Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Strayer University AUDITING A 403 CHAPTER 2 AUDITING IT GOVERNANCE CONTROLS REVIEW QUESTIONS 1)What is IT governance?   What are the objectives of IT governance?   What is distributed data processing?   What are the advantages and disadvantages of distributed data processing?   What types of tasks become redundant in a distributed data processing system?

Strayer University AUDITING A 403 CHAPTER 2 AUDITING IT GOVERNANCE CONTROLS REVIEW QUESTIONS 1)What is IT governance?   What are the objectives of IT governance?   What is distributed data processing?   What are the advantages and disadvantages of distributed data processing?   What types of tasks become redundant in a distributed data processing system?

Accounting

Strayer University

AUDITING A 403

CHAPTER 2

AUDITING IT GOVERNANCE CONTROLS REVIEW QUESTIONS

1)What is IT governance?

 

  1. What are the objectives of IT governance?

 

  1. What is distributed data processing?

 

  1. What are the advantages and disadvantages of distributed data processing?

 

  1. What types of tasks become redundant in a distributed data processing system?

.

 

  1. Explain why certain duties that are deemed incompatible in a manual system may be combined in a CBIS computer-based information system environment. Give an example.

 

 

  1. What are the three primary CBIS functions that must be separated?

 

  1. What exposures do data consolidation in a CBIS environment pose?

 

  1. What problems may occur as a result of combining applications programming and maintenance tasks into one position?

 

  1. Why is poor-quality systems documentation a prevalent problem?

 

  1. What is RAID?

 

  1. What is the role of a data librarian?

 

 

  1.          What is the role of a corporate computer services department? How does this differ from other configurations?

 

  1. What are the five risks associated with distributed data processing?

 

  1. List the control features that directly contribute to the security of the computer center environment.

 

  1. What is data conversion?

 

  1. What may be contained in the data library?

 

  1. What is an ROC?

 

  1. What is a cold site?

 

  1. What is fault tolerance?

 

  1. What are the often-cited benefits of IT outsourcing?

 

  1. Define commodity IT asset.

 

  1. Define specific asset.

 

  1. List five risks associated with IT outsourcing.

 

  1. What is virtualization?

 

  1. What is network virtualization?

 

  1. What are the three classes of cloud computing services?

 

 

  1. What is Software as a Service (SaaS)?

 

  1. Give two advantages of Infrastructure as a Service (IaaS).

 

 

DISCUSSION QUESTIONS

 

  1. How is pre-SOX IT governance different from post-SOX IT governance?

 

  1. Although IT governance is a broad area, only three aspects of IT governance are discussed in the chapter. Name them and explain why these topics were chosen.

 

  1. What types of incompatible activities are prone to becoming consolidated in a distributed data processing system? How can this be prevented?

 

 

  1. Why would an operational manager be willing to take on more work in the form of supervising an information system?

 

  1. How can data be centralized in a distributed data processing system?

 

  1. Should standards be centralized in a distributed data processing environment? Explain.

 

  1. How can human behavior be considered one of the biggest potential threats to operating system integrity?

 

  1. A bank in California has thirteen branches spread throughout northern California, each with its own minicomputer where its data are stored. Another bank has 10 branches spread throughout California, with its data stored on a mainframe in San Francisco. Which system do you think is more vulnerable to unauthorized access? Excessive losses from disaster?

 

  1. End-user computing has become extremely popular in distributed data processing organizations. The end users like it because they feel they can more readily design and implement their own applications. Does this type of environment always foster more efficient development of applications? Explain your answer.

 

  1. Compare and contrast the following disaster recovery options: mutual aid pact, empty shell, recovery operations center, and internally provided backup. Rank them from most risky to least risky, as well as from most costly to least costly.

 

  1. Who should determine and prioritize the critical applications? How is this done? How frequently is it done?

 

  1. Why is it easier for programmers to perpetrate a fraud than operators?

 

  1. Why should an organization centralize the acquisition, testing, and implementation of software and hardware within the corporate IT function?

 

 

  1. Organizations sometimes locate their computer centers in the basement of their buildings to avoid normal traffic flows. Comment on this practice.

 

  1. The 2003 blackout that affected the U.S. northeast caused numerous computer failures. What can an organization do to protect itself from such uncontrollable power failures?

 

  1. Discuss a potential problem with ROCs.

 

  1. Discuss two potential problems associated with a cold site.

 

  1. Discuss three techniques used to achieve fault tolerance.

 

  1. Explain the outsourcing risk of failure to perform.

 

  1. Explain vendor exploitation.

 

  1. Explain why reduced security is an outsourcing risk.

 

  1. Explain how IT outsourcing can lead to loss of strategic advantage.

 

  1. Explain the role of Statement on Standards for Attestation Engagements No. 16 (SSAE 16) report in the review of internal controls

 

 

  1. How do SSAE 16 Type 1 and Type 2 differ?

 

  1. How are the Carve-out and Inclusive methods of reporting on subservice organizations different?

 

  1. Give two differences between ASP and SaaS.

 

  1. Why is cloud computing not the best option for all companies?

 

 

 

 

 

PROBLEMS

 

  1. Disaster Recovery Planning Controversy

The relevance of a disaster recovery plan (DRP) to a financial statement audit is a matter of debate. Some argue that the existence of a DPR is irrelevant to the audit. Others argue that it is an important control that needs to be considered in the assessment of internal control.

Required:

Argue both side of this debate.

    1. Provide a logical argument why a DRP should not be considered in the audit.
    2. Argue why a DRP is an important control and should be reviewed within the conduct of a financial audit.

 

  1. Internal Control

During its preliminary review of the financial statements of Barton, Inc., Simon and Associates, CPA discovered a lack of proper segregation of duties between the programming and operating functions in Barton’s data center. They discovered that some new systems development programmers also filled in as operators on occasion. Simon and Associates extended the internal control review and test of controls and concluded in its final report that sufficient compensating general controls provided reasonable

 

assurance that the internal control objectives were being met.

Required:

What compensating controls are most likely in place?

 

  1. Physical Security

Big Apple Financials, Inc., is a financial services firm located in New York City. The company keeps client investment and account information on a server at its Brooklyn data center. This information includes the total value of the portfolio, type of investments made, the income structure of each client, and associated tax liabilities. The company has recently upgraded its Web site to allow clients to access their investment information.

The company’s data center is in the basement of a rented building. Company management believes that the location is secure enough to protect their data from physical threats. The servers are housed in a room that has smoke detectors and associated sprinklers. It is enclosed, with no windows, and has temperature-controlled air conditioning. The company’s auditors, however, have expressed concern that some of the measures at the current location are inadequate and that newer alternatives should be explored. Management has expressed counter concerns about the high cost of purchasing new equipment and relocating its data center.

Required:

 

  1. Why are Big Apple’s auditors stressing the need to have a better physical environment for the server?
  2. Describe six control features that contribute to the physical security of the computer center.
  3. Big Apple management is concerned about the cost of relocating the data center. Discuss some options open to them that could reduce their operating costs and provide the security the auditor’s seek.

 

 

 

  1. Disaster Recovery Plans

The headquarters of Hill Crest Corporation, a private company with $15.5 million in annual sales, is located in California. Hill Crest provides for its 150 clients an online legal software service that includes data storage and administrative activities for law offices.

The company has grown rapidly since its inception 3 years ago, and its data processing department has expanded to accommodate this growth. Because Hill Crest’s president and sales personnel spend a great deal of time out of the office developing new clients, the planning of the IT facilities has been left to the data processing professionals.

Hill Crest recently moved its headquarters into a remodeled warehouse on the outskirts of the city. While remodeling the warehouse, the architects retained much of the original structure, including the wooden-shingled exterior and exposed wooden beams throughout

 

the interior. The distributive processing computers and servers are situated in a large open area with high ceilings and skylights. The openness makes the data center accessible to the rest of the staff and promotes a team approach to problem solving. Before occupying the new facility, city inspectors declared the building safe; that is, it had adequate fire extinguishers, sufficient exits, and so on.

In an effort to provide further protection for its large database of client information, Hill Crest instituted a tape backup procedure that automatically backs up the database every Sunday evening, avoiding interruption in the daily operations and procedures. All tapes are then labeled and carefully stored on shelves reserved for this purpose in the data processing department. The departmental operator’s manual has instructions on how to use these tapes to restore the database, should the need arise. A list of home phone numbers of the individuals in the data processing department is available in case of an emergency. Hill Crest has recently increased its liability insurance for data loss from

$50,000 to $100,000.

This past Saturday, the Hill Crest headquarters building was completely ruined by fire, and the company must now inform its clients that all of their information has been destroyed.

Required:

    1. Describe the computer security weaknesses present at Hill Crest Corporation that made it possible for a disastrous data loss.
    2. List the components that should have been included in the disaster recovery plan at Hill Crest Corporation to ensure computer recovery within 72 hours.
    3. What factors, other than those included in the plan itself

 

 

  1. Segregation of Duties

Arcadia Plastics follows the philosophy of transferring people from job to job within the organization. Management believes that job rotation deters employees from feeling that they are stagnating in their jobs and promotes a better understanding of the company. A computer services employee typically works for six months as a data librarian, one year as a systems developer, six months as a database administrator, and one year in systems maintenance. At that point, he or she is assigned to a permanent position.

 

Required:

Discuss the importance of separation of duties within the information systems department.

How can Arcadia Plastics have both job rotation and well-separated duties?

 

 

 

  1. DDP Risks

Write an essay discussing the primary risks associated with the distributed processing environment.

 

 

 

  1. Cloud Based Recovery Service Provider

Visit SunGard’s Web site, http://www.sungard.com, and research its Recovery2Cloud services offered. Write a report of your findings.

 

  1. Internal Control Responsibility for Outsourced IT

Explain why managers who outsource their IT function may or may not also outsource responsibility for IT controls. What options are open to auditors regarding expressing an opinion on the adequacy of internal controls?

 

 

  1. Competing Schools of Thought Regarding Outsourcing

Explain the core competency argument for outsourcing and compare/ contrast it with TCE theory. Why does one theory tend to prevail over the other in making outsourcing decisions?

 

 

 

 

  1. Distributed Processing System

The internal audit department of a manufacturing company conducted a routine examination of the company’s distributed computer facilities. The auditor’s report was critical of the lack of coordination in the purchase of PC systems and software that individual departments use. Several different hardware platforms, operating systems, spreadsheet packages, database systems, and networking applications were in use.

In response to the internal audit report, and without consulting with department users regarding their current and future system needs, Marten, the Vice President of Information Services, issued a memorandum to all employees stating the following new policies:

 

  1. The Micromanager Spreadsheet package has been selected to be the standard for the company, and all employees must switch to it within the month.
  2. All future PC purchases must be Megasoft compatible.
  3. All departments must convert to the Megasoft Entree database package.
  4. The office of the Vice President of Information Services must approve all new hardware and software purchases.

Several managers of other operating departments have complained about Marten’s memorandum. Apparently, before issuing this memo, Marten had not consulted with any of the users regarding their current and future software needs.

Required

    1. When setting systems standards in a distributed processing environment, discuss the pertinent factors about:
  1. Computer hardware and software considerations.
  2. Controls considerations.
    1. Discuss the benefits of having standardized hardware and software across distributed departments in the firm.
    2. Discuss the concerns that the memorandum is likely to create for distributed users in the company.

 

 

 

  1. Describe the key features of cloud computing.

 

 

  1. Service Provider Audit

The Harvey Manufacturing Company is undergoing its annual financial statement audit. Last year the company purchased a SaaS application from Excel Systems (a cloud service provider) to run mission critical financial transactions. The SaaS application runs on an IaaS server, which Excel Systems outsourced to another service provider.

Required:

 

Explain how the Harvey Manufacturing auditors will assess the relevant internal controls related to these mission critical transactions.

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE