BIT2318: Topic 6: Protection of Information Assets
BIT2318: Topic 6: Protection of Information Assets
Contents
Importance of Information Security
Management
Issues and Exposures: Logical Access, Network
Infrastructure, Environmental & Physical Access.
Auditing Information Security Management:
- Auditing IS Management Framework
- Auditing Logical Access
- Auditing Network Infrastructure Security
- Auditing Environmental Controls
- Auditing Physical Access
1. Information Security
Management
Why
depend on timely,
accurate, complete, valid, consistent,
relevant, and reliable information.
Security must be considered as an
integral part of the systems.
Security failures may result in both
financial losses and/or intangible losses
such as unauthorized disclosure of
competitive or sensitive information.
IS Management-Roles &
Responsibilities
Implementation:
Information Assets
Information
-
Assets Inventories
Classification: assigning classes or level
of sensitivity and criticality to
information resources.
Level of protection: level access
controls that should be applied to each
information asset.
Owner? Access right? Level of access?
Responsibility? Approvals needed?
Information Assets
Information
security
administrators are
responsible for ensuring
that information system
assets are secure
Assets are secure when
the expected losses that
will occur over time are
at an acceptable level
of a project plan
Identification of assets
Valuation of assets
Threats Identification
Threats Likelihood assessment
Exposures Analysis
Controls Adjustment
Report Preparation
Identification of Assets
Valuation of assets
Threats Identification
Threats Identification
of occurrence
Statistical data might be available
Elicit likelihood from stakeholders
Related to value of the asset for some
kinds of threats
Exposures Analysis
Expected Loss =
probability of threat occurring x probability of control
failure x Loss
privilege
System access is controlled at physical
/ logical level.
Identification and authentication of the
users may be built into OS, access
control SW or applications program, db
system, network access device.
Documented on need-to-know basis.
Layer
Privacy Management
Privacy? Adherence to trust and obligation in
relation to any information.
Ensure all IT projects Comply with privacy
policy, laws and other regulations. IS Auditor
should:
- Identify and understand legal requirements
- Verify correct security measures are adopted
- Review managements privacy policy
- Conduct Compliance and substantive testing
LOGICAL ACCESS
Logical
Access EXPOSURES:
- technical exposures
- computer crimes
IS Auditors need to gain technical and
organizational understanding of the IT
environment reviewing OS, network,
database, application security layers.
LOGICAL ACCESS
Path
LOGICAL ACCESS
LOGICAL ACCESS
Authorization
LOGICAL ACCESS
Access Control Lists
- Authorization Tables ACL
- Register of Users & Types of Access Permitted
Logical Access Security Administration
- Software controls over access to computers
- Physical Control environment
- Access from remote locations
- Access to System documentation & manuals
- Access to data transmission
- Access to backup files
NETWORK INFRASTRUCTURE
SECURITY
Controls through network control terminal
and communications software.
LAN Security
- Risks
- Issues
Client Server Security
Wireless Security
Internet Threats and Security
- firewall, Intrusion & detection system,
encryption
Viruses
Logical Access
IS Auditors should:
- Obtain general understanding of security
risks
- Document and evaluate controls over
potential access path
- Test control over access path
- Evaluate access control environment
- Evaluate security environment
Security Techniques
Terminal Identification
Logon IDs and Passwords
Review Access Controls and Password
Administration
Remote Access
Internet point of presence
Network Penetration Tests
Full network assessment reviews
Development and Authorization of
network changes