Topic 14 Security and Risk Updated
Topic 14 Security and Risk Updated
Topic 14 Security and Risk Updated
SECURITY GOALS
To retain a competitive advantage and to meet basic business requirements, organisations must endeavour to
achieve the following security goals
1. Confidentiality
Protect information value and preserve the confidentiality of sensitive data. Information should not be
disclosed without authorization. Information the release of which is permitted to a certain section of the
public should be identified and protected against unauthorised disclosure.
2. Integrity
Ensure the accuracy and reliability of the information stored on the computer systems. Information has
integrity if it reflects some real world situation or is consistent with real world situation. Information
should not be altered without authorisation. Hardware designed to perform some functions has lost
integrity if it does not perform those functions correctly. Software has lost integrity if it does not perform
according to its specifications. Communication channels should relay messages in a secure manner to
ensure that integrity. People should ensure the system functions according to the specifications.
3. Availability
Ensure the continued availability of the information system and all its assets to legitimate users at an
acceptable level of service or quality of service. Any event that degrades performance or quality of a
system affects availability
4. Ensure conformity to laws, regulations and standards.
SECURITY POLICY
Security failures can be costly to business. Losses may be suffered as a result of the failure itself or costs can
be incurred when recovering from the incident, followed by more costs to secure systems and prevent further
failure. A well-defined set of security policies and procedures can prevent losses and save money.
The information systems security policy is the responsibility of top management of an organisation who
delegate its implementation to the appropriate level of management with permanent control.
The policy contributes to the protection of information assets.
Its objective is to protect the information capital against all types of risks, accidental or intentional. An
existing and enforced security policy should ensure systems conformity with laws and regulations, integrity
of data, confidentiality and availability.
GENERAL CONTROLS
They apply to all computerized applications and consist of a combination of hardware, software and manual
procedures that creates an overall control environment.
Software controls
They are aimed at minimizing software failure. They are controls that monitor use of software to prevent
unauthorized access to system software, application software and data.
They include
Definition of passwords and data access permissions
Installation of antivirus programs
Hardware controls
They ensure that computer hardware is physically secure and check for equipment malfunctions.
They include
Locking of system units in cabinets to prevent theft of computer parts
Using surge protectors or uninterruptible power supply units (UPS) to protect the hardware from
electrical problems.
Implementation controls
These are controls that monitor the system development process at various stages to ensure that the process is
properly controlled and managed. They are commonly referred to as system development controls
They include:
Ensuring that users are involved in the development and implementation of systems.
Ensuring that systems are properly tested before they are delivered to the users.
Training of users to minimize user errors
Use of quality assurance techniques to ensure that the output is qualitative.
APPLICATION CONTROLS
IT application or program controls are fully automated (i.e., performed automatically by the systems)
designed to ensure the complete and accurate processing of data, from input through output. They are
controls over the input, processing, and output functions
Processing Controls
They establish that the data to be processed is accurate, complete and has value before it can processed.
They include Data validation and data editing controls
Data validation identifies data errors, incomplete or missing data and inconsistencies among related data
items. Validation controls ensure that the data to be processed has value i.e will enable the organization to
achieve its objectives.
Types of validation checks are
Range or limit checks
These checks ensure that the data to be processed is within the pre-defined limits or range
File existence checks
Checks that a file with a specified name exists. This check is essential for programs that use file handling
Format checks
They ensure that the data to be processed is in the appropriate format which may be text, number, date/time,
currency etc.
Consistency checks
Checks fields to ensure data in these fields corresponds, e.g., If Title = "Mr.", then Gender = "M".
Sequence check
The control number follows sequentially and any control number outof sequence or duplicated are rejected or
noted on an exception report for follow-uppurposes. For example, invoices are numbered sequentially. The
day’s invoices beginwith 12001 and end with 15045. If any invoice larger than 15045 is encountered
duringprocessing, that invoice would be rejected as an invalid invoice number.
Duplicate check
New transactions are matched to those previously input to ensurethat they have not already been entered. For
example, a vendor invoice number agreeswith previously recorded invoices to ensure that the current order is
not a duplicate andtherefore, the vendor will not be paid twice.
Output controls
They ensure that the results of processing are accurate, complete and properly distributed.
They include:
1. There should be guidelines on how, where and when to destroy output
2. The output should be clearly labeled with descriptive headings and processing dates.
3. There should be a distribution list to ensure that only those specified will receive the output
4. Those who attempt to access softcopy output should be required key passwords.
COMPUTER CRIME AND ABUSE
Computer Crime
This is the commissioning of illegal acts through the use of a computer system. It may destroy or corrupt
data.
Crime may either be online or offline. Online or cyber-crime/fraud is supported by internet, intranet or
extranet while offline crime involves physical accessibility of data and other resources.
Types of computer crime
Hacking
It involves accessing an organization or individual’s data without permission. Hacking may be online or
offline.
Malicious Software
Cyber criminals use internet based software to transmit computer viruses which destroy or corrupt data.
Sniffing
It is a form of online fraud that involves configuring software to intercept data that is passing from a user to
the computer that is hosting a website.
Spoofing
Spoofers fraudulently misrepresent themselves as other organizations by setting up false websites from
where they can collect information about unsuspecting visitors to the website.
Computer Abuse
This is the commissioning of acts which are not illegal but are unethical using the computer system.
The two most common types of computer abuse are:
Spamming
This is the sending of unsolicited mass e-mail to people who have not requested for the messages.
Jamming
This is the use of software routines to tie up the computer that is hosting the website so that legitimate users
or visitors do not have access to the site.
RISK ASSESSMENT
Risk assessment is the second process in the risk management methodology. Organizations use risk
assessment to determine the extent of the potential threat and the risk associated with an IT system
throughout its SDLC.
The output of this process helps to identify appropriate controls for reducing or eliminating risk during
the risk mitigation process
RISK MITIGATION
Risk mitigation, the third process of risk management, involves prioritizing, evaluating, and
implementing the appropriate risk-reducing controls recommended from the risk assessment process.
NETWORK SECURITY
Communication networks (Wide Area or Local Area Networks) generally include devicesconnected to the
network, and programmes and files supporting the network operations. Controlis accomplished through a
network control terminal and specialised communications software.
The following are controls over the communication network
1. Network control functions should be performed by technically qualified operators.
2. Network control functions should be separated and duties rotated on a regular basis where possible.
3. Network control software must restrict operator access from performing certain functions such as ability
to amend or delete operator activity logs.
4. Network control software should maintain an audit trail of all operator activities.
5. Audit trails should be reviewed periodically by operations management to detect any unauthorised
network operation activities.
6. Network operation standards and protocols should be documented and made available to the operators
and should be reviewed periodically to ensure compliance.
7. Network access by system engineers should be closely monitored and reviewed to direct unauthorised
access to the network.
8. Analysis should be performed to ensure workload balance, fast response time and system efficiency.
9. A terminal identification file should be maintained by the communication software to check the
authentication of a terminal when it tries to send or receive messages.
10. Data encryption should be used where appropriate to protect messages from disclosure during
transmission.
INTERNET THREATS
The very nature of the Internet makes it vulnerable to attack. It was originally designed to allow for the freest
possible exchange of information, data and files. However, today the freedom carries a price. Hackers and
virus-writers try to attack the Internet and computers connected to the Internet and those who want to invade
other’s privacy attempt to crack into databases of sensitive information or snoop on information as it travels
across Internet routes.
It is, therefore, important in this situation to understand the risks and security factors that are needed to
ensure proper controls are in place when a company connects to the Internet.