Information Systems: Characteristics and Security

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a characteristic of a centralized system?

  • All processing occurs at one location. (correct)
  • It is harder to set up.
  • Data is stored in diverse locations.
  • Processing occurs at multiple locations.

Which of the following is a benefit of a centralized system?

  • Difficult security setup
  • Lower costs (correct)
  • Complex setup
  • High risk of disruption

What is a common challenge for growing businesses regarding information systems?

  • Overlapping and redundant systems. (correct)
  • Simple accounting practices
  • Excessive system integration.
  • Lack of any information systems.

What is a recommended compensating control for small businesses with limited segregation of duties?

<p>Manager supervision (B)</p> Signup and view all the answers

What should physical access controls focus on in smaller companies, where employees often share resources?

<p>Bring-your-own-device security. (C)</p> Signup and view all the answers

Where do logical access controls operate?

<p>Company's security system on a network (B)</p> Signup and view all the answers

What type of usernames and passwords should companies require employees to use to ensure safety?

<p>Strong usernames and passwords (D)</p> Signup and view all the answers

What is an example of a common inexpensive information system used in early-stage enterprises?

<p>Excel (A)</p> Signup and view all the answers

What type of system is the Accounting Information System (AIS) primarily considered to be?

<p>Transaction processing system (A)</p> Signup and view all the answers

Which level of users typically makes strategic decisions?

<p>Executive Leadership (A)</p> Signup and view all the answers

What is the primary focus of an Accounting Information System (AIS)?

<p>Capturing data from accounting business events (D)</p> Signup and view all the answers

Which user level is primarily involved in capturing data within an organization's information system?

<p>Workers (B)</p> Signup and view all the answers

What is a critical requirement for an effective Transaction Processing System (TPS)?

<p>High availability and data integrity (D)</p> Signup and view all the answers

What is the term for the level of risk before any responses are implemented?

<p>Inherent risk (D)</p> Signup and view all the answers

Which risk response involves taking action to decrease the likelihood or impact of a risk?

<p>Mitigate (B)</p> Signup and view all the answers

What does it mean to 'accept' a risk?

<p>Choosing to take no action and accept the inherent risk. (B)</p> Signup and view all the answers

Which risk response strategy involves shifting the burden of a risk to another party?

<p>Transfer (B)</p> Signup and view all the answers

What is the term for the level of risk remaining after responses have been implemented?

<p>Residual risk (B)</p> Signup and view all the answers

What is a primary benefit of using an Enterprise Resource Planning (ERP) system?

<p>Automating routine business processes (A)</p> Signup and view all the answers

Which of the following is a characteristic of ERP systems?

<p>Single, cohesive system across all areas of a company (C)</p> Signup and view all the answers

What is one disadvantage of information systems for large organizations?

<p>Expensive to maintain (B)</p> Signup and view all the answers

In a distributed system, where is data processing and storage primarily handled?

<p>Multiple locations (C)</p> Signup and view all the answers

What is a potential drawback of using a distributed system?

<p>Increased security risk (A)</p> Signup and view all the answers

What is a defining characteristic of a decentralized system?

<p>Distributed processing and databases among several locations (C)</p> Signup and view all the answers

What is an advantage of a decentralized system?

<p>Quicker transaction details with faster processing speed (B)</p> Signup and view all the answers

Which of these represents a potential negative aspect of a decentralized system?

<p>Increased costs of multiple systems (B)</p> Signup and view all the answers

What are the three objectives of internal control according to the content?

<p>Operations, Reporting, and Compliance (D)</p> Signup and view all the answers

Which of the following is NOT a dimension of the COSO Cube?

<p>Financial Performance (A)</p> Signup and view all the answers

Which of the following is an example of a manual control?

<p>A manager reviewing and initialing an employee's travel expenses. (A)</p> Signup and view all the answers

Which group has the primary responsibility to establish and maintain an adequate system of internal controls?

<p>Management (C)</p> Signup and view all the answers

In the Three Lines of Defense model, who is independent of management and assesses the effectiveness of controls?

<p>Internal Auditors (C)</p> Signup and view all the answers

What is the purpose of an internal control framework?

<p>To provide guidance for establishing and maintaining internal control systems. (D)</p> Signup and view all the answers

Which law codifies the requirement that companies use an internal control framework?

<p>The Sarbanes-Oxley Act of 2002 (D)</p> Signup and view all the answers

Which internal control framework is widely used by large organizations?

<p>The COSO framework (D)</p> Signup and view all the answers

Which of the following is an example of application software?

<p>Excel (C)</p> Signup and view all the answers

What type of processing involves collecting data and processing it later at a scheduled time?

<p>Batch Processing (B)</p> Signup and view all the answers

Which of the following is a potential risk associated with purchasing third-party software?

<p>Copyright Infringement (B)</p> Signup and view all the answers

Which of the following is a type of system software?

<p>Operating Systems (C)</p> Signup and view all the answers

Which programming language is commonly used for database management?

<p>Structured Query Language (SQL) (D)</p> Signup and view all the answers

What is a characteristic of real-time processing?

<p>Transactions are processed as they occur. (A)</p> Signup and view all the answers

If a third-party vendor closes down, what is a potential risk for businesses using their software?

<p>Disruptions due to lack of support. (D)</p> Signup and view all the answers

What is a key difference between batch processing and real-time processing?

<p>Real-time processing requires more processing capacity. (A)</p> Signup and view all the answers

Which type of risk originates from within a company's operations?

<p>Internal (B)</p> Signup and view all the answers

What is the definition of operational risk?

<p>Risks that occur in a company's day-to-day activities. (D)</p> Signup and view all the answers

Which of the following is an example of financial risk?

<p>Customers not paying on credit. (A)</p> Signup and view all the answers

Damage to a company's reputation is known as what type of risk?

<p>Reputational risk (A)</p> Signup and view all the answers

Which of these risks is most likely to be significantly amplified via social media?

<p>Reputational risk (B)</p> Signup and view all the answers

What is compliance risk?

<p>The risk associated with complying with laws and regulations. (D)</p> Signup and view all the answers

What is strategic risk?

<p>The risk associated with a company's current and new strategies. (A)</p> Signup and view all the answers

Which of the is an example of physical risk

<p>A natural disaster damaging a company's facilities. (A)</p> Signup and view all the answers

What are the two factors that combine to make risk severity?

<p>Risk likelihood and risk impact. (C)</p> Signup and view all the answers

In risk prioritization, what does 'risk impact' refer to?

<p>The estimated damage resulting from a risk event. (D)</p> Signup and view all the answers

What is the initial step in the risk management process?

<p>Risk identification (B)</p> Signup and view all the answers

What is the main goal of data security?

<p>Protect data confidentiality, integrity, and availability (A)</p> Signup and view all the answers

Which of the following is a fundamental concept in information systems?

<p>Data integration (B)</p> Signup and view all the answers

Which of these is a key characteristic of effective information?

<p>Relevance (B)</p> Signup and view all the answers

What is the purpose of a disaster recovery plan?

<p>Ensure business continuity after a disruptive event. (D)</p> Signup and view all the answers

What does risk refer to in the context of business?

<p>The likelihood of an unfavorable event occurring. (D)</p> Signup and view all the answers

What happens to the expected enterprise value when there is insufficient risk-taking?

<p>The expected enterprise value is low. (A)</p> Signup and view all the answers

What is the sweet spot on the Risk Level vs. Expected Enterprise Value curve?

<p>Where there is optimal risk-taking. (C)</p> Signup and view all the answers

What does a portfolio view of risk examine?

<p>Risk at the entity (organizational) level. (C)</p> Signup and view all the answers

What is the focus of the risk categorization step in Enterprise Risk Management (ERM)?

<p>Grouping risks based on their types. (B)</p> Signup and view all the answers

Which of the following is the correct order of steps in Enterprise Risk Management (ERM)?

<p>Risk Identification, Risk Categorization, Risk Prioritization, Risk Response (A)</p> Signup and view all the answers

What are the two parts of a risk statement?

<p>The issue and the possible outcome. (C)</p> Signup and view all the answers

Which of the following phrases correctly represents the format of a risk statement?

<p>&quot;This issue may result in this outcome&quot;. (A)</p> Signup and view all the answers

What is a primary advantage of using a cloud system?

<p>Pay-as-you-go model reducing upfront software costs (D)</p> Signup and view all the answers

Which of the following is a risk associated with in-house developed software related to budgeting?

<p>The expense of hiring talent to write and maintain the system code. (A)</p> Signup and view all the answers

What is a potential scheduling risk associated with developing software in-house?

<p>The development process might extend beyond the anticipated timeline (D)</p> Signup and view all the answers

Which of the following represents a 'Technical Specifications' risk associated with in-house software development?

<p>The delivered software may be defectively developed. (A)</p> Signup and view all the answers

What external market risk is associated with in-house developed software?

<p>Industry changes may require extensive software updates post-implementation. (B)</p> Signup and view all the answers

From a fraud perspective, what risk is associated with in-house software development?

<p>Code can be written to circumvent existing fraud controls. (B)</p> Signup and view all the answers

Which of the following is a reliability risk associated with using cloud systems?

<p>System inaccessibility due to loss of internet connectivity (D)</p> Signup and view all the answers

What is a key privacy risk when using a cloud service provider?

<p>Potential for litigation and loss of reputation if provider fails to secure data privacy. (A)</p> Signup and view all the answers

What security risk is associated with using a cloud service?

<p>Potential unauthorized access and malicious use of data, leading to financial loss (D)</p> Signup and view all the answers

What does SaaS stand for regarding cloud computing?

<p>Software as a Service (A)</p> Signup and view all the answers

Flashcards

Centralized System

A setup where all data processing and storage happens in a single place.

Centralized System - Positives

Easier setup, better security, and lower costs are benefits of this system.

Centralized System - Negatives

Greater risk of disruption, bottlenecks, lag time, and remote access issues.

Segregation of Duties (Small Business)

Combining duties due to limited staff; requires compensating controls.

Signup and view all the flashcards

Physical Access Controls

Prevents unauthorized access to physical resources.

Signup and view all the flashcards

Physical Access (Small Business)

Focus shifts to securing employee-owned devices.

Signup and view all the flashcards

Logical Access Controls

Security system controls access to a network, not personal drives.

Signup and view all the flashcards

Logical Access (Small Business)

Strong passwords tied to allowed job functions.

Signup and view all the flashcards

Inherent Risk

The level of risk before any risk responses are applied.

Signup and view all the flashcards

Residual Risk

The level of risk remaining after risk responses have been implemented.

Signup and view all the flashcards

Accepting Risk

Choosing to live with the risk. No actions are taken.

Signup and view all the flashcards

Mitigating Risk

Reducing the likelihood and/or impact of a risk event.

Signup and view all the flashcards

Transferring Risk

Shifting the burden of risk to another party, usually for a fee.

Signup and view all the flashcards

Three Objectives of Internal Control

Operations, Reporting, and Compliance: the goals an organization strives to achieve.

Signup and view all the flashcards

COSO Cube

A visual representation of the COSO framework's three dimensions.

Signup and view all the flashcards

Three Dimensions of the COSO Cube

Control Objectives, Control Components, and Organizational Structure

Signup and view all the flashcards

Manual Controls

Controls requiring human judgment and interaction.

Signup and view all the flashcards

Automated Controls

Controls performed automatically by a system.

Signup and view all the flashcards

First Line of Defense

Management establishes and maintains internal controls.

Signup and view all the flashcards

Second Line of Defense

Risk management and control experts assist management.

Signup and view all the flashcards

Third Line of Defense

Internal Auditors assess the effectiveness of controls.

Signup and view all the flashcards

ERP System

A software solution that integrates all business functions into a single system.

Signup and view all the flashcards

Benefits of ERP

Automating tasks, improving quality, increasing efficiency, saving costs, and increasing data transparency.

Signup and view all the flashcards

Large Org. IS

Commonly used by large enterprises; expensive to maintain but offer scalability.

Signup and view all the flashcards

Distributed System

Uses multiple locations connected to a central site for data processing and storage.

Signup and view all the flashcards

Advantages of Distributed Systems

Reduced central processing load & improved responsiveness

Signup and view all the flashcards

Disadvantages of Distributed Systems

Increased security risks due to multiple locations and potential bottlenecks.

Signup and view all the flashcards

Advantages of Decentralized Systems

Faster transaction processing speed due to workload distribution.

Signup and view all the flashcards

Accounting Information System (AIS)

Part of information systems focused on accounting data generated by business events.

Signup and view all the flashcards

Transaction Processing System (TPS)

Systems that executes and captures data generated by accounting business events.

Signup and view all the flashcards

Effective TPS

High availability and data integrity are requirements for TPS

Signup and view all the flashcards

Levels of Users

Corporate, Upper-level management, Middle Management, Workers

Signup and view all the flashcards

Information Systems Types

Transaction processing systems, Management information systems, Decision support systems, Executive information Systems

Signup and view all the flashcards

Copyright Infringement Risk

Violating software license terms can lead to lawsuits and damage to a company's image.

Signup and view all the flashcards

Data Breach Risk (Third-Party)

Relying on third-party software introduces the risk of vulnerabilities that can be exploited.

Signup and view all the flashcards

Third-Party Vendor Disruption

If a third-party vendor shuts down, support for their software may disappear, creating problems.

Signup and view all the flashcards

Software Update Risk

Vendors may push unnecessary updates to generate extra billable hours.

Signup and view all the flashcards

Software Sourcing

Acquiring software from an external source or creating it within the organization.

Signup and view all the flashcards

Application Software

Programs designed for specific user tasks, like spreadsheets or accounting.

Signup and view all the flashcards

System Software

Software that manages computer hardware and other software.

Signup and view all the flashcards

Batch Processing

Collecting data and processing it later, usually on a schedule.

Signup and view all the flashcards

Decentralized Systems

A system with processing and storage spread across multiple interconnected locations.

Signup and view all the flashcards

Disadvantages of Decentralized Systems

Slower processing speeds, potential for errors, and inconsistent application of controls.

Signup and view all the flashcards

Decentralized Systems - Security Concerns

The risk that remains after management implements its risk response.

Signup and view all the flashcards

Definition of Preventative Controls

Controls performed by people using their knowledge, skills, and judgment.

Signup and view all the flashcards

Detective Controls

Internal auditing function provides independent assessment of control effectiveness.

Signup and view all the flashcards

Internal Risks

Risks that originate within the company's own activities and systems.

Signup and view all the flashcards

External Risks

Risks that arise from factors outside of the company's direct control.

Signup and view all the flashcards

Operational Risk

Risks that affect day-to-day activities and processes.

Signup and view all the flashcards

Financial Risk

Risks that impact the flow of money in and out of a business, possibly leading to financial losses.

Signup and view all the flashcards

Reputational Risk

Risks that can damage the company's image, brand, or reputation.

Signup and view all the flashcards

Compliance Risk

Risks related to compliance with laws and regulations.

Signup and view all the flashcards

Strategic Risk

Risks arising from the company's strategic decisions and plans.

Signup and view all the flashcards

Physical Risk

Risks stemming from natural disasters, theft, or other physical threats.

Signup and view all the flashcards

Risk Severity

A combination of how likely a risk is to occur and the potential damage if it does occur.

Signup and view all the flashcards

Risk Likelihood

The chance or probability that a risk event will happen.

Signup and view all the flashcards

What is Risk?

The chance of an unfavorable event happening.

Signup and view all the flashcards

ERM (Enterprise Risk Management)

A process to identify, categorize, prioritize, and respond to risks.

Signup and view all the flashcards

What is a Risk Statement?

A statement with two parts: the issue and the possible outcome.

Signup and view all the flashcards

Portfolio View of Risk

Looking at risk across the entire organization.

Signup and view all the flashcards

Profile View of Risk

Concentrating on risk at the level of a specific business event.

Signup and view all the flashcards

What is Risk Identification?

Figuring out what risks exist and what might result from them.

Signup and view all the flashcards

What is Risk Categorization?

Sorting risks into groups based on their kind.

Signup and view all the flashcards

What is Risk Prioritization?

Deciding which risks matter most and addressing those first.

Signup and view all the flashcards

Software as a Service (SaaS)

Software delivery model where applications are hosted by a service provider and made available to customers over the Internet.

Signup and view all the flashcards

Cloud Computing

Using a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server.

Signup and view all the flashcards

Cloud System Flexibility

Potential for increased flexibility and ability to scale resources as needed when utilizing a cloud system.

Signup and view all the flashcards

Cloud Cost Savings

Reduced upfront expenses and ongoing software costs by paying only for the resources you use.

Signup and view all the flashcards

Reduced Maintenance in Cloud

Elimination of the need to manage and maintain hardware and software, shifting the responsibility to the cloud provider.

Signup and view all the flashcards

In-House Software Budgeting Risk

The expense of hiring code writers and people to maintain the system.

Signup and view all the flashcards

In-House Software Scheduling Risk

The possibility of the software taking longer to create than expected.

Signup and view all the flashcards

In-House Software Technical Risk

The potential for software to be improperly developed, not meeting requirements.

Signup and view all the flashcards

In-House Software External Market Risk

Risk that the organization might experience industry and market changes that cause the software to require extensive updates.

Signup and view all the flashcards

Cloud Reliability Risks

The risk of the cloud failing because of unreliable internet or an unreliable host of the software and secure environment.

Signup and view all the flashcards

Study Notes

Internal Controls

  • Internal control is a process, effected by an entity's board of directors, management, and other personnel, designed to provide reasonable assurance regarding the achievement of objectives in the following categories: reliability of financial reporting, effectiveness and efficiency of operations, and compliance with applicable laws and regulations per PCAOB AU Section 319.06

  • Internal controls are essential for dealing with risks and understanding controls, and will be reviewed in the chapter.

Categorization of Internal Controls

  • Preventative controls are designed to prevent an event from occurring.
  • Detective controls are designed to provide notice to the company that an event has occurred.
  • Corrective controls are designed minimize or eliminate undesired outcomes when an event occurs.

Quick Class Exercise:

  • A fire insurance policy for a company warehouse is a transfer, so the code is "T".
  • Before any new employee is hired, a company runs a criminal background check this is preventative (P).
  • Every month the company reconciles the cash account balance in the general ledger to the cash balance shown on their bank statement. This is detective (D).

Preventative Control

  • Segregation of duties involves separating and assigning the three components of a transaction to separate employees.
  • One component of a transaction is custody of assets.
  • Another component of a transaction is authorization.
  • The third component of a transaction is record keeping.
  • An employee, such as the Inventory Manager or Clerk, is the only one authorized to have access to the inventory (custody).
  • Another employee, such as the Purchasing Manager or Purchasing Agents, is the only person authorized to order inventory (authorization).
  • A third employee, such as the Accounts Payable Manager or Clerk, is the person authorized to record increases to the inventory and accounts payable accounts for ordered and received inventory (record keeping).

Threats that can defeat internal control

  • One threat is management override; when someone in a supervisory role directs one of the people that report up to them to not follow policy/ well designed control can be defeated.
  • Another threat is collusion; when two or more employees work together (especially across segregated duties) a well designed control can be defeated.

Classification of Controls

  • Physical controls are outside of the IT environment and govern human activities and the ability to work from home if an office is closed.
  • IT General controls apply to the full set of systems used by the company requiring a password needed to access your office computer.
  • IT application controls apply to a specific application; accounts payable clerk is allowed to enter AP transaction, but a payroll clerk is not allowed to enter AP transaction.

What is Risk

  • Risk is the likelihood of an unfavorable event occurring and is essential in business.
  • Risk is not always a bad thing.
  • Focus is on unfavorable outcomes.
  • The key is choosing the right level of risk.

Identifying Risks

  • Risks can be related to a single business event, a business process, a business function, or the entire organization including the business model and strategy. Be as specific as possible to identify all risks
  • Enterprise Risk Management (ERM) is a thorough process to identify, categorize, prioritize, and respond to an entity’s risks.

Risk Identification and Statements

  • Identify existing risks and their outcomes.
  • Categorize the risks based on their types; this helps fine-tune risks from entity-level to business-process-related risks.
  • Prioritize risks that are most likely to occur or will have the largest impact on the organization and prioritize responding to those.
  • Risk statements have two parts: the issue and the possible outcome, and are in the form of, "This issue may result in this outcome.”

Risk Categories

  • Internal risks occur within the normal operations of a company and are preventable.
  • External risks come from outside of a company. Some appear to be both internal and external.
  • Internal risks include operational, technology and financial.
  • External risks includes compliance, reputational, and strategic.

Risk Prioritization

  • Risk severity is combination of risk likelihood and risk impact.
  • Risk likelihood estimates the probability of occurrence.
  • Risk impact estimates the damage.
  • Risks are prioritized based on both factors.

Responding to Risk

  • Before responding to risk, respond to the level of risk the entity faces is inherent risk.

  • After a response, the remaining level of risk the entity faces is residual risk..

  • There are four general types of responses to deal with each risk:

    • Accept the risk, no risk response is chosen, and the entity accepts the inherent risk.
    • Mitigate the risk by adjusting to reduce the likelihood of risk event occurring.
    • Transfer the risk transferring the risk to another entity (often in exchange for a payment).
    • Avoid the risk by avoiding events that cause the risk, and is not be possible in many cases

Example of Risk Response with Car

  • You buy a new car that has a leather interior and sometimes your friends eat inside.
  • Accept: Don't worry about. If someone spills, clear it and hope the stain isn't noticeable.
  • Mitigate: Treat your seats with a chemical that makes the likelihood of a food stain much less.
  • Transfer: Buy a specific insurance policy that covers damage to your seats.
  • Avoid: Do not allow anyone to eat in your car

Types of Software

  • Batch processing is when data is collected and processed later at the same scheduled time

  • Real-time processing is when transactions are processed as they occur, requiring more processing capacity and complex systems and controls, order entry and shipping systems.

  • Programming languages includes the coded instructions that create the software: -Structured Query Language SQL

  • Application software are end-user programs that perform specific functions facilitated by apps.

  • System Software includes operating systems, communications software, and utility programs.

Software Sourcing

  • Software can be purchased from a third-party vendor or developed in-house, each with its own benefits and risks.
  • If the business isn't adhering to software licensing policies of the software, could face legal allegations and reputational loss.
  • If third-party software is not properly secure, it is vulnerable to hackers.
  • Vendor may require unnecessary updates to bill additional hours to its customers that cannot be refused.

Cloud Computing

  • Cloud computing is the newer model for software deployment, connecting you to software via the internet; the advantages of Software as a Service(SaaS) include increased flexibility and scalability to meet changing conditions.
  • There are various budgeting, scheduling, technical specification, external market, fraud, reliability, privacy, and security risk areas of cloud computing.

Organizational Information Systems

  • Alternative system configurations are available for locations common is a centralized system which connects all users to one central location.
  • As businesses grow, they acquire businesses, and their systems can be integrated into a single system.
  • For small businesses, use proper segregation of duties, physical and logical access.
  • Business need to use policies and procedures for bring-your-own-device.
  • The most important thing is to tie functions to employees with usernames and passwords.

Benefits of ERP System

  • Future cost savings
  • Improved data transparency and quality
  • Increased business efficiencies
  • Quality improvement
  • Automating routine business processes
  • SAP is one of the most popular ERP systems.

Manual vs. Automated Controls

  • Manual controls are useful when human judgment and interaction are present, and employee travel expenses are reimbursed. Before being reviewed and initialed by manager.
  • Automated controls are often more reliable and consistent, like when a transaction is entered into an accounting system. Debits do not equal credits.

Establishment and Assessment of Internal Controls

  • Management has the primary responsibility to establish and maintain an adequate system of internal controls.
  • Internal auditors are independent of management and are tasked with assessing the effectiveness and efficiency of controls.
  • Internal control frameworks are essential as internal control framework is a set of concepts and questions that can be used by management to establish and maintain the internal control system.
  • The COSO framework is one of the most widely adopted.
  • The COSO Cube displays the three dimensions of the framework: control objectives, control components, and organizational structure.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Introduction to Computer Security Quiz
5 questions
Information Security Glossary
10 questions
IT Security Policies and ISMS Controls
10 questions
Use Quizgecko on...
Browser
Browser