It Controls Part Ii: Security and Access Operating System: Interpreters
It Controls Part Ii: Security and Access Operating System: Interpreters
It Controls Part Ii: Security and Access Operating System: Interpreters
OPERATING SYSTEM
It allows users and their applications to share and access common computer
resources, such as processors, main memory, databases, and printers.
Operating Systems
4. be protected by itself.
Involves policies, procedures, and controls that determine who can access the
operating system, which resources (files, programs, printers) they can access
and what actions they can take.
Log-On Procedure
first line of defense – user IDs and passwords
Access Token
contains key information about the user
Accidental Threats
Hardware failures
Intentional Threats
Privileged Personnel who abuse authority (systems admin & personnel)
Individuals – browse and exploit security flaws
Individuals – insert computer viruses
Access Privileges
Audit objectives: verify that access privileges are consistent with separation of
incompatible functions and organization policies
System audit trails – logs that record activity at the system, application and user
level.
Managements needs to decide on the “threshold” between information
and irrelevant facts
Audit objectives: (1) those authorized to use databases are limited to data
needed to perform their duties and (2) unauthorized individuals are denied
access to data
Backup controls – ensure that in the event of data loss due to unauthorized access,
equipment failure, or physical disaster, the organization can recover its files and
database.
Access Controls
Backup Controls
backup copies of the database are stored off site to support disaster
recovery
Controlling networks
Equipment failure
Audit objective: the integrity of the electronic commerce transactions by determining that
controls are in place to detect and correct message loss due to equipment failure
Include:
unauthorized interception of a message
gaining unauthorized access to an organization’s network
a denial-of-service attack from a remote location
Dual-Homed Firewall
Encryption
Computer program transforms a clear message into a coded (cipher) text
form using an algorithm.
• IPS works with a firewall filter that removes malicious packets from
the flow before they can affect servers and networks
Encryption
The conversion of data into a secret code for storage and transmission
Two general approaches to encryption are private key and public key encryption.
Digital certificate – like an electronic identification card used with a public key
encryption system
Verifies the authenticity of the message sender
Digital Signature
parity checks – an extra bit is added onto each byte of data similar to
check digits
Audit objectives:
1. Transactions are authorized, validated, and in compliance with the trading
partner agreement.
EDI Risks
Authorization
automated and absence of human intervention
Access
need to access EDI partner’s files
Audit trail
paperless and transparent (automatic) transactions
Authorization
use of passwords and value added networks (VAN) to ensure valid partner
Access
software to specify what can be accessed and at what level
Audit trail
control log records the transaction’s flow through each phase of the
transaction processing
EDI System