Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.

Slides:



Advertisements
Similar presentations
Computer Fraud Chapter 5.
Advertisements

Computer Fraud Chapter 5.
Computer Science 101 Data Encryption And Computer Networks.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Information Technology Control Day IV Afternoon Sessions.
Core Concepts of ACCOUNTING INFORMATION SYSTEMS Moscove, Simkin & Bagranoff John Wiley & Sons, Inc. Developed by: S. Bhattacharya, Ph.D. Florida Atlantic.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Crime and Security in the Networked Economy Part 4.
Auditing Computer-Based Information Systems
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
9 - 1 Computer-Based Information Systems Control.
4/15: Security & Controls in IS Systems Vulnerabilities Controls: what to use to guard against vulnerabilities –General controls –Application controls.
Chapter 17 Controls and Security Measures
Security+ Guide to Network Security Fundamentals
Chapter 14 System Controls. A Quote “The factory of the future will have only two employees, a man and a dog. The man will be there to feed the dog. The.
Risks, Controls and Security Measures
Business Data Communications, Fourth Edition Chapter 10: Network Security.
1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senn’s Information Technology, 3 rd Edition Chapter 14 Issues in Information.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Processing Integrity and Availability Controls
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 8-1 Accounting Information Systems 9 th Edition Marshall.
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 8-1 Accounting Information Systems 9 th Edition Marshall.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Processing Integrity and Availability Controls
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Concepts of Database Management Sixth Edition
Core Concepts of ACCOUNTING INFORMATION SYSTEMS Moscove, Simkin & Bagranoff John Wiley & Sons, Inc. Developed by: Marianne Bradford, Ph.D. Bryant College.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
Chapter 1 Introduction to CBIS. Information Technology Trends “free” hardware easy-to-use software pre-packaged software small computers data availability.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Information Systems Security Operational Control for Information Security.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Chapter Eight CBIS and Checklists. General Controls 12 controls Planning, controls, standards, security Continuous updating –e.g., C&L 66% of firms inadequate.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
SUPPLEMENTAL B An Overview of The General Ledger Architecture.
Enterprise Resource Planning System (ERP) Flowchart #7
IT in Business Issues in Information Technology Lecture – 13.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
An Overview of The General Ledger Architecture.  Files are used to store data and processing instruction. The two types of files computer users use most.
MBA 664 Database Management Dave Salisbury ( )
CIS 325: Data Communications1 Chapter Seventeen Network Security.
1 3 Computing System Fundamentals 3.6 Errors Prevention and Recovery.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
INFORMATION SYSTEMS SECURITY AND CONTROL.
Electronic Data Processing Systems Chapter 6.
Controlling Computer-Based Information Systems, Part II
Processing Integrity and Availability Controls
Managing the IT Function
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
WJEC GCSE Computer Science
Presentation transcript:

Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002

Computer Based Controls General control - any control that relates to more than one system. Application control - a control that relates to one phase of application processing (input, processing, output).

General Controls 12 controls are discussed on pages

1. Security Plan - What are the threats?

2a. Segregation of Duties - Systems Operations Users submit input Data control groups logs and reviews. Computer operations processes. Data control groups logs output. Users receive output Librarian

2b. Segregation of Duties - Systems Development Users request programming changes. Analysts develop specifications. Programmers make changes and test. Librarian maintains programs

3a. Project Development- Systems Development Long range plan Project development plan Assign responsibility to project manager Performance evaluations Post implementation review

3b. Management of AIS- Systems Operations Data processing schedule System performance measurements

4. Physical Access Controls Goal is to prevent unauthorized people from gaining access Locked rooms Security guards and cameras Identification badges

5. Logical Access Controls Identify who are authorized users. – System must assign “rights” to users. –See access control matrix, p. 294.

I will show you some examples of hacked web sites.

6. Data Storage Controls These controls can be used to protect data in addition to physical and logical access controls: –Properly supervised file library. –Labels. –Concurrent update controls.

6. Data Storage Controls Record locking - prevents two people from accessing a file at the same time. “A” wants to increase the balance by $20. “B” wants to decrease the balance by $50. Customer’s Balance = $100 Read balance - $100 Update - $120 Write balance - $120

6. Data Storage Controls Record locking - prevents two people from accessing a file at the same time. “A” wants to increase the balance by $20. “B” wants to decrease the balance by $50. Customer’s Balance = $100 Read balance - $100 Update - $120Update - $50 Write balance - $120Write balance - $50 Customer’s Balance - $120

6. Data Storage Controls Record locking - prevents two people from accessing a file at the same time. “A” wants to increase the balance by $20. “B” wants to decrease the balance by $50. Customer’s Balance = $100 Read balance - $100 Update - $120Update - $50 Write balance - $120Write balance - $50 Customer’s Balance - $50

7. Data Transmission Controls Purpose is to detect errors in transmission and prevent theft of data during transmission

Preventing Theft of Data Encryption - –scramble plaintext and create cyphertext –transmit cyphertext or save on disk –decrypt cyphertext and return to plaintext Two types of encryption –Secret key –Public key

Rule for Secret Key Encryption MessageKeyCyphertext

Secret Key Encryption Use same key for coding and decoding. Therefore, key must be kept secret. Message Key Cyphertext Key Plaintext

Public Key Encryption Uses two keys. A public key and a private key. Use one key to encrypt. Can only use other key to decrypt.

Securing messages Cyphertext is created using private key. Since senders is only one who has private key, you know who created the message. However, this technique allows anyone to read the message.

Public Key Encryption Message Encrypt with sender's ___________ key. Decrypt with sender's ___________ key. Message

Securing messages Cyphertext is created using public key. This technique assures receiver is only one who can read message. However, this technique does not tell you who was the sender.

Public Key Encryption Message Encrypt with recipient's ___________ key. Decrypt with recipient's ___________ key. Message

What is needed Assurance that message was created by sender. Assurance that message can only be read by recipient.

Digital Signatures Plain text message Encrypt with sender’s private key Encrypt with recipient’s public key Decrypt with recipient’s private key Decrypt with sender’s public key Plain text message

Detecting Transmission Errors Send extra data that can be used to check “message” data Parity checking – add extra bit so that sum of “1” bits is always odd or even A = _ B = _ C = _ D = _ Assume even parity

Message Acknowledgement Add labels & batch numbers to the data Echoing Start Code Address Batch Number Data Parity Check End Code

9. Minimize Downtime Two approaches: Prevent down time with routine checking of hardware. Make system fault tolerant. –Install redundant hardware. If component fails, system switches to new component. –Example: UPS provides power back-up when electricity is lost.

10. Disaster Recovery Plan for duplicating computer operations after a catastrophe occurs. Data and programs recovery: –Create backup copies (data and applications) and store offsite. –Save several generations of master files and transaction files. –Checkpoint.

Backing up Batch Systems Grandfather master file + Transaction file = Father master file + Transaction File = Son master file

Hardware Backup Maintain duplicate hardware facilities in remote location Hot Site - ready to go computer site - brought live in very short time Cold Site - site that can be brought live in reasonable time

11. Personal Computers & Networks

12. Internet Controls

Firewalls Method of controlling access to / from one network to another. How this works? –Only allows messages to & from approved sites. –Allows messages to & from sites not specifically excluded.

Application Controls Input - Processing - Output

Application Controls 4 controls listed in text relate to input: –Batch totals, –Source Data Controls, –Input Validation Routines, –On-line Data Entry Controls.

Application Controls - Input Objectives –Make sure data is successfully transferred from source documents into the system. –Detect obvious errors before the data is processed.

Input Control Example Look at the sales order on page 422. How can input errors occur? What controls can be used to prevent, or detect and correct, these errors?

Application Controls - Processing Goal is to detect errors during processing –Default values –Edit checks

Application Controls - Output Goal is to detect errors in output & deliver output to correct person: –Data control group –End user review –Reconciliation –Check Ids –Passwords

Two broad categories of controls