GRP 7 Is Security and Control
GRP 7 Is Security and Control
• People: Users, administrators, and security professionals who interact with the
system.
• Policies and Procedures: Guidelines, standards, and rules that define how users
interact with the system and how security measures are implemented.
• Technology: Hardware, software, and networking components that support security,
such as firewalls, antivirus software, and encryption tools.
Threats to Information System Security
Cyberattacks: Malicious attempts by individuals or groups to breach information
systems, including malware, phishing, and denial-of-service attacks.
Insider Threats: Security breaches caused by employees, contractors, or other
insiders with authorized access to systems and data.
Human Error: Accidental data breaches or system disruptions caused by user
mistakes, such as misconfigurations, misplaced devices, or lost passwords.
Best Practices for Ensuring Information System Security
• This refers to potential weaknesses in a system that can be exploited by malicious individual
to gain unauthorized access, steal data, disrupt operations, or cause other harm.
• it is very critical issue that can have serious consequences for individuals, organizations, and
society as a whole.
• There are various ways in which information systems can be vulnerable to abuse, including
• Weak cybersecurity measures: if a system lacks proper security controls , such as firewalls,
encryption and access controls, it becomes more susceptible to unauthorized access and
abuse.
• Human error: Employees may inadvertently expose confidential information through
actions like clicking on phishing emails or sharing sensitive data with unauthorized parties.
• Lack of regular updates and patches : failure to keep software and systems up to date with
the latest security patches can leave them vulnerable to known vulnerabilities that can be
exploited by attackers.
• Insider threats: Employees or contractors with authorized access to a system can abuse
their privileges for personal gain or to harm the organisation.
• Weak cybersecurity measures: if a system lacks proper security controls , such as firewalls,
encryption and access controls, it becomes more sesceptible to unauthorized access and
abuse.
• Human error: Employees may inedvertently expose confidential information through
actions like clicking on phishing emails or sharing sensitive data with unauthorized parties.
• Lack of regular updates and patches : failure to keep software and systems up to date with
the latest security patches can leave them vulnerable to known vulnerabilities that can be
exploited by attackers.
• Insider threats: Employees or contractors with authorized access to a system can abuse
their privileges for personal gain or to harm the organisation.
• These vulnerabilities can be exploited by malicious actors to gain unathorized access,
steal data, disrupt services or cause other harm.
• Information systems can be abused in various ways, such as through hacking, phishing,
malware attacks or social engineering. this abuse can lead to data breaches, financial
losses, reputational damage and other negative impacts.
• To prevent and mitigate the vulnerabilities and abuse in information systems,
organisations should implement robust cyber security measures, regulary update
software , train employees on best practices, monitor system activity for suspicious
behavior, and enforce strict access controls.
• Additionally having incident responce plans in place can help organisations quickly
respond to and recover from security incidents.
• Given the evolving nature of cybersecurity threats collaboration among
stakeholders is essential. this includes sharing threat intelligence, coodinating
incident response effort, and working together to strengthen the overall
security posture.
• Every time information is transmitted from one user or application to another, the
organization could be compromising its data.
• Application controls include both automated and manual procedures that ensure that
only authorized data are completely and accurately processed by that application
• Computer application controls help mitigate the risks of using these tools by putting
various checks in place.
• These checks authenticate applications and data before it’s allowed into or out of the
company’s internal IT environment, ensuring that only authorized users can take action
with the company’s digital assets
• Application controls are specific controls unique to each computerized application,
such as payroll or order processing.
• They include both automated and manual procedures that ensure that only authorized
data are completely and accurately processed by that application.
• Application controls can be classified as:
• input controls,
• processing controls,
• output controls
Access Controls
•Not all users need the same level of access to the application.
•Application controls establish which actions a user has access to; some users may only be
able to view data, whereas others might be able to modify existing data or even add inputs.
• Systems with effective access controls should have checks verifying each user’s identity.
• It might be a two-factor authentication upon login or requiring that a user enter a unique
code in addition to their credentials
Input Controls
• This application control governs the data inputs in an application. Input controls
prevent users from entering unvalidated information into the system.
• These controls might require data to be entered in a given format or authorization on
all inputs before adding them to the information system
• Input controls check data for accuracy and completeness when they enter the system.
• There are specific input controls for input authorization, data conversion, separating
the functions of each user, data editing and error handling.
Input Controls
• Input controls check data for accuracy and completeness when they enter the system.
• There are specific input controls for input authorization, data conversion, separating
the functions of each user, data editing and error handling.
Processing Controls
• With processing controls, organizations verify that incoming data is correctly
processed before it’s added to the information system or establish that data are
complete and accurate during updating
• This verification involves establishing rules for processing data, then ensuring that
these rules are followed every time the application transmits data.
• For instance, it may mean limiting the number of checks or verifying that the totals
are reasonable
• Validity checks are a type of processing control that requires the application to
confirm that all processed data is valid.
• It then means ensuring that the data is in the required format or sent to the correct
user.
Output Controls
• These controls ensure that the results of computer processing are accurate, complete,
and properly distributed.
• These controls safeguard data when transmitting it between applications.
• With output controls, organizations verify that the data gets sent to the right user by
tracking what the data is, whether or not the data is complete and the data’s final
destination.
• When implemented correctly, output controls ensure that data won’t be transmitted
until all checks are successfully passed
• Authentication is an example of an output control, in which the system
authenticates data before it leaves the system.
• Authorization is another tool that requires the application to confirm that the user
has the approval to complete the action
Application Controls
Report distribution Output Documentation specifying that authorized recipients have received their
logs reports, checks, or other critical documents.
Data security controls
• Availability means users can get their data when they need it.
• It works hand-in-hand with integrity. If the contents of your data aren’t correct, it’s not
available.
• Creating archives is an example of a data security control.
• So is storing data on high availability file systems and in reliable databases.
Administrative controls.