Learning Objectives Demonstrate why info systems are vulnerable to destruction, error, abuse, quality control problemsDemonstrate why info systems are.

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
14.1 © 2004 by Prentice Hall INFORMATIONSYSTEMS SECURITY AND CONTROL.
Crime and Security in the Networked Economy Part 4.
Auditing Computer-Based Information Systems
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
Managing Information Systems Information Systems Security and Control Part 1 Dr. Stephania Loizidou Himona ACSC 345.
Lecture 1: Overview modified from slides of Lawrie Brown.
LEARNING OBJECTIVES DEMONSTRATE WHY INFO SYSTEMS ARE VULNERABLE TO DESTRUCTION, ERROR, ABUSE, QUALITY CONTROL PROBLEMSDEMONSTRATE WHY INFO.
4/15: Security & Controls in IS Systems Vulnerabilities Controls: what to use to guard against vulnerabilities –General controls –Application controls.
Chapter 17 Controls and Security Measures
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
IS Security Control & Management. Overview n Why worry? n Sources, frequency and severity of problems n Risks to computerized vs. manual systems n Purpose.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey.
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
14.1 © 2002 by Prentice Hall c h a p t e r 14 INFORMATION SYSTEMS SECURITY & CONTROL.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
11.1 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality,
Storage Security and Management: Security Framework
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
14. CONTROLLING INFORMATION SYSTEMS 14. CONTROLLING INFORMATION SYSTEMS 14.1.
Overview of Systems Audit
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
1 I.Assets and Treats Information System Assets That Must Be Protected People People Hardware Hardware Software Software Operating systems Operating systems.
Chapter 13 Processing Controls. Operating System Integrity Operating system -- the set of programs implemented in software/hardware that permits sharing.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
David N. Wozei Systems Administrator, IT Auditor.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
C8- Securing Information Systems
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
11.1 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality,
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Information Systems Security Operational Control for Information Security.
Information Systems Security Operations Security Domain #9.
S4: Understanding the IT environment of the entity.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
SESSION 14 INFORMATION SYSTEMS SECURITY AND CONTROL.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
The Importance of Proper Controls. 5 Network Controls Developing a secure network means developing mechanisms that reduce or eliminate the threats.
Information Systems Security and Control Chapter 14.
CONTROLLING INFORMATION SYSTEMS
Storage, Communication & Disposal of data & information Threats to data & Information Deliberate, accidental & technical failure.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Information Systems Security
INFORMATION SYSTEMS SECURITY AND CONTROL.
Errors, Fraud, Risk Management, and Internal Controls
INFORMATION SYSTEMS SECURITY & CONTROL
APPLICATION RISK AND CONTROLS
Computer-Based Processing: Developing an Audit Assessment Approach
INFORMATION SYSTEMS SECURITY and CONTROL
Information Systems Security and Control
Presentation transcript:

Learning Objectives Demonstrate why info systems are vulnerable to destruction, error, abuse, quality control problemsDemonstrate why info systems are vulnerable to destruction, error, abuse, quality control problems vulnerable Compare general and application controlsCompare general and application controls Select factors for developing controlsSelect factors for developing controls*

Learning Objectives Describe important software quality- assurance techniquesDescribe important software quality- assurance techniques Demonstrate importance of auditing info systems & safeguarding data qualityDemonstrate importance of auditing info systems & safeguarding data quality*

System Vulnerability & Abuse Why systems are vulnerableWhy systems are vulnerable Hackers & virusesHackers & viruses Concerns for builders & usersConcerns for builders & users System quality problemsSystem quality problems*

Threats to Information Systems Hardware failure, fireHardware failure, fire Software failure, electrical problemsSoftware failure, electrical problems Personnel actions, user errorsPersonnel actions, user errors Access penetration, program changesAccess penetration, program changes Theft of data, services, equipmentTheft of data, services, equipment Telecommunications problemsTelecommunications problems*

System Vulnerability System complexitySystem complexity Computerized procedures not always read or auditedComputerized procedures not always read or audited Extensive effect of disasterExtensive effect of disaster Unauthorized access possibleUnauthorized access possible*

Vulnerabilities RADIATION: Allows recorders, bugs to tap systemRADIATION: Allows recorders, bugs to tap system CROSSTALK: Can garble dataCROSSTALK: Can garble data HARDWARE: Improper connections, failure of protection circuitsHARDWARE: Improper connections, failure of protection circuits SOFTWARE: Failure of protection features, access control, bounds controlSOFTWARE: Failure of protection features, access control, bounds control FILES: Subject to theft, copying, unauthorized accessFILES: Subject to theft, copying, unauthorized access*

VULNERABILITIES USER: Identification, authentication, subtle software modificationUSER: Identification, authentication, subtle software modification PROGRAMMER: Disables protective features; reveals protective measuresPROGRAMMER: Disables protective features; reveals protective measures MAINTENANCE STAFF: Disables hardware devices; uses stand-alone utilitiesMAINTENANCE STAFF: Disables hardware devices; uses stand-alone utilities OPERATOR: Doesn’t Notify supervisor, reveals protective measuresOPERATOR: Doesn’t Notify supervisor, reveals protective measures*

HACKER: Person gains access to computer for profit, criminal mischief, personal pleasureHACKER: Person gains access to computer for profit, criminal mischief, personal pleasure COMPUTER VIRUS: Rouge program; difficult to detect; spreads rapidly; destroys data; disrupts processing & memoryCOMPUTER VIRUS: Rouge program; difficult to detect; spreads rapidly; destroys data; disrupts processing & memory* HACKERS & COMPUTER VIRUSES

Antivirus Software Software to detectSoftware to detect Eliminate virusesEliminate viruses Advanced versions run in memory to protect processing, guard against viruses on disks, and on incoming network filesAdvanced versions run in memory to protect processing, guard against viruses on disks, and on incoming network files*

Concerns For Builders & Users DisasterDisaster Breach of securityBreach of security ErrorsErrors*

Disaster Loss of hardware, software, data by fire, power failure, flood or other calamityLoss of hardware, software, data by fire, power failure, flood or other calamity Fault-tolerant computer systems: backup systems to prevent system failure (particularly on-line transaction processing)Fault-tolerant computer systems: backup systems to prevent system failure (particularly on-line transaction processing)*

Security Policies, procedures, technical measures to prevent unauthorized access, alteration, theft, physical damage to information systems *

System Quality Problems Software & data Bugs: program code defects or errorsBugs: program code defects or errors Maintenance: modifying a system in production use; Can take up to 85% of analysts’ timeMaintenance: modifying a system in production use; Can take up to 85% of analysts’ time Data quality problems: finding, correcting errors; costly; tedious (do it right the first time!)Data quality problems: finding, correcting errors; costly; tedious (do it right the first time!)*

Cost Of Errors During Systems Development Cycle COSTS ProgrammingConversionPOST-Implementation Analysis Analysis & design

Creating A Control Environment Controls: methods, policies, procedures to protect assets; Accuracy & reliability of records; Adherence to management standards Controls: methods, policies, procedures to protect assets; Accuracy & reliability of records; Adherence to management standards GeneralGeneral ApplicationApplication*

General Controls Implementation: audit system development to assure proper control, managementImplementation: audit system development to assure proper control, management Software: ensure security, reliability of softwareSoftware: ensure security, reliability of software Program security: prevent unauthorized changes to programsProgram security: prevent unauthorized changes to programs Hardware: ensure physical security, performance of computer hardwareHardware: ensure physical security, performance of computer hardware*

Computer operations: ensure procedures consistently, correctly applied to data storage, processingComputer operations: ensure procedures consistently, correctly applied to data storage, processing Data security: ensure data disks, tapes protected from wrongful access, change, destructionData security: ensure data disks, tapes protected from wrongful access, change, destruction Administrative: ensure controls properly executed, enforcedAdministrative: ensure controls properly executed, enforced Segregation of functions: divide tasks to minimize risksSegregation of functions: divide tasks to minimize risks* General controls

Application Controls InputInput ProcessingProcessing OutputOutput*

Input Controls Input authorization: record, monitor source documentsInput authorization: record, monitor source documents Data conversion: transcribe data properly from one form to anotherData conversion: transcribe data properly from one form to another Batch control totals: count transactions prior to and after processingBatch control totals: count transactions prior to and after processing Edit checks: verify input data, correct errorsEdit checks: verify input data, correct errors*

Developing A Control Structure Costs: Can be expensive to build; complicated to useCosts: Can be expensive to build; complicated to use Benefits: Reduces expensive errors, loss of time, resources, good willBenefits: Reduces expensive errors, loss of time, resources, good will Risk assessment: Determine frequency of occurrence of problem, cost, damage if it were to occurRisk assessment: Determine frequency of occurrence of problem, cost, damage if it were to occur*