Control All Points

The existence of each of these components represents an exposure that should be controlled. These IT system exposures are entry points that make the organization susceptible to the IT risks described earlier.

The exposure areas are as follows:

  1. The operating system
  2. The database
  3. The database management system (DBMS)
  4. Local area networks (LANs)
  5. Wireless networks
  6. E-business conducted via the Internet
  7. Telecommuting workers and mobile workers
  8. Electronic data interchange (EDI)
  9. Application software

The first eight of these exposure areas can be controlled by the use of appropriate general controls such as those described in previous sections. The next eight sections give a brief description of each of the eight exposure areas. Some of these hardware or software components are described in more detail in other chapters. The ninth exposure area, application software, requires application controls. The description of application controls within application software is presented in the last section of this chapter. The purpose of the descriptions in this chapter is to provide only enough detail to allow an understanding of these exposures.

Auto318

Textbooks

Accounting Information Systems, Third Edition, Leslie Turner, Andrea Weickgenannt & Mary Kay Copeland