Exploitation by a deceptive application programmer can occur during application development and maintenance. Programs must be compared against object code or programs in active storage itself.
Inspect code for:
Allow special functions to be performed using a special code or userid.
Allow for special processing after a certain date.
Cause data set damage after a certain date, such as employee termination.
The auditor must be involved in all stages of a program's life, especially during the design stage. Ensure that personnel who develop a program are not the individuals who test it. Fraud is more likely if only one person develops, tests, and implements a program. Fraud can also occur if a conspiracy exists among the developers, testers, and implementers. Separating function minimizes the risk.
In auditing applications already in use, determine if:
|
Copyright © 2010 CA Technologies.
All rights reserved.
|
|