CHAPTER 4

Internal Controls and Risks in IT Systems

STUDY OBJECTIVES

This chapter will help you gain an understanding of the following concepts:

images An overview of internal controls for IT systems

images General controls for IT systems

images General controls from a Trust Services Principles perspective

images Hardware and software exposures in IT systems

images Application software and application controls

images Ethical issues in IT systems

THE REAL WORLD

images

On Christmas day in 2011, a loosely organized hacker group called Anonymous hacked into the U.S. data security firm Stratfor, based in Austin, Texas. A few days later, Anonymous revealed that it had collected 200 gigabytes of data from Stratfor, including clients' credit card numbers, e-mail addresses, passwords, and mailing addresses. It posted the credit card numbers ...

Get Accounting Information Systems: The Processes and Controls, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.