Accounting Information System
Accounting Information System
on
Accounting Information System
Course Code – 6403
Submitted To
Dr A.N.M Asaduzzaman Fakir
Associate Professor
Department of Accounting & Information Systems
Jagannath University
Submitted By-
Group-02
Section – A
Batch- 2nd
Name ID
Tahmina Yesmin Tamanna M22020201515
Md. Sakil Ahmed M22020201517
Imdadul Haque Abir M22020201521
Joya Abedin Rupa M22020201522
Sagar Krishna Sikder M22020201523
1
Question 01- Along with natural and political threats, business also faces AIS threats,
do you agree? Describe the threats to AIS and discuss why threats are growing?
Yes, I agree with the statement, Society has increasingly relied on accounting information
systems, which have developed increasingly complex to meet the increasing need for
information. In line with the increase in system complexity and dependence on the system,
companies face an increased risk of the system being negotiated. Almost every year, more than
60% experience a major failure in controlling the security and integrity of computer
information systems. The causes are as follows: information is available for a very large
number of employees and information distributed in the information network is difficult to
monitor; Society has increasingly relied on accounting information systems, which have
developed more complex to meet the increasing need for information. Increased system
information threats occur because the client/server system distributes data to many users, which
is why the system is more difficult to control than the main computer system that is centralized
and information is available to workers who are not good. An accounting information system
as an open system cannot be guaranteed as a system that is free from errors or fraud. Good
internal control is a way for the systems to protect themselves from harmful actions. The
concept of control is increasingly important and occupies a strategic position because the threat
to the Accounting Information System increases both in terms of type and intensity. In line
with the increase in complexity and dependence systems on the system, companies face
increased risk for systems that are being developed and negotiated. The potential for
unexpected events or activities that cannot endanger both the accounting and organizational
information systems are referred to as threats. The study was conducted by reviewing several
papers relating to the attention of developers to the threat of accounting information system
security.
1) Creating Illegal Programs
2) Accessing or deleting files
3) Destroying or corrupting a programs’ logic through viruses.
4) Unauthorized access that allows
- Altering
- Deleting
- Corruption
- Destroying or stealing data
2
The failure to maintain backup files or other retrieval techniques represent a potentially
devastating loss of data. Threat to the information generation and reporting phase must also be
considered.
For example, the theft, misdirection or misuse of computer output could damage the
competitiveness or reputation of the company.
Advances in information technology and increased accountants, auditors and professors
become more knowledgeable and conversant in design, operation and control of accounting
information systems.
Information system security is any form of mechanism that must be carried out in a system that
is intended to prevent the system from all threats that endanger the data security of information
and security of system perpetrators. Threats include various types of employee behavior such
as employee ignorance, carelessness, taking other employee passwords and providing
passwords for other employees. Threats that may arise from information processing activities
can come from nature, namely: water threats, land threats, and natural threats such as: forest
fires, lightning, tornadoes, hurricanes, and so on.
Threat-1 for accounting information systems: Destruction due to Natural Disasters and Politics
One of the threats faced by companies is due to natural and political disasters, such as fires,
excessive heat, floods, earthquakes, wind storms, and war. Disasters that cannot be predicted
can completely destroy the information system and cause a downfall of a company. When a
disaster occurs, many companies are affected at the same time.
Threat-2 of Accounting Information Systems: Error in software and malfunction of
equipment. The second threat to the company is software errors and equipment malfunctions,
such as hardware failures, errors or software malfunctions, operating system failures, electrical
interference and fluctuations, and undetected data transmission errors.
3
of the system, develop systems that do not meet the needs of the company, or develop systems
that are unable to handle the tasks assigned.
By looking at some aspects that pose a threat to the security of the health information system
presented in the reviewed papers, several things that need to be considered by the information
system manager are:
1. Conduct a security risk analysis to protect information assets.
4
2. Carry out safeguards regarding policies, procedures, processes and activities to protect
information from various types of threats.
3. Conduct adequate protection in supporting aspects of confidentiality, integrity and
availability for investigation.
Question 02- What is Computer Fraud? Classify the Computer Fraud with illustration.
Do you think Computer Fraud is rising? Why? Explain the ways of preventing and
detecting fraud and abuse.
Computer Fraud
Computer Fraud is a term that may refer to a wide range of malicious activities that involve the
use of computers. It is a type of fraud that involves the use of computers to obtain personal or
financial information from unsuspecting victims in order to gain access to funds or assets.
• The U.S. Department of Justice defines computer fraud as any illegal act for which
knowledge of computer technology is essential for its perpetration, investigation; or
prosecution.
• In using a computer, fraud perpetrators can steal more of something in less time and
with less effort. They may also leave very little evidence, which can make these crimes
more difficult to detect.
• Computer systems are particularly vulnerable to computer crimes for several reasons:
– Individuals can steal, destroy, or alter massive amounts of data in very little
time.
– Access provided to customers and vendors creates added vulnerability.
– Computer programs only need to be altered once, and they will operate that way
until the system is no longer in use or someone notices.
– Modern systems are accessed by PCs, which are inherently more vulnerable to
security risks and difficult to control.
– Computer systems face a number of unique challenges.
• Computer frauds cost billions of dollars each year, and their frequency is increasing
because:
– Not everyone agrees on what constitutes computer fraud.
– Many computer frauds go undetected.
– Many that are detected are not reported.
5
– There are a growing number of competent computer users aided by easier
access.
– Some folks believe “it can’t happen to us.”
– Many networks have a low level of security.
– Instructions on how to perpetrate computer crimes and abuses are readily
available on the Internet.
– Law enforcement is unable to keep up.
Frauds can be categorized according to the data processing model: input frauds; processor
frauds; computer instruction frauds; stored data frauds; and output frauds.
Input fraud is the simplest and most common way to commit a fraud. Altering computer
input requires little computer skills. It can take a number of forms, including disbursement
frauds, inventory frauds, payroll frauds, cash receipt frauds, and fictitious refund frauds.
Processor fraud involves computer fraud committed through unauthorized system use. It
includes theft of computer time and services. Incidents could involve employees surfing
the Internet; using the company computer to conduct personal business; or using the
company computer to conduct a competing business.
Computer instruction fraud involves tampering with the software that processes company
data. It may include modifying the software, making illegal copies, using it in an
unauthorized manner, or developing a software program or module to carry out an
unauthorized activity. Computer instruction fraud used to be one of the least common types
of frauds because it required specialized knowledge. Today these frauds are more frequent.
Data fraud involves altering or damaging a company’s data files; or copying, using, or
searching the data files without authorization. In many cases, disgruntled employees have
scrambled, altered, or destroyed data files. Theft of data often occurs so that perpetrators
can sell the data.
6
Output fraud involves stealing or misusing system output. Output is usually displayed on
a screen or printed on paper. Unless properly safeguarded, screen output can easily be read
from a remote location using inexpensive electronic gear. This output is also subject to
prying eyes and unauthorized copying. Fraud perpetrators can use computers and
peripheral devices to create counterfeit outputs, such as checks.
7
business reversals, physical isolation, status gaining, and difficulties in employer-
employee relations.
• Opportunity is the opening or gateway that allows an individual to commit the fraud,
conceal the fraud, and convert the proceeds. There are many opportunities that enable
fraud. Some of the most common are:
– Lack of internal controls
– Failure to enforce controls (the most prevalent reason)
– Excessive trust in key employees
– Incompetent supervisory personnel
– Inattention to details
– Inadequate staffing
• Internal controls that may be lacking or un-enforced include authorization procedures,
clear lines of authority, adequate supervision, adequate documents and records, a
system to safeguard assets, independent checks on performance, and separation of
duties. One control feature that many companies lack is a background check on all
potential employees.
• Rationalizations take many forms, including:
– I was just borrowing the money.
– It wasn’t really hurting anyone.
– Everybody does it.
– I was only taking what was owed to me.
– I didn’t take it for myself. I needed it to pay my child’s medical bills.
• Unfortunately, there is usually a mixture of pressure, opportunity, and rationalization
in play, and there is no reliable method to predict when an individual may commit a
fraud.
8
Make fraud less likely to occur - By creating an ethical cultural, adopting an appropriate
organizational structure, requiring active oversight, assigning authority and responsibility,
assessing risk, developing security policies, implementing human resource policies,
supervising employees effectively, training employees, requiring vacations, implementing
development and acquisition controls, and prosecuting fraud perpetrators vigorously.
Improve detection methods - By creating an audit trail, conducting periodic audits, installing
fraud detection software, implementing a fraud hotline, employing a computer security officer,
monitoring system activities, and using intrusion detection systems.
9
Question 03- Define internal control. Differentiate among Preventive control, detective
control and corrective control. Discuss The Internal Control Model given by the
committee of Sponsoring Organizations (COSO).
Internal control:
Internal controls are the mechanisms, rules, and procedures implemented by a company to
ensure the integrity of financial and accounting information, promote accountability and
prevent fraud.
Differentiate among Preventive control, detective control and corrective control.
Preventive, detective, and corrective controls are three types of control techniques used in
various domains, such as information security, risk management, and quality assurance. Here's
a comparison of these control techniques with examples:
Preventive Controls:
Preventive controls aim to proactively prevent or reduce the likelihood of risks and issues from
occurring. These controls are implemented to avoid potential problems before they arise.
Examples of preventive controls include:
a. Access Control: Limiting access to sensitive information or systems by using strong
passwords, multifactor authentication, and role-based access control (RBAC).
d. Regular Backups: Performing regular backups of critical data to prevent loss in case of
hardware failure, data corruption, or cyber attacks.
Detective Controls:
Detective controls focus on identifying and detecting risks, issues, or anomalies that have
already occurred. These controls are designed to detect and respond to incidents as quickly as
possible. Examples of detective controls include:
10
a. Intrusion Detection Systems (IDS): Monitoring network traffic and identifying suspicious
activity or potential intrusions.
b. Security Incident and Event Management (SIEM) Systems: Collecting and analyzing
logs and security events to detect and respond to security incidents.
d. Log Monitoring: Analyzing system logs, application logs, and event logs to identify
abnormal behavior or potential security incidents.
Corrective Controls:
Corrective controls are implemented after an issue or incident has occurred to mitigate the
damage, restore normal operations, and prevent future occurrences. These controls focus on
correcting the root cause of the problem. Examples of corrective controls include:
a. Patch Management: Applying software patches and updates to fix vulnerabilities and
prevent further exploitation.
c. System Restore: Restoring systems from a known good backup or configuration to eliminate
the effects of malware or system compromise.
11
Discuss The Internal Control Model given by the committee of Sponsoring Organizations
(COSO).
The COSO model defines internal control as “a process effected by an entity’s board of
directors, management and other personnel designed to provide reasonable assurance of the
achievement of objectives in the following categories:
• Operational Effectiveness and Efficiency
• Financial Reporting Reliability
• Applicable Laws and Regulations Compliance
1. Control Environment
• Exercise integrity and ethical values.
• Make a commitment to competence.
• Use the board of directors and audit committee.
• Facilitate management’s philosophy and operating style.
• Create organizational structure.
• Issue assignment of authority and responsibility.
• Utilize human resources policies and procedures.
2. Risk Assessment
• Create companywide objectives.
• Incorporate process-level objectives.
• Perform risk identification and analysis.
• Manage change.
3. Control Activities
• Follow policies and procedures.
• Improve security (application and network).
• Conduct application change management.
• Plan business continuity/backups.
• Perform outsourcing.
4. Information and Communication
• Measure quality of information.
• Measure effectiveness of communication.
5. Monitoring
• Perform ongoing monitoring.
• Conduct separate evaluations.
• Report deficiencies.
12
Question 04- Compare Preventive, Detective control, Corrective control techniques with
examples.
13
Question 05- Explain the interrelated components of COSO's internal control model.
COSO, which stands for the Committee of Sponsoring Organizations of the Treadway
Commission, developed a widely recognized framework for internal control known as the
COSO Internal Control Integrated Framework. This framework comprises five interrelated
components, which work together to help organizations achieve their objectives effectively and
efficiently, provide reliable financial reporting, and comply with laws and regulations. Here
are the components of the COSO internal control model:
Control Environment
The control environment sets the tone for an organization and influences the control
consciousness of its people. It encompasses factors such as integrity and ethical values, the
commitment to competence, management's philosophy and operating style, the organizational
structure, the assignment of authority and responsibility, and human resource policies and
practices. A strong control environment fosters a culture of accountability and integrity
throughout the organization.
Risk Assessment:
Risk assessment involves identifying, analyzing, and managing risks that may affect the
achievement of an organization's objectives. This process includes identifying internal and
external factors that may threaten the organization's ability to achieve its objectives, assessing
the likelihood and potential impact of these risks, and determining how to manage or mitigate
them. Effective risk assessment ensures that the organization can anticipate and respond to
risks in a timely manner.
Control Activities:
Control activities are the policies and procedures that help ensure that management directives
are carried out to mitigate risks and achieve objectives. These activities may include
segregation of duties, authorization and approval processes, physical controls, information
processing controls, and performance reviews. Control activities are designed to prevent or
detect errors, fraud, or noncompliance and are an essential part of the organization's internal
control system.
Information and Communication:
Information and communication systems enable the organization to capture and exchange
relevant, timely, and accurate information necessary for effective internal control. This
component involves the systems and processes used to identify, capture, and communicate
information about internal and external events relevant to the organization's objectives.
14
Monitoring Activities :
Monitoring activities involve ongoing assessments of the effectiveness of internal control
processes and procedures. This includes regular management and supervisory activities,
internal audits, and other evaluations to ensure that internal controls are operating as intended.
Monitoring activities help identify deficiencies or weaknesses in the internal control system
and enable management to take corrective action promptly.
These five components of the COSO internal control model are interrelated and collectively
contribute to the effectiveness of an organization's internal control system. By implementing
and integrating these components into their operations, organizations can better manage risks,
achieve objectives, and maintain integrity and accountability in their activities.
15
Question 06- Describe the information processing operations required to update the
general ledger and to produce reports for internal and external users. What are the treats
of preparing financial statements?
The information processing operations required to update the general ledger and produce
reports for internal and external users involve several steps and controls to ensure accuracy,
reliability, and timeliness of financial information. Here's an overview of the typical process:
Recording Transactions:
➢ Financial transactions are initially recorded in journals, such as sales journals, cash
receipts journals, and purchases journals. Each transaction is documented with relevant
details, including date, amount, accounts affected, and description.
➢ These transactions are then posted to the appropriate accounts in the general ledger,
where individual account balances are maintained.
Adjusting Entries:
➢ At the end of an accounting period, adjusting entries may be required to ensure that the
financial statements reflect the accrual basis of accounting and comply with accounting
principles (GAAP). Adjusting entries may include accruals, deferrals, and estimates for
items such as depreciation or bad debts.
➢ Adjusting entries are recorded in the general journal and posted to the general ledger
accounts.
Trial Balance:
➢ After all transactions and adjusting entries have been posted, a trial balance is prepared
to verify that debits equal credits and to ensure that the ledger is in balance. Any
discrepancies are investigated and corrected before proceeding.
Financial Statements:
➢ Once the trial balance is confirmed, financial statements are prepared, including the
income statement, balance sheet, statement of cash flows, and statement of retained
earnings.
➢ The income statement shows the company's revenues, expenses, and net income or loss
for the period.
16
➢ The balance sheet presents the company's assets, liabilities, and shareholders' equity at
a specific point in time.
➢ The statement of cash flows provides information about the company's cash inflows
and outflows from operating, investing, and financing activities.
Reporting:
17
to accounting standards and regulatory requirements helps maintain transparency and
accountability in financial reporting.
Question 07- What are the motives for hacking? Why does hacking become so popular
in recent years? Do you consider it as a crime? Explain.
The motives behind hacking can vary widely and may include:
Financial Gain
Many hackers seek to steal sensitive financial information, such as credit card numbers or login
credentials, to commit fraud or extortion.
Espionage:
Some hackers are motivated by espionage, seeking to steal sensitive information from
governments, corporations, or individuals for political, economic, or personal gain.
Personal Challenge:
For some hackers, the primary motivation is the intellectual challenge and thrill of
circumventing security measures and gaining unauthorized access to systems or data.
Malicious Intent
Some hackers engage in destructive or disruptive activities simply for the sake of causing harm,
such as spreading malware or launching denial-of-service attacks.
Intellectual Property Theft:
Hackers may target businesses to steal valuable intellectual property, such as trade secrets,
proprietary software, or research and development data.
These motives can overlap, and individuals or groups may have multiple reasons for engaging
in hacking activities.
Hacking has become more prevalent in recent years for several reasons:
Increased Connectivity: With the widespread adoption of the internet and the proliferation of
connected devices through the Internet of Things , there are more entry points and potential
vulnerabilities for hackers to exploit.
Financial Incentives:
Many hackers are motivated by financial gain. They target individuals, businesses, and
organizations to steal sensitive information such as credit card details, personal data, or
intellectual property that can be sold on the dark web or used for identity theft.
18
Advancements in Technology:
As technology evolves, so do hacking techniques. Hackers are constantly developing new
methods and tools to exploit vulnerabilities in software, networks, and systems.
Low Risk:
The anonymity provided by the internet and tools like virtual private networks (VPNs) makes
it easier for hackers to operate without fear of being caught. Additionally, the global nature of
cybercrime often makes it difficult for law enforcement agencies to track down and prosecute
offenders.
Availability of Resources:
There is a wealth of information and resources available online that can help aspiring hackers
learn new skills and techniques. This includes tutorials, forums, and even specialized courses
on hacking and cybersecurity.
Weak Security Practices:
Despite increased awareness of cybersecurity threats, many individuals and organizations still
have inadequate security measures in place. This creates opportunities for hackers to exploit
vulnerabilities and gain unauthorized access to systems and data.
Overall, the combination of these factors has contributed to the rise in hacking activity in recent
years. As technology continues to advance, it's likely that hacking will remain a significant
concern, highlighting the importance of robust cybersecurity measures and vigilance in
protecting sensitive information.
Unauthorized Access:
Hacking typically involves gaining access to computer systems, networks, or data without
permission from the owner or administrator. This unauthorized access violates the privacy and
security of individuals and organizations.
Damage and Disruption
Hackers may cause damage to computer systems, networks, or data through various means,
such as installing malware, deleting files, or disrupting services. This can result in financial
losses, reputational damage, and operational disruptions for the affected parties.
Theft of Information
19
Hacking often involves stealing sensitive information, such as personal data, financial records,
or intellectual property. This theft of information can lead to identity theft, fraud, and other
forms of cybercrime.
Violation of Laws and Regulations:
Hacking violates various laws and regulations, including the Computer Fraud and Abuse Act
(CFAA) in the United States and similar laws in other countries. These laws prohibit
unauthorized access to computer systems, as well as the theft, damage, or disruption of
computer-related assets.
As such, hacking is widely recognized as a criminal activity that can have serious consequences
for both individuals and society as a whole.
20
Q: 8 Explain the COSO enterprise risk management framework. Compare and contrast
the frameworks: COBIT and COSO.
The COSO Enterprise Risk Management (ERM) framework is a widely recognized and
comprehensive approach for organizations to manage risks effectively. The COSO ERM
framework provides organizations with a structured approach to identifying, assessing,
responding to, and monitoring risks, helping them to achieve their objectives while navigating
uncertainties and challenges effectively.
Internal Environment:
This component emphasizes the importance of establishing a strong internal environment that
promotes ethical values, integrity, and a risk-aware culture throughout the organization.
Objective Setting:
Objectives provide the foundation for the risk management process. They should be aligned
with the organization's mission and strategic goals and be specific, measurable, achievable,
relevant, and time-bound (SMART).
Event Identification:
Events or circumstances that could affect the achievement of the organization's objectives
must be identified. These events can be internal or external, positive or negative.
Risk Assessment:
Risk assessment involves evaluating both the inherent risk (the risk without considering any
controls) and the residual risk (the risk remaining after considering the effectiveness of existing
controls).
Risk Response:
Risk responses can include avoiding, mitigating, transferring, or accepting risks, depending on
their significance and the organization's risk appetite.
Information and Communication:
Effective communication of risk-related information is essential for informed decision-making
and risk management. Information and communication processes should enable the timely and
relevant dissemination of risk-related information .
Monitoring
Continuous monitoring of the risk management process is necessary to ensure that it remains
effective over time. Monitoring activities involve assessing the performance of the
organization's risk management activities, evaluating the effectiveness of controls, and making
adjustments.
21
The COSO ERM framework provides organizations with a structured approach to identifying,
assessing, responding to, and monitoring risks, helping them to achieve their objectives while
navigating uncertainties and challenges effectively.
22
Question 09- Explain with example how 2 combinations of preventive, detective and
corrective controls can be employed to provide reasonable assurance about information
security.
Combination 1:
Preventive Control: Access Control Measures
Example: Implementing role-based access control (RBAC) where users are granted
permissions based on their roles and responsibilities. This prevents unauthorized users from
accessing sensitive information or performing actions beyond their authorization.
Combination 2:
Preventive Control: Encryption
Example: Encrypting sensitive data both at rest and in transit using strong encryption
algorithms. This prevents unauthorized individuals from accessing or understanding the
information even if they gain unauthorized access to the system.
23
Detective Control: Security Information and Event Management (SIEM)
Example: Implementing a SIEM system that aggregates and analyzes logs from various
sources such as servers, firewalls, and applications. It can detect security incidents by
correlating events across the IT environment, providing real-time alerts for suspicious
activities.
By combining preventive, detective, and corrective controls, organizations can create layers of
defense against potential security threats. Preventive controls help in stopping incidents before
they occur, detective controls aid in identifying security breaches or anomalies in real-time,
and corrective controls enable organizations to respond effectively to incidents and minimize
their impact. This comprehensive approach enhances the overall security posture and provides
reasonable assurance about information security.
24
Question 10- Explain the value Chain concept to Bexi Garments Ltd. Explain how it
would perform in various Primary and Support Activities.
Value Chain:
Ans- value chain is a set of activities that a firm operating in a specific industry performs in
order to deliver a valuable product or service for the market. The concept comes from business
management and was first described and popularized by Michael Porter in1985.
Value chain in Bexi Garments Ltd. is shown in below figure.
Bleaching,
Weaving/ Make-
Fiber Spinning Dyeing, Retailing
Knitting Printing, Up
Finishing
Primary Activities:
1. Inbound Logistics – Involve relationships with suppliers and include all the activities
required to receive, store, and disseminate inputs.
2. Operations – Are all the activities required to transform inputs into outputs (products and
services).
3. Outbound Logistics – Include all the activities required to collect, store, and distribute the
output.
4. Marketing and Sales – Activities inform buyers about products and services, induce buyers
to purchase them, and facilitate their purchase.
5. Service – Includes all the activities required to keep the product or service working
effectively for the buyer after it is sold and delivered.
25
4. Infrastructure – Serves the company’s needs and ties its various parts together, it consists
of functions or departments such as accounting, legal, finance, planning, public affairs,
government relations, quality assurance and general management.
Yes, the characteristics of useful information can be met simultaneously. Useful information
is often described using the acronym "ACCURATE," which stands for:
2. Complete: Information should contain all the relevant details necessary for its purpose,
leaving no significant gaps.
3. Clear: Information should be presented in a way that is easily understandable to the intended
audience, avoiding ambiguity or confusion.
4. Concise: Information should be brief and to the point, without unnecessary details that may
distract from the main message.
5. User-friendly: Information should be presented in a format that is accessible and easy for
the intended users to comprehend.
6. Relevant: Information should be directly related to the subject or decision at hand, avoiding
irrelevant details.
7. Timely: Information should be provided in a timely manner, aligning with the needs of the
decision-making process or the context in which it is used.
26
Let's consider an example:
Imagine a financial analyst preparing a report on a company's quarterly performance. The
analyst gathers accurate and complete financial data, ensuring that all relevant figures are
included. The report is presented in a clear and concise format, avoiding unnecessary jargon.
The document is user-friendly, with visual aids such as charts and graphs to enhance
understanding. The information is highly relevant to the stakeholders, focusing on key financial
metrics impacting the company's performance. Lastly, the report is delivered in a timely
manner, enabling decision-makers to act promptly based on the insights provided.
In this example, the characteristics of useful information are met simultaneously, making the
financial report a valuable tool for informed decision-making.
27