IS Security Control & Management. Overview n Why worry? n Sources, frequency and severity of problems n Risks to computerized vs. manual systems n Purpose.

Slides:



Advertisements
Similar presentations
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Advertisements

Overview of IS Controls, Auditing, and Security Fall 2005.
Auditing Concepts.
Information Technology Control Day IV Afternoon Sessions.
Auditing Computer-Based Information Systems
Auditing Computer Systems
Auditing Computer-Based Information Systems
Managing Information Systems Information Systems Security and Control Part 1 Dr. Stephania Loizidou Himona ACSC 345.
The Islamic University of Gaza
4/15: Security & Controls in IS Systems Vulnerabilities Controls: what to use to guard against vulnerabilities –General controls –Application controls.
1 An Overview of Computer Security computer security.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Impact of Information Technology on the Audit.
Session 3 – Information Security Policies
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
14. CONTROLLING INFORMATION SYSTEMS 14. CONTROLLING INFORMATION SYSTEMS 14.1.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
TO ENSURE  THE EFFICIENT & EFFECTIVE DEVELOPMENT / MAINTENANCE OF IT SYSTEMS  PROPER IMPLEMENTATION OF IT SYSTEMS  PROTECTION OF DATA AND PROGRAMS.
Overview of Systems Audit
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Implementing and Auditing Ethics Programs
Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
David N. Wozei Systems Administrator, IT Auditor.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Business Continuity & Disaster recovery
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Chapter 7 Control and AIS. Threats to AIS Natural disasters –DSM flood (p. 249) Political disasters –Terrorism Cyber crime (as opposed to general terrorism)
Information Systems Security Operational Control for Information Security.
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
MODULE 12 Control Audit And Security Of Information System 12.1 Controls in Information systems 12.2 Need and methods of auditing Information systems 12.3.
This Lecture Covers IT Control Frameworks. Liberating Control from Fin Reptg ITCG COBIT New frameworks such as AICPA/CICA SysTrust Principles and Criteria.
S4: Understanding the IT environment of the entity.
Fundamentals I: Accounting Information Systems McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
SESSION 14 INFORMATION SYSTEMS SECURITY AND CONTROL.
Learning Objectives Demonstrate why info systems are vulnerable to destruction, error, abuse, quality control problemsDemonstrate why info systems are.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Introduction to Information Security
Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Auditing Internal Control over Financial Reporting Chapter Seven.
Chapter 3-Auditing Computer-based Information Systems.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Welcome to the ICT Department Unit 3_5 Security Policies.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Information Systems Security
Auditing Concepts.
INFORMATION SYSTEMS SECURITY AND CONTROL.
BUSINESS CONTINUITY BY HUI ZHENG.
DISASTER RECOVERY INSTITUTE INTERNATIONAL
Errors, Fraud, Risk Management, and Internal Controls
Processing Integrity and Availability Controls
Managing the IT Function
What a non-IT auditor needs to know about IT & IT controls
INFORMATION SYSTEMS SECURITY and CONTROL
Presentation transcript:

IS Security Control & Management

Overview n Why worry? n Sources, frequency and severity of problems n Risks to computerized vs. manual systems n Purpose of control mechanisms n Types of controls: General & Application n Developing and managing control systems

Why Worry? n Computer Viruses –Rogue software programs that are difficult to detect that spread rapidly through computer systems, destroying data or disrupting processing and memory systems Example: ILOVEYOU virus n Hackers –People who gains unauthorized access

Why Worry? n Information System Outages –Studies show that: companies would sustain critical loss of business operations within 15 days of an information system outage At that point, firms would have less than a 25% chance of ever recovering

Need for Information System Audits n Continuous improvement in hardware performance and capabilities n Decreasing hardware costs n Availability of application and database software with more functionality n Advances in communication n Sophistication of users n Demand for greater control of information

Management’s Concerns Regarding Information Systems n Loss or misstatement of data n Unauthorized access to data n Loss of confidentiality of data n Fraud n Errors and omissions n Computer downtime/damage n Corruption of data

Threats to Systems n Natural disasters n Sabotage and theft n Operational errors n Upgrades & conversions (including fixes!)

Primary Concerns by Disaster Type

Natural Disasters n Broader impact than other types –business and employees both impacted –typically many systems fail at once –often others in the area have the same problems and are therefore seeking the same resources for recovery n Focus on reasonability of backup and recovery plans

Sabotage or Theft n Points of risk –Layoffs and firings –Mergers & reorganizations n In Fortune 500 companies with over 1,000 laptops, 14 lost per year n Often not covered by insurance n Data loss worse than equipment loss

Operational Errors n Hardware failures –Risks with outdated hardware –Impact for e-commerce activities –Reliance on network connections n User generated failures (32% of all data losses involving disks and tapes are caused by user errors) n Mistakes made in attempts to recover lost or damaged data

Upgrades and Conversions n The solution causes the problem! n Problem with suppliers and buyers n Time lost in conversions often not considered in cost of “upgrades”

Severity of Problems: The Firm n In 1997, Nations Bank, the 4th largest bank in the U.S. at the time, reviewed their vulnerability, they estimated that their exposure was: –$50 million in financial losses –for an interruption of more than 24 hours –where existing plans would take 2-5 days to restore operations

Severity of Problems: The Individual n A Fortune 500 CFO lost five years’ worth of accounting and stockholder data on a Friday afternoon; he needed it Monday for an annual stockholder’s meeting. n Twice daily backups didn’t help: the backup media had never been tested. When it was proven to be faulty, the CFO thought his career was over. n Data recovery specialists managed to rescue the information in time for the CFO’s Monday morning presentation

System Vulnerability n Complex IS cannot be easily replicated manually n Once an IS has been built, can be hard to decipher processes again n Probability of disasters is the same, but impact may be greater with IS failures n Security in a networked system is significantly more complicated

Quality Assurance vs. Control n Quality assurance as the prevention of errors n Quality control as the identification of errors after they occur n Data vs. system quality –Is the information stored and secured correctly? –Are things processed correctly?

Quality Assurance in IS n Use of appropriate methods & documentation n Test plans & testing n Complete the circle with customer & employee feedback n Communication, communication, communication

Cost to Fix Mistakes After Implementation versus Before

Testing Approaches n Test plans n Manual approaches –Usability tests (handout) –Testers vs. users as guinea pigs! n Automated testing –Main benefits simulation of large volumes of users can be run on many configurations of hardware –Requires tools & expertise

Testing and Quality n Types of testing: Unit, System, Acceptance n Inability to prove correctness n At design phase: test with walkthrough –Is it what they want? n During construction: debugging n Pre-implementation: verify goals met

Purpose of Control Mechanisms n Reduce risk of loss of business continuity and legal liability through controls n Methods, policies, and organizational procedures that assure: –Safety of organizational assets –Accuracy & reliability of records –Adherence to organizational standards

Types of Controls n General controls –Design, security & use of IS –Accomplished through system software and manual procedures n Application controls –Specific to given applications –Accomplished through application software

General Controls n Controls over system development processes n Software system level controls n Hardware controls (secure & accurate) n Computer operations controls n Data security controls n Administrative controls (segregation of functions, adherence to policies, etc.)

Application Controls n Based on I-P-O model n Input controls –Control totals, data validations, authorization n Processing controls –Run control totals and “Computer matching” of values (redundancy checks) n Output controls –Reconciliation and Appropriate distribution of information

Developing Control Systems n Risk analysis and assessment –Financial valuations of business interruptions –Non-financial valuations legal & regulatory compliance Other benefits n Need for upper management support

Risk Analysis Steps -Identifying and valuing assets; -Identifying threats (whether caused by people or natural disasters); -Identifying vulnerabilities (i.e., design, configurations, or procedures that make assets subject to threats); -Estimating risks (calculating probabilities); -Calculating statistically expected losses; and -Identifying potential protective measures.

Testing & Audits of Control Systems n Backups & recovery plans must be tested to be relied upon –5 - 25% of firms that do not have plans are not in business within a year of a major disaster n Major consulting firms such as Ernst & Young have thriving business sectors in IS auditing –Verify general & application controls –Similar to accounting audits but for information systems