Exam 17: IT Controls Part III: Systems Development, program Changes, and Application Controls
Explain how application version numbers can be used as a audit toll for assessing program change controls.
The SPLMS assigns a version number automatically to each program stored on the SPL.When programs are first placed in the libraries (at implementation),they are assigned version number zero.With each modification to the program,the version number is increased by one.This feature,when combined with audit trail reports,provides a basis for detecting unauthorized changes to the application program.An unauthorized change is signaled by a version number on the production load module that cannot be reconciled to the number of authorized changes.For example,if 10 changes were authorized but the production program is Version 11,then two possible control violations may have happened: (1)an authorized change occurred,which for some reason went undocumented,or (2)an unauthorized change was made,which incremented the version number.
The base case system evaluation is a variation of the test data method.
True
Use of the integrated test facility poses no threat to organizational data files.
False
Describe a test of controls that would provide evidence that only authorized program maintenance is occurring.
Programs in their compiled state are very susceptible to the threat of unauthorized modification.
The results of a parallel simulation are compared to the results of a production run in order to judge the quality of the application processes and controls.
The programmer's authority table will specify the libraries a programmer may access.
When using the test data method,the presence of multiple error messages indicates a flaw in the preparation of test transactions.
Tracing is a method used to verify the logical operations executed by a computer application.
The technical design activities translate a set of detailed technical specifications for a system into user specifications.
What is meant by auditing around the computer versus auditing through the computer? Why is this so important?
The black box approach to testing computer program controls is also known as auditing around the computer.
Contrast the black box approach to IT auditing and the through-the-computer audit approach.Which is preferred?
Describe and contrast the test data method with the integrated test facility.
Generalized audit software packages perform all of the following tasks except
New system development activity controls must focus on the authorization,development,and implementation of new systems and its maintenance.Discuss at least five control activities that are found in an effective system development life cycle.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)