Lesson D - 2 Ch04 Controlling and Auditing Data Management Systems
Lesson D - 2 Ch04 Controlling and Auditing Data Management Systems
Management Systems
• Inference control rules that place restrictions on the size of the query set to which the
system will respond:
• The system will not respond to queries where fewer than two records satisfy the query.
• The system will not respond to queries where greater than (n – 2) records satisfy the query (where n is
the number of records in the database).
Access Controls:
Inference Controls
• Three (3) types of compromises to the database that inference
controls attempt to prevent:
• 1. Positive compromise - the user determines the specific value of a
data item.
• 2. Negative compromise - the user determines that a data item does
not have a specific value.
• 3. Approximate compromise - the user is unable to determine the
exact value of an item but is able to estimate it with sufficient
accuracy to violate the confidentiality of the data.
Access Controls:
Audit Objective and Audit Procedures
AUDIT OBJECTIVE: Verify that database access authority and privileges are granted to users in
accordance with their legitimate needs.
AUDIT PROCEDURES:
Responsibility for Verify that database administration (DBA) personnel retain exclusive
Authority Tables and responsibility for creating authority tables and designing user views. Evidence
Subschemas may come from three sources:
(1) By reviewing company policy and job descriptions, which specify these
technical responsibilities;
(2) (2) by examining programmer authority tables for access privileges to data
definition language (DDL) commands;
(3) through personal interviews with programmers and DBA personnel.
Appropriate Access Select a sample of users and verify that their access privileges stored in the
Authority authority table are consistent with their job descriptions organizational levels.
Access Controls:
Audit Objective and Audit Procedures
AUDIT OBJECTIVE: Verify that database access authority and privileges are
granted to users in accordance with their legitimate needs.
AUDIT PROCEDURES:
Biometric Controls Evaluate the costs and benefits of biometric controls. Generally, these would be
most appropriate where highly sensitive data are accessed by a very limited
number of users.
Inference Controls Verify that database query controls exist to prevent unauthorized access via
inference. The auditor can test controls by simulating access by a sample of
users and attempting to retrieve unauthorized data via inference queries.
Encryption Verify that sensitive data, such as passwords, are properly encrypted. Printing
Controls the file contents to hard copy can do this.
Backup Controls
• Risks: Data can be corrupted and destroyed by
• malicious acts from external hackers and disgruntled employees
• disk failure
• program errors
• fires, floods, and earthquakes
Off-Site Storage
Backup Controls:
Flat-File - GPC Backup Technique
Creates generations of backup files.
• The more significant the data, the
greater the number of backup versions