AIS Lec

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 14

Chapter 10

Information Systems Controls for System Reliability—Part 3: Processing Integrity and


Availability 10-1
Nicholas Kitch James S. Gajetela, MSIT(CAR)
Learning Objectives

 Identify and explain controls designed to ensure processing integrity.

 Identify and explain controls designed to ensure systems availability.

Nicholas Kitch James S. Gajetela, MSIT(CAR) 10-2


Trust Services Framework
 Security (Chapter 8)
 Access to the system and its data is controlled and restricted to legitimate users.

 Confidentiality (Chapter 8)
 Sensitive organizational information (e.g., marketing plans, trade secrets) is protected from
unauthorized disclosure.

 Privacy (Chapter 9)
 Personal information about customers is collected, used, disclosed, and maintained only in
compliance with internal policies and external regulatory requirements and is protected from
unauthorized disclosure.

 Processing Integrity
 Data are processed accurately, completely, in a timely manner, and only with proper
authorization.

 Availability
 System and its information are available to meet operational and contractual
obligations.

Nicholas Kitch James S. Gajetela, MSIT(CAR) 10-3


Controls Ensuring Processing Integrity

 Input

 Process

 Output

Nicholas Kitch James S. Gajetela, MSIT(CAR) 10-4


Input Controls

 “Garbage-in Garbage-out”

 Form Design
 All forms should be sequentially numbered
 Verify missing documents
 Use of turnaround documents
 Eliminate input errors

Nicholas Kitch James S. Gajetela, MSIT(CAR) 10-5


Input Controls
 Data Entry Checks  Validity check
 Field check  Input compared with master data
 Characters proper type? Text, to confirm existence
integer, date, and so on  Reasonableness check
 Sign check  Logical comparisons
 Proper arithmetic sign?  Check digit verification
 Limit check  Computed from input value to
 Input checked against fixed catch typo errors
value?  Prompting
 Range check  Input requested by system
 Input within low and high range  Close-loop verification
value?  Uses input data to retrieve and
 Size check display related data
 Input fit within field?
 Completeness check
 Have all required data been
entered?

Nicholas Kitch James S. Gajetela, MSIT(CAR) 10-6


Batch Input Controls

 Batch Processing
 Input multiple source documents at once in a group

 Batch Totals
 Compare input totals to output totals
 Financial
 Sums a field that contains monetary values
 Hash
 Sums a nonfinancial numeric field
 Record count
 Sums a nonfinancial numeric field

Nicholas Kitch James S. Gajetela, MSIT(CAR) 10-7


Processing Controls

 Data Matching
 Multiple data values must match before processing occurs.

 File Labels
 Ensure correct and most current file is being updated.

 Batch Total Recalculation


 Compare calculated batch total after processing to input totals.

 Cross-Footing and Zero Balance Tests


 Compute totals using multiple methods to ensure the same results.

 Write Protection
 Eliminate possibility of overwriting or erasing existing data.

 Concurrent Update
 Locking records or fields when they are being updated so multiple users are not updating at
the same time.

Nicholas Kitch James S. Gajetela, MSIT(CAR) 10-8


Output Controls

 User Review
 Verify reasonableness, completeness, and routed to intended individual

 Reconciliation

 Data Transmission Controls


 Check sums
 Hash of file transmitted, comparison made of hash before and after
transmission
 Parity checking
 Bit added to each character transmitted, the characters can then be
verified for accuracy

Nicholas Kitch James S. Gajetela, MSIT(CAR) 10-9


Controls Ensuring Availability

 Systems or information need to be available 24/7


 It is not possible to ensure this so:

Nicholas Kitch James S. Gajetela, MSIT(CAR) 10-10


Minimize Risks
 Preventive Maintenance
 Cleaning, proper storage

 Fault Tolerance
 Ability of a system to continue if a part fails

 Data Center Location


 Minimize risk of natural and human created disasters.

 Training
 Less likely to make mistakes and will know how to recover, with minimal damage, from
errors they do commit

 Patch Management
 Install, run, and keep current antivirus and anti-spyware programs

Nicholas Kitch James S. Gajetela, MSIT(CAR) 10-11


Quick Recovery
 Back-up
 Incremental
 Copy only data that changed from last partial back-up
 Differential
 Copy only data that changed from last full back-up

 Business Continuity Plan (BCP)


 How to resume not only IT operations, but all business processes
 Relocating to new offices
 Hiring temporary replacements

Nicholas Kitch James S. Gajetela, MSIT(CAR) 10-12


Change Control

 Formal process used to ensure that modifications to hardware,


software, or processes do not reduce systems reliability
 Changes need to be documented.
 Changes need to be approved by appropriate manager.
 Changes need to be tested before implementations.
 All documentation needs to be updated for changes.
 Back-out plans need to be adopted.
 User rights and privileges need to be monitored during change.

Nicholas Kitch James S. Gajetela, MSIT(CAR) 10-13


Disaster Recovery Plan (DRP)
 Procedures to restore an organization’s IT function in the event that its
data center is destroyed
 Cold Site
 An empty building that is prewired for necessary telephone and Internet
access, plus a contract with one or more vendors to provide all necessary
equipment within a specified period of time
 Hot Site
 A facility that is not only prewired for telephone and Internet access but
also contains all the computing and office equipment the organization
needs to perform its essential business activities
 Second Data-Center
 Used for back-up and site mirroring

Nicholas Kitch James S. Gajetela, MSIT(CAR) 10-14

You might also like