IT Controls Part II: Security and Access: Accounting Information Systems, 5
IT Controls Part II: Security and Access: Accounting Information Systems, 5
COPYRIGHT © 2007 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star logo,
and South-Western are trademarks used herein under license
Objectives for Chapter 16
• Threats to the operating system and
internal controls (IC) to minimize them
• Threats to database integrity and IC to
minimize them
• Risks associated with electronic
commerce and IC to reduce them
• Exposures associated with electronic
data interchange (EDI) and IC to reduce
them
Operating Systems
• Perform three main tasks:
– translates high-level languages into
the machine-level language
– allocates computer resources to user
applications
– manages the tasks of job scheduling
and multiprogramming
Requirements for Effective Operating
Systems Performance
• Protect itself from tampering from users
• Prevent users from tampering with the
programs of other users
• Safeguard users’ applications from accidental
corruption
• Safeguard its own programs from accidental
corruption
• Protect itself from power failures and other
disasters
Operating Systems Security
• Log-On Procedure
– first line of defense – user IDs and passwords
• Access Token
– contains key information about the user
• Access Control List
– defines access privileges of users
• Discretionary Access Control
– allows user to grant access to another user
Operating Systems Controls
Access Privileges
• Audit objectives: verify that access privileges
are consistent with separation of incompatible
functions and organization policies
• Audit procedures: review or verify…
– policies for separating incompatible functions
– a sample of user privileges, especially access to
data and programs
– security clearance checks of privileged employees
– formally acknowledgements to maintain
confidentiality of data
– users’ log-on times
Operating Systems S Controls
Password Control
• Audit objectives: ensure adequacy and
effectiveness password policies for controlling
access to the operating system
• Audit procedures: review or verify…
– passwords required for all users
– password instructions for new users
– passwords changed regularly
– password file for weak passwords
– encryption of password file
– password standards
– account lockout policies
Operating Systems Controls
Malicious & Destructive Programs
• Audit objectives: verify effectiveness of
procedures to protect against programs such
as viruses, worms, back doors, logic bombs,
and Trojan horses
• Audit procedures: review or verify…
– training of operations personnel concerning
destructive programs
– testing of new software prior to being implemented
– currency of antiviral software and frequency of
upgrades
Operating System Controls
Audit Trail Controls
• Audit objectives: whether used to (1) detect
unauthorized access, (2) facilitate event
reconstruction, and (3) promote accountability
• Audit procedures: review or verify…
– how long audit trails have been in place
– archived log files for key indicators
– monitoring and reporting of security violations
Database Management Controls
Two crucial database control issues:
Access controls
• Audit objectives: (1) those authorized to use
databases are limited to data needed to perform
their duties and (2) unauthorized individuals are
denied access to data
Backup controls
• Audit objectives: backup controls can adequately
recovery lost, destroyed, or corrupted data
Access Controls
• User views - based on sub-schemas
• Database authorization table - allows
greater authority to be specified
• User-defined procedures - user to create
a personal security program or routine
• Data encryption - encoding algorithms
• Biometric devices - fingerprints, retina
prints, or signature characteristics
Database Authorization Table
Resource Employee Line Cash Receipts
User AR File File Printer Program
Read data
User 1 Change
Add No Access Use No Access
Delete
Read code
User 2 Read only No Access Use Modify
Delete
Step 2: SYN/ACK
Cleartext Encryption
Communication
Message Program
Ciphertext System
Key
Public – Private Key Encryption
Message A Message B Message C Message D
Multiple people
may have the public key Public Key used for
encoding messages
EDI EDI
Translation Translation
Software Software
Direct Connection
Communications Communications
Software Software
EDI System with Controls
Company A Company B (Vendor)
Application Purchases Audit trail of Sales Order Application
Software System transactions between System Software
trading partners
EDI EDI
Translation Translation
Software Software
Transaction Transaction
Log Log
Communications Communications
Software Software
Other
Software limits Mailbox
vendor’s Use of VAN to
(Company B) Company VAN Company enforce use of
access to A’s mailbox B’s mailbox
passwords and
company A’s valid partners
database Other
Mailbox
Auditing Procedures for EDI
• Tests of Authorization and Validation Controls
– Review procedures for verifying trading partner identification
codes
– Review agreements with VAN
– Review trading partner files
• Tests of Access Controls
– Verify limited access to vendor and customer files
– Verify limited access of vendors to database
– Test EDI controls by simulation
• Tests of Audit Trail Controls
– Verify exists of transaction logs are key points
– Review a sample of transactions