What are the 5 types of Management Reporting Systems?
(Mgmt Info,Decision Support,Expert,Executive Supp,Analytical Processing)
Systems Development Life Cycle Approach (SDLC)
(7 Steps)
(Feasibility,Req,Software Selection,Config,Final Testing,Post Implementation,Maint)
SDLC - An approach for analyzing whether or not to develop & implement new information & control system, consisting of 7 steps:
Transactional Processing
What are the two types?
Transactional Processing - The electronic processing of tranactions , which can be accomplished using either:
Networks
Centralized Processing
vs.
Distributed Processing
Network - where computers are connected to one another to enable sharing of peripherial devices, sharing data, & programs stored on a file server. Networks allow various user departments to share information files maintained in databases.
Network Configurations
WAN, LAN, VAN
The linking of computers may be done in different ways using different Network Configurations:
Computer Network Topology
What are the 5 types of computer Topography?
Topology refers to the shape of a network or a network’s layout. Examples are:
Network Group/Size
Intranet
Extranet
Internet
Intranet is a network that is limited to the computers of a single company.
Extranet (like intranet) is primarily for users within a single company, but select customers & vendors are able to participate.
Internet is a world wide network that allows virtually any computer system to link to it by a way of electronic gateway.
Enterprise Resource Planning (ERP)
Enterprise Resource Planning (ERP) - A packaged business computer software that allows an entity to automate & integrate a majority of its business processes. Examples are:
World Wide Web - Languages
Hypertext Transfer Protocol (HTTP)
Transmission Control Protocol or Internet Protocol (TCP/IP)
Hyper Text Markup Language (HTML)
Extensible Business Reporting Language (XBRL)
HTTP - the language commonly understood by diferrent computers to communicate via internet.
TCP/IP - an IP is a unique computer address.
HTML - specialized programming languages used to create websites.
Extensible Business Reporting Language (XBRL) is a global standard language specifically designed for the electronic communication of business information & FINANCIAL DATA.
Electronic Data Interchange (EDI)
What are the 3 special considerations?
Electronic Data Interchange (EDI) is the electronic interchange of business information using a standardized format; a process which allows one company to send information to another company electronically rather than with paper.
There are special considerations relating to EDI:
Challenges for Auditors regarding EDI
What are the 4 challenges?
EDI adds to the complexity of Auditing as EDI enables:
EDI also creates special challenges for the audit as the reduction of paper trail is associated with EDI.
Computer/Internet Risks
Virus
Trojan Horse
Worm
Hoax Virus
Killer Application
Phishing
Virus - a program with the ability to reproduce by modifying other programs to include a copy of itself.
Trojan Horse - is a purposefully hidden malicious or damaging code within an authorized computer program.
Worm - a program that duplicates itself over a network so as to infect many computers with viruses.
Hoax Virus - a widely distributed e-mail message warning of a virus that doesn’t exist.
Killer Application - simply refers to a program that is extremely useful, & is not anything dangerous.
Phishing - is the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private info that will be used for identity theft.
Size & Power of Computers
Supercomputers
Minicomputers
Microcomputers
Personal Digital Assistants
Programming Language
Source Program
Object Program
Compiler
Protocol
Query Program
Data Structure
Bit>Byte>Character>Field>Record>File>Database
TESTED
Data Structure refers to the relationships among files in the database & among data items within each file.
Database Management Systems (DBMS)
What is Data Mining?
DBMS is a software system that controls the organization, storage, & retrieval of data in a database.
Data Mining - program/tool that looks for trends or anomalies.
Organizations of an IT Environgment
Systems Development & Maintenance Personnel
(System Analyst,Application Programmer,Database Administrator)
Systems might include the following:
System Analyst - designs the information system using system flowcharts & other tools & prepares specifications for application programers , as well as acting as an intermediary between the users & programmers.
Application Programmer - writes, tests, & debugs programs that will be used in the system
Database Administrator - individual/department responsible for the security & information classification of shared data stored on a database system. this responsibility includes the design, definition, & maintenance of the database.
Organization of an IT Environment
Operations in an IT Function Personnel
(Data Ctrl Clerk,Data Ctrl Dept,Computer Operator,Librarians)
Data Control Clerk- schedules jobs for the cumputer & manages the distribution of reports & other inputs. Also involved with coding activities.
Data Control Department - responsible for collecting data for input into a batch processing operation.
Computer Operator - a person who operates a computer in a data center & perform activities such as commanding the operating system, mounting disks & tapes, & placing paper in the printer.
Librarians - individuals responsible for safeguarding & maintaining all program & data files.
Controls
What are the 2 broad types of Controls?
Controls - in an operation of computer systems, management must focus on two broad types of controls:
General Controls
What are the 5 elements of General Control?
(Personnel,File Security,Contingency Planning,Computer Facilities,Acces Ctrls)
General Controls - these relates to the overall integrity of the system. Controls include policies, procedures, & practices established by management to provide reasonable assurance that specific objectives will be achieved.
Application
(Program Controls)
Application Controls - specific to individual programs & users
Contingency Planning
(General Controls)
Contingency Planning refers to controls that are designed to protect information from accidental or intentional destruction or unauthorized alteration. This includes:
General Controls
Personnel Policies - Segregation of Duties (ARC)
Personnel Policies - the Segregation of Duties amoung the IT personnel (ARC).
General Controls
Contingency Planning
(Hot Site vs. Cold Site)
Contingency Planning - Being prepared for a computer failure or loss of data through backup & planned downtime controls, and business contingency & disaster recover plans.