business, e-
information in a suitable form for decision-making at all
commerce related information systems can have a
hierarchical levels, and, for financial audit, it permits the
significant impact on the technical work of the audit
evaluation of the information and reporting system,
engagement. In an e-business, the economic
which makes it play an important role in all phases of the
transactions are captured, measured and reported in
mission. Among these the planning phase should be
real time without human intervention or paper
noted, during which the auditor should assess the risks
documents (Kotb and Roberts, 2011).
of material misstatement through understanding the
Nastase et al. (2007:16) argued that "the need for an audited entity's information system (Cardoş, 2010).
information systems audit was experienced first by
The features of e-commerce information systems
financial and internal auditors, regarding it at first only as
auditing include the following (Chen, H. Zheng, K., 2013,
an extension of the financial audit, then the managers of Pathak et al., 2010):
organizations, which, to withstand the competitive race
• Electronic data. Refers to the data regarding
created, recognized that information technology
transactions and operations, stored in databases that
represents a key resource, and therefore, the processes
audit must organize and analyze. The context in
that use it must be controlled and audited, and, not least,
which the audit engagement takes place has been
international professional associations and organizations transformed from simple electronic financial records
have recognized the need to control and audit to electronic media, e-mail and instant messaging.
information systems”.
• Application of computer-assisted audit technologies.
Through auditing its information systems, a company Implies the guidance in the system or towards data.
benefits on several levels: These technologies are necessary due to the large
• Standardization; volume of data which requires the use of these
systems in order to obtain indications of possible
• Improving business efficiency;
problems and the outcome of conformity and
• Improved system and process controls; materiality tests.

• Plan contingency and disaster recovery; • Change of controls on audit risk. The changes do not
reflect how the newly emerging risks should be
• Information and development systems
identified, assessed and controlled, as well as
management;
aspects concerning responsibility, consequently there
• Preparation for the statutory audit; is an increased risk of audit and a need for audit and

Nr. 3(123)/2015 - 91
Pavel NĂSTASE, Flavia CAIA

continuous monitoring. The auditors who were and testing applications, identification of the key
reluctant to review and audit the IT controls are more personnel to be interviewed, analyzing the policies of the
likely to present incomplete reports, with undetected department, the procedures and the internal guidelines,
financial distortions. investigating the audit tools, and the testing and
verification methodologies for controls. The procedures
• Complexity of the content of the audit report. The
for evaluating test results concern the response time,
audit report for e-commerce information system
accuracy of records, orders, access security,
includes, in addition to a traditional report, items on:
functionality of websites and applications.
ensuring confidentiality of personal data, which will
not be used for irrelevant purposes, security of the Documents analyzed:
clearing electronic system and emphasizing the audit • Equipment documentation;
of internal controls.
• Documentation of applications;
• Real time auditing. Assumes establishing a
• Evidence of access rights and user profiles;
connection in real time with the computer system of
the audited entity, obtaining audit evidence, updating • Internal regulations;
the content to be audited and providing the real-time • Guidance on working procedures;
audit report.
• Analyses carried out by the company regarding
Auditors must assess the level of confidence in the e- performance, security, stability, usability, risks
commerce system in terms of security risks, privacy associated to the audited information system.
issues, and reliability of processes or e-commerce
Conducted activities: interviews, online application
transactions (Pathak et al., 2010).
testing, analyzing documents, records of access rights,
regulations and work procedures, verifying the results of
2. Research methodology a sample security, loading, volume and usability tests,
and inspecting the equipment.
The objective of the empirical study is to analyze the
performance, stability and security of the infrastructure in
the context of the information system of the company, 3. Empirical Study on the audit
given that the business is based on the online sales
channel and needs hardware and software support that of information systems
is stable, scalable and permanently functional.
for e-business
The aim of the study is to highlight the benefits and the
importance of performing the audit of information
3.1. Description of the Information System
systems in Romania, as a recurring process, additional
to the traditional audit missions in the context of the within the company
growing trend of e-commerce and the development of The company is a major retailer, which operates through
information systems as basic utilities for business the online shop. The website requires authentication and
activities and entity management. integrates a database of clients and a database of
For this study, a qualitative approach was used, in the products and promotions.
form of archive-based methods. These include The activity of this company is based entirely on the
identifying sources of information fortesting and
website and online operations performed by customers,
evaluating results, as well as functional diagrams,
its results being directly impacted by the functionality
policies, standards, procedures of previous audit
and content of the online shop.
engagements, identifying locations and resources that
will be audited and identifying the resources necessary The online store is organized using Magento Content
to carry out the activities in case of system overload, Management System (CMS), while for MyAccount
then correlating and analyzing the information. To (pages that require authentication and are connected
support the conclusions based on this method there directly to the database of customers) it is used a
were used structured interviews on the issues examined. custom in-house developed CMS. For Magento have
The procedures to collect information include been developed custom modules, each being
identification and selection of the approach for verifying documented by the team that was in change.

92 Audit financiar,anul Xlll


Study Regarding Information Systems Audit for E-business

The licenses for Magento CMS accounts (accounts and to better serve the needs of the business and was
access rights are managed independently) are approved subject to acceptance tests.
by superiors and reviewed regularly. There is, thus, a
The company has an IT policy that provides strong control
strict record o f access rights (users, mapping,
over the development process and includes rules for
passwords) for all sites and databases.
administration, security and working procedures
Magento was chosen according to several criteria (more (roadmap). The latter include procedures for maintenance,
than 45) on the mandatory and optional features needed upgrades, regular security assessments, etc. (C h a rt 1).

Chart 1. Flow of updating and developing activities for the online shop

Development Production
environment environment
ft
■ siS

Source: Flow created by the authors, based on the information provided by the company

The development, testing and production environments number o f custom ers and orders on the eShop), then
are synchronized. The information system has three there are made proposals, based on estimates, to
layers with the following roles: static (scalable parallel supplem ent and organize the resources of IT equipment.
additions can be made), dynamic and the database There is a formalized escalation matrix on four levels,
(C h a rts 2 and 3). The operating system used is Red regarding the responsibility for the content and
Hat Enterprise Linux. Other technologies used: MySQL functionality o f websites.

Enterprise, Apache, PHP, Oracle, SAS, etc. All Regarding the network, there is a script replicating the
technologies are upgraded regularly, and the latest test environment to the production environment, which is
stable versions are used, or when there is a bug that running every 15-minute, then the corresponding IPs
needs to be solved and the update is necessary. from the production environment are configured. The
The CSS are filtering equipm ent that ensure the installation procedure is checked at the replication o f the
confidentiality o f customers, thus custom ers’ IPs do not developm ent environm ent to test environment, so that
appear on the servers o f the company. the approval is made on the test environm ent which is
identical to the production environment. During the
Business request and change request are formulated by
project managers, are received and reviewed by the transfer from the test environm ent to the production

developm ent team, and then a patch solution is created. environment, the data is blocked so no changes can be
When a new functionality is added, the loading impact is made during replication. A fter transfer is complete, the
analyzed. Also, in the case o f major projects, the links and other aspects from the application can be
upgrade o f the solution is made based on the business replaced so that references point to the real server in
requirement (new functionalities required, estimating the production.

Nr. 3(123)/2015 93
Pavel NĂSTASE, Flavia CAIA

The machines utilized are new, support virtualization, can processors. The test and the development environment
hold two applications on the same server, have low energy consist of virtual machines and the entire environment is
consumption and use new generation, more powerful stored on a single server (C harts 2 and 3).

Chart 2. Development/Testing environment

HRp (80). Mips (443)

Source: Authors projection, based on the information provided by the company

The changes that can be made on the websites of the usability, etc.) are conducted, the necessary
company are divided into three categories: changes are made in the developm ent environment,
• Large developm ents (new release) - M ajor the applications are tested, then the deployment
on the production environment is made. After the
changes to the w hole site
deploym ent is completed, Sanity Check Tests are
• A verage developm ents - page corrections, new performed to verify whether the implementation was
prom otions done correctly.
• M inor developm ent - changes regarding pictures, For changes implemented at the application-level, roll­
buttons, etc. back procedures are included, in order to return to the
The first two types of modifications concerning the previous version in case something goes wrong in the
application in production require several steps and testing. production environment. Crontab is used to make the
In order to improve the sites, both user deploym ent during the night, so the site is always
experience and technical tests (security, load, functional during the day.

94 Audit financiar,anul XIII


Study Regarding Information Systems A udit for E-business

Chart 3. Production environment

Dynamc serves

Server
osher sites

Source: Authors projection, based on the information provided by the company

There is a ticketing system, each change request and To im plem ent changes and solve incidents there is a
file sent appears in a history for each site and database. Service Level Agreem ent (SLA) with terms for receipt
If, fo r example, something worked on the acknowledgment, requirements analysis, tem porary
test/developm ent environment, but on the production/ settlem ent o f the incident and the estimated time for full
test environm ent did not work, a ticket is opened so that settlem ent or new releases. Delivery time is determined
the developm ent team solves the issue. The according to the type o f request and the degree of
developm ent team is contractually obliged to provide emergency. For the team working in the developm ent
non-stop support, on & off site, and to collaborate with environment, deadlines are agreed and updated
other involved teams for the rapid resolution o f critical according to the evolution o f work processes.
situations.
Project owners ensure the change/im provem ent
The test and developm ent environments may require management, so that the requirements do not conflict,
resynchronization, general or specific, as a first step in and determine the priority o f each requirement. Back-up
the installation procedure for certain patches or is done every 10 days for all files and databases, and
developments, and this aspect is specified in the archives are stored in two copies in various locations
documentation o f the patch. from Brasov and Bucharest.

Nr. 3(123)/2015 95
Pavel NĂSTASE, Flavia CAIA

The location of the equipment is protected against fire, At a very high volume of users, the site could become
earthquake, there are alarm systems, temperature and unavailable, which would affect the company's results.
humidity adjustment systems, and human presence For some pages concurrent sessions appear, opened by
detection systems. browsers when loading an iframe page. This requires
optimizing the queries on the database, so as to yield a
3.2. Analysis and evaluation of MyAccount low response time. The recorded data regarding the
application number and frequency of connections are properly
Regarding the CMS internally created for MyAccount recorded in these circumstances.
(MA), the team does not have extensive experience in The contact form is having trouble retrieving data
using it and there are many features that are not used application default client requires completing name and
very much complicating the maintenance and surname, although pre-filled and hidden, and there
improvement of site built on this CMS. name and e-mail the URL. This is problematic user
Loading the customers coming from the acquisition of a control on completing the work, but is deficient data
company in the database, the manual processing of acquisition and control does not allow sending the form.
customer data that have different types of codes,
translating / migrating the databases of the acquired 3.3. Identifying threats and vulnerabilities in
company and integrating with the database of the information technology
company involve additional risks. Thus, MyAccount will Some aspects that appear in the study have a very low
not be available to customers migrated to the mother frequency, but involve a high degree of risk. The
company until the customer data is adapted to the analysis is conducted based on the practical experience
characteristics of the database, and this process is and the theoretical studies in the field of information
subject to human error. The rules for identifying and systems auditing.
validating the e-mail or the PNC are not very complex,
Vulnerabilities identified through interviews and
thus, erroneous or fictitious accounts can appear in the
analyzes performed:
database.
1. There is no strict regulation concerning the
The ticket issued for identifying logged in users should
procedures for placing and managing new
be sent using the post / get method, not through URL
and should not appear in the URL. It is necessary to equipment purchased.
rewrite the way of displaying the links to the pages that 2. The procedure for replicating from an environment
can be accessed based on authentication for Apache to another or restoration is not regulated or
servers. A Request Timeout greater than three minutes controlled.
means that the site is unavailable, this is a problem 3. The transfer of management and access rights from
related to the automatic control applied to inputs. one team to another, inaccurate mapping of users.
Among the pages of MyAccount there are functional 4. The superficial implementation of the test
sections for administrators that imply risks, especially environment, failure to respect the rigors of the
since IPs cannot be traced back (no IP is saved) in order process, because of haste or lack of experience.
to identify the person using the page (can be a hacker).
5. Lack of specialized personnel and aggregation of
Thus, there is no control of who accesses the page, and
multiple functions by certain employees.
the page can be accessed freely if one identifies the
URL. The page should be secured or removed. 6. Intermittent management of users or the ignorance
of certain employees regarding the safety and
The volume tests for the MA platform - how many
management rules (such as changing passwords
simultaneous logins the application supports, which is
regularly, training the staff on IT security, etc.).
the response time (50 users => 5sec response time) -
show that the application is stable, scalable and has 7. Lack of documentation or incomplete
enough hardware support. The application has a high documentation of the applications.
probability to remain functional and not subjected to 8. Partial testing of applications or functionalities
incidents like unsaved session and outdated accounts. created.

96 ■ Auditfinanciar,anul XIII
Study Regarding Information Systems Audit for E-business

9. The method used to authenticate users creates 5. The risk of errors, like connection timeout errors
security risks. The solution chosen was the fastest when loading takes long.
to implement.
6. The MA platform is highly customizable, only one
10. The contact form cannot be sent. The control person knows how to work a certain modules
regarding filling in the form is working, but the data developed and managed using that platform, and if
pre-filled in hidden fields is not retrieved and the that person’s station is sabotaged, the system may
control does not allow sending the form. suffer losses, can be attacked roughly, and the
11. The translation of the database of the acquired image and profits of the company will be affected.
company to the database of the application is done Also, the person cannot be verified, not all
manually. The client codes and the structure differ necessary tests are performed and versions with
too much to be automated. errors can enter in production.
7. Unauthorized persons getting access to the system
Threats associated to the information system or to sensitive information may cause losses for the
vulnerabilities: company and determine a wave of attacks targeting
the system of the company. There are limits
1. Placing high value and importance equipment in an
specified in the licenses regarding the number of
inappropriate location, inadequately furbished and
stations and users. If users are not managed
insured can easily lead to equipment damage.
properly, the company may lose licenses or access
Triggering a fire alarm during a training exercise for
to certain development platforms and as a result
fire or accident in the building, can lead to flooding
have suspended access and lost applications. This
the equipment (servers) having a very high value.
is a major problem in case of undocumented
2. Creating a new development environment can lead applications, for which there is no back-up, etc.
to multiplication of errors or duplication of sensitive
8. Lack of documentation or incomplete
information whose subsequent flow cannot be
documentation of applications may lead to the
controlled.
appearance and propagation of security breaches in
3. Transferring the management and access rights the application, especially when the workload is
from one team to another implies high risks during high and new people are brought into the team, to
the transfer. Some people can copy data from the work on application development, and the testing is
system, data that can be used to attack the not performed completely for all application modules
company's information system. There is another risk or not all security tests are covered (e-Jobs failed a
that not all users have been mapped correctly and / simple SQL injection test).
or some users may have not had certain/the rights
9. Incomplete testing makes the system susceptible to
withdrawn, although this is required; or there may
risks related to:
be users who know the username and password of
another person (for example, some may find out the • Application availability and operation in the
password for the administrator account) and can production environment;
obtain access to modify / delete data. • Communication problems between
applications that bring losses to the company;
4. Failure to implement a proper test environment can
lead to the failure of the system in production. For • Errors that attract hackers or intruders and
example, the application will process much slower a make the system susceptible to deliberate
database larger than the one used for testing or attacks.
development, or regarding the interaction with other 10. Decrease of the number of users, complaints, loss
applications in the system, errors may appear when of confidence in the company, lower sales and
the applications are integrated in the production income, risk of compromising personal data, traffic
environment. monitoring problems.

Nr. 3(12 3 )/2 0 1 5 . 97


Pavel NÂSTASE, Flavia CAIA

environment is involved, a minimum degree of risk


4. Conclusions and should be ensured by requiring clear procedures
recommendations providing several steps (e.g. identification and

The information systems audit for entities in the assessment, detection, selection, execution, operation
and control).
electronic commerce domain presents a set of specific
characteristics, compared to auditing traditional entities, 3. Independent, separate management of access
such as: electronic data, the application of computer- rights, software licenses, certificates, etc.
assisted audit technologies, changing controls regarding 4. Imposing a regulation concerning back-up
audit risk, complexity of the content of the audit report procedures, roll-back, testing and implementation of
audit and real time auditing. a new environment.
Following an empirical study conducted in an online 5. Periodic assessment of the necessity of personnel,
business company, there were identified a series of hiring more specialists to manage certain modules /
issues related to infrastructure and configuration. They applications, testing, managing access rights and
concern the working procedures for key processes, such user accounts. Separation of responsibilities of
as implementing a new environment or restoration and employees and covering the need for professional
transfer, synchronization of certain information or training.
applications, lack of staff. Also, the procedure for
6. Training employees on IT security.
transfer from one environment to another does not have
a guideline and is not controlled, and the implementation 7. Enforcing mandatory standard procedures, so that
of the test environment is superficial, the rigors of the there is no modification / module / application /
process being ignored. development / functionality of the platform that is not
documented.
As regards the controls of the application the study
highlighted issues requiring action, such as: selective, 8. Improving the authentication solution, more effective
partial testing, authentication problems for the online controls, removing or securing functional
application and for certain contact form controls, and management pages.
lack of documentation or incomplete documentation of 9. Addressing the data acquiring problem.
functionalities. In addition, the method used to
10. Allocation of temporary resources for this process,
authenticate users creates security risks, the contact
for efficiency and fairness.
form cannot be sent, and the translation of the database
of the acquired company in the database of the The study and the proposed security policies are

application is done manually. considering a complex system consisting of online web,


Oracle and SAS technologies.
In order to eliminate or reduce the risks associated to
the information system to an acceptable level, we For companies with this business profile, the benefits of

propose a set of security policies: independent information systems audit would be


reflected in the efficiency, safety, increasing results of
1. Arranging and providing storage space and
the online shops, increasing users' satisfaction with the
coordinating the equipment procurement to the
site and customers’ and stakeholders' confidence.
needs of the department.

2. Establish procedures for the transfer of virtual Acknowledgement


machines, so that sensitive data may not be This work was co-financed from the European Social
reproduced and people working on the test
Fund through Sectoral Operational Programme Human
environment may not receive access to the Resources Development 2007-2013, project number
development environment or vice versa, if the POSDRU/159/1.5/S/142115 „Performance and
development environment will be restored using test excellence in doctoral and postdoctoral research in
environment, or vice versa. If the production Romanian economics science domain”.

98 AUDIT FINANCIAR, a n u l X III


Study Regarding Information Systems Audit for E-business

REFERENCES:

Cannon, D., CISA Certified Information Systems Auditor


Madan, D., ISCA - A Complete Reference (Information
Study Guide, 3rd Edition, John Wiley publishing
System Control and Audit), publisher Pooja Law
house, Indianapolis, 2011
House, 2013
Cardoş V.D., Provocările şi valenţele auditului
sistemelor informaţionale contabile, Ph.D. Thesis, Moeller, R., IT Audit, Control, and Security, John Wiley &
Coordinator Prof. Dumitru Matiş, „Babeş-Bolyai” Sons publishing house, Hoboken, 2010
University, Cluj-Napoca, 2010, accessed online: Năstase et all, Auditul şi controlul sistemelor
http://doctorat.ubbcluj.ro/sustinerea_publica/rezuma informaţionale, Editura Economică, Bucureşti, 2007
te/2010/contabilitate/Cardos_Vasile_RO.pdf Pathak, J., Lind, M., şi Abdolmohammadi, M., E-
Cascarino, R., Auditor's Guide to IT Auditing, John Wiley Commerce Audit Judgment Expertise: Does
& Sons publishing house, Hoboken, 2012 Expertise in System Change Management and
Chen, H. şi Zheng, K., A Study of E-Commerce System Information Technology Auditing Mediate E-
Audit, Advances in information Sciences and Service Commerce Audit Judgment Expertise?, Informatica
Sciences (AISS), Volume 5, No. 2, pp. 413-419, 2013 Economică, 2010, Volume 14, No. 1, pp. 5-20, 2010

Jackson, C , Network Security Auditing, Cisco Press Tomar, N., Benefits of Auditing in Information System,
publishing house, Indianapolis, 2010 2011, available online at: http://www.c-
sharpcorner.com/blogs/4909/benefits-of-auditing-in-
Kotb, A., Roberts, C., The Impact of E-Business on the
information-system.aspx
Audit Process: An Investigation of the Factors
Leading to Change, International Journal of Google Online Security Blog, disponibil la adresa:
Auditing, Volume 15, pp. 150-175, 2011 http://googleonlinesecurity.blogspot.ro/

Nr. 3(123)/2015 99
Copyright of Audit Financiar is the property of Chamber of Financial Auditors of Romania
(CFAR) and its content may not be copied or emailed to multiple sites or posted to a listserv
without the copyright holder's express written permission. However, users may print,
download, or email articles for individual use.

You might also like