Chapter 5: Networks, Internet & Ecommerce IT Auditing & Assurance, 2e, Hall & Singleton.

Slides:



Advertisements
Similar presentations
I.S 512 TOPIC 1 – LESSON 2. Types Of Transmission Media PHYSICAL Twisted Pair Cable Shielded twisted-pair (STP ) Unshielded twisted-pair (UTP) Coaxial.
Advertisements

Computer Networking (Appendix C) Objectives
Principles of Information Systems, Sixth Edition Telecommunications and Networks Chapter 6.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Understanding Computers Ch.8
IS Network and Telecommunications Risks
Curtis/Cobham © Pearson Education Limited 2008 Slide 4.1 Chapter 4 Distributed Systems, Networks and the Organization Lecture 1 Distributed systems.
Chapter 6 Telecommunications & Networks.
Networks Adapting Computers to Telecommunications Media.
Communications and Networks
99 CHAPTER COMMUNICATIONS AND NETWORKS. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 9-2 Competencies Discuss connectivity, the wireless.
Telecommunications Chapter 5 Chapter 5 Telecommunications
NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Communications and Networks.
Computer Networks & Security
NETWORKING NETWORKS TELECOMMUNICATIONS Two or more computers communicating Long distance communications.
COMMUNICATIONS AND NETWORKS
Chapter Preview  In this chapter, we will study:  The basic components of a telecomm system  The technologies used in telecomm systems  Various ways.
Chapter 9 Communications and Network Tyler Clutts.
Intro to MIS – MGS351 Network Basics Extended Learning Module E.
Information Technology in Business: Telecommunications, Networks and Internet Basics.
Chapter 5: Networks, Internet & Ecommerce IT Auditing & Assurance, 2e, Hall & Singleton.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 6 Information System Networks and the Internet.
Technology Guide 4 Telecommunication & Internet. Agenda Telecommunication terminology Communication media Network architecture concepts Enterprise networking.
NETWORK.
GRAP 3175 Computer Applications for Drafting Unit VI Data Communication.
Business Telecommunications
Chapter 16 IT Controls Part II: Security and Access
Networks and Networking Chapter 4 Copyright Prentice-Hall, Inc
Chapter 7 Networking: Computer Connections. Networks n Network - a computer system that uses communications equipment to connect two or more computers.
Local Area Network By Bhupendra Ratha, Lecturer
Unit 1—Computer Basics Lesson 7 Networks.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
By. Shafiq Ahmed Chachar Internet Applications Internet Relay Chat Telnet Search Engines E-Commerce File Transfer Protocol (FTP) Popular Uses of.
Extended Learning Module D
Module 2: Information Technology Infrastructure
NETWORKS.
1 California State University, Fullerton Chapter 6 Information System Networks and the Internet.
Technology Strategies for the Hospitality Industry© 2005 Pearson Education, Inc Nyheim, McFadden, & Connolly Upper Saddle River, New Jersey Networks.
Living Online Module Lesson 23 — Networks and Telecommunication
7/12: Ch. 6 Telecommunications Business Value of Telecommunications Trends –Industry –Technology –Application Internet applications Network models –WANs,
Chapter Seven E-Business Risks. E-Business Model Evolution EDI EDI Web pages Web pages The online environment The online environment Distributed e-business.
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
Telecommunications, the Internet, and Wireless Technology.
Chapter 5 Network Computing. Agenda Functions Feasibility Analysis.
Chapter 9 Installing Communication Devices Prepared by: Khurram N. Shamsi.
What is a Network? Living Online Lesson 1 Mrs. Elzey.
© 2003 Prentice Hall, Inc.C-1 Appendix C Computer Networking Information Systems Today Leonard Jessup and Joseph Valacich.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
© Paradigm Publishing Inc. 6-1 Chapter 6 Telecommunications and Networks.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
3/20: Telecommunications & Networking What is telecommunications? The hardware: physical components of telecommunications, inc. channels Standards: agreements.
Principles of Information Systems, Sixth Edition Telecommunications and Networks Chapter 6.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Telecommunications and Networks Chapter 6 Principles and Learning Objectives Effective communication is essential to organizational success. –Define.
COMMUNICATION CONTROL
Data Communication and Networks Chapter 5. What’s a Network? a network consists of two or more computers that are connected together to share information.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1.
Communications and Networks Chapter 9 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
ICT Unit 4: Network and the effects of using them
Networks and Networking
Intro to MIS – MGS351 Network Basics
Chapter 8 Computer Networks.
Communications and Networks Chapter 9 McGraw-Hill/Irwin
Network Basics Extended Learning Module E
Intro To Computer Networks
الفصل الثالث نقل البيانات وشبكات الحاسوب
NETWORK.
Presentation transcript:

Chapter 5: Networks, Internet & Ecommerce IT Auditing & Assurance, 2e, Hall & Singleton

 LAN (Local Area Networks)  WAN (Wide Area Networks  Internet/Internet-Works NETWORKS: TYPES

NETWORKS  Network topology  Star (Figure 5-1, p.194)  Hierarchical (Figure 5-2, p.196)  Ring (Figure 5-3, p.196)  Bus (Figure 5-4, p.197 )  Network architecture  Peer-to-peer architecture  Client/server architecture (Figure 5-5)  Network protocols  Function of protocols

 Network Operating System (NOS)  Polling  Token passing  Carrier sensing  Nodes/terminals  Dumb terminals  Smart terminals  Programmable terminals NETWORKS: COMPONENTS

 Transmission channels / media ( Figure 5-9, p.206)  Synchronous / asynchronous  Simplex / half duplex / full duplex (Figure 5-8, p.205)  Twisted pair (phone line)  Coax cable (cable line)  Fiber optic cable  Six advantages -- p  Microwave  Communication satellites  Wireless NETWORKS: COMPONENTS

 Server / host  Connecting devices  Modem  Digital signal to radio wave signal (figure 5-14, p.211)  Modulation – demodulation (figure 5-15, p.212)  Network Interface Card (NIC)  Network processors  Message switching  PBX  Packet switching NETWORKS: CONNECTING DEVICES

 LAN Linking Devices and Systems  Multiplexer  Hubs  Passive  Manageable  Switched  Routers  Switches  Gateways  Bridges NETWORKS: CONNECTING DEVICES

 Internet  Intranet  Extranet INTERNET

 Inter-company transfers  Processed automatically by IS  Processed in standardized format  Figure 5-19, p.218  Third party (VANs)  Protocols EDI

 Benefits  Reduces data keying  Reduces paper  Reduces postage  Reduces errors  Reduces inventory  REDUCES COSTS  EFT (figure 5-23, p.223)  EDI audit trail EDI

 Electronic commerce  Types  B2C  B2B  C2C  Components  Electronic payment systems  SSL  SET  S-HTTP ELECTRONIC COMMERCE

 Risks  Internal  Accidents / system failures  Ineffective accounting  Malicious activities  Fraud  External  Intruders Hackers Cracker Script kiddies  Viruses  Cyberterrorism / cyber-crime ELECTRONIC COMMERCE

 Controls  Policies and procedures  SDLC techniques  Anti-virus systems  Message sequence numbers  Logs  Monitoring systems CONTROLLING E-COMMERCE

 Access control systems  Call-back systems  Challenge-response systems  Multifaceted password systems  Biometrics  Firewalls  IDS  Misuse detection vs. anomaly detection  Network-based vs. host-based systems  Passive system vs. reactive systems  Controlling DoS attacks CONTROLLING E-COMMERCE

 Verify the security and integrity of transactions  Can detect and correct message loss  Can prevent and detect illegal access, internally and externally  Will render useless any data captured  Verify that backup procedures are sufficient  Determine:  All EDI and electronic transactions are authorized, validated, and compliant with SLA  No unauthorized access to databases  Authorized partners only have access to approved data  Adequate controls are in place to ensure a complete audit trail for electronic transactions AUDIT OBJECTIVES

 Backup control for networks  Transaction validation  Access control:  Tests of validation control  Tests of audit trail controls AUDIT OBJECTIVES

 Select of sample of messages from transaction log and verify their integrity  Review the message transaction logs to verify that all messages were received in proper sequence  Test the operation of features such as call-back  Review security procedures governing data  Verify any encryption process by sending test messages  Review the adequacy of firewalls (see list on page 240) AUDIT PROCEDURES

Chapter 5: Networks, Internet & Ecommerce IT Auditing & Assurance, 2e, Hall & Singleton