Paper - 6: Information Systems Control and Audit Questions Multiple Choice Questions Questions No.(s) 1 To 5 Are Based On Case Scenario
Paper - 6: Information Systems Control and Audit Questions Multiple Choice Questions Questions No.(s) 1 To 5 Are Based On Case Scenario
QUESTIONS
6. Which of the following statement is incorrect w.r.t Decision Support Systems (DSS)?
(a) A DSS includes one or more databases that contain both routine and non-routine data
from both internal and external sources.
(b) The DSS is intended to make decisions for managers in solving semi-structured and
unstructured problems in their own.
(c) The Model Base is the brain of the DSS as it performs data manipulations and
computations with the data provided to it by the user and the database.
(d) DSS is an interactive software-based system intended to help decision makers to
compile useful information from raw data, documents and personal knowledge.
7. During System Acquisition phase in SDLC, the top management of an enterprise should
establish acquisition standards that address the security and reliability issues as per
current state-of-the art development standards. Which of the following is not to be
considered while focussing on acquisition standards?
(a) Ensuring security, reliability, and functionality already built into a product.
(b) Ensuring managers’ complete reviews of appropriate vendor, contract and licensing.
(c) Request for proposals soliciting bids when acquiring off-the-shelf or third-party
software.
(d) To select the programming techniques and languages to be used for systems
development.
8. Which of the following statement is incorrect w.r.t Auditing of Information Systems?
(a) Audit trail attempts to ensure that a chronological record of all events that occurred
in an organization are maintained.
(b) One of the audit techniques named Integrated Test Facility (ITF) is used to trap
exceptions whenever the application system uses a DBMS.
(c) The Boundary Controls under Application Controls maintain the chronology of events
that occur when a user attempts to gain access to and employ systems resources.
(d) While auditing, an auditor must check that risk assessment procedure adequately
covers periodic and timely assessment of all assets and physical access threats.
DESCRIPTIVE QUESTIONS
Chapter 1: Concepts of Governance and Management of Information Systems
9. Under COBIT 5, the process “Monitor, Evaluate and Assess the System of Internal Control
(MEA)” provides guidance on evaluating and assessing internal controls implemented in
an enterprise. Discuss the key management practices for assessing and evaluating the
system of internal controls.
20. To establish whether Application Security controls are operating effectively or not; Layered
approach is used wherein the audit is carried out at each layer of an application. Discuss
various aspects that need to be considered regarding Application Security layers.
Chapter 7: Information Technology Regulatory Issues
21. Mr. A and Mr. X are employees of the company ABC Ltd. and do not share congenial
relations with each other. In the absence of Mr. X, Mr. A manages to access Mr. X’s official
computer system and intentionally introduces computer virus into his computer through a
contaminated USB drive. Later, Mr. X realises that his computer system has been infected
with computer virus due to which critical information residing in his system has got
destroyed. In the given situation, examine in the light of the IT Act 2000, whether Mr. A is
liable for causing damage to Mr. X’s computer system or not?
22. List down the various norms recommended by SEBI for the selection of Auditors.
Chapter 8: Emerging Technologies
23. As a Software as a Service (SaaS) provider under Cloud Computing, enlist the services
that you may provide to your client.
24. Though Cloud Computing provides the facility to access shared resources and common
infrastructure offering services to demand over the network, there are major issues related
to its implementation. Discuss them.
SUGGESTED ANSWERS/HINTS
7. (d) To select the programming techniques and languages to be used for system
development.
8. (b) One of the audit techniques named Integrated Test Facility (ITF) is used to trap
exceptions whenever the application system uses a DBMS.
DESCRIPTIVE ANSWERS
9. The key management practices for assessing and evaluating the system of internal
controls in an enterprise are given as follows:
• Monitor Internal Controls: Continuously monitor, benchmark and improve the IT
control environment and control framework to meet organizational objectives.
• Review Business Process Controls Effectiveness: Review the operation of
controls, including a review of monitoring and test evidence to ensure that controls
within business processes operate effectively. It also includes activities to maintain
evidence of the effective operation of controls through mechanisms such as periodic
testing of controls, continuous controls monitoring, independent assessments,
command and control centers, and network operations centers. This provides the
business with the assurance of control effectiveness to meet requirements related to
business, regulatory and social responsibilities.
• Perform Control Self-assessments: Encourage management and process owners
to take positive ownership of control improvement through a continuing program of
self- assessment to evaluate the completeness and effectiveness of management’s
control over processes, policies and contracts.
• Identify and Report Control Deficiencies: Identify control deficiencies and analyze
and identify their underlying root causes. Escalate control deficiencies and rep ort to
stakeholders.
• Ensure that assurance providers are independent and qualified: Ensure that the
entities performing assurance are independent from the function, groups or
organizations in scope. The entities performing assurance should demonstrate an
appropriate attitude and appearance, competence in the skills and knowledge
necessary to perform assurance, and adherence to codes of ethics and professional
standards.
• Plan Assurance Initiatives: Plan assurance initiatives based on enterprise
objectives and conformance objectives, assurance objectives and strategic priorities,
inherent risk resource constraints, and sufficient knowledge of the enterprise.
• Scope assurance initiatives: Define and agree with management on the scope of
the assurance initiative, based on the assurance objectives.
• Execute assurance initiatives: Execute the planned assurance initiative. Report on
identified findings. Provide positive assurance opinions, where appropriate, and
12. The information can be categorized on the basis of its requirement by the Top, Middle and
Lower level management, that are as follows:
• Top level management strives for the information that can help them in major policy
decisions such as establishment of new plant, launching of new product etc. In other
words, the top management requires strategic information that helps them in making
strategy of an enterprise in terms of scope of products, targets of products i.e.
customers, competition with market i.e. price, quality, long term planning etc. The
information about the customers buying habits such as what combination of produ cts
and type of products they are likely to purchase together helps top managers to
decide the launching of new products. Such information can help top management of
company to decide to work on new products as well as the location where it has to
be launched for maximum profit and sale which is one of the objectives and goals of
the top management.
• Middle management requires tactical information that helps in implementing
decisions taken by the top management. For example - information of customers
likely to purchase certain product in a particular location can help sales managers to
fulfill their sales target efficiently. Tactical information is used for short term planning
whereas strategy information is used for long term planning. For example, the offer s
of companies during festive seasons are a short term planning, which is done by
having information about the customers buying capacity in that location.
• The lower management requires operational information, which is required in day-
to-day activities. The operational information mainly comprises of information about
stock on hand, information about customer order pending, information about bill
payable by customer etc. These are essential for smooth running of the daily activities
of a business at primary level. For example, if a regular customer demands for a
product other than the daily purchase then this information is important for salesman
because it will help him in providing better service.
13. Various Application and Monitoring System Access Controls to be implemented in an
Information System are as follows:
• Information access restriction: The access to information is prevented by
application specific menu interfaces, which limit access to system function. A user is
allowed to access only to those items, s/he is authorized to access. Controls are
implemented on the access rights of users, for example - Read, Write, Delete, and
Execute. This also ensures that sensitive output is sent only to authorized terminals
and locations.
• Sensitive system isolation: Based on the critical constitution of a system in an
enterprise, it may even be necessary to run the system in an isolated environment.
Monitoring system access and use is a detective control, to check if preventive
controls discussed so far are working. If not, this control will detect and report any
unauthorized activities.
• Event logging: In Computer systems, it is easy and viable to maintain extensive logs
for all types of events. It is necessary to review if logging is enabled and the logs are
archived properly. An intruder may penetrate the system by trying different passwords
and user ID combinations. All incoming and outgoing requests along with attempted
access should be recorded in a transaction log. The log should record the user ID,
the time of the access and the terminal location from where the request has been
originated.
• Monitor system use: Based on the risk assessment, a constant monitoring of some
critical systems is essential. Define the details of types of accesses, operations,
events and alerts that will be monitored. The extent of detail and the frequency of the
review would be based on criticality of operation and risk factors. The log files are to
be reviewed periodically and attention should be given to any gaps in these logs.
• Clock synchronization: Event logs maintained across an enterprise network plays
a significant role in correlating an event and generating report on it. Hence, the need
for synchronizing clock time across the network as per a standard time is mandatory.
14. Major Boundary Control techniques to be implemented in Information System are as
follows:
• Cryptography: It deals with programs for transforming data into cipher text that are
meaningless to anyone, who does not possess the authentication to access the
respective system resource or file. A cryptographic technique encrypts data (clear
text) into cryptograms (cipher text) and its strength depends on the time and cost to
decipher the cipher text by a cryptanalyst. Three techniques of cryptography are
transposition (permute the order of characters within a set of data), substitution
(replace text with a key-text) and product cipher (combination of transposition and
substitution).
• Passwords: User identification by an authentication mechanism with personal
characteristics like name, birth date, employee code, function, designation or a
combination of two or more of these can be used as a password boundary access
control. A few best practices followed to avoid failures in this control system are
minimum password length, avoid usage of common dictionary words, periodic change
of passwords, hashing of passwords and number of entry attempts.
• Personal Identification Numbers (PIN): PIN is similar to a password assigned to a
user by an institution a random number stored in its database independent to a user
identification details, or a customer selected number. Hence, a PIN may be exposed
to vulnerabilities while issuance or delivery, validation, transmission and storage.
out a test because daily operations are disrupted. They also fear a real disaster could
arise as a result of the test procedures.
17. Various fact-finding techniques/tools that can be used by the system analyst for
determining the needs and requirements of a proposed system are as below:
• Documents: Document means manuals, input forms, output forms, diagrams of how
the current system works, organization charts showing hierarchy of users and
manager responsibilities, job descriptions for the people, who work with the current
system, procedure manuals, program codes for the applications associated with the
current system, etc. Documents are a very good source of information about user
needs and the current system.
• Questionnaires: Users and managers are asked to complete questionnaire about
the information systems when the traditional system development approach is
chosen. The main strength of questionnaires is that a large amount of data can be
collected through a variety of users quickly. Also, if the questionnaire is skilfully
drafted, responses can be analysed rapidly with the help of a computer.
• Interviews: Users and managers may also be interviewed to extract information in
depth. The data gathered through interviews often provide system developers with a
larger picture of the problems and opportunities. Interviews also give analyst the
opportunity to observe and record first-hand user reaction and to probe for further
information.
• Observation: In general, observation plays a central role in requirement analysis.
Only by observing how users react to prototypes of a new system, the system can be
successfully developed.
18. At the end of the Design phase of SDLC, the organization gets a reasonable idea of the
types of hardware, software and services, it needs for the system being developed.
Acquiring the appropriate hardware and software is critical for the success of the whole
project. The following considerations are valid for both acquisition of hardware and
software from a vendor:
• Vendor Selection: This step is a critical step for success of process of acquisition of
systems. It is necessary to remember that vendor selection is to be done prior to
sending RFP (Request For Proposal). The result of this process is that ‘RFP are sent
only to selected vendors’. For vendor selection, following things are kept in mind
including the background and location advantage of the vendor, the financial stability
of vendor, the market feedback of vendor performance, in terms of price, services
etc.
• Geographical Location of Vendor: The issue to look for whether the vendor has
local support persons. Otherwise, the proposals submitted by vendor not as per RFP
requirements need to reject with no further discussion on such rejected proposals.
This stage may be referred to as ‘technical validation’, that is to check the proposals
submitted by vendors, are technically complying with RFP requirements.
• Presentation by Selected Vendors: All vendors, whose proposals are accepted
after “technical validation”, can make presentation to the System Acquisition Tea m.
The team evaluates the vendor’s proposals by using techniques.
• Evaluation of Users Feedback: The best way to understand the vendor systems is
to analyse the feedback from present users. Present users can provide valuable
feedback on system, operations, problems, vendor response to support calls.
19. Through Information Systems Auditing, organizations achieve following major objectives
that are as follows:
• Asset Safeguarding Objectives: The information system assets (hardware,
software, data information etc.) must be protected by a system of internal controls
from unauthorised access.
• Data Integrity Objectives: It is a fundamental attribute of IS Auditing. The
importance to maintain integrity of data of an organisation requires all the time. It is
also important from the business perspective of the decision maker, competition and
the market environment.
• System Effectiveness Objectives: Effectiveness of a system is evaluated by
auditing the characteristics and objective of the system to meet business and user
requirements.
• System Efficiency Objectives: To optimize the use of various information system
resources (machine time, peripherals, system software and labour) along with the
impact on its computing environment.
20. Application Security Controls are implemented in Layered manner which are divided into
Operational Layer, Tactical Layer and Strategic Layer.
(i) Operational Layer: The operational layer audit issues include:
• User Accounts and Access Rights: This includes defining unique user
accounts and providing them access rights appropriate to their roles and
responsibilities. Auditor needs to always ensure the use of unique user IDs, and
these need to be traceable to individual for whom created. In case, guest IDs
are used then test of same should also be there. Likewise, vendor accounts and
third-party accounts should be reviewed.
• Password Controls: In general, password strength, password minimum length,
password age, password non-repetition and automated lockout after three
attempts should be set as a minimum. Auditor needs to check whether there are
applications where password controls are weak. In case such instances are
found, then auditor may look for compensating controls against such issues.
detailed standards and guidelines. These guidelines shall be used at the appropriate
level of security at the application, database and operating system layers.
21. The situation pertains to Section 43 of IT Act, 2000 which is stated below-
[Section 43] Penalty and Compensation for damage to computer, computer system,
etc.
If any person without permission of the owner or any other person who is in-charge of a
computer, computer system or computer network, -
(a) accesses or secures access to such computer, computer system or computer network
or computer resource;
(b) downloads, copies or extracts any data, computer data base or information from such
computer, computer system or computer network including information or data held
or stored in any removable storage medium;
(c) introduces or causes to be introduced any computer contaminant or computer virus
into any computer, computer system or computer network;
(d) damages or causes to be damaged any computer, computer system or computer
network, data, computer data base or any other programmes residing in such
computer, computer system or computer network;
(e) disrupts or causes disruption of any computer, computer system or computer network;
(f) denies or causes the denial of access to any person authorized to access any
computer, computer system or computer network by any means;
(g) provides any assistance to any person to facilitate access to a computer, computer
system or computer network in contravention of the provisions of this Act, rules or
regulations made there under;
(h) charges the services availed of by a person to the account of another person by
tampering with or manipulating any computer, computer system, or computer
network;
(i) destroys, deletes or alters any information residing in a computer resource or
diminishes its value or utility or affects it injuriously by any means;
(j) steals, conceals, destroys or alters or causes any person to steal, conceal, destroy
or alter any computer source code used for a computer resource with an intention to
cause damage,
he shall be liable to pay damages by way of compensation to the person so affected.
As per the Section 43(c) and 43(j) of IT Act, 2000; Mr. A will be held liable as he
intentionally caused damage to computer system of Mr. X.
22. As per SEBI, various norms for selection of Auditors are as follows:
• Auditor must have minimum 3 years of experience in IT audit of Securities Industry
participants e.g. stock exchanges, clearing houses, depositories etc. The audit
experience should have covered all the Major Areas mentioned under SEBI’s Audit
Terms of Reference (TOR).
• The Auditor must have experience in/direct access to experienced resources in the
areas covered under TOR. It is recommended that resources employed shall have
relevant industry recognized certifications e.g. CISA (Certified Information Syste ms
Auditor) from ISACA, CISM (Certified Information Securities Manager) from ISACA,
GSNA (GIAC Systems and Network Auditor), CISSP (Certified Information Systems
Security Professional) from International Information Systems Security Certification
Consortium, commonly known as (ISC).
• The Auditor should have IT audit/governance frameworks and processes conforming
to industry leading practices like CoBIT.
• The Auditor must not have any conflict of interest in conducting fair, objective and
independent audit of the Exchange/Depository. It should not have been engaged over
the last three years in any consulting engagement with any departments/units of the
entity being audited.
• The Auditor may not have any cases pending against its previous auditees, which fall
under SEBI’s jurisdiction, which point to its incompetence and/or unsuitability to
perform the audit task.
23. The services provided by Software as a Service (SaaS) are as follows:
(a) Business Services: SaaS providers provide a variety of business services to startup
companies that includes ERP, CRM, billing, sales, and human resources.
(b) Social Networks: Since the number of users of the social networking sites is
increasing exponentially, loud computing is the perfect match for handling the variable
load.
(c) Document Management: Most of the SaaS providers provide services to create,
manage, and track electronic documents as most of the enterprises extensively use
electronic documents.
(d) Mail Services: To handle the unpredictable number of users and the load on e-mail
services, most of the email providers offer their services as SaaS services.
24. Some of the well-identified implementation issues of Cloud Computing are as follows:
• Threshold Policy: In order to test if the program works, develops, or improves and
implements; a threshold policy is of immense importance in a pilot study before
moving the program to the production environment. This involves the checking how
the policy enables to detect sudden increases in the demand and results in the