HAPTER 7 Information Systems Controls for Systems Reliability

Slides:



Advertisements
Similar presentations
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Advertisements

Auditing Computer Systems
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security Controls – What Works
Information Security Policies and Standards
Security+ Guide to Network Security Fundamentals
Chapter 12 Network Security.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
IS Controls – Reliability Part 1
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Lesson 19: Configuring Windows Firewall
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Computer Security: Principles and Practice
Controls for Information Security
Introduction (Pendahuluan)  Information Security.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Payment Card Industry (PCI) Data Security Standard
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Department Of Computer Engineering
Information Systems Controls for System Reliability -Information Security-
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Controls for Information Security
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart1 of 212 C HAPTER 7 Information Systems Controls for Systems.
SEC835 Database and Web application security Information Security Architecture.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
BUSINESS B1 Information Security.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Module 14: Configuring Server Security Compliance
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Chapter 2 Securing Network Server and User Workstations.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Role Of Network IDS in Network Perimeter Defense.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IS3220 Information Technology Infrastructure Security
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Security Methods and Practice CET4884
CS457 Introduction to Information Security Systems
Critical Security Controls
Presentation transcript:

HAPTER 7 Information Systems Controls for Systems Reliability Part 1: Information Security 1

INTRODUCTION Questions to be addressed in this chapter: How does security affect systems reliability? What is the time-based model of security and the concept of defense-in-depth? What types of preventive, detective, and corrective controls are used to provide information security? 2

INTRODUCTION One basic function of an AIS is to provide information useful for decision making. In order to be useful, the information must be reliable, which means: It provides an accurate, complete, and timely picture of the organization’s activities. It is available when needed. The information and the system that produces it is protected from loss, compromise, and theft. 3

INTRODUCTION SYSTEMS RELIABILITY The Trust Services framework developed by the AICPA and the Canadian Institute of Chartered Accountants (CICA) identified five basic principles that contribute to systems reliability: Security Confidentiality Online privacy Processing integrity Availability CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY AVAILABILITY SECURITY 4

FUNDAMENTAL INFORMATION SECURITY CONCEPTS In this chapter, we will focus on the Trust Services principle of information security. There are three fundamental information security concepts that will be discussed in this chapter: Security as a management issue, not a technology issue. The time-based model of security. Defense in depth. 5

SECURITY AS A MANAGEMENT ISSUE Management is responsible for the accuracy of various internal reports and financial statements produced by the organization’s IS. Security is a key component of the internal control and systems reliability to which management must attest. management’s philosophy and operating style are critical to an effective control environment. 6

TIME-BASED MODEL OF SECURITY The time-based model of security focuses on implementing a set of preventive, detective, and corrective controls that enable an organization to recognize that an attack is occurring and take steps to thwart it before any assets have been compromised. All three types of controls are necessary: Preventive Detective Corrective 7

TIME-BASED MODEL OF SECURITY The time-based model evaluates the effectiveness of an organization’s security by measuring and comparing the relationship among three variables: P = Time it takes an attacker to break through the organization’s preventive controls D = Time it takes to detect that an attack is in progress C = Time to respond to the attack These three variables are evaluated as follows: If P > (D + C), then security procedures are effective. Otherwise, security is ineffective. 8

DEFENSE IN DEPTH The idea of defense-in-depth is to employ multiple layers of controls to avoid having a single point of failure. If one layer fails, another may function as planned. Computer security involves using a combination of firewalls, passwords, and other preventive procedures to restrict access. 9

Wed 27-10 PREVENTIVE CONTROLS Major types of preventive controls used for defense in depth include: Authentication controls Authorization controls Training Physical access controls Remote access controls Host and Application Hardening procedures Encryption 10

PREVENTIVE CONTROLS Authentication - focuses on verifying the identity of the person or device attempting to gain access. Passwords are probably the most commonly used authentication method and also the most controversial. An effective password must satisfy a number of requirements: Length Multiple character types Random Secret 11

Control Physical Access PREVENTIVE CONTROLS Encryption Hardening Control Remote Access Control Physical Access Training These are the multiple layers of preventive controls that reflect the defense-in-depth approach to satisfying the constraints of the time-based model of security.

PREVENTIVE CONTROLS Other authentication methods have their own limitations like: Biometric techniques Multi-factor authentication 13

PREVENTIVE CONTROLS Authorization - restricts access of authenticated users to specific portions of the system and specifies what actions they are permitted to perform. Authorization controls are implemented by creating an access control matrix. Specifies what part of the IS a user can access and what actions they are permitted to perform. When an employee tries to access a particular resource, the system performs a compatibility test that matches the user’s authentication credentials against the matrix to determine if the action should be allowed. 14

PREVENTIVE CONTROLS Which programs can user 12354 access? Who has the authority to delete Program 2? Which files can user 12354 access? Which programs can user 12354 access? 15

PREVENTIVE CONTROLS Training Employees should be trained to follow safe computing practices, such as: Never open unsolicited email attachments. Use only approved software. Never share or reveal passwords. Physically protect laptops, especially when traveling. 16

PREVENTIVE CONTROLS Controlling Physical Access Within a few minutes, a skilled attacker with unsupervised direct physical access to the system can successfully obtain access to sensitive data. Physical access control begins with entry points to the building itself. Should be one regular entry point unlocked during normal office hours. Fire codes require emergency exits. These should not permit entry from outside. Should be connected to an alarm that is triggered if someone leaves through the exit. A receptionist or security guard should be stationed at the main entrance of the building to: Verify the identity of employees. Require that visitors sign in and be escorted to their destination. 17

PREVENTIVE CONTROLS Controlling Remote Access Information sent over the Internet is governed by TCP/IP, two protocols for transmitting information over the Internet. Transmission Control Protocol (TCP) specifies the procedures for dividing files and documents into packets and for reassembly at the destination. Internet Protocol (IP) specifies the structure of the packets and how to route them to the proper destination. 18

PREVENTIVE CONTROLS Host and Application Hardening Routers and firewalls are designed to protect the network perimeter. Information security is enhanced by supplementing preventive controls on the network perimeter with additional preventive controls on the workstations, servers, printers, and other devices (collectively referred to as hosts) that comprise the organization’s network. Three areas deserve special attention: Host configuration (of devices and OS ----- Default setting or tuning to parameters) User accounts (rights and powers) Software design (buffer overflow attack): Attacker sends a program more data than it can handle. 19

PREVENTIVE CONTROLS Perimeter Defense: Routers, Firewalls, and Intrusion Prevention Systems This figure shows the relationship between an organization’s information system and the Internet. A device called a border router connects an organization’s information system to the Internet.

PREVENTIVE CONTROLS Encryption Encrypting sensitive stored data provides one last barrier that must be overcome by an intruder. Encryption plays an essential role in ensuring and verifying the validity of e-business transactions. Therefore, accountants, auditors, and systems professionals need to understand encryption. 21

DETECTIVE CONTROLS Log Analysis Most systems come with extensive capabilities for logging who accesses the system and what specific actions each user performed. Logs form an audit trail of system access. Are of value only if routinely examined. Log analysis is the process of examining logs to monitor security. 22

DETECTIVE CONTROLS The log may indicate unsuccessful attempts to log in to different servers. The person analyzing the log must try to determine the reason for the failed attempt. Could be: The person was a legitimate user who forgot his password. Was a legitimate user but not authorized to access that particular server. The user ID was invalid and represented an attempted intrusion. 23

DETECTIVE CONTROLS Intrusion Detection Systems An IDS creates a log of network traffic that was permitted to pass the firewall. The router hides your pc's ip address. It also blocks certain types of scans. The software firewall will help block anything that does get through. More importantly, the firewall blocks outgoing stuff Analyzes the logs for signs of attempted or successful intrusions. Most common analysis is to compare logs to a database containing patterns of traffic associated with known attacks. An alternative technique builds a model representing “normal” network traffic and uses various statistical techniques to identify unusual behavior. 24

DETECTIVE CONTROLS Managerial Reports The Information Systems Audit and Control Association (ISACA) and the IT Governance Institute have developed a comprehensive framework for information systems controls called Control Objectives for Information and Related Technology (COBIT). Specifies 34 IT-related control objectives Provides: Management guidelines that identify crucial success factors associated with each objective. Key performance indicators (KPI) that can be used to assess their effectiveness. 25

DETECTIVE CONTROLS COBIT key performance indicators: Number of incidents with business impact Percent of users who do not comply with password standards Percent of cryptographic keys compromised and revoked

DETECTIVE CONTROLS Security Testing - the effectiveness of existing security procedures should be tested periodically. One approach is vulnerability scans, which use automated tools designed to identify whether a system possesses any well-known vulnerabilities. 27

CORRECTIVE CONTROLS Detection of attempted and successful intrusions is important but is worthless if not followed by corrective action. Three key components that satisfy the preceding criteria are: Establishment of a computer emergency response team. Designation of a specific individual with organization-wide responsibility for security. An organized patch management system. 28

CORRECTIVE CONTROLS Computer Emergency Response Team (CERT) Responsible for dealing with major incidents. Should include technical specialists and senior operations management. 29

CORRECTIVE CONTROLS A chief security officer (CSO): Should be independent of other IS functions and report to either the COO or CEO. Must understand the company’s technology environment and work with the CIO to design, implement, and promote sound security policies and procedures. Disseminates info about fraud, errors, security breaches, improper system use, and consequences of these actions. Works with the person in charge of building security, as that is often the entity’s weakest link. Should impartially assess and evaluate the IT environment, conduct vulnerability and risk assessments, and audit the CIO’s security measures. 30

CORRECTIVE CONTROLS Patch Management A patch is code released by software developers to fix vulnerabilities that have been discovered. Patch management is the process for regularly applying patches and updates to all of an organization’s software. Another important corrective control involves fixing known vulnerabilities and installing latest updates to: Anti-virus software Firewalls Operating systems Application programs 31