10 IS Control For System Reliability Part 3 - Processing Integrity and Availability
10 IS Control For System Reliability Part 3 - Processing Integrity and Availability
Confidentiality (Chapter 8)
Sensitive organizational information (e.g., marketing plans, trade secrets) is
protected from unauthorized disclosure.
Privacy (Chapter 9)
Personal information about customers is collected, used, disclosed, and
maintained only in compliance with internal policies and external regulatory
requirements and is protected from unauthorized disclosure.
Processing Integrity
Data are processed accurately, completely, in a timely manner, and only with
proper authorization.
Availability
System and its information are available to meet operational and contractual
obligations.
Input
Process
Output
“Garbage-in Garbage-out”
Form Design
All forms should be sequentially numbered
Verify missing documents
Use of turnaround documents
Eliminate input errors
Batch Processing
Input multiple source documents at once in a group
Batch Totals
Compare input totals to output totals
Financial
Sums a field that contains monetary values
Hash
Sums a nonfinancial numeric field
Record count
Sums a nonfinancial numeric field
Data Matching
Multiple data values must match before processing occurs.
File Labels
Ensure correct and most current file is being updated.
Write Protection
Eliminate possibility of overwriting or erasing existing data.
Concurrent Update
Locking records or fields when they are being updated so multiple users are
not updating at the same time.
User Review
Verify reasonableness, completeness, and routed to
intended individual
Reconciliation
Fault Tolerance
Ability of a system to continue if a part fails
Training
Less likely to make mistakes and will know how to recover, with minimal
damage, from errors they do commit
Patch Management
Install, run, and keep current antivirus and anti-spyware programs
Back-up
Incremental
Copy only data that changed from last partial back-up
Differential
Copy only data that changed from last full back-up