I would like prefer following e-commercial1. Bestbuy2. BohmeRequired:        1.  Analyze   the general computer controls (GCC) and application controls of an E-commerce   website that you

General computer controls


  • Computer controls in context.

      • Confidentiality

    • As accountants, we want to understand the risk and controls in our software. How likely is it that someone can break in and make changes?

    • Application Audit

      • An app, something that processes information, takes inputs, puts them into accounts, ledgers, shipping activity, payroll activity.

      • We programmed it ourselves, self developed software, or it came out of a can, Oracle, canned software, Quickbooks.

    • ITGC Audit

      • IT General Controls

        • Keep the bad stuff out of the machine

      • Mostly concerns with things that affect the machine we use to do our work.

      • Application controls: how the software checks itself as it is doing its job.

    • GCCs

      • General Computer Controls is the same as ITGC

        • Administrative

          • Baseline

          • Risk assessment

          • Approvals of projects/budgets/steering committee

          • Coordination between business and IT

          • Training, background checks, evaluations

          • Documented policies and procedures

          • Segregation of IT duties

            • Over finance:

              • Record

              • Authorization

              • Custody

            • In I.T.

              • Programmers/coders

              • Developers

              • Production

                • Launched version of the software developed by programmers

                • Users

              • Security professionals

        • Logical security/logical controls

          • Access

            • Minimize principal (few users, few rights)

            • Approvals

            • Terminations/transfers

            • Review of rights (data owners)

            • Special rights (admins, DBA, etc.)

            • Applications, OS, Database

            • Passwords

              • What you know

              • What you have-token based, RSA cards, USB drives, swipe cards

              • Change them often

              • Be mysterious

              • Don’t leave them lying around

              • Don’t share

              • The longer, the better

        • Change control

          • SDLC

          • Authorization

            • Steering committee

          • Tested

          • Approved

          • Back outs

          • Segregation of duties

        • Network operations

          • Help desk

          • Executables

          • Monitoring

          • Hardening

          • Incident management

          • Malware

          • Destruction of info

          • Backups

            • Rotation

            • Offsite

            • Restorations

            • Access

            • Encryption

        • Physical/Environmental security

          • Colocation

          • Stopping the environment or physical factors from doing something to your machines

          • Redundancy

          • Security

            • Biometrics, key cards, mantraps, cameras, motion sensors

          • Environmental

            • Temperature, humidity, fire, water, dust, airflow

            • Power

              • UPS, generators, conditioners

        • Recovery/Continuity

          • DRP (Disaster recovery plan)

            • Hot sites

            • Warm sites

            • Cold sites

          • BCP (Business Continuity plan)

            • Risk Assessment

            • Test

            • Refine

      • Levels within GCC

        • Internet

          • Getting information out to external users

        • Networks

          • By which employees move information

        • Database

          • Storing files

        • Application

        • Operating System

        • Hardware

    • Background information

      • How are controls within GCCs and BCCs integrated?

  • Network security-browser transfer security

    • Monitoring

    • Zones

    • IDS/IPS

    • Wireless

    • VPN

    • E-commerce


Application Controls:

  1. Input

    1. E-commerce; entering order information

  2. Processing

    1. Affects shipping, invoicing

  3. Output

    1. Affects reporting - invoice, bill of lading

    2. Reports are linked to queries, those queries have to be created correctly - i.e. new information/column but query is not aware of it

Objectives:

  1. All input data is accurate, complete, authorized, and correct

  2. All data is processed as intended

  3. All data stored is accurate and complete

  4. All output is accurate and complete

  5. A record is maintained to track the process of data from input to storage, and to the eventual output

  6. Access to data is limited based on business need

  7. Incompatible duties within an application are systematically prevented

It is important to track who is performing transactions, journal entries, etc, in a “black box.” Limiting access goes back to general controls, duties, determining who can do what within the system.


Input Controls:

  1. Designed by an organization to ensure that the info being collected for processing is authorized, accurate, and complete

  2. Controlling the users

  3. These controls are used to check the integrity of the data entered into a business application

    1. Users limited to selecting values in a pre-populated dropdown, radio buttons, etc.

    2. System validates that a valid # is entered into a field where a $amount is expected

  4. Five components

    1. Validation

      1. Has someone looked at the data and “approved it?”

      2. Matching of data

        1. Matching input to existing valid/authorized data

        2. Customer number matches to existing/active customer

        3. Order entry - match to inventory levels for availability

        4. Purchasing - match vendor ID to an approved vendor lists prior to payment

      3. Programmed check

        1. Program matches input with pre-established rules or data held in a reference table or master file

          1. i.e. sales tax auto populated based on zip code

          2. Stops unauth discounts

        2. Matching transactions to another file

          1. SKU: shop keeping unit, # references price table

          2. Helps calc tax, shipping, lower inventory

    2. Authorization
      i. username and password

      1. Modular with access restrictions

        1. Enter prices

        2. Enter vendors

        3. Enter employees

        4. Enter customer credit approval (or programmed)

        5. Enter sales orders

        6. Enter adjustments

        7. Enter useful lives

        8. Triggers approvals based on user before processing requests

      2. Approve journal entries

    3. Completeness

      1. Pertinent, key data has to be entered into the fields, no open fields

      2. Batching - pieces of paper, filled in by hand, catalog orders, making sure everything in a stack was put in the system

      3. Sequence check - chronological ordered checks

      4. Match with previously processed data

        1. completeness check

      5. Batch controls

        1. Financial total - foot/total every one of the financial dollar amounts in that batch

        2. Hash total - nonsensical number processed to check for accuracy, i.e. adding up customer IDs as numerical values

        3. Record count - hand count of batch quantities

      6. Completeness of Input - computer matching with previously processed documents

        1. Invoice is created based on completed sales order number and valid shipping doc #

        2. In the input stage, not letting something process unless all the relevant input fields are filled - testing stage

        3. Payment of invoice will not take place until certain matching occurs between previously processed documents

  • invoice will be matched to

  • previously processed P.O.

  • previously processed receipt of goods

    1. Accuracy

      1. Ensuring the data is right as you put it in, no extra zeros

        1. Edit checks

          1. Reasonableness (be concerned) limit/arraigned

            1. Checking to see if input falls within reasonable range of limits

            2. Prevents possible mistakes or manipulation activities

            3. Applied to data fields

            4. Example: New inventory cost exceeds previous price by more than 10%

            5. System warns user of unusual input

              1. Prevents entry altogether

              2. Asks for approval code

              3. Warns, then allows

          2. Dependency

            1. Looking for logical relationships

            2. Comparing 2+ elements or fields on a transaction for correct logical relationships

            3. Example: Inventory quantity ordered does not exceed 120% of average quantity ordered for prior year

          3. Format

            1. Checks the existence of expected numeric or alphabetic characters

            2. Ex: only allows numerical input in a field, only allow text, do not allow blanks.

          4. Mathematical Accuracy checks

            1. Re-footing live

          5. Check Digits

            1. Using algorithms to check validity of entered data

          6. Existence

            1. Look to see what’s been populating

            2. Matches data codes with other files for validity

            3. Ex: purchase orders are processed, GL & AP codes used, program checks for matching or existence.

            4. Supplement with check digits

          7. Processing Controls

            1. Provide automated means to ensure processing is complete, accurate, and authorized

            2. Ex: transactions exceeding a specific dollar amount must be approved by an exec before being applied in the system

            3. Automated file id and validation

            4. Automated functionality and calculations controls

            5. Audit trails and overrides controls

            6. Duplicate controls - no duplicate checks

          8. Output controls

            1. reconciliation for completeness and accuracy

            2. Focus on detecting errors after processing is completed rather than on preventing errors

            3. Security over reports

            4. Ex: system generated POs, reports, invoices

    2. Integrity

      1. No changes in form from input to output

      2. Exceptions; payroll, etc.