SlideShare a Scribd company logo
Internal Control and IS Audit
Control 
• “Any input given to a dynamic system to produce a desired 
output.” 
• Here the word dynamic and desired output are very 
important. 
Input Dynamic 
System 
Desired 
output
Control 
• Dynamism of the system and Control Requirement 
– Static system – control is not required 
– More dynamism – the greater will be the control requirement of 
the system 
– Computer system – control not required, if it is not being used 
for any application or switched off 
– As complexity increases – its control requirement will also rise. 
– This implies that 
• Lesser control is required for stand-alone system 
• Greater for one which is connected to network or Internet
Control 
• Knowledge of Dynamism of the System Makes Control 
Effective 
– The predictability of the complexity of the disease has helped in 
development of vaccines to prevent and cure 
– Similarly, in computer system – control measures would operate 
effectively if the dynamism and complexity were known.
Control 
• The Input should be Directed towards Achieving the 
Desired Output 
– If the inputs are not focused and directed towards specific 
outputs – then control mechanism will not be successful. 
– There are No thumb rule 
– Each input or control measure should be directed towards 
achieving a specific output.
Control 
• The Output Should be Evaluated for Giving further 
Appropriate Input to the System 
– Example: Automobile driving system 
– This example shows how input can be effectively altered on 
the basis of evaluation of actual performance to achieve the 
desired output. 
– The same is true for complex computer system.
Control 
• The Output Should be Evaluated for Giving further 
Appropriate Input to the System 
– Example: Automobile driving system 
– This example shows how input can be effectively altered on the 
basis of Antivirus software is deployed 
• It acts as a detective , or preventive some time corrective control 
• The output can be observed by regular scanning 
• When the output is not at desired level – system is infected with some 
viruses 
• Based this evaluation patches can be loaded or new anti-virus software 
deployed
Internal Control 
• Basic purpose: 
– Business objectives are achieved 
– Undesired risk events are prevented or detected and 
corrected 
• How this can be achieved 
– By designing an effective internal control framework, 
comprises 
• Policies, procedures, practices, and organizational structure that gives 
reasonable assurance that the business objectives will be achieved 
• Discrete activities and supporting process 
• Either manual or automated
Internal Control 
• Manual or automated process 
• Implementation of internal control differs in both, essence 
remains the same 
• It not solely a procedure or policy performed at certain 
point of time 
• Rather this is an ongoing activity, based on 
– Risk assessment of the organization 
• Role of auditor is very important in evaluating the strength 
of the control
Internal Control 
• Elements of Control 
– Nature of controls 
• Preventive or Detective 
• Manual or Programmed 
– Preventive Control 
• Those inputs, designed to protect the organization from unlawful 
activities 
• The broad characteristics of preventive controls are: 
– A clear cut understanding about the vulnerabilities of the asset 
– Understanding the probable threats 
– Provision of necessary controls for probable threats from materializing
Internal Control 
• Some examples of preventive controls and how the 
same control is implemented in different 
environments. 
– Employ qualified personnel 
– Access control 
– Vaccination against diseases 
– Prescribing appropriate book for a course 
– Authorization of transaction 
– Firewalls 
– Anti-virus software passwords
Internal Controls 
Purpose Manual Control Computerized Control 
Restrict unauthorized 
Entry into the premises 
Build a gate and post a 
security guard 
Use access control 
software, smart card, 
biometrics 
Restrict unauthorized 
entry into software 
application 
Keep the computer in a 
secured location and 
allow only authorized 
persons to use the 
applications 
Use access control, viz. 
user ID, password, smart 
card
Detective Control 
• Detect and report the occurrences of an error, 
omission, or malicious act in the IS 
• Main characteristics are as follows: 
– Clear understanding of lawful activities so that anything 
which deviates from these is reported as unlawful, 
malicious, etc. 
– An established mechanism to refer the reported unlawful 
activities to the appropriate person or group 
– Interaction with preventive control to prevent such acts 
from occurring
Detective Control 
• Examples of Detective Controls 
– Surprise checks by supervisor 
– Check point in production jobs 
– Error messages over tape labels 
– Duplicate checking of calculations 
– Periodic performance reporting with variances 
– Past-due accounts report 
– The internal audit functions 
– Intrusion detection system 
– Cash counts and bank reconciliation 
– Monitoring expenditure against budgeted amount
Corrective Controls 
• Are very important 
• Prevention and detection alone cannot be effective 
unless there is an appropriate corrective mechanism in 
place. 
• Main characteristics are: 
– Minimize the impacts of threat 
– Identify the cause of the problem 
– Remedy problems discovered by detective controls 
– Get feedback from detective and preventive controls 
– Modify the processing system to minimize future occurrence 
of the problem
Compensatory Control 
• The cost of the lock should not be more than the cost of 
the asset it protects.
Corrective Control 
• Examples of Corrective Controls 
– Contingency planning 
– Backup procedure 
– Treatment procedures for a diseases 
– Change input value to an application system 
– Investigate budget variance and report violations
CISCO Security – Monitoring Analysis & Response System
Isa 4
Isa 4
Isa 4
Isa 4
Isa 4
Isa 4
Isa 4
Isa 4
Isa 4
Isa 4
Isa 4
Isa 4
Isa 4
Isa 4
Isa 4
Isa 4

More Related Content

What's hot

Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Sreekanth Narendran
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit
Sreekanth Narendran
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Sharah Ayumi
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
_supriadi
 
03.2 application control
03.2 application control03.2 application control
03.2 application controlMulyadi Yusuf
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information System
arif prasetyo
 
Audit in computerised informaton system environment and recent development i...
Audit in computerised  informaton system environment and recent development i...Audit in computerised  informaton system environment and recent development i...
Audit in computerised informaton system environment and recent development i...
Dr. Sanjay Sawant Dessai
 
Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkata
sunil patro
 
IT General Controls
IT General ControlsIT General Controls
IT General Controls
Cicero Ray Rufino
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Shahzeb Pirzada
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2
Jayant Dalvi
 
Federal Risk and Authorization Management Program: Assessment and Recommendat...
Federal Risk and Authorization Management Program: Assessment and Recommendat...Federal Risk and Authorization Management Program: Assessment and Recommendat...
Federal Risk and Authorization Management Program: Assessment and Recommendat...
John Gilligan
 
Security audit
Security auditSecurity audit
Security audit
Rosaria Dee
 
Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010
Donald E. Hester
 
Perfexpert
PerfexpertPerfexpert
Perfexpert
gystell
 
Security Audit Best-Practices
Security Audit Best-PracticesSecurity Audit Best-Practices
Security Audit Best-Practices
Marco Raposo
 
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Sreekanth Narendran
 

What's hot (19)

Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
 
Computer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and TechniquesComputer-Assisted Audit Tools and Techniques
Computer-Assisted Audit Tools and Techniques
 
03.2 application control
03.2 application control03.2 application control
03.2 application control
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information System
 
Compliance
ComplianceCompliance
Compliance
 
Caa ts
Caa tsCaa ts
Caa ts
 
Audit in computerised informaton system environment and recent development i...
Audit in computerised  informaton system environment and recent development i...Audit in computerised  informaton system environment and recent development i...
Audit in computerised informaton system environment and recent development i...
 
Icai seminar kolkata
Icai seminar kolkataIcai seminar kolkata
Icai seminar kolkata
 
IT General Controls
IT General ControlsIT General Controls
IT General Controls
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
 
Information system audit 2
Information system audit 2 Information system audit 2
Information system audit 2
 
Federal Risk and Authorization Management Program: Assessment and Recommendat...
Federal Risk and Authorization Management Program: Assessment and Recommendat...Federal Risk and Authorization Management Program: Assessment and Recommendat...
Federal Risk and Authorization Management Program: Assessment and Recommendat...
 
Security audit
Security auditSecurity audit
Security audit
 
Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010Information Systems Audit & CISA Prep 2010
Information Systems Audit & CISA Prep 2010
 
Perfexpert
PerfexpertPerfexpert
Perfexpert
 
Security Audit Best-Practices
Security Audit Best-PracticesSecurity Audit Best-Practices
Security Audit Best-Practices
 
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
 

Similar to Isa 4

crisc_wk_4.pptx
crisc_wk_4.pptxcrisc_wk_4.pptx
crisc_wk_4.pptx
dotco
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
HardikKundra
 
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
cveiga12
 
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
cveiga12
 
chapter2-190516054412.pdf
chapter2-190516054412.pdfchapter2-190516054412.pdf
chapter2-190516054412.pdf
chetanvchaudhari
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
dotco
 
Chapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptxChapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptx
ToxicHawk
 
Internal Control
Internal ControlInternal Control
Internal Control
Salih Islam
 
CISM_WK_2.pptx
CISM_WK_2.pptxCISM_WK_2.pptx
CISM_WK_2.pptx
dotco
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
Marc Vael
 
3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf
Nehemiah27
 
Monitoring
MonitoringMonitoring
Monitoring
WajahatAli810625
 
Internal control
Internal controlInternal control
Internal control
SALIH AHMED ISLAM
 
Chapterhjhlzuoollkkklhkoksfghjyrec-7.pptx
Chapterhjhlzuoollkkklhkoksfghjyrec-7.pptxChapterhjhlzuoollkkklhkoksfghjyrec-7.pptx
Chapterhjhlzuoollkkklhkoksfghjyrec-7.pptx
brhanegebrewahd414
 
Auditing in computerized environment.pptx
Auditing in computerized environment.pptxAuditing in computerized environment.pptx
Auditing in computerized environment.pptx
infantemiliya18
 
CISA_WK_2.pptx
CISA_WK_2.pptxCISA_WK_2.pptx
CISA_WK_2.pptx
dotco
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
Jeffrey Paulette
 
Managerial control
Managerial controlManagerial control
Managerial control
Parul Tandan
 
53064476-Frauds-in-Bank-ppt.pdf
53064476-Frauds-in-Bank-ppt.pdf53064476-Frauds-in-Bank-ppt.pdf
53064476-Frauds-in-Bank-ppt.pdf
KritiChoudhary9
 

Similar to Isa 4 (20)

crisc_wk_4.pptx
crisc_wk_4.pptxcrisc_wk_4.pptx
crisc_wk_4.pptx
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
 
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
IIA GAM CS 8-5: Audit and Control of Continuous Monitoring Programs and Artif...
 
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
CS 8-5_Audit and Control of Continuous Monitoring Programs and Artificial Int...
 
Bankauditin it env
Bankauditin it envBankauditin it env
Bankauditin it env
 
chapter2-190516054412.pdf
chapter2-190516054412.pdfchapter2-190516054412.pdf
chapter2-190516054412.pdf
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
 
Chapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptxChapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptx
 
Internal Control
Internal ControlInternal Control
Internal Control
 
CISM_WK_2.pptx
CISM_WK_2.pptxCISM_WK_2.pptx
CISM_WK_2.pptx
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
 
3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf
 
Monitoring
MonitoringMonitoring
Monitoring
 
Internal control
Internal controlInternal control
Internal control
 
Chapterhjhlzuoollkkklhkoksfghjyrec-7.pptx
Chapterhjhlzuoollkkklhkoksfghjyrec-7.pptxChapterhjhlzuoollkkklhkoksfghjyrec-7.pptx
Chapterhjhlzuoollkkklhkoksfghjyrec-7.pptx
 
Auditing in computerized environment.pptx
Auditing in computerized environment.pptxAuditing in computerized environment.pptx
Auditing in computerized environment.pptx
 
CISA_WK_2.pptx
CISA_WK_2.pptxCISA_WK_2.pptx
CISA_WK_2.pptx
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
Managerial control
Managerial controlManagerial control
Managerial control
 
53064476-Frauds-in-Bank-ppt.pdf
53064476-Frauds-in-Bank-ppt.pdf53064476-Frauds-in-Bank-ppt.pdf
53064476-Frauds-in-Bank-ppt.pdf
 

Recently uploaded

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 

Recently uploaded (16)

急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 

Isa 4

  • 2. Control • “Any input given to a dynamic system to produce a desired output.” • Here the word dynamic and desired output are very important. Input Dynamic System Desired output
  • 3. Control • Dynamism of the system and Control Requirement – Static system – control is not required – More dynamism – the greater will be the control requirement of the system – Computer system – control not required, if it is not being used for any application or switched off – As complexity increases – its control requirement will also rise. – This implies that • Lesser control is required for stand-alone system • Greater for one which is connected to network or Internet
  • 4. Control • Knowledge of Dynamism of the System Makes Control Effective – The predictability of the complexity of the disease has helped in development of vaccines to prevent and cure – Similarly, in computer system – control measures would operate effectively if the dynamism and complexity were known.
  • 5. Control • The Input should be Directed towards Achieving the Desired Output – If the inputs are not focused and directed towards specific outputs – then control mechanism will not be successful. – There are No thumb rule – Each input or control measure should be directed towards achieving a specific output.
  • 6. Control • The Output Should be Evaluated for Giving further Appropriate Input to the System – Example: Automobile driving system – This example shows how input can be effectively altered on the basis of evaluation of actual performance to achieve the desired output. – The same is true for complex computer system.
  • 7. Control • The Output Should be Evaluated for Giving further Appropriate Input to the System – Example: Automobile driving system – This example shows how input can be effectively altered on the basis of Antivirus software is deployed • It acts as a detective , or preventive some time corrective control • The output can be observed by regular scanning • When the output is not at desired level – system is infected with some viruses • Based this evaluation patches can be loaded or new anti-virus software deployed
  • 8. Internal Control • Basic purpose: – Business objectives are achieved – Undesired risk events are prevented or detected and corrected • How this can be achieved – By designing an effective internal control framework, comprises • Policies, procedures, practices, and organizational structure that gives reasonable assurance that the business objectives will be achieved • Discrete activities and supporting process • Either manual or automated
  • 9. Internal Control • Manual or automated process • Implementation of internal control differs in both, essence remains the same • It not solely a procedure or policy performed at certain point of time • Rather this is an ongoing activity, based on – Risk assessment of the organization • Role of auditor is very important in evaluating the strength of the control
  • 10. Internal Control • Elements of Control – Nature of controls • Preventive or Detective • Manual or Programmed – Preventive Control • Those inputs, designed to protect the organization from unlawful activities • The broad characteristics of preventive controls are: – A clear cut understanding about the vulnerabilities of the asset – Understanding the probable threats – Provision of necessary controls for probable threats from materializing
  • 11. Internal Control • Some examples of preventive controls and how the same control is implemented in different environments. – Employ qualified personnel – Access control – Vaccination against diseases – Prescribing appropriate book for a course – Authorization of transaction – Firewalls – Anti-virus software passwords
  • 12. Internal Controls Purpose Manual Control Computerized Control Restrict unauthorized Entry into the premises Build a gate and post a security guard Use access control software, smart card, biometrics Restrict unauthorized entry into software application Keep the computer in a secured location and allow only authorized persons to use the applications Use access control, viz. user ID, password, smart card
  • 13. Detective Control • Detect and report the occurrences of an error, omission, or malicious act in the IS • Main characteristics are as follows: – Clear understanding of lawful activities so that anything which deviates from these is reported as unlawful, malicious, etc. – An established mechanism to refer the reported unlawful activities to the appropriate person or group – Interaction with preventive control to prevent such acts from occurring
  • 14. Detective Control • Examples of Detective Controls – Surprise checks by supervisor – Check point in production jobs – Error messages over tape labels – Duplicate checking of calculations – Periodic performance reporting with variances – Past-due accounts report – The internal audit functions – Intrusion detection system – Cash counts and bank reconciliation – Monitoring expenditure against budgeted amount
  • 15. Corrective Controls • Are very important • Prevention and detection alone cannot be effective unless there is an appropriate corrective mechanism in place. • Main characteristics are: – Minimize the impacts of threat – Identify the cause of the problem – Remedy problems discovered by detective controls – Get feedback from detective and preventive controls – Modify the processing system to minimize future occurrence of the problem
  • 16. Compensatory Control • The cost of the lock should not be more than the cost of the asset it protects.
  • 17. Corrective Control • Examples of Corrective Controls – Contingency planning – Backup procedure – Treatment procedures for a diseases – Change input value to an application system – Investigate budget variance and report violations
  • 18.
  • 19.
  • 20. CISCO Security – Monitoring Analysis & Response System