Module7_GenCon_Network
Module7_GenCon_Network
Networks
Network-level firewall
Application-level firewall
Smurf Attack
Sender
Receiver
Private Key Encryption
Sender
Receiver
Public Key Encryption
• Public key encryption uses two different keys: one for encoding messages and the other
for decoding them.
• Users never need to share their private keys to decrypt messages, thus reducing the
likelihood that they fall into the hands of a criminal.
Public Key Encryption
• RSA (Rivest-Shamir-Adleman) This method is computationally intensive and much slower than
standard DES encryption.
• Sometimes, both DES and RSA are used together in what is called a digital envelope.
• The DES private key needed to decrypt the message is encrypted using RSA and transmitted along
with the message. The receiver first decodes the DES key, which is then used to decode the
message.
Digital Message Security Feature
A sequence number All incoming and A control message Requires the dial-in
is inserted in each outgoing messages, as from the sender and a user to enter a
message, and any well as failed access, response from the password and be
such attempt to should be recorded in receiver are sent at identified. The system
delete, change a message transaction periodic, synchronized then breaks the
order or duplicate a log. intervals. connection to perform
message will user authentication.
become apparent at The log should record The message timing
the receiving end. the user ID, the time of should follow a random Call-back device dials
access, and the pattern that will be the caller’s number to
terminal location or difficult for the intruder establish a new
telephone number. to determine and connection when the
circumvent. caller is authorized.
Audit Objectives Relating to Subversive Threats
The auditor’s objective is to verify the security and integrity of financial transactions by determining that
network controls:
a) can prevent and detect illegal access both internally and from the Internet.
c) are sufficient to preserve the integrity and physical security of data connected to the network.
Audit Procedures Relating to Subversive Threats
1) Review the adequacy of the firewall in achieving the proper balance between control and convenience
based on the organization’s business objectives and potential risks. Criteria: flexibility, proxy services,
filtering, segregation of systems, audit tools, probe for weaknesses.
2) Verify that an Intrusion Prevention Systems (IPS) with deep packet inspection (DPI) is in place for
organizations that are vulnerable to DDos attacks, such as financial institutions.
3) Review security procedures governing the administration of data encryption keys.
4) Verify the encryption process by transmitting a test message and examining the contents at various points
along the channel between the sending and receiving locations.
5) Review the message transaction logs to verify that all messages were received in their proper sequence.
6) Test the operation of the call-back feature by placing an unauthorized call from outside the installation.
CONTROLLING RISKS FROM
EQUIPMENT FAILURE
CONTROLLING RISKS FROM EQUIPMENT FAILURE
Line Errors
• The most common problem in data communications is data loss due to line error.
• The bit structure of the message can be corrupted through noise on the communications lines.
• Noise is made up of random signals that can interfere with the message signal when they reach a
certain level.
• Electric motors, atmospheric conditions, faulty wiring, defective components in equipment, or noise
spilling over from an adjacent communications channel may cause these random signals.
CONTROLLING RISKS FROM EQUIPMENT FAILURE
ECHO CHECK
• The echo check involves the receiver of the message returning the message to the sender.
• The sender compares the returned message with a stored copy of the original.
• If there is a discrepancy between the returned message and the original, suggesting a transmission
error, the message is retransmitted
CONTROLLING RISKS FROM EQUIPMENT FAILURE
PARITY CHECK.
• The parity check incorporates an extra bit (the parity bit) into the structure of a bit string when it is
created or transmitted.
• If the number is even, the system assigns the parity bit a value of one.
• If the number of 1 bits is odd, a zero parity bit is added to the bit structure.
CONTROLLING RISKS FROM EQUIPMENT FAILURE
Audit Objectives & Procedures Relating to Equipment Failure
Audit Objective:
Verify the integrity of the electronic commerce transactions by determining that controls are in
place to detect and correct message loss due to equipment failure.
Audit Procedures:
The auditor can select a sample of messages from the transaction log and examine them for
garbled contents that line noise causes.
The auditor should verify that all corrupted messages were successfully retransmitted.
ELECTRONIC DATA
INTERCHANGE CONTROLS
Electronic Data Interchange
b) Before being converted, the translation software can validate the trading partner’s ID and password against
a validation file in the firm’s database.
c) Before processing, the trading partner’s application software references the valid customer and vendor files
to validate the transaction.
Electronic Data Interchange Controls
ACCESS CONTROL
• To function smoothly, EDI trading partners must permit a degree of access to
private data files that would be forbidden in a traditional environment.
• For example, it may permit the customer’s system to access the vendor’s
inventory files to determine if inventories are available. The customer may
periodically access the vendor’s price list file to keep pricing information
current. Alternatively, the vendor may need access to the customer’s price list
to update prices.
a) All EDI transactions are authorized, validated, and in compliance with the trading partner agreement
d) Adequate controls are in place to ensure a complete audit trail of all EDI transactions.
Audit Procedures Relating to EDI
• By selecting a sample of transactions and tracing these through the process, the auditor can verify
that key data values were recorded correctly at each point.
Thank You and God Bless