Information System Audit : © South-Asian Management Technologies Foundation Chapter 10 Case Study: Conducting an Information Systems Audit.

Slides:



Advertisements
Similar presentations
Crime and Security in the Networked Economy Part 4.
Advertisements

Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Firewalls : usage Data encryption Access control : usage restriction on some protocols/ports/services Authentication : only authorized users and hosts.
MyFloridaMarketPlace Roundtable Technical/Networking Presentation March 19, :00 a.m. – noon.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Chapter 13 Securing Windows Server 2008
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Controlling access with packet filters and firewalls.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Factors to be taken into account when designing ICT Security Policies
Chapter 19 Security.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Security Guide for Interconnecting Information Technology Systems
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Campus Firewalling Dearbhla O’Reilly Network Manager Dublin Institute of Technology.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Overview of Systems Audit
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Operations Security Lisa M. True, CISSP January 12, 2004 Domain 7.
Supervisory Control and Data Acquisition (SCADA) Software.
Troubleshooting Windows Vista Security Chapter 4.
Module 14: Configuring Server Security Compliance
Module 7: Fundamentals of Administering Windows Server 2008.
Chapter 6 of the Executive Guide manual Technology.
Today’s Lecture Covers < Chapter 6 - IS Security
Module 11: Remote Access Fundamentals
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Note1 (Admi1) Overview of administering security.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Chapter 2 Securing Network Server and User Workstations.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Module 11: Designing Security for Network Perimeters.
Network Security & Accounting
+ Security Concerns Chapter Security types Physical security Access security Database security.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Module 3: Planning Administrative Access. Overview Determining the Appropriate Administrative Model Designing Administrative Group Strategies Planning.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Local issues Auditing Log Review Physical protection Disaster Recovery Backup Schedules Off-site storage SECURITY.
Chapter 8 Auditing in an E-commerce Environment
ITACS L.L.P. Policy And Procedures Group 1. Objective: To establish companywide policy with regards to personal device usage both on and off of the company.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Integrating the Healthcare Enterprise The Integration Profiles: Basic Security Profile.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Review of IT General Controls
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 7: Identifying Advanced Attacks
Configuring and Troubleshooting Routing and Remote Access
The Impact of Information Technology on the Audit Process
Computer-Based Processing: Developing an Audit Assessment Approach
The Impact of Information Technology on the Audit Process
Chapter 27: System Security
IS4680 Security Auditing for Compliance
السلوك التنظيمى المعاصر
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Information System Audit : © South-Asian Management Technologies Foundation Chapter 10 Case Study: Conducting an Information Systems Audit

Information System Audit : © South-Asian Management Technologies Foundation Important Security Issues in Bank User Access Management User Registration Authentication of Users Password Management System Limiting Sign-on Attempts Unattended Terminals Information Access Restriction

Information System Audit : © South-Asian Management Technologies Foundation Important Security Issues in Bank Use of System Utilities Limitation of Connection Time Warning External Users Audit Trails Fault Logging Logging and Reviewing of Events

Information System Audit : © South-Asian Management Technologies Foundation Steps of Information Systems Audit at a Bank Branch Commencement of audit Review of start-up operations General overview Overview of records Physical environment Hardware audit Software audit

Information System Audit : © South-Asian Management Technologies Foundation Steps of Information Systems Audit at a Bank Branch Network and communication audit Personnel awareness Password maintenance Logical environment Access to server Repair and maintenance Unauthorized programs and folders

Information System Audit : © South-Asian Management Technologies Foundation Steps of Information Systems Audit at a Bank Branch Day-end reports Backup Contingency plan

Information System Audit : © South-Asian Management Technologies Foundation Special Considerations in Core Banking Systems Migration controls Day-end controls –Exception report –List of users –Access log –List of rejected and cancelled entries Control over Periodical/Mass-Runs (System Generated Transactions) Control over Inter-SOL Transactions

Information System Audit : © South-Asian Management Technologies Foundation Special Considerations in Core Banking Systems Control over Proxy/Parking Transactions –System generated –User generated Mapping of Accounts Application Control Review –User profile maintenance –User-id maintenance –Password management

Information System Audit : © South-Asian Management Technologies Foundation Special Considerations in Core Banking Systems –Log-on attempts –Access logs and reviews –Virus detection and protection –Module interfacing Database and System Administration –Database administrator and system administrator –Segregation of duties –Access to super-user accounts

Information System Audit : © South-Asian Management Technologies Foundation Special Considerations in Core Banking Systems –Usage of passwords –Change in privilege levels –Problem management –Change management –Access to database logs –Encryption of data VPN level Storage level –Test of backup and periodic recovery

Information System Audit : © South-Asian Management Technologies Foundation Special Considerations in Core Banking Systems Firewalls –Bandwidth level estimation –Location of firewalls –Presence of proxy server –Restriction of network services –Port restrictions –Internet connection –Domain name system –IP address

Information System Audit : © South-Asian Management Technologies Foundation Special Considerations in Core Banking Systems –Router password management –Logging and review of logs –Demilitarized zone –Updating of patches for the firewall –Firewall operation in backup site Help Desk Information Security

Information System Audit : © South-Asian Management Technologies Foundation Special Considerations in Core Banking Systems Logs of Activity –Operating system logs –Firewall logs –Application system logs –SQL logs –ATM terminal access ID and log Departure from Normal Patterns Management Practices Operational Activities