INFORMATION SECURITY AUDITING Week 1-5
INFORMATION SECURITY AUDITING Week 1-5
INFORMATION SECURITY AUDITING Week 1-5
Audit
Independent review and examination of records and activities to assess the adequacy of internal
controls, to ensure compliance with established policies and operational procedures, and to
recommend necessary changes in controls, policies, or procedures.
IT/IS Audit
The process of collecting and evaluating evidence to determine whether computer system
safeguards assets, maintain data integrity, achieves organisational goals effectively and
consumes resources effectively.
Improved System
Efficiency
A typical structure and context showing where IS Audit fits within a typical large
corporation
Internal Audit Reporting Structure
IS Auditor Qualifications
Independent:
Accounting Controls – those controls which are intended to safeguard the client’s assets
and ensure the reliability of the financial records. Whether financial processes have been
carried out properly.
Professional Competence
Family Educational Rights and Privacy Act of 1974 (FERPA or the Buckley Amendment) is a
United States federal law.
Roles and Responsibilities in IT Audit
Ensure IT governance by assessing risks and monitoring controls over those risks
Works as either internal or external auditor
Works on many kind of audit engagements
Reviewing and assessing enterprise management controls
Review and perform test of enterprise internal controls
Report to management
Effective IT Audit
Early involvement
Informal audits
Knowledge sharing
Self-assessments
Classifications of Audit
Financial Audit: Assure integrity of financial statements
Operational Audit: Evaluate internal controls for a given process or area
Integrated Audit: Includes both Financial and Operational aspects
Forensic Audit: Follows up on fraud/crime
IS Audit: Does IS safeguard data, provide CIA in efficient way?
Administrative Audit: Assess efficiency of a process or organization
Specialized Audit: Example:
SAS 70: Assesses internal controls of a service organization
Standards, such as SAS No. 94, guide the work of IT auditors on financial audit
engagements
The functional definition has its merits in focusing on what actual users - from a conceptual point
of view- do with the information system while using
it. They communicate with experts to solve a particular problem.
The structural definition makes clear that IS are socio-technical systems, i.e., systems consisting
of humans, behavior rules, and conceptual and technical artifacts.
Three activities in an information system produce the information that organizations need to
make decisions, control operations, analyze problems, and create new products or services.
These activities are:
input,
processing,
output
Input captures or collects raw data from within the organization or from its external environment.
Processing converts this raw input into a more meaningful form.
Output transfers the processed information to the people who will use it or to the activities for
which it will be used. Information systems also require feedback, which is output that is returned
to appropriate members of the organization to help them evaluate or correct the input stage.
People Resources
End users: (also called users or clients) are people who use an information system or the
information it produces. They can be accountants, salespersons, engineers, clerks,
customers, or managers. Most of us are information system end users.
IS Specialists: people who actually develop and operate information systems. They
include systems analysts, programmers, testers, computer operators, and other
managerial, technical, and clerical IS personnel.
Systems analysts design information systems based on the information requirements of
end uses, programmers prepare computer programs based on the specifications of
systems analysts, and computer operators operate large computer systems.
Hardware Resources
Machines: as computers and other equipment along with all data media, objects on which
data is recorded and saved.
Computer systems: consist of variety of interconnected peripheral devices. Examples are
microcomputer systems, midrange computer systems, and large computer systems.
Software Resources
Software Resources includes all sets of information processing instructions. This generic concept
of software includes not only the programs, which direct and control computers but also the sets
of information processing (procedures). Software Resources includes:
System software, such as an operating system
Application software, which are programs that direct processing for a
particular use of computers by end users.
Procedures, which are operating instructions for the people, who will use
an information system. Examples are instructions for filling out a paper
form or using a particular software package.
Data Resources
Data resources include data (which is raw material of information systems) and database. Data
can take many forms, including traditional alphanumeric data, composed of numbers and
alphabetical and other characters that describe business transactions and other events and
entities.
Text data, consisting of sentences and paragraphs used in written communications; image data,
such as graphic shapes and figures; and audio data, the human voice and other sounds, are also
important forms of data.
Data resources must meet the following criteria:
Comprehensiveness: means that all the data about the subject are actually
present in the database.
Non-redundancy: means that each individual piece of data exists only once
in the database.
Appropriate structure: means that the data are stored in such a way as to
minimize the cost of expected processing and storage. The data resources of IS are typically
organized into:
o Processed and organized data-Databases.
o Knowledge in a variety of forms such as facts, rules, and case examples about
successful business practices.
Network Resources
Telecommunications networks like the Internet, intranets, and extranets have become essential to
the successful operations of all types of organizations and their computer-based information
systems. Telecommunications networks consist of computers, communications processors, and
other devices interconnected by communications media and controlled by communications
software. The concept of Network Resources emphasizes that communications networks are a
fundamental resource component of all information systems.
Network resources include:
•Communications media: such as twisted pair wire, coaxial cable, fiber-optic cable, microwave
systems, and communication satellite systems.
•Network support: This generic category includes all of the people, hardware, software, and data
resources that directly support the operation and use of a communications network. Examples
include communications control software such as network operating systems and Internet
packages.
Components of Information Systems
Generic IS structure
Internal controls
Storage
Input Processes Outputs
s
CONCEPTS OF IT AUDITING
The purpose of Information Security Auditing is to create a careful balance of the audit process,
governance, and compliance regulations, as well as hands-on introduction to the latest
technology tools.
Internal control is the plan of organization and the methods a business uses to safeguard assets,
provide accurate and reliable information, promote and improve operational efficiency, and
encourage adherence to prescribed managerial policies.
The specific control procedures used in the internal control and management control
systems may be classified using the following four internal control classifications:
Preventive, detective, and corrective controls
General and application controls
Administrative and accounting controls
Input, processing, and output controls
IT Governance
Compliance audit
What is a compliance audit?
Governance
Policies
IT
Standards
Management
IT General and Application Management and
Controls Hierarchy Organization
Physical and
Environmental Controls
Separation of duties
Delegation of authority and responsibility
Competent and trustworthy personnel
System of authorizations
Adequate documents and records
Physical control over asset and records
Adequate management supervision
Independent check on performance
Comparing recorded accountability with assets
networking,-LAN, WAN
- Audit implications:
# DDP access controls/telecom controls that transmit data to/from the central computer;
completeness/accuracy of data transmitted btw central & divisions
# Networking need to understand network & accounting cycles affected by network; access
controls – validity, authorisation, completeness of transactions processed
e-commerce
Real-time systems:
- batch transactions transactions entered into a group, batched, transaction file then
created & run against master file
- Online/real time system transactions entered individually, master file changed
immediately (e.g. ATM, JIT, EPOS)
- Audit implications:
# Access controls
- E.g. American Express – Authoriser’s Assistant no credit limit, so need to know when
to accept/deny a credit card transaction
- Audit implications:
End-user computing
- End users use own applications/files – shorter development time, reduction in conflicts
btw user/IT dept
- But end users may not be subject to the same IT controls at central
- Audit implications:
- Weak controls may allow end users to access/modify data at main computer centre
safeguarding of assets/data integrity
COMPLEXITY OF IT SYSTEMS
Low complexity:
- Limited segregation of duties within computer dept & btw IT/user depts
Advanced systems:
- Mainframe computers
- General/application controls
- Remote locations – needs to build in supervisory controls & monitoring processes into
computer systems
Information processing:
- Keeping of adequate documents paper audit trail may not be present auditor must
rely on CAAT’s to obtain evidence on transaction processing
Segregation of duties:
- In an IT environment, programs within a computer system may perform all the following
functions: initiating transactions, authorisation, recording, custody of assets.
Physical controls
- Easier to hide theft of assets, e.g. fictitious purchases of goods, then mail cheque to
fictitious supplier cash goes to personal funds
However, methods of applying specific audit procedures change need to use CAAT’s
Analytical procedures.
Documentation of internal control .
Why Standards?
Costs • Use of proven and existing Models
• Methodology of standardisation and repeatability
• Consolidation of resources through continuity and
standardization
Introduction of a • State of the Art technological standards
relevant security • Currency
framework model • Improving the security maturity through cyclical
assessment
Competition • Certification of organisations, services or products
• Improve the image of the organisation
• Reduce litigation risk
• Leading edge over competitors through meeting
standards
Compliance • Readiness for impending regulatory requirements
• Compliance with existing regulations
• Information Security is not restricted to Physical Security (access control, etc…) but
covers data protection, business continuity, operations, communications, project
development, etc…
• Your Resources
– Computer time and disk space
• Your Reputation
– What you do and what others do posing as you
• Modification of information
• Vengeance or justice
• The Risks:
– Reduced security for system resources
– Possibility of compromised confidential data
– Possibility of malicious attacks from outside sources
– Information!
Real Threats
1. Hacker
2. Social Engineering
• Attackers usually assume a position of trust
– People are naturally helpful and trusting
3. Sniffing
• Sniffing is a term for digital wiretapping on the network
4. Viruses
• Can perform unauthorised actions
5. Hoaxes
• An e-mail or rumour of computer viruses, free giveaways or chain letter contests that are
untrue.
• There is no way to track e-mail proliferation.
• Hoaxes tie up e-mail bandwidth and job time as well as embarrass the sender.
– II.1 Letter from tsunami victim (hoax)
• The Bait: An email that wants you to transfer money for them (like the
Nigerian hoax)
• What it tries to make you do: Reply to the email
• Where you can see how it actually appears:
http://www.sophos.com/virusinfo/hoaxes/tsunami.html
– II.2 Unidentified tsunami boy (hoax)
• The Bait: A picture of a Tsunami victim
• What it tries to make you do: Forward the email (2MB in size) to slow
down your network.
• Where you can read more on this story:
http://www.sophos.com/virusinfo/hoaxes/tsunami_boy.html
6. Denial of Service
• Most result from an overload of resources
– Disk
– Network bandwidth
– Internal tables
– Input buffers
The Solution
Implementing a suitable set of controls…
….while incorporating business and other requirements e.g. regulatory and in reference to best
practise