© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.

Slides:



Advertisements
Similar presentations
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Advertisements

Control and Accounting Information Systems
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Some general principles in computer security Tomasz Bilski Chair of Control, Robotics and Computer Science Poznań University.
HAPTER 7 Information Systems Controls for Systems Reliability
Security Controls – What Works
HAPTER 7 Information Systems Controls for Systems Reliability
Firewall Configuration Strategies
Information Security Policies and Standards
HAPTER 7 Information Systems Controls for Systems Reliability
Chapter 12 Network Security.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
IS Controls – Reliability Part 1
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Accounting Information Systems Chapter Outlines
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Controls for Information Security
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Stephen S. Yau CSE , Fall Security Strategies.
NETWORK SECURITY.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Information Systems Controls for System Reliability -Information Security-
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Introduction to Network Defense
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart1 of 212 C HAPTER 7 Information Systems Controls for Systems.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Chapter 3 Internal Controls.
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Module 14: Configuring Server Security Compliance
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter 6 of the Executive Guide manual Technology.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Security Mark A. Magumba. Definitions Security implies the minimization of threats and vulnerabilities A security threat is a harmful event or object.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Chapter 9: Introduction to Internal Control Systems
Module 11: Designing Security for Network Perimeters.
Database security Diego Abella. Database security Global connection increase database security problems. Database security is the system, processes, and.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
IS3220 Information Technology Infrastructure Security
Information Security tools for records managers Frank Rankin.
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
Unit 2 Personal Cyber Security and Social Engineering Part 2.
100% Exam Passing Guarantee & Money Back Assurance
Internal control objectives
HAPTER 7 Information Systems Controls for Systems Reliability
ISMS Information Security Management System
IS4680 Security Auditing for Compliance
HAPTER 7 Information Systems Controls for Systems Reliability
Presentation transcript:

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems Reliability Part 1: Information Security

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart2 of 222 INTRODUCTION Questions to be addressed in this chapter: –How does security affect systems reliability? –What are the four criteria that can be used to evaluate the effectiveness of an organization’s information security? –What is the time-based model of security and the concept of defense-in-depth? –What types of preventive, detective, and corrective controls are used to provide information security? –How does encryption contribute to security and how do the two basic types of encryption systems work?

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart3 of 222 INTRODUCTION The five basic principles that contribute to systems reliability: –Security –Confidentiality –Online privacy –Processing integrity –Availability SECURITY CONFIDENTIALITY PRIVACY PROCESSING INTEGRITY AVAILABILITY SYSTEMS RELIABILITY

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart4 of 222 C OBI T and Trust Services Control Objectives for Information Technology (C OBI T) Information systems controls required for achieving business and governance objectives Adequate Controls

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart5 of 222 C OBI T and Trust Services C OBI T IT resources: –Applications –Information –Infrastructures –People

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart6 of 222 C OBI T and Trust Services C OBI T information criteria: –Effectiveness –Efficiency –Confidentiality –Integrity –Availability –Compliance –Reliability

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart7 of 222 C OBI T and Trust Services C OBI T domains: –Basic management activities for IT –Help organize 34 generic IT controls

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart8 of 222 C OBI T and Trust Services

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart9 of 222 C OBI T and Trust Services

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart10 of 222 C OBI T and Trust Services

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart11 of 222 C OBI T and Trust Services

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart12 of 222 FUNDAMENTAL INFORMATION SECURITY CONCEPTS There are three fundamental information security concepts that will be discussed in this chapter: –Security as a management issue, not a technology issue. –The time-based model of security. –Defense in depth.

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart13 of 222 SECURITY AS A MANAGEMENT ISSUE Management is responsible for the accuracy of various internal reports and financial statements produced by the organization’s IS. –SOX Section 302 requires that the CEO and CFO certify the accuracy of the financial statements. –SOX Section 404 requires that the annual report include a report on the company’s internal controls. Within this report, management acknowledges their responsibility for designing and maintaining internal controls and assessing their effectiveness. –Security is a key component of the internal control and systems reliability to which management must attest. –As identified in the COSO model, management’s philosophy and operating style are critical to an effective control environment.

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart14 of 222 SECURITY AS A MANAGEMENT ISSUE The Trust Services framework identifies four essential criteria for successfully implementing the five principles of systems reliability: –Develop and document policies. –Effectively communicate those policies to all authorized users. –Design and employ appropriate control procedures to implement those policies. –Monitor the system, and take corrective action to maintain compliance with the policies. Top management involvement and support is necessary to satisfy each of the preceding criteria.

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart15 of 222 TIME-BASED MODEL OF SECURITY The time-based model evaluates the effectiveness of an organization’s security by measuring and comparing the relationship among three variables: –P = Time it takes an attacker to break through the organization’s preventive controls. –D = Time it takes to detect that an attack is in progress. –C = Time to respond to the attack. These three variables are evaluated as follows: –If P > (D + C), then security procedures are effective. –Otherwise, security is ineffective.

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart16 of 222 DEFENSE IN DEPTH  Major types of preventive controls used for defense in depth include: –Authentication controls (passwords, tokens, biometrics, MAC addresses) –Authorization controls (access control matrices and compatibility tests) –Training –Physical access controls (locks, guards, biometric devices) –Remote access controls (IP packet filtering by border routers and firewalls using access control lists; intrusion prevention systems; authentication of dial-in users; wireless access controls) –Host and application hardening procedures (firewalls, anti-virus software, disabling of unnecessary features, user account management, software design, e.g., to prevent buffer overflows) –Encryption

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart17 of 222 DEFENSE IN DEPTH Detective controls include: –Log analysis –Intrusion detection systems –Managerial reports –Security testing (vulnerability scanners, penetration tests, war dialing)

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart18 of 222 DEFENSE IN DEPTH Corrective controls include: –Computer emergency response teams –Chief Security Officer (CSO) –Patch Management

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart19 of 222 PREVENTIVE CONTROLS Who has the authority to delete Program 2?

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart20 of 222 PREVENTIVE CONTROLS  These are the multiple layers of preventive controls that reflect the defense-in-depth approach to satisfying the constraints of the time-based model of security.

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart21 of 222 PREVENTIVE CONTROLS Perimeter Defense: Routers, Firewalls, and Intrusion Prevention Systems –This figure shows the relationship between an organization’s information system and the Internet. –A device called a border router connects an organization’s information system to the Internet.

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart22 of 222 PREVENTIVE CONTROLS This is a contract for... Encryption algorithm Xb&j &m 2 ep0%fg... Decryption algorithm This is a contract for... Plaintext Plain- text Cipher- text Key Encryption is the process of transforming normal text, called plaintext, into unreadable gibberish, called ciphertext. Decryption reverses this process. To encrypt or decrypt, both a key and an algorithm are needed. + + Key