Chapter 2 Control, Audit and Security of Information System
Chapter 2 Control, Audit and Security of Information System
Integrity
Availability (Recoverability)
Includes Physical Security as well as Logical Security
Necessary tools: policy, awareness, training, education,
technology
Motivation for Security
Systems contain sensitive data about the organization and also
about persons working in the organization
Sensitive data should be protected from spies, thieves or
disgruntled employees.
Thus access should be carefully controlled and provided only on a
need to know basis
When computers are networked corruption may take place due
to viruses
Services may be disrupted due to denial of service attacks
Thus systems should be designed with appropriate security
measures.
CIA Triad
Confidentiality: Making sure that those who should not see
information
Integrity: Making sure that the information hasn’t been changed
from it’s original
Availability: Making sure that the information is available for use
when you need it.
Information can exist in
Printed or written on paper
Stored electronically
Transmitted by post or using electronic means
Shown on corporate videos
Displayed / published on web
Verbal – spoken in conversations
Security breaches leads to…
Reputation loss
Financial loss
Intellectual property loss
Legislative Breaches leading to legal actions (Cyber Law)
Loss of customer confidence
Business interruption costs
Loss of Goodwill
Information Security Components
People : ―Who we are‖: who use or interact with the Information
Process: ―What we do‖: The processes refer to "work practices" or
workflow. Processes are the repeatable steps to accomplish
business objectives.
Technology: ―what we use to improve what we do‖
Network Infrastructure
Application software
Physical Security components
Access devices
Risk, Threat and Vulnerability
Risk: A possibility that a threat exploits a vulnerability in an
asset and causes damage or loss to the asset.
Threat: Something that can potentially cause damage
to the organization, IT Systems or network.
Vulnerability: A weakness in the organization, IT Systems,
or network that can be exploited by a threat.
Relationship between Risk, Threats, and
Vulnerabilities
exploit
Threats Vulnerabilities
PKBob SKBob
Finished
HIDS
run on individual hosts or devices on the network
Ittakes a snapshot of existing system files and matches it to the
previous snapshot. If the critical system files were modified or
deleted, an alert is sent to the administrator to investigate
Digital Certificate:
are a means by which consumers and businesses can utilise the
security applications of Public Key Infrastructure (PKI)
PKI comprises of the technology to enables secure e-commerce and
Internet based communication.
e.g. used in Remittance
Data encryption
privacy control
anti spam and spam filters
Other Security measures for
Enterprise:
Security incident response capability shall be developed to
assist with detection and response to IT related problems.
Regular vulnerability assessments and penetration testing.
Security Trainings and awareness to IT staffs
Employee background check and confidentiality agreements
System hardening
Documented disaster recovery and business continuity plan
Consumer layered Security strategy
Good password management: passwords change, never
reuse, difficult to guess, and contain a long combination
of letters, numbers, and other characters.
Workstations shall either logged off or shut down when
not in use.
Automatic inactivity locking shall be enabled
Confidential data shall only shared with authorized
personnel
Installation of authorized softwares only
Consumer layered Security strategy
Web browser security
Antivirus
Antimalware
Firewall
Backup
Operating system updates
Business intelligence
Business Intelligence is the processes, technologies, and
tools that help us change data into information,
information into knowledge and knowledge into plans
that guide organization
Technologies for gathering, storing, analyzing and
providing access to data to help enterprise users make
better business Decisions
Business intelligence (BI) is a set of theories,
methodologies, architectures, and technologies that
transform raw data into meaningful and useful information
for business purposes.
Why BI?
What happened?
What were our total sales this month?
What’s happening?
Are our sales going up or down, trend analysis
Why?
Why have sales gone down?
What will happen?
Forecasting & What If Analysis
What do I want to happen?
Planning & Targets
Characteristics of BI
Single point of access to information
Timely answers to Business questions
Using BI in all Departments of an organization
Key Stages of BI
Data Sourcing
Data Analysis
Situation Awareness
Risk Analysis
Decision Support
BI Applications and technologies can help
to analyze:
Changing trends in market share
Changes in customer behavior and spending patterns
Customers preferences
Company capabilities
Market conditions
Significance of BI
Companies need to have accurate, up-to-date information on
customer preferences , So that company can quickly adapt to
their changing demands
BI applications can also help managers to be better informed
about actions that a company’s competitors are taking
It help analysts and managers to determine which adjustments are
mostly likely to respond to changing trends
IT can help companies develop a more consistent, data-based
decision, which can produce better results than making business
decisions by ―guesswork‖
Where is Business Intelligence applied?
Types:
Dial up remote access
VPN remote access
Dial-up Remote Access: comprises remote access clients, a remote
access server (RAS), and some telecommunication infrastructure
(typically, an analog phone line). A remote client uses the
telecommunication infrastructure to create a temporary physical or
virtual circuit to a port on the RAS. After the circuit is created, the
connection parameters are set. If RAS and remote access clients are not
located in a local telecommunication boundary, incremental long
distance charges are incurred. Even though it has limited scalability, this
solution is good for corporations that have a low requirement for remote
access.
VPN Remote Access: VPN remote access connection between a user
and the enterprise data center consists of a VPN client, a VPN device or
server, and the Internet. When a client accesses the Internet through a
local ISP, a virtual point-to-point connection is created with a RAS acting
as the VPN server. Once this connection is created, the parameters for
the VPN connection can be set and a VPN tunnel established with the
VPN device or server to access enterprise resources. In this case, the
client is not required to dial long distance
Dial-In Equipment and WAN Infrastructure for PSTN Connections
Remote Access Security: AAA
Authentication:
The process of verification to gain access is called
authentication
May be one factor, two factor, three factor
The user may then be able to execute commands on that server
Authorization
The server uses a process called authorization to determine
which commands and resources should be made available to
that particular user.
Authorization asks the question, "What privileges does this user
have?"
Accounting
Finally,
the number of login attempts, the specific commands
entered, and other system events can be logged and time-
stamped by the accounting process.
Accounting can be used to trace a problem, such as a security
breach, or it may be used to compile usage statistics or billing
data.
Accounting asks the questions, "What did this user do and when
was it done?"
AAA advantages
AAA provides scalability.
Typical AAA configurations rely on a server or group of servers to
store usernames and passwords.
This means that local databases do not have to be built and
updated on every router and access server in the network.
Instead, the routers in the network become clients of these security
servers.
By centralizing the username/password database, AAA makes it
possible to enter, update, and store information in one place.
AAA supports standardized security protocols, specifically TACACS+,
RADIUS, and Kerberos.
TACACS+ (Terminal Access Controller Access-Control System Plus )
A security application used with AAA that provides centralized
validation of users attempting to gain access to a router or network
access server.
is a protocol developed by Cisco
RADIUS (Remote Authentication Dial-In User Service)
A distributed client/server system used with AAA that secures networks
against unauthorized access.
This central server contains all user authentication and network service
access information.
Kerberos
A secret-key network authentication protocol used with AAA that uses the
Data Encryption Standard (DES) cryptographic algorithm for encryption and
authentication.
Content control and policy based encryption
Security
Client security - Techniques and practices that protect user privacy and
integrity of the computing system.
Server security - Protect web server, software and associated hardware from
break-ins, vandalism and DOS attacks.
Communication security - Guarantee protection against eavesdropping and
intentional message modification (tapping, intercepting, diverting)
Security Issues in E Commerce
1. Malicious Code – It includes a variety of threats such as virus, worms,
Trojan horse etc.
2. Unwanted program – programs installed without the users consent.
Browser parasites – Program used to monitor and change settings of a user`s
browser
Adware – Unwanted pop up ads, Spyware – Program used to obtain personal
information
3. Phishing and Identity theft – It refers to any deceptive, online attempt by
a third party to obtain confidential information for a financial gain.
4. Hacking
5. Credit Card Fraud – refers to use of stolen data to establish credit under
false identity.
6. Spoofing – Hackers hide their identity, misrepresent themselves by using
fake email addresses or masquerading as someone else this threatens
integrity and authenticity of the hacked website
7. DOS (Denial of Service) – Hackers flood a website with
useless traffic to overwhelm the network.
8. DDOS (Distributed Denial of Service) – Hackers use numerous
networks from numerous launch points to send useless traffic
to a website. This may cause a complete shutdown making it
impossible for users to access the website.
9. Sniffing – A sniffer is a type of eavesdropping application
that monitors information travelling over the network. It
enables hackers to steal proprietary information from
anywhere on a network including email, files, reports etc.
10. Insider jobs – It involves poorly designed server and client
software and complexity of program which increase
vulnerabilities for hackers to exploit.
Defensive measures against Security Issues in E commerce
1. Use of Secure Socket Layer (SSL)
2. Secure hypertext transfer protocol: is an obsolete alternative to the HTTPS
protocol for encrypting web communications carried over HTTP
3. Encryption
4. Server protection
Access control and authentication, Digital signature from user, Username and
password, Access control list
5. Digital Signature – It is a signature in encrypted electronic code which is
encrypted by the sender with his private key and can be decrypted only with
the public key of the sender (by receiver).
6. Use of Firewalls
7. Client computer protection: Browser protection, Antivirus software, user
awareness, use of updated applications
Audit of Information
System
Overview
• IS Audit Process
• Common IS Audit Observations
• So What Should We Do
Motivations For Audit
◼ Many organizations are now entirely dependent on
computer based information system
▪ These information systems contain financial data and
other critical procedures
▪ It is essential to protect the systems against frauds and
ensure that sound accounting practices are followed
▪ It is necessary to trace the origin and fix responsibilities
when frauds occur
Planning
Follow-up Testing
Reporting
Planning
• Security
• Backup & Recovery
• Resource Management
• Web Site
• Policies/Procedures
Illustration of Test Data
Approach
Computer Operations Auditors
Prepare Test
Transaction
Transactions
Test Data
And Results
Computer
Application
System
Manually
Computer Auditor Compares
Processed
Output Results
Security Testing
Remote Vulnerability Scans
Servers
Routers
Laptops
Security Testing
On-Site, Follow-up Vulnerability Tests
“Critical Data”
Resource Management Testing
Computer Hardware & Software
To Implement Solutions
Reporting
A Final Report is Sent
to
The Board of Directors
Follow-Up
Operating Systems
Applications
Databases
Common Audit Observations