1 / 35

INTRODUCTION

INTRODUCTION. Why AIS threats are increasing Control risks have increased in the last few years because: There are computers and servers everywhere, and information is available to an unprecedented number of workers.

mjim
Download Presentation

INTRODUCTION

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. INTRODUCTION • Why AIS threats are increasing • Control risks have increased in the last few years because: • There are computers and servers everywhere, and information is available to an unprecedented number of workers. • Distributed computer networks make data available to many users, and these networks are harder to control than centralized mainframe systems. • Wide area networks are giving customers and suppliers access to each other’s systems and data, making confidentiality a major concern.

  2. INTRODUCTION • Some vocabulary terms for this chapter: • A threat is any potential adverse occurrence or unwanted event that could injure the AIS or the organization. • The exposure or impact of the threat is the potential dollar loss that would occur if the threat becomes a reality. • The likelihood is the probability that the threat will occur.

  3. OVERVIEW OF CONTROL CONCEPTS • Internal controls perform three important functions: • Preventive controls • Deter problems before they arise.

  4. OVERVIEW OF CONTROL CONCEPTS • Internal controls perform three important functions: • Preventive controls • Detective controls • Discover problems quickly when they do arise.

  5. OVERVIEW OF CONTROL CONCEPTS • Internal controls perform three important functions: • Preventive controls • Detective controls • Corrective controls • Remedy problems that have occurred by: • Identifying the cause; • Correcting the resulting errors; and • Modifying the system to prevent future problems of this sort.

  6. OVERVIEW OF CONTROL CONCEPTS • Internal controls are often classified as: • General controls • Those designed to make sure an organization’s control environment is stable and well managed. • They apply to all sizes and types of systems. • Examples: Security management controls.

  7. OVERVIEW OF CONTROL CONCEPTS • Internal controls are often classified as: • General controls • Application controls • Prevent, detect, and correct transaction errors and fraud. • Concerned with accuracy, completeness, validity, and authorization of the data captured, entered into the system, processed, stored, transmitted to other systems, and reported.

  8. OVERVIEW OF CONTROL CONCEPTS • An effective system of internal controls should exist in all organizations to: • Help them achieve their missions and goals. • Minimize surprises.

  9. CONTROL FRAMEWORKS • A number of frameworks have been developed to help companies develop good internal control systems. Three of the most important are: • The COBIT framework • The COSO internal control framework • COSO’s Enterprise Risk Management framework (ERM)

  10. CONTROL FRAMEWORKS • COSO’s internal control framework • The Committee of Sponsoring Organizations (COSO) is a private sector group consisting of: • The American Accounting Association • The AICPA • The Institute of Internal Auditors • The Institute of Management Accountants • The Financial Executives Institute

  11. CONTROL FRAMEWORKS • In 1992, COSO issued the Internal Control Integrated Framework: • Defines internal controls. • Provides guidance for evaluating and enhancing internal control systems. • Widely accepted as the authority on internal controls. • Incorporated into policies, rules, and regulations used to control business activities.

  12. CONTROL FRAMEWORKS • COSO’s internal control model has five crucial components: • Control environment • The core of any business is its people. • Their integrity, ethical values, and competence make up the foundation on which everything else rests.

  13. CONTROL FRAMEWORKS • COSO’s internal control model has five crucial components: • Control environment • Control activities • Policies and procedures must be established and executed to ensure that actions identified by management as necessary to address risks are, in fact, carried out.

  14. CONTROL FRAMEWORKS • COSO’s internal control model has five crucial components: • Control environment • Control activities • Risk assessment • The organization must be aware of and deal with the risks it faces. • It must set objectives for its diverse activities and establish mechanisms to identify, analyze, and manage the related risks.

  15. CONTROL FRAMEWORKS • COSO’s internal control model has five crucial components: • Control environment • Control activities • Risk assessment • Information and communication • Information and communications systems surround the control activities. • They enable the organization’s people to capture and exchange information needed to conduct, manage, and control its operations.

  16. CONTROL FRAMEWORKS • COSO’s internal control model has five crucial components: • Control environment • Control activities • Risk assessment • Information and communication • Monitoring • The entire process must be monitored and modified as necessary.

  17. RISK ASSESSMENT AND RISK RESPONSE • Companies should: • Assess inherent risk • Develop a response • Then assess residual risk • The ERM model indicates four ways to respond to risk: • Reduce it • The most effective way to reduce the likelihood and impact of risk is to implement an effective system of internal controls.

  18. RISK ASSESSMENT AND RISK RESPONSE • Companies should: • Assess inherent risk • Develop a response • Then assess residual risk • The ERM model indicates four ways to respond to risk: • Reduce it • Accept it • Don’t act to prevent or mitigate it.

  19. RISK ASSESSMENT AND RISK RESPONSE • Companies should: • Assess inherent risk • Develop a response • Then assess residual risk • The ERM model indicates four ways to respond to risk: • Reduce it • Accept it • Share it • Transfer some of it to others via activities such as insurance, outsourcing, or hedging.

  20. RISK ASSESSMENT AND RISK RESPONSE • Companies should: • Assess inherent risk • Develop a response • Then assess residual risk • The ERM model indicates four ways to respond to risk: • Reduce it • Accept it • Share it • Avoid it • Don’t engage in the activity that produces it. • May require: • Sale of a division • Exiting a product line • Canceling an expansion plan

  21. RISK ASSESSMENT AND RISK RESPONSE • Accountants: • Help management design effective controls to reduce inherent risk. • Evaluate internal control systems to ensure they are operating effectively. • Assess and reduce inherent risk using the risk assessment and response strategy.

  22. Identify the events or threats that confront the company RISK ASSESSMENT AND RISK RESPONSE Estimate the likelihood or probability of each event occurring Estimate the impact of potential loss from each threat • Event identification • The first step in risk assessment and response strategy is event identification, which we have already discussed. Identify set of controls to guard against threat Estimate costs and benefits from instituting controls Is it cost-beneficial to protect system Avoid, share, or accept risk No Yes Reduce risk by implementing set of controls to guard against threat

  23. Identify the events or threats that confront the company RISK ASSESSMENT AND RISK RESPONSE Estimate the likelihood or probability of each event occurring Estimate the impact of potential loss from each threat • Estimate likelihood and impact • Some events pose more risk because they are more probable than others. • Some events pose more risk because their dollar impact would be more significant. • Likelihood and impact must be considered together: • If either increases, the materiality of the event and the need to protect against it rises. Identify set of controls to guard against threat Estimate costs and benefits from instituting controls Is it cost-beneficial to protect system Avoid, share, or accept risk No Yes Reduce risk by implementing set of controls to guard against threat

  24. Identify the events or threats that confront the company RISK ASSESSMENT AND RISK RESPONSE Estimate the likelihood or probability of each event occurring Estimate the impact of potential loss from each threat • Identify controls • Management must identify one or more controls that will protect the company from each event. • In evaluating benefits of each control procedure, consider effectiveness and timing. Identify set of controls to guard against threat Estimate costs and benefits from instituting controls Is it cost-beneficial to protect system Avoid, share, or accept risk No Yes Reduce risk by implementing set of controls to guard against threat

  25. Identify the events or threats that confront the company RISK ASSESSMENT AND RISK RESPONSE Estimate the likelihood or probability of each event occurring Estimate the impact of potential loss from each threat • All other factors equal: • A preventive control is better than a detective one. • However, if preventive controls fail, detective controls are needed to discover the problem, and corrective controls are needed to recover. • Consequently, the three complement each other, and a good internal control system should have all three. • Similarly, a company should use all four levers of control. Identify set of controls to guard against threat Estimate costs and benefits from instituting controls Is it cost-beneficial to protect system Avoid, share, or accept risk No Yes Reduce risk by implementing set of controls to guard against threat

  26. Identify the events or threats that confront the company RISK ASSESSMENT AND RISK RESPONSE Estimate the likelihood or probability of each event occurring Estimate the impact of potential loss from each threat • Estimate costs and benefits • It would be cost-prohibitive to create an internal control system that provided foolproof protection against all events. • Also, some controls negatively affect operational efficiency, and too many controls can make it very inefficient. Identify set of controls to guard against threat Estimate costs and benefits from instituting controls Is it cost-beneficial to protect system Avoid, share, or accept risk No Yes Reduce risk by implementing set of controls to guard against threat

  27. Identify the events or threats that confront the company RISK ASSESSMENT AND RISK RESPONSE Estimate the likelihood or probability of each event occurring Estimate the impact of potential loss from each threat • The benefits of an internal control procedure must exceed its costs. • Benefits can be hard to quantify, but include: • Increased sales and productivity • Reduced losses • Better integration with customers and suppliers • Increased customer loyalty • Competitive advantages • Lower insurance premiums Identify set of controls to guard against threat Estimate costs and benefits from instituting controls Is it cost-beneficial to protect system Avoid, share, or accept risk No Yes Reduce risk by implementing set of controls to guard against threat

  28. Identify the events or threats that confront the company RISK ASSESSMENT AND RISK RESPONSE Estimate the likelihood or probability of each event occurring Estimate the impact of potential loss from each threat • Costs are usually easier to measure than benefits. • Primary cost is personnel, including: • Time to perform control procedures • Costs of hiring additional employees to effectively segregate duties • Costs of programming controls into a system Identify set of controls to guard against threat Estimate costs and benefits from instituting controls Is it cost-beneficial to protect system Avoid, share, or accept risk No Yes Reduce risk by implementing set of controls to guard against threat

  29. Identify the events or threats that confront the company RISK ASSESSMENT AND RISK RESPONSE Estimate the likelihood or probability of each event occurring Estimate the impact of potential loss from each threat • Other costs of a poor control system include: • Lost sales • Lower productivity • Drop in stock price if security problems arise • Shareholder or regulator lawsuits • Fines and penalties imposed by governmental agencies Identify set of controls to guard against threat Estimate costs and benefits from instituting controls Is it cost-beneficial to protect system Avoid, share, or accept risk No Yes Reduce risk by implementing set of controls to guard against threat

  30. Identify the events or threats that confront the company RISK ASSESSMENT AND RISK RESPONSE Estimate the likelihood or probability of each event occurring Estimate the impact of potential loss from each threat • The expected loss related to a risk is measured as: • Expected loss = impact x likelihood • The value of a control procedure is the difference between: • Expected loss with control procedure • Expected loss without it Identify set of controls to guard against threat Estimate costs and benefits from instituting controls Is it cost-beneficial to protect system Avoid, share, or accept risk No Yes Reduce risk by implementing set of controls to guard against threat

  31. Identify the events or threats that confront the company RISK ASSESSMENT AND RISK RESPONSE Estimate the likelihood or probability of each event occurring Estimate the impact of potential loss from each threat • Determine cost-benefit effectiveness • After estimating benefits and costs, management determines if the control is cost beneficial, i.e., is the cost of implementing a control procedure less than the change in expected loss that would be attributable to the change? Identify set of controls to guard against threat Estimate costs and benefits from instituting controls Is it cost-beneficial to protect system Avoid, share, or accept risk No Yes Reduce risk by implementing set of controls to guard against threat

  32. Identify the events or threats that confront the company RISK ASSESSMENT AND RISK RESPONSE Estimate the likelihood or probability of each event occurring Estimate the impact of potential loss from each threat • In evaluating costs and benefits, management must consider factors other than those in the expected benefit calculation. • If an event threatens an organization’s existence, it may be worthwhile to institute controls even if costs exceed expected benefits. • The additional cost can be viewed as a catastrophic loss insurance premium. Identify set of controls to guard against threat Estimate costs and benefits from instituting controls Is it cost-beneficial to protect system Avoid, share, or accept risk No Yes Reduce risk by implementing set of controls to guard against threat

  33. Expected Loss without control procedure = $800,000 x .12 = $96,000. • Expected loss with control procedure = $800,000 x .005 = $4,000. • Estimated value of control procedure = $96,000 - $4,000 = $92,000. • Estimated cost of control procedure = $43,000 (given). • Benefits exceed costs by $92,000 - $43,000 = $49,000. • In this case, Hobby Hole should probably install the motion detectors. RISK ASSESSMENT AND RISK RESPONSE • Let’s go through an example: • Hobby Hole is trying to decide whether to install a motion detector system in its warehouse to reduce the probability of a catastrophic theft. • A catastrophic theft could result in losses of $800,000. • Local crime statistics suggest that the probability of a catastrophic theft at Hobby Hole is 12%. • Companies with motion detectors only have about a .5% probability of catastrophic theft. • The present value of purchasing and installing a motion detector system and paying future security costs is estimated to be about $43,000. • Should Hobby Hole install the motion detectors?

  34. Identify the events or threats that confront the company RISK ASSESSMENT AND RISK RESPONSE Estimate the likelihood or probability of each event occurring Estimate the impact of potential loss from each threat • Implement the control or avoid, share, or accept the risk • When controls are cost effective, they should be implemented so risk can be reduced. Identify set of controls to guard against threat Estimate costs and benefits from instituting controls Avoid, share, or accept risk Is it cost-beneficial to protect system No Yes Reduce risk by implementing set of controls to guard against threat

  35. Identify the events or threats that confront the company RISK ASSESSMENT AND RISK RESPONSE Estimate the likelihood or probability of each event occurring Estimate the impact of potential loss from each threat • Risks that are not reduced must be accepted, shared, or avoided. • If the risk is within the company’s risk tolerance, they will typically accept the risk. • A reduce or share response is used to bring residual risk into an acceptable risk tolerance range. • An avoid response is typically only used when there is no way to cost-effectively bring risk into an acceptable risk tolerance range. Identify set of controls to guard against threat Estimate costs and benefits from instituting controls Avoid, share, or accept risk Is it cost-beneficial to protect system No Yes Reduce risk by implementing set of controls to guard against threat

More Related