Preview

Cis Environment

Good Essays
Open Document
Open Document
1270 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cis Environment
1. Distinguish between internal control in a CIS environment and in non-CIS environment.
A CIS environment exists when a computer of any type or size is involved in the processing by the entity of financial information of significance to the audit; whether that computer is operated by the entity or by a third party. Many of the control procedures used in manual processing also apply in a CIS environment. Examples of such control procedures include authorization of transaction, proper segregation of duties, and independent checking. The elements of internal control are the same; the computer just changes the methods by which these elements are implemented.
2. What is meant by “general controls” in relation to CIS environment?
General controls are those control policies and procedures that relate to the overall computer information system. The purpose of general CIS controls is to establish a framework of overall controls over the CIS activities and to provide a reasonable assurance that the overall objectives of internal control are achieved. These may include:
-organization and management controls
-application systems development and maintenance controls
-computer operation controls
-system software controls
-data entry and program controls

3. Enumerate and describe each of the five (5) general controls in a CIS environment.
a. Organizational Controls – just as in a manual system, there should be a written plan of the organization, with clear assignment of authority and responsibility. In a CIS environment, the plan of an organization for an entity’s computer system should include segregation between the user and CIS department, and segregation of duties within the CIS department.
b. Systems development and documentation controls – software development as well as changes thereof must be approved by the appropriate level of management and the user department. To ensure that computer programs are functioning as designed, the program must be tested

You May Also Find These Documents Helpful

  • Good Essays

    IS4560 Unit 3 Assign 1

    • 779 Words
    • 3 Pages

    systems from the network diagram. A security control is any mechanism that you put in…

    • 779 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Service Request Sr Rm 004

    • 1582 Words
    • 7 Pages

    This phase requires the coordination and cooperation of many people. The system analyst cannot conduct all the work alone. The first step involves coding. Coding is process of converting writing computer language that tells the system the commands to perform when certain commands are given. As the coding process being, the process of testing is also taking place as well. When coding is written, it must pass validation or the computer will not understand the language and the expect program will not perform to standard. Many strategies are available for testing validation; the size of the system dictates which is best. Throughout the system development life cycle, software testing was taking place after certain events to ensure the preliminary creation was on track. During analysis the overall test plan was developed. In the design phase, the unit test, integration test plan, and a system test plan was developed. Inspections are formal group activities that perform manually to find obvious errors such as syntax and…

    • 1582 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Assignment 8.1 Handout 1. Internal controls are designed to safeguard assets, encourage employees to follow company policies, promote operational efficiency, and ensure accurate accounting records. Requirements R1. Which objective is most important? R2. Which must the internal controls accomplish for the business to survive? Give your reason. 2. The Sarbanes-Oxley Act affects public companies. Requirement R1. How does the Sarbanes-Oxley Act relate to internal controls? Be specific. 3. Separation of duties is a key internal control. Requirement R1. Explain in your own words why separation of duties is often described as the cornerstone of internal control for safeguarding assets. Describe what can happen if the same person has custody of an…

    • 854 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Examine three (3) specific functions a CISO and provide examples of when a CISO would execute these functions within the organization.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    IT/210 Appendix D

    • 453 Words
    • 4 Pages

    Consider the Input and Output Process Example program in Appendix B, in which you developed what are often called system-level requirements: the basis for all subsequent analysis and design steps. The following steps will take these system-level requirements and refine them into a detailed blueprint for the program.…

    • 453 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    General controls – make sure an organization’s control environment is stable and well managed. Examples: security, IT infrastruction, software acquisition, development,…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    SR-kf-013

    • 9081 Words
    • 37 Pages

    c. Monitoring System Performance – The system will need to be monitored to see if the performance of the system is consistent. When the system shows constant high performance then the system has been successfully developed.…

    • 9081 Words
    • 37 Pages
    Powerful Essays
  • Satisfactory Essays

    I. Control Objectives for Information and Related Technology, contains good practices for IT management provided by ISACA. Provides a extensive framework for ensuring your IT is being used to support your organization in the best possible manner.…

    • 566 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Internal control is a business process for assuring achievement of an organization’s objectives. Firstly, internal control plays an important role in safeguarding the organization’s assets. With carefully examination and monitor, internal control is able to discover any anomalies inside the organization, such as inventory spoilage. Moreover, internal control can help improve the efficiency and effectiveness of business processes. For example, through internal control in a manufacturing company, the manager can explore some non-value added activities. Eliminating non-value adding activities can save significant organization’s resources for better development. Additionally, internal controls prevent and detect fraud happen in the organization. Employees will less likely to perform misconduct since the rigorous internal control will find out who is conducting harmful behaviors. Furthermore, internal control improve the completeness and accuracy of accounting record, thus improves the reliability of the accounting information. This can be achieved by rigid internal audit. Lastly, internal audit can ensure that preparation of financial information on timely basis.…

    • 1349 Words
    • 4 Pages
    Powerful Essays
  • Best Essays

    Internal control is defined as a process affected by an organization 's structure, work and authority flows, people and management information systems, designed to help the organization accomplish specific goals or objectives. It is a means by which an organization 's resources are directed, monitored, and measured. It plays an important role in preventing and detecting fraud and protecting the organization 's resources, both physical (e.g., machinery and property) and intangible (e.g., reputation or intellectual property such as trademarks)…

    • 4040 Words
    • 17 Pages
    Best Essays
  • Satisfactory Essays

    Types of controls, that an admin can implement, are login identifiers, system and data audits, firewalls, encryption, and session timeouts. All of these controls help to prevent, defect, and correct the network from potential threats. Identifiers are simply authentication methods used to gain access to a network. Audits need to be completed to investigate the activities of personnel as well as identify the status of the overall network. Firewalls must be put in place to protect the network against unwanted users and bugs. Encryption should be used to ensure all data traffic is protected from prying eyes or individuals scanning the network for information they can steal or abuse. Lastly, a policy implementing session timeouts must be enforced to hold all users liable for not properly locking their computers when walking away from it.…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There are five components to internal controls. A comprehensive checklist should adequately define these components and ensure that each component has been adequately met. According to Louwers, Ramsay, Sinason, and Strawser (2007) the five components to internal controls include:…

    • 329 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 205 Final Exam

    • 1743 Words
    • 10 Pages

    5. Policies that determine which information technology will be used, when, and how are provided by:…

    • 1743 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    |1,2 |Instructor Handouts (PP |Financial Auditing, Operational Auditing, IT Auditing, Forensics auditing, role of IIA, ISACA, |…

    • 746 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    B- Suppose you are going to build a new system that automates or improves the interview process for the career services department of your school. Develop a requirements definition for the new system. Include both functional and non-functional system requirements. Pretend you will release the system in three different versions. Prioritize the requirements accordingly.…

    • 829 Words
    • 4 Pages
    Satisfactory Essays