1 Chapter Five MANAGING THE IT FUNCTION. 2 Organizing the IT Function Locating the IT Function – to whom should the IT manager? Locating the IT Function.

Slides:



Advertisements
Similar presentations
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Advertisements

Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
9 - 1 Computer-Based Information Systems Control.
Chapter 14 System Controls. A Quote “The factory of the future will have only two employees, a man and a dog. The man will be there to feed the dog. The.
Reliability Week 11 - Lecture 2. What do we mean by reliability? Correctness – system/application does what it has to do correctly. Availability – Be.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
1 Output Controls Ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. Exposures of this sort can cause serious.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Processing Integrity and Availability Controls
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Concepts of Database Management Seventh Edition
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
Session 3 – Information Security Policies
Network security policy: best practices
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Processing Integrity and Availability Controls
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
November 2009 Network Disaster Recovery October 2014.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Discovery Planning steps (1)
ISA Topic 9: Operations Security ISA 562 Internet Security Theory & Practice.
Security Operations. 2 Domain Objectives Protection and Control of Data Processing Resources Media Management Backups and Recovery Change Control Privileged.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Disaster Recovery, Business Continuity, and Organizational Policies.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
Concepts of Database Management Sixth Edition
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2015 Operations Security.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Operations Security Lisa M. True, CISSP January 12, 2004 Domain 7.
David N. Wozei Systems Administrator, IT Auditor.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
Concepts of Database Management Eighth Edition
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
1 Availability Policy (slides from Clement Chen and Craig Lewis)
MANAGING THE IT FUNCTION Chapter Five. Organizing the IT Function The IT Function must be organized and structured. IT Manager must define the role and.
Information Systems Security Operational Control for Information Security.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.
Disaster Recovery and Business Continuity Planning.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Phases of BCP The BCP process can be divided into the following life cycle phases: Creation of a business continuity and disaster recovery policy. Business.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
CHAPTER 2 TYPES OF BUSINESS INFORMATION SYSTEM. INTRODUCTION Information System support business operations by processing data related to business operation.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter Five MANAGING THE IT FUNCTION. Lecture Outline Organizing the IT Function Organizing the IT Function Financing the IT Function Financing the IT.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
UNIT V Security Management of Information Technology.
Information Systems Security
Blackboard Security System
Review of IT General Controls
Managing Multi-User Databases
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Operations Security.
Processing Integrity and Availability Controls
Managing the IT Function
Database Security &Threats
Managing the IT Function
Presentation transcript:

1 Chapter Five MANAGING THE IT FUNCTION

2 Organizing the IT Function Locating the IT Function – to whom should the IT manager? Locating the IT Function – to whom should the IT manager? Stucturing the IT Function - Often determined by cultural, political and economic forces inherent in each organization. Stucturing the IT Function - Often determined by cultural, political and economic forces inherent in each organization.

3 Internal control considerations within an IT function Separate from one another : Separate from one another : –systems development –computer operations –computer security Must vest in different people: Must vest in different people: –Authorizing Transactions –Recording Transactions –Maintaining Custody of Assets

4 Systems Development Staff has access to operating systems, business applications and other key software. Staff has access to operating systems, business applications and other key software. Systems developers are authorized to create and alter software logic, therefore, they should not be allowed to process information Systems developers are authorized to create and alter software logic, therefore, they should not be allowed to process information They should not maintain custody of corporate data and business applications. They should not maintain custody of corporate data and business applications.

5 Computer Operations Operation staff are responsible for: Operation staff are responsible for: –Entering Data (similar to the internal control concept of ‘authorizing transactions’) –Processing information (similar to the internal control concept of ‘recording transactions’) –Disseminating Output (similar to the internal control concept of ‘maintaining custody’) Must segregate duties. Must segregate duties.

6 Computer Security Responsible for the safe-keeping of resources Responsible for the safe-keeping of resources –includes ensuring that business software applications are secure. –responsible for the safety (‘custody’) of corporate information, communication networks and physical facilities Systems analysts and programmers should not have access to the production library. Systems analysts and programmers should not have access to the production library.

7 Funding the IT Function Must be adequately funded to fulfill strategic objectives. Must be adequately funded to fulfill strategic objectives. –Audit risk of under-funding - Heavy workloads can lead to a culture of ‘working around’ the system of internal controls Two funding approaches Two funding approaches –Cost Center –Profit Center »Negative Outcome: IT can build excessive expenses into billing rates until the rates exceed costs of outside providers. »Auditor should confirm that reasonableness check is performed at least annually to ensure that billing rates are not excessive

8 Staffing the IT Function Business and audit risks can be effectively controlled via sound human resource procedures. Business and audit risks can be effectively controlled via sound human resource procedures. Hiring Hiring Recruiting Recruiting Verifying Verifying Testing Testing Interviewing Interviewing Reviewing Reviewing Rewarding Rewarding Evaluating Evaluating Compensating Compensating Promoting Promoting Training Training Terminating Terminating

9 Compensation Issues: Compression and Inversion Compression: The compensation of newly hired employees gets very close to experienced employees in similar positions or the compensation of subordinates is nearly the same as their superiors. Compression: The compensation of newly hired employees gets very close to experienced employees in similar positions or the compensation of subordinates is nearly the same as their superiors. Inversion: The compensation of new hires is greater than more experienced employees in the same position, or the compensation of subordinates exceeds that of superiors. Inversion: The compensation of new hires is greater than more experienced employees in the same position, or the compensation of subordinates exceeds that of superiors.

10Terminating A disgruntled employee can disrupt the company’s systems and controls. A disgruntled employee can disrupt the company’s systems and controls. The IT function needs to design and implement countervailing controls The IT function needs to design and implement countervailing controls –backup procedures –checks-and-balances –cross-training –job rotations –mandated vacations –immediately separate them from the computing environment –terminate all computer privileges

11 Directing the IT Function: Administering the Workflow Effective capacity planning Effective capacity planning Schedule and perform the work Schedule and perform the work –Have enough resources for peaks yet minimize idle time Develop formal workload schedules Develop formal workload schedules Monitor performance Monitor performance Denote actual-to-planned workload variances Denote actual-to-planned workload variances Continually adjust Continually adjust

12 Managing the Computing Environment The IT manager must The IT manager must –Must understand how the infrastructure elements work together. »Computer hardware »Network hardware »Communication systems »Operating systems »Application software and data files –establish policies for acquiring, disposing, and accounting for inventory –track rented equipment and software –comply with licensing agreements

13 Managing the Computing Environment The IT manager must ensure the physical environment is safe for humans and computers with The IT manager must ensure the physical environment is safe for humans and computers with –Fire suppression systems in place –A tested fire evacuation plan –A climate controlled environment –Facilities that are inconspicuous in location and design –Compliance with appropriate safety and health regulations

14 Third Party Services Examples: Examples: –Internet service providers (ISP), ASP, MSP –Communication companies –Security firms –Call centers Policies must be established for purchase, use, and termination of 3 rd party services. Policies must be established for purchase, use, and termination of 3 rd party services. –Must ensure the security and confidentiality of company information. –Must have a plan for disruption of services. –Must have backup and recover plan in place.

15 Assisting Users Training and Education Training and Education Training and Education –Identify training needs. –Design curricula. –Deliver programs. –Use outside training programs. Help Desk Help Desk –design and monitor effective ways to assist users when they request help. –Effective handling of problems and incidences requires a formal set of policies and procedures.

16 Controlling the IT Function The major control categories involved in the IT function are The major control categories involved in the IT function are –Security –Input –Processing –Output –Databases –Backup and recovery (continuity) Each of these categories is intended to minimize business and audit risk via internal controls. Each of these categories is intended to minimize business and audit risk via internal controls.

17 Security Controls Secure the computing infrastructure from internal and external threats. Secure the computing infrastructure from internal and external threats. A compromise of the infrastructure can result in: A compromise of the infrastructure can result in: –business risk »network downtime »database corruption –audit risk »material misstatements in accounts due to incomplete or inaccurate data capturing

18 Physical Security Focuses on keeping facilities, computers, communication equipment and other tangible aspects of the computing infrastructure safe. Focuses on keeping facilities, computers, communication equipment and other tangible aspects of the computing infrastructure safe. Access Restriction Access Restriction –Authorized personnel only, Visitors must be accompnaied by authorized personnel at all times. –Entry Security - Security guards, keys, card readers, etc. Monitoring who is entering, roaming and leaving the facility. Monitoring who is entering, roaming and leaving the facility. –Security guards –Video Cameras –Penetration alarms

19 Security Issue Physical Controls Logical Controls Access Controls Security Guards Locks & Keys Biometric Devices ID and Passwords Authorization Matrix Firewalls & Encryption Monitor Controls Security Guards Video Cameras Penetration Alarms Access logs Supervisory Oversight Penetration alarms Review Controls Formal Reviews Signage Logs Violation Investigations Formal Reviews Activity Logs Violation Investigations Penetrating Tests Unauthorized attempts to enter IT facilities Attempts to break in through vulnerable points As authorized visitor, attempts to leave authorized personnel and wander around the facility without oversight Unauthorized attempts to enter servers and networks Attempts to override access controls (hacking) As authorized user, attempts to use unauthorized applications and view unauthorized information

20 Physical Security Communication & Power Lines Communication & Power Lines Communication & Power Lines –monitor the primary communication and power lines –install secondary (backup) lines in case the primary lines fail. –UPS

21 Logical Security Data and software nature known as ‘logical’ components of the infrastructure: Data and software nature known as ‘logical’ components of the infrastructure: –Corporate data –Computer software »user applications »network management software »communication systems »operating systems

22 Logical Security Points of Entry Computer Terminal Computer Terminal –Supply Authorized ID –Password Network/Internet Network/Internet –Controls need to control external access points –Firewalls –Track failed attempts to enter system

23 Information Controls Controls need to be in place and working effectively to ensure the integrity and accuracy of vital decision-making information. Controls need to be in place and working effectively to ensure the integrity and accuracy of vital decision-making information. –Input –Processing –Output Must Integrate sound backup controls. Must Integrate sound backup controls.

24 Information Controls Input Controls The company must have and follow written procedures regarding the proper authorization, approval and input of accounting transactions. The company must have and follow written procedures regarding the proper authorization, approval and input of accounting transactions. These are incompatible functions. These are incompatible functions. –they should be carefully segregated, to the extent possible, and controlled.

25 Information Controls Input Controls – 3 Scenarios- #1 A customer purchases goods at a store counter. A customer purchases goods at a store counter. –Authorizing the sale A cashier records the sale on the cash register A cashier records the sale on the cash register –Approving the sale, balances the register, logs the logs into the register with ID An accounting clerk later processes cash register sales in batches. An accounting clerk later processes cash register sales in batches. –Inputs sales transactions into accounting system in batches

26 Process Controls Validating Validating Error Handling Error Handling Updating Updating

27 Output controls Only properly authorized parties can request certain output – Only properly authorized parties can request certain output – –computer screens –printed reports Must have record retention and destruction policies per regulatory and company rules. Must have record retention and destruction policies per regulatory and company rules. –Permanent reports must be in secured area. –Temporary reports must by properly destroyed.

28 Output controls Computer Screens Screens need to be physically secure when output is visible. Screens need to be physically secure when output is visible. Output should be removed when user leaves the terminal. Output should be removed when user leaves the terminal. Return to the screen should require a password. Return to the screen should require a password.

29 Database Controls Roll-back and Recovery When there is an interruption, the database management system (DBMS) begins to restore. When there is an interruption, the database management system (DBMS) begins to restore. There are numerous technical processes depending on the DBMS in use. There are numerous technical processes depending on the DBMS in use.

30 Database Controls Concurrency Control Multiple users attempt to read/update the same data item simultaneously Multiple users attempt to read/update the same data item simultaneously A common way to prevent concurrency problems is to lock a database object while it is in use A common way to prevent concurrency problems is to lock a database object while it is in use –Course level – database is locked during updates. –Moderate level – Database locks at tuple (record) level. –Fine level – Database locks at attribute (field) level. –A lower level of granular locking equates to slower computer performance.

31 Continuity Controls Must develop and follow a sound backup strategy to prevent disruption of business activity due. Must develop and follow a sound backup strategy to prevent disruption of business activity due. –Two key considerations: downtime and cost. –Shorter downtime requirements equate to higher backup costs. Backup Types Backup Types –Normal (full), Copy*, –Incremental, Differential*, –Daily*

32 Continuity Controls Backup Controls – Data Backup Fast Company Fast Company –Must be back on computers within hours –Needs daily full backup –Hourly incremental backups Lightening Company Lightening Company –Must be back on computers within minutes –Needs real-time backup –Simultaneouse updating on remote computer

33 Continuity Controls Storage location & hardware redundancy Physical Vaulting One backup on-site, one off-site One backup on-site, one off-site –On site copy is readily accessible if no disaster –Off-site copy retrievable if disaster Electronic Vaulting Send backup data over a communications network (such as the Internet) to an off-site storage medium. Send backup data over a communications network (such as the Internet) to an off-site storage medium. Strategy involves more time and money Strategy involves more time and money

34 Continuity Controls Storage location & hardware redundancy Hardware Backup usually needed for component failures: Hardware Backup usually needed for component failures: –Power supplies –Anything with moving parts There are 3 common configurations for redundant storage devices: There are 3 common configurations for redundant storage devices: –Redundant Array of Independent Disks (RAID) –Network Attached Storage (NAS) –Server Area Network (SAN)

35 Continuity Controls Redundant Array of Independent Disks (RAID) Disk mirroring Disk mirroring –Data is simultaneously written to the primary disk and one or more redundant disks Disk striping Disk striping –An array of at least three, but usually five, disks is established –scheme of parity checks is utilized –if one disk drive in the array fails, the remaining drives can reconstruct the data on the failed drive and continue processing

36 Continuity Controls Network Attached Storage (NAS) Integrates one or more storage devices, (NAS appliances,) into the local area network (LAN). Integrates one or more storage devices, (NAS appliances,) into the local area network (LAN). Comprised of one or more disk drives and an internal controller. Comprised of one or more disk drives and an internal controller. Employs RAID technology to ensure hardware redundancy. Employs RAID technology to ensure hardware redundancy. Can be shared by multiple users on the network. Can be shared by multiple users on the network. Appliances are relatively affordable and scalable Appliances are relatively affordable and scalable

37 User #1 User #2 Printer Scanner Network Attached Storage (NAS)

38 Continuity Controls Server Area Network (SAN) Expands NAS to wide area networks (WAN). Expands NAS to wide area networks (WAN). SAN is a dedicated network. SAN is a dedicated network. SAN can be linked to multiple LANs. SAN can be linked to multiple LANs. Multiple SANs can be simultaneously utilized. Multiple SANs can be simultaneously utilized. SAN can be expensive and technically complicated SAN can be expensive and technically complicated Capable of handling very high volumes Capable of handling very high volumes SAN is a great solution for large companies. SAN is a great solution for large companies. SAN is designed to be very fault tolerant. SAN is designed to be very fault tolerant.

39 Disk Storage Input-Output Controller Disk Storage Disk Storage Disk Storage Wide Area Network

40 Disaster Recovery Controls IT managers and auditors should plan for what, who, when, where, how, which and why. IT managers and auditors should plan for what, who, when, where, how, which and why. –determine what just happened –specify who to contact, in what order, and what they are expected to do –when to enact the remainder of the contingency plan –where to transfer the lost computer processing load

41 Disaster Recovery Controls ( where ) Three Levels: Three Levels: 1.Cold Site: Includes building & basic infrastructure »bring own computing equipment »establish the necessary infrastructure telephone service - Internet connections telephone service - Internet connections specialized computer cooling systems (if needed) specialized computer cooling systems (if needed) unique power requirements unique power requirements 2.Warm Site: provides basic computer needs »Not the computers 3.Hot Site: Ready to Go! »Complete with computers »Operating system

42 Disaster Recovery Controls How is the company going to get the computer hardware, people, software and data to the alternate site? How is the company going to get the computer hardware, people, software and data to the alternate site? Which applications are mission critical? Which applications are mission critical? Why one application or set of applications is more time sensitive than another ? Why one application or set of applications is more time sensitive than another ? All affected parties need to be involved in planning phase. All affected parties need to be involved in planning phase. It must be reviewed and updated on a recurrent basis. It must be reviewed and updated on a recurrent basis.