3. Operating Systems book
https://alphapeeler.sourceforge.net/index4stu.html#achievements_os
CEHv12 Mod020 – Cryptanalysis
https://
alphapeeler.sourceforge.net/index4stu.html#achievements_cryptana
AlphaPeeler Credited by other YouTubers
https://alphapeeler.sourceforge.net/index4stu.html#achievements_yt
Referred in Certified Ethical Hacking manuals
https://
alphapeeler.sourceforge.net/index4stu.html#achievements_ceh
Books and articles references
https://
alphapeeler.sourceforge.net/index4stu.html#achievements_books_artic
les
Student Life Achievements
9. Class Policies
• •Attendance will be marked only if you are present in
class.
•Attendance: 80% is required to be able to sit in final
exams.
•Remaining 20% : sick leave, internship, job,
emergencies, accidents or going to phoppo's house, or
any reason.
• Cross Section Attendance is not allowed
Late Assignment Submission till after 1 week of actual
deadline. (Marks deduction applies for late
submission)
• After 1 week submissions of assignment won’t be
accepted.
• All Submissions on Google forms, no email submission
• Plagiarism will not be tolerated.
10. Reference books
IT Auditing: Using Controls to Protect
Information Assets, 2nd
Edition by Chris Davis,
Mike Schiller with Kevin Wheeler.
Auditing Information Systems, Second Edition by
Jack J. Champlain.
Information System Control and Audit
by Ron Weber
CISA Review Manual 2010
11. Assessment
The course material builds your innovation skills cumulatively
Spot tests will be given periodically to assess your
comprehension of the readings.
Class participation is graded based on student participation in
practicum exercises.
There will be midterm and final examinations that are
cumulative.
Midterm 30%
Assignment 10%
Final Exam 50%
Project 10%
Total 100%
13. Course Outline:
IS Audit charter, Polices, Procedures, Audit
computer networks and communication,
Auditing software development, Acquisition,
Maintenance, Auditing IT infrastructure,
Auditing Management and Organization,
Business process re-engineering: IS audit
proposal, report, evidence and follow-up,
complaint to standard, Enterprise service
agreement, Backup and procedures
Course Catalogue - HEC
14. After successful completion of this course
students should be able to do auditing of
information systems.
Develop and implement a risk-based IS audit
strategy in compliance with IT Audit
Standards, to ensure that key areas are
included.
Plan specific audits to determine whether
information systems are protected, controlled
and provided value to the organization.
Course Goals
15. Conduct audits in accordance with IT audit
standards to achieve planned audit
objectives.
Report audit findings and make
recommendations to key stakeholders to
communicate results and effect change when
necessary.
Conduct follow-ups or prepare status reports
to ensure that appropriate actions have been
taken by management in a timely manner.
Course Goals
17. Auditing
An audit is an evaluation of an organization, system,
process, project or product.
performed by a competent, independent, objective, and
unbiased person or persons, known as auditors.
Purpose
Make an independent assessment based on
management's representation of their financial
condition (through their financial statements).
To ensure the operating effectiveness of the
internal accounting system is in accordance with
approved and accepted accounting standards /
practices.
Evaluates the internal controls to determine if
conformance will continue, and recommends
necessary changes in policies, procedures or
controls.
Auditing is a part of quality control certifications
18. Financial Audit
Is an assurance or attestation on financial
statements provided by accounting firms, whereby
the firm provides an independent opinion on
published information.
Performed by firms of practicing accountants due to
the financial reporting knowledge they require.
Internal auditors, do not attest to financial reports
but focus mainly on the internal controls of the
organization.
External auditors
US's Certified Public Accountant (CPA)
UK's Chartered Certified Accountant (ACCA) and Chartered
Accountants
(A.F. Ferguson & Co. , KPMG Taseer Hadi & Co. , Moody
International)
19. History
Independent auditing developed with the expansion
of the British Empire in the 19th
century
Prior to the 1930s, corporations were required
neither to submit annual reports to government
agencies or shareholders nor to have such reports
audited.
The 1929 boom initiated to pressure for audit of publicly
traded companies;
In the UK, the London Association of Accountants
successfully campaigns for the right to audit companies in
1930
In the US, the Securities Exchange Act of 1934 required all
publicly traded companies to disclose certain financial
information, and that financial information be audited.
The establishment of the U.S. Securities and Exchange
Commission (SEC) created a body to enforce the audit
requirements.
20. History since 1980
The Pro-business Reagan administration in the US,
and the Thatcher regime in the UK lifted many of
the controls over the profession
Leading to abuses that resulted in the crashes of 1987 and
2001
Since then, the Sarbanes-Oxley Act (SOX) has forced
an expansion of audit responsibility and driven up
audit revenues (and costs)
One study estimated the net private cost of SOX to
amount to $1.4 trillion in the US.
It is an econometric estimate of “the loss in total market
value around the most significant legislative events”—i.e.,
the costs minus the benefits as perceived by the stock market
as the new rules were enacted.
21. Audit Firms
The largest accounting firms (the 'Big 4' or ‘Final 4’)
audit nearly all of large quoted/listed companies.
In addition to providing audits, they also provide
other services including tax advice and strategic
consultancy
The 5th
largest firm, Grant Thornton, has only around
10% of the revenues of KPMG
https://www.statista.com/statistics/250479/big-four-accounting-firms-global-revenue/
22. Worldwide Big 4 revenues
The revenues of the big accounting firms grew by a
healthy 15% last year.
They are in effect, the back office of the global
markets
They are a “private police force… hired, fired and
paid for by company management”
The “big four” firms employ around half a million
people
23. Worldwide Big 4 revenues
Growth of 'Big 4' Revenues
30
40
50
60
70
80
90
100
110
120
130
2000 2002 2004 2006 2008 2010 2012
Year
Revenues
24. Planning and risk assessment.
Internal controls testing.
Substantive procedures
Stages of an audit
25. Stages of an audit
Planning and risk assessment
Timing: before year-end
Purpose:
to understand the business of the company and the
environment in which it operates.
to determine the major audit risks (i.e. the chance that the
auditor will issue the wrong opinion).
For example, if sales representatives stand to gain
bonuses based on their sales, and they account for
the sales they generate, they have both the incentive
and the ability to overstate their sales figures, thus
leading to overstated revenue.
In response, the auditor would typically plan to increase the
precision of their procedures for checking the sales figures.
26. Stages of an audit
Internal controls testing
Timing: before year-end
Purpose: to assess the internal control
procedures
(e.g. by checking computer security, account
reconciliations, segregation of duties). If internal
controls are assessed as strong, this will reduce
(but not entirely eliminate) the amount of
'substantive' work the auditor needs to do
27. Definitions
Balance Sheet : A financial statement that
summarizes a company's assets, liabilities and
shareholders' equity at a specific point in time.
These three balance sheet segments give
investors an idea as to what the company owns
and owes, as well as the amount invested by
shareholders.
The balance sheet adheres to the following
formula:
Assets = Liabilities + Shareholders' Equity
28. Definitions
In accounting and finance, equity is the difference
between the value of the assets/interest and the cost
of the liabilities of something owned. For example, if
someone owns a car worth $15,000 but owes $5,000
on that car, the car represents $10,000 equity.
29. Definitions
In financial accounting, a cash flow statement, also
known as statement of cash flows, is a financial
statement that shows how changes in balance
sheet accounts and income affect cash and cash
equivalents, and breaks the analysis down to
operating, investing and financing activities.
30. Stages of an audit
Substantive procedures
Timing: after year-end
Purpose: to check that the actual numbers in the Income
Statement and Balance Sheet (and, where applicable, Statement
of Changes in Equity and Cash Flow Statement) are reliable, by
performing tests that use the numbers provided.
Methods:
where internal controls are strong, auditors typically rely more on
Substantive Analytical Procedures (the comparison of sets of
financial information, and financial with non-financial
information, to see if the numbers 'make sense' and that
unexpected movements can be explained)
where internal controls are weak, auditors typically rely more on
Substantive Tests of Detail (selecting a sample of items from the
major account balances, and finding hard evidence (e.g. invoices,
bank statements) for those items
31. Audit Report Card
In 2005, 174 auditors were inspected by the Public Company
Accounting Oversight Board (PCAOB)
almost half have been deemed to have some trouble doing their job
satisfactorily.
On January 19th
2006, Grant Thornton became the latest.
Fifteen of its audits were found to have significant “deficiencies”
and one client had to restate at least part of its financial statements
as a result of the inspection.
Some audits by the “Big Four” accounting firms have also been
found wanting (A few clients of each of the four restated their
accounts)
At least 19 of PwC's audits, for instance, were found to include
deficiencies.
Most of these failures resulted from accounting
firms’ inability to properly audit computer based
accounting systems
32. New Business Models
The business of providing high-end temporary accounting help is
already worth $5 billion a year
Siegfried Group has seen Revenues sextuple in the past two years, to
$73m.
In 2003 its core accounting business had just 15 clients; last year it had
100; by the end of May it had 155.
More than 50 of these are among America's largest companies.
Siegfried has even received business from a Big Four accounting firm.
Siegfried's astonishing growth is explained by what it does not do:
consulting and auditing, the signature products of the big firms.
Siegfried is on the other side of the outsourcing boom: it is an
insourcer.
34. The Information Tech Industry
IT now represents 60% of expenditure in Fortune
500 companies
90% in Finance companies
Over $4 trillion annual expenditure (broadly
defined)
Most of this is financial record keeping
35. How did we get here?
Automated Clerks: 1963-1980
Back Office
Computers as automated accountants
Goals were efficiency and cost control
“Legacy” systems automated manual tasks
… but had no significant
effect on management’s
decision making
36. How did we get here?
Empowerment: 1980-1995
Client / server systems
enhanced the productivity of
knowledge workers
Word processing,
spreadsheets, and other tools
Fomented a “white-collar”
revolution
37. How did we get here?
Networking: 1995 onward
The Virtual Office (Global
Marketplace)
Net and Web and internal
networks integrate the separate
activities of the firm
What were “islands of data” have
become “knowledge nodes”
accessible to the whole firm
… and the global marketplace
38. How did we get here?
Embedding:2002-2010
Computers grow cheap, small and powerful
Morphing into a commodity platform
Which substitutes for all sorts of devices
39. How did we get here?
Invisibility: c. 2020
The “The Web” becomes
an all-pervasive info presence,
Devices plug in and rewire on the fly
“Smart dust” monitors everything
The Rest?: Machines taking care of the
work
40. Where are we ?
Industry Structure, c. 2006
Information
Technology
Market
Annual
Expenditures
($US billion)
Employees
(thousand)
Major Suppliers
Operations &
Accounting
500 2000 US, India
Search & Storage 1000 5000 US
Tools 300 300 US, Germany
Embedded 1500 700 US, Japan, Korea, Greater China
Communications 700 2000 US, Germany, Japan, Greater China
Total 4,000 10,000 GWP ~$45 trillion (Pop: 6 billion)
US GDP ~$10 trillion (Pop: 300
million)
* Gross domestic product (GDP)
* The gross world product (GWP)
41. Where’s the Money?
U.S. Output: Contribution to GDP (in billions)
Other, $2,989
Services, $2,965
Manufacturing,
$2,839
Information
Technology, $534
Life Sciences,
$712
Finance, $820
44. Market Share of servers 2017
DB servers
Servers OS
https://www.differencebtw.com/difference-between-stand-alone-operating-systems-and-server-operating-systems/
Email servers
45. Problems: Malware and Spam 2016
https://www.statista.com/chart/10045/new-malware-specimen-and-share-of-windows-based-malware/
49. Software & Hardware
Until the 1950s, there was no differentiation
between the two
By the turn of the 21st
century, they had both
been commoditized
Most of the money in IT now goes into:
System customization (about 20%)
Data (around 75%)
Hardware Taxonomy:
Central
Processing Unit
Memory
Cache RAM / ROM
Optical &
Magnetic Media
Peripheral
Processor
(Video, Bus, Etc.)
Network Devices
Fast Slow
51. Programming
Basically the core task in Information System
Languages:
Translate from human language (task specific)
To machine language (bits & bytes)
And back to human language
Today, these are just one part of a
Development environment
That keeps track of numerous design decisions.
What Machines do Well
High speed arithmetic
Massive storage and search
Repetitive, structured processes
Consequently they often have difficulty with many
real world tasks
52. Applications Software Rules(1967:2000)
Proportion of
total IT industry
revenues
1967-2000
10
15
20
25
30
35
40
1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000
%
Share
Softw are
Communications
equipment
Computer Hardw are
Photocopying, office and accounting equipment
54. IT’s Contribution to US GDP Growth
0
0.2
0.4
0.6
0.8
1
1.2
1950 1960 1970 1980 1990 2000 2010
Year
IT
Contribution
to
Real
GDP
Growth
55. How does IS change accounting?
They have shifted
away from the economics of
shortage and resource
allocation,
Towards an economics of
increasing returns
information, attention and
coordination
58. What Auditors Need to Know about IS
1. IS Security
2. Utility Computing and IS Service Organizations
3. Physical Security
4. Logical Security
5. IS Operations
6. Controls Assessment
7. Encryption and Cryptography
8. Computer Forensics
9. New Challenges from the Internet: Privacy, Piracy,
Viruses and so forth
10. Auditing and Future Technologies (RFID, Full
Automation of Substantive and Control Tests)
59. Future Opportunities
Automated / Robot Auditors
Technologies:
Scanning,
Surveillance,
Logging and Analysis,
Forensics
Advantages:
Always ‘on’
Sample sizes large enough for reliability
No system ‘learning curve’; shared experience database
Objective, Not biased / unfavorable assessment
61. IS Audit Programs
What is IS Auditing?
Why is it Important?
What is the Industry Structure?
Attestation and Assurance
62. Auditing
External Real
W orld Entities
and Events that
Create and
Destroy Value
Audit Report /
Opinion
Journal Entries
'Own ed ' A s s ets
and Liabilities
Reports:
Statistic s
Internal
O perations
of the Firm
Ac c ounting
System s
Audit
Program
T ransac tions
Transactions
The P hysical Wo rld
The P arallel (Logical)
Wo rld of Accounting
Ledgers:
D atabases
Auditing
Corporate Law
S
u
b
st
a
n
ti
v
e
T
e
s
ts
T
e
sts
o
f
T
ra
n
sa
c
tio
n
s
A
t
t
e
s
t
a
t
i
o
n
A nalytical Tests
63. How Auditors
Should Visualize
Computer
Systems
Business Applic ation
System s
T ransac tion Flow s
Asset Loss Risks
(Internal Audits)
Reporting Risks
(External Audit)
Control Proc ess Risks
(Internal & External
Audits)
O perating System s
(inc luding D BM S, netw ork
and other spec ial system s)
Hardw are Platform
Physical and Logical
Se curity Environm ent
Audit O bje ctive s
64. The IS Auditor’s Challenge
Corporate Accounting is in a constant state of
flux
Because of advances in Information Technology
applied to Accounting
Information that is needed for an Audit is often hidden
from easy access by auditors
Making computer knowledge an important prerequisite
for auditing
IS (and also just Information) assets are
increasingly the main proportion of wealth
held by corporations
65. The Challenge to Auditing Presented by
Computers
Transaction flows are less visible
Fraud is easier
Computers do exactly what you tell them
To err is human
But, to really screw up you need a computer
Audit samples require computer knowledge and access
Transaction flows are much larger (good for the
company, bad for the auditor)
Audits grow bigger and bigger from year to year
And there is more pressure to eat hours
Environmental, physical and logical security problems
grow exponentially
Externally originated viruses and hacking
are the major source of risk
(10 years ago it was employees)
66. The Challenge to Auditing Presented by
The Internet
Transaction flows are External
External copies of transactions on many Internet nodes
External Service Providers for accounting systems
require giving control to outsiders with different incentives
Audit samples may be impossible to obtain
Because they require access to 3rd
party databases
Transaction flows are intermingled between companies
Environmental, physical and logical security problems grow
exponentially
Externally originated viruses and hacking
are the major source of risk
(10 years ago it was employees)
Editor's Notes
#19:Securities and Exchange Commission of Pakistan
What is the mission of the SECP?
To develop an efficient and dynamic regulatory body that fosters principles of good governance in the corporate sector, ensures proper risk management procedures in the capital market, and protects investors through responsive policy measures and effective enforcement practices.
#20:Margaret Thatcher : Former British Prime Minister
Margaret Hilda Thatcher, Baroness Thatcher, LG, OM, PC, FRS was a British stateswoman and politician who was the Prime Minister of the United Kingdom from 1979 to 1990 and the Leader of the Conservative Party from 1975 to 1990
#27:Shareholders' equity is the amount that the owners of a company have invested in their business. This includes the money they've directly invested and the accumulation of income the company has earned and that has been reinvested since inception.
#30:DEFINITION of 'Balance Sheet'
A financial statement that summarizes a company's assets, liabilities and shareholders' equity at a specific point in time. These three balance sheet segments give investors an idea as to what the company owns and owes, as well as the amount invested by shareholders.
In accounting and finance, equity is the difference between the value of the assets/interest and the cost of the liabilities of something owned. For example, if someone owns a car worth $15,000 but owes $5,000 on that car, the car represents $10,000 equity.
In financial accounting, a cash flow statement, also known as statement of cash flows, is a financialstatement that shows how changes in balance sheet accounts and income affect cash and cashequivalents, and breaks the analysis down to operating, investing and financing activities.
#39:Human communication uses an insignificant portion of bandwidth
#40:Gross domestic product (GDP) is a monetary measure of the market value of all final goods and services produced in a period (quarterly or yearly) of time.
The gross world product (GWP) is the combined gross national product of all the countries in the world.
#41:The gross domestic product (GDP) is one of the primary indicators used to gauge the health of a country's economy.
#53:Managed services is the practice of outsourcing the responsibility for maintaining, and anticipating need for, a range of processes and functions, ostensibly for the purpose of improved operations and reduced budgetary expenditures through the reduction of directly-employed staff.
IaaS : Infrastructure as a service (IaaS) is the on-demand availability of highly scalable computing resources as services over the internet.
#58:Logical Security consists of software safeguards for an organization’s systems, including user identification and password access, authenticating, access rights and authority levels.
#64:state of flux: constantly changing : un accountable.