AIS Chapter 5 Information Systems Controls For Systems Reliability
AIS Chapter 5 Information Systems Controls For Systems Reliability
AIS Chapter 5 Information Systems Controls For Systems Reliability
1
INTRODUCTION
Questions to be addressed in this chapter:
How does security affect systems reliability?
What are the four criteria that can be used to evaluate
the effectiveness of an organization’s information
security?
What is the time-based model of security and the
concept of defense-in-depth?
What types of preventive, detective, and corrective
controls are used to provide information security?
How does encryption contribute to security and how do
the two basic types of encryption systems work?
2
INTRODUCTION
One basic function of an AIS is to provide
information useful for decision making. In
order to be useful, the information must be
reliable, which means:
It provides an accurate, complete, and
timely picture of the organization’s
activities.
It is available when needed.
The information and the system that
produces it is protected from loss,
compromise, and theft.
3
INTRODUCTION
The five basic principles that
SYSTEMS contribute to systems
RELIABILITY reliability:
Security
PROCESSING INTEGRITY
Confidentiality
CONFIDENTIALITY
Online privacy
AVAILABILITY
Processing integrity
Availability
PRIVACY
SECURITY
4
INTRODUCTION
Note the importance of
SYSTEMS security in this picture. It is
RELIABILITY the foundation of systems
reliability. Security
PROCESSING INTEGRITY
procedures:
Restrict system access to only
CONFIDENTIALITY
5
INTRODUCTION
Security procedures also:
SYSTEMS Provide for processing
RELIABILITY
integrity by preventing:
Submission of unauthorized or
PROCESSING INTEGRITY
fictitious transactions.
Unauthorized changes to stored
CONFIDENTIALITY
data or programs.
AVAILABILITY
6
INTRODUCTION
The press carries many stories about information
security incidents including:
Denial of service attacks
Fraud
Loss of trade secrets
Identity theft
Accountants and IS professionals need to understand
basic principles of information security in order to
protect their organizations and themselves.
7
COBIT and Trust Services
Control Objectives for
Information
Technology (COBIT)
Information systems Adequate Controls
controls required for
achieving business and
governance objectives
COBIT and Trust Services
COBIT IT resources:
Applications
Information
Infrastructures
People
COBIT information criteria:
Effectiveness
Efficiency
Confidentiality
Integrity
Availability
Compliance
Reliability
9
FUNDAMENTAL INFORMATION SECURITY CONCEPTS
There are three fundamental information security
concepts that will be discussed in this part:
Security as a management issue, not a technology issue.
The time-based model of security.
Defense in depth.
1. Security as a management issue, not a technology
issue
Though information security is a complex technical
subject, security is first and foremost a top management
issue, not an IT issue.
10
1. SECURITY AS A MANAGEMENT ISSUE……..
SOX Section 302 requires that the CEO and CFO
certify the accuracy of the financial statements.
SOX Section 404 requires that the annual report
include a report on the company’s internal controls.
Within this report, management acknowledges their
responsibility for designing and maintaining internal
controls and assessing their effectiveness.
Security is a key component of the internal control
and systems reliability to which management must
attest.
As identified in the COSO model, management’s
philosophy and operating style are critical to an
effective control environment.
11
SECURITY AS A MANAGEMENT ISSUE
The Trust Services framework identifies four
essential criteria for successfully implementing the
five principles of systems reliability:
Develop and document policies.
Effectively communicate those policies to all
authorized users.
Design and employ appropriate control
procedures to implement those policies.
Monitor the system, and take corrective action
to maintain compliance with the policies.
Top management involvement and support is
necessary to satisfy each of the preceding criteria.
12
2. TIME-BASED MODEL OF SECURITY
Given enough time and resources, any
preventive control can be circumvented.
Consequently, effective control requires
supplementing preventive procedures with:
Methods for detecting incidents; and
Procedures for taking corrective remedial
action.
Detection and correction must be timely,
especially for information security,
because once preventive controls have been
breached, it takes little time to destroy,
compromise, or steal the organization’s
economic and information resources.
13
TIME-BASED MODEL OF SECURITY
The time-based model of security focuses on
implementing a set of preventive, detective, and
corrective controls,
That enable an organization to recognize that an
attack is occurring and take steps to thwart it before
any assets have been compromised.
All three types of controls are necessary:
Preventive
Detective
Corrective
14
3. DEFENSE IN DEPTH
The idea of defense-in-depth is to employ multiple
layers of controls to avoid having a single point of
failure.
If one layer fails, another may function as planned.
Information security involves using a combination of
firewalls, passwords, and other preventive procedures
to restrict access.
Redundancy also applies to detective and corrective
controls.
15
DEFENSE IN DEPTH
Major types of preventive controls used for defense in depth
include:
Authentication controls (passwords, tokens, biometrics,
MAC addresses)
Authorization controls (access control matrices and
compatibility tests)
Training
Physical access controls (locks, guards, biometric devices)
Remote access controls (IP packet filtering by border
routers and firewalls using access control lists; intrusion
prevention systems; authentication of dial-in users;
wireless access controls)
Host and application hardening procedures (firewalls,
anti-virus software, disabling of unnecessary features,
user account management, software design, e.g., to
prevent buffer overflows)
Encryption
16
DEFENSE IN DEPTH
Detective controls include:
Log analysis
Intrusion detection systems
Managerial reports
Security testing (vulnerability scanners, penetration tests,
war dialing)
Corrective controls include:
Computer emergency response teams
Chief Security Officer (CSO)
Patch Management
17
PREVENTIVE CONTROLS
These are the
multiple layers of
preventive
controls that
reflect the
defense-in-depth
approach to
satisfying the
constraints of the
time-based model
of security.
18
PREVENTIVE CONTROLS
Controlling
Remote Access
The third layer
of defense is
control of
remote access.
19
PREVENTIVE CONTROLS
Perimeter Defense:
Routers, Firewalls,
and Intrusion
Prevention Systems
This figure shows
the relationship
between an
organization’s
information
system and the
Internet.
A device called a
border router
connects an
organization’s
information
system to the
Internet.
20
PREVENTIVE CONTROLS
Behind the
border router is
the main firewall,
either a special-
purpose hardware
device or software
running on a
general purpose
computer.
21
PREVENTIVE CONTROLS
Another dimension
of the defense-in-
depth concept is
the use of a number
of internal firewalls
to segment
different
departments within
the organization.
22
Plaintext
This is a Key
contract + PREVENTIVE
for . . .
CONTROLS
Encryption is the
Encryption process of transforming
algorithm
normal text, called
plaintext, into
Cipher-
Key
Xb&j &m 2
+ unreadable gibberish,
text ep0%fg . . .
called ciphertext.
Decryption reverses this
Decryption
process.
algorithm To encrypt or decrypt,
both a key and an
Plain- This is a algorithm are needed.
text contract for
...
23
24
Questions to be addressed in this part include:
What controls are used to protect the confidentiality of
sensitive information?
What controls are designed to protect privacy of customers’
personal information?
What controls ensure processing integrity?
How are information systems changes controlled to ensure
that the new system satisfies all five principles of systems
reliability?
25
CONFIDENTIALITY
Reliable systems maintain the
SYSTEMS confidentiality of sensitive
RELIABILITYPROCESSING INTEGRITY
information.
CONFIDENTIALITY
AVAILABILITY
PRIVACY
SECURITY
26
CONFIDENTIALITY
Maintaining confidentiality requires that
management identify which information is
sensitive.
Each organization will develop its own definitions
of what information needs to be protected.
Most definitions will include:
Business plans
Pricing strategies
Client and customer lists
Legal documents
27
CONFIDENTIALITY
Encryption is a fundamental control procedure for
protecting the confidentiality of sensitive information.
Confidential information should be encrypted:
While stored
Whenever transmitted
The Internet provides inexpensive transmission, but
data is easily intercepted.
Encryption solves the interception issue.
If data is encrypted before sending it, a virtual private
network (VPN) is created.
Provides the functionality of a privately owned network
But uses the Internet
28
CONFIDENTIALITY
Use of VPN software creates private
communication channels, often referred to as
tunnels.
The tunnels are accessible only to parties who have the
appropriate encryption and decryption keys.
Cost of the VPN software is much less than costs of
leasing or buying a privately-owned, secure
communications network.
Also, makes it much easier to add or remove sites from
the “network.”
29
PRIVACY
In the Trust Services
framework, the privacy
SYSTEMS
RELIABILITY
principle is closely related to
the confidentiality principle.
PROCESSING INTEGRITY
30
PRIVACY
COBIT section DS 11 addresses the management of
data and specifies the need to comply with
regulatory requirements.
A number of regulations, including the Health
Insurance Portability and Accountability Act
(HIPAA) and the Financial Services Modernization
Act (aka, Gramm-Leach-Billey Act) require
organizations to protect the privacy of customer
information.
31
PRIVACY
The Trust Services privacy framework of the AICPA and CICA
lists ten internationally recognized best practices for protecting
the privacy of customers’ personal information:
Management
Notice
Choice and consent
Collection
Use and retention
Access
Disclosure to Third Parties
Security
Quality
Monitoring and enforcement
32
PROCESSING INTEGRITY
COBIT control objective DS
SYSTEMS 11.1 addresses the need for
RELIABILITY
controls over the input,
PROCESSING INTEGRITY
AVAILABILITY
data.
PRIVACY
File labels
Write-protection mechanisms
35
PROCESSING INTEGRITY
Output Controls
Careful checking of system output
provides additional control over
processing integrity.
Output controls include:
User review of output
Reconciliation procedures
External data reconciliation
36
AVAILABILITY
Reliable systems are available for
SYSTEMS use whenever needed.
RELIABILITY Threats to system availability
originate from many sources,
PROCESSING INTEGRITY
including:
CONFIDENTIALITY
AVAILABILITY
Hardware and software failures
PRIVACY
SECURITY
37
AVAILABILITY
Minimizing Risk of System Downtime
Loss of system availability can cause significant financial
losses, especially if the system affected is essential to e-
commerce.
Organizations can take a variety of steps to minimize the
risk of system downtime.
Physical and logical access controls can reduce the risk of
successful denial-of-service attacks.
Good information security reduces risk of theft or sabotage of
IS resources.
38
AVAILABILITY
Disaster Recovery and Business Continuity
Planning
Disaster recovery and business continuity
plans are essential if an organization hopes
to survive a major catastrophe.
Being without an IS for even a short period of
time can be quite costly—some report as
high as half a million dollars per hour.
Yet many large U.S. companies do not have
adequate disaster recovery and business
continuity plans.
39
AVAILABILITY
Key components of effective disaster
recovery and business continuity plans
include:
Data backup procedures
Provisions for access to replacement
infrastructure (equipment, facilities,
phone lines, etc.)
Thorough documentation
Periodic testing
Adequate insurance
40
…………..END of Chapter 5…………..
41