Tutorial Letter 505/0/2021: Information Strategy
Tutorial Letter 505/0/2021: Information Strategy
Tutorial Letter 505/0/2021: Information Strategy
Information Strategy
MAC4866
Year module
IMPORTANT INFORMATION
Please register on myUnisa, activate your myLife email address
and make sure that you have regular access to the
myUnisa module website for MAC4866-21-Y1.
Note: This is a fully online module and therefore it is only available on myUnisa.
BARCODE
CONTENTS
Page
INTRODUCTION ...................................................................................................................................... 6
1. LEARNING UNIT 1: OPERATIONAL RISKS OF INFORMATION SYSTEMS .............................. 6
1.1 INFORMATION SYSTEMS SECURITY ........................................................................................ 6
1.1.1 IS security ..................................................................................................................................... 6
1.1.2 Operational risks: the information security management system (ISMS) ....................................... 7
1.1.3 Individuals posing a threat to the IS .............................................................................................. 7
1.14 IS/IT security ................................................................................................................................. 8
Summary .................................................................................................................................................. 8
1.2 PHYSICAL RISKS OF INFORMATION SYSTEMS ....................................................................... 9
1.2.1 Risk of physical damage ............................................................................................................... 9
Summary ................................................................................................................................................ 10
1.3 RISKS OF FRAUD AND OTHER DELIBERATE ACTIONS ........................................................ 10
1.3.1 Computer fraud schemes ............................................................................................................ 10
1.3.2 Internet risks ............................................................................................................................... 11
1.4 GENERAL AND APPLICATION CONTROLS ............................................................................. 11
1.4.1 Control problems ........................................................................................................................ 11
1.4.2 General controls ......................................................................................................................... 12
1.4.3 Personnel controls ...................................................................................................................... 12
1.4.4 Application controls ..................................................................................................................... 12
1.4.5 Access controls........................................................................................................................... 13
Summary ................................................................................................................................................ 13
1.6 THEFT AND FRAUD PREVENTION........................................................................................... 14
1.6.1 Computer theft ............................................................................................................................ 14
1.6.2 Software piracy and controls ....................................................................................................... 14
1.6.3 Computer fraud ........................................................................................................................... 14
Summary ................................................................................................................................................ 14
1.7 INTERNET AND E-MAIL CONTROLS ........................................................................................ 14
1.7.1 Virus protection ........................................................................................................................... 15
1.7.2 Encryption and other safety measures ........................................................................................ 15
1.7.3 E-mail ......................................................................................................................................... 15
Summary ................................................................................................................................................ 15
1.8. CONTROLLING DISTRIBUTED SYSTEMS AND COMMUNICATION NETWORKS .................. 16
2
MAC4866/505
3
2.1.1 Cyber security risk governance ................................................................................................... 27
2.1.2 Cyber security risk information and communication .................................................................... 28
2.2 Protection ................................................................................................................................... 28
2.2.1 Areas to be protected.................................................................................................................. 28
2.2.2 Methods of protection ................................................................................................................. 29
2.2.3 Forms of protection ..................................................................................................................... 29
2.4 Certification ................................................................................................................................. 29
2.5 Man in the middle (MitM)............................................................................................................. 29
2.6 Detection .................................................................................................................................... 30
2.7 Response ................................................................................................................................... 30
2.8 Defending against the cyber security risks .................................................................................. 30
2.8.1 Protecting devices....................................................................................................................... 30
2.8.2 Protecting networks and systems................................................................................................ 31
2.8.3 Business continuity plan (BCP) and Disaster recovery plan (DRP) ............................................. 31
Audit trail (additional info from old syllabus) ............................................................................................ 32
2.8.4 ISO27001 Information security management .............................................................................. 34
2.9 Blockchain technology ................................................................................................................ 34
2.9.1 What is Blockchain technology.................................................................................................... 34
2.9.2 Key features of a Blockchain (Kaplan Publishing, 2019) ............................................................. 34
2.9.3 The relevance of Blockchain technology to accountants ............................................................. 34
2.9.4 Risks ........................................................................................................................................... 35
2.10 Centralised monitoring ................................................................................................................ 35
Summary ................................................................................................................................................ 35
Relevant articles ..................................................................................................................................... 35
References ............................................................................................................................................. 36
3. LEARNING UNIT 3: CYBER SECURITY TOOLS, TECHNIQUES AND REPORTING ................ 37
3.1 Cyber security tools and techniques ........................................................................................... 37
3.2 Forensic analysis ........................................................................................................................ 37
3.2.1 System level analysis .................................................................................................................. 37
3.2.2 Storage analysis ......................................................................................................................... 37
3.2.3 Network analysis ......................................................................................................................... 37
3.3 Malware analysis ........................................................................................................................ 38
3.3.1 Reverse engineering ................................................................................................................... 38
3.3.2 Decompilation and disassembly .................................................................................................. 38
3.4 Penetration (Pen) testing ............................................................................................................ 38
3.4.1 Network discovery....................................................................................................................... 38
3.4.2 Vulnerability probing ................................................................................................................... 38
4
MAC4866/505
5
INTRODUCTION
Dear Students
In Tutorial 501 it was mentioned that relevant information from the old syllabus would be
included from the Performance pillar in this tutorial. With cloud computing the service provider
will provide online security and back-ups. But what if the service provider discontinues their
service, this is unlikely if your organisation is using large public cloud providers such as
Amazon, Microsoft and Google, but what if your organisation uses a smaller cloud provider.
Organisation’s should either still do their own back-up’s or carefully monitor what their service
provider is doing in this regard. Another what if, is what if the organisation you work for does not
use cloud technology.
You also still need to know about control mechanisms like physical controls and so on. It is
therefore important that you study the information below.
1.1.1 IS security
The term “information security” (including computer security) means “protecting information and
information systems from unauthorised access, use, disclosure, disruption, modification, or
destruction in order to provide the following:
6
MAC4866/505
Systems analysis
Analyse the existing system to produce a vulnerability and threats report.
Systems design
Design a comprehensive set of security measures and contingency plans.
Systems implementation
Implement the designed security measures.
Vulnerabilities depict weaknesses in the system and threats are the potential exploitation of
them. Breaches in IS security are serious and increase as more individuals have access to
computers, the internet and distributed information systems. Organisations can use a qualitative
or quantitative approach, or a mix of both, to assess the risks they might face. Regardless of the
analysis method used, any analysis must include loss exposures for at least the following areas
(Bodnar & Hopwood 2010:184):
business interruption
loss of software
loss of data
loss of hardware
loss of facilities
loss of service and personnel
loss of reputation
7
1.14 IS/IT security
A secure environment depends on the following factors (Bodnar & Hopwood 2010:195):
Organisational structure
A clear organisational line should be drawn to designate who is responsible for making
decisions pertaining to IT procedures. Although segregation of duties is conducive to
control, one individual must be in charge of computer security.
External influences
Information systems must be in compliance with all state and local laws and regulations.
Summary
8
MAC4866/505
The organisation must install and review suitable environmental and physical controls to protect
the IT facilities against physical, mechanical and environmental threats. Control measures must
be put in place to protect the organisation from all these threats. The following table is an
example of the more common controls directed at some environmental hazards (Gelinas & Dull
2008:272):
Water damage Waterproof ceilings, walls and floors, adequate drainage, water
and moisture detection alarms, insurance
Dust, coffee, tea, soft Regular cleaning of rooms and equipment, dust-collecting rugs
drinks at entrances, separate dust-generating activities from
computer, not allowing food/drink near computers, good
housekeeping
Successive layers of access controls should be implemented to prevent active threats. These
are site access (physical) controls, system access (logical) controls, and file access controls.
With regard to physical threats, such as theft, site access control is implemented to physically
separate unauthorised individuals from IS resources. For instance, users should be required to
wear security identification badges, computer rooms should have locked doors, guards should
9
patrol premises and operations should be monitored by closed-circuit television (Bodnar &
Hopwood 2010:197).
Note: It is not only important to realise that physical threats can jeopardise the information
system’s functionality, but you must also be able to suggest the necessary control measures to
be implemented for a specific case at hand.
Summary
Organisational resources may be lost or damaged owing to theft, acts of violence, or natural
disasters. This requires the organisation to put adequate physical controls in place to safeguard
these resources.
Specifically, financial transaction fraud encompasses activities such as altering, or adding false
transactions and distributing of false pay cheques to non-existent employees.
Fraudulent activities denote “a false representation of a material fact made by one party to
another party with the intent to deceive and induce the other party to justifiably rely on the fact
to his or her detriment” (Hall 2008:119). To combat fraudulent activities, such as white-collar
crime, defalcation, embezzlement and irregularities, management must create a climate that
makes fraud less likely and put proper control measures in place.
10
MAC4866/505
Apart from fraud or white-collar criminal activities, the IS of an organisation may also be
threatened by actions such as commercial or business espionage, malicious damage or
industrial action.
The organisation needs a strategy for the provision of information through intranets and the
internet. The level of security will depend on the type of information required. The organisation
also needs to protect itself from both intentional (code-cracking, Trojan horses and viruses) and
unintentional (bugs, crashes and loopholes) breaches of security.
Security measures should be implemented when using the internet to access information.
These measures include the use of firewalls, encryption technology, authentication, hashing,
secure servers and secure electronic transactions (SET) systems.
To feel safe in cyberspace, it must be possible to communicate information in such a way that:
The kind of intruders found on the internet are hackers, individuals looking for financial gain and
secrets and disgruntled ex-employees or ex-contractors (Eccles et al 2000:412).
illogical processing
incorrect data entry
concentration of data
inability to substantiate processing
concentration of duties
unauthorised systems access
11
poorly specified systems
repetition of errors
cascading of errors
problems inherent in the electronic automated environment
invisibility of records and audit trail
information can be lost or changed, leaving no trace of the earlier content
inability to react quickly
failure to check the computer
The controls that can be introduced to prevent all kinds of risk are usually classified into two
major categories, namely general controls and application controls. General controls are
designed and implemented to ensure a stable and well-managed control environment and to
increase the effectiveness of application controls. Application controls are designed and
implemented to prevent, detect and correct errors and irregularities in transactions that are
being processed. There are, however, also specific controls for microcomputers, distributed
systems and communication networks.
Every layer of management has a specific IT responsibility. However, with the growth in internet
connectivity and e-commerce almost all employees may be in a position to compromise the
information system.
data matching (e.g. the system should verify that the information on the vendor invoice
matches that on both the purchase order and receiving report before paying the vendor);
file labels (e.g. file labels need to be checked to ensure that the correct and most current
files are being updated);
recalculation of batch totals (e.g. if the recomputed record count is smaller than the
original, one or more transaction records were not processed);
cross-footing (e.g. compare the results of the totals calculated by adding up the rows with
those of adding up the columns) and zero-balance tests (e.g. the payroll clearing account
should have a zero balance after it has been debited with the total gross pay of all
employees in a particular period and credited with the amount for all labour costs allocated
to various expense categories);
write-protection mechanisms (e.g. replacing bar-codes and manual tags with radio
frequency identification (RFID) tags to ensure that the price of the merchandise cannot be
written over or erased); and
database processing integrity procedures (e.g. the use of database administrators, data
dictionaries and concurrent update controls to ensure database processing integrity).
Summary
Internal control forms part of a larger functional process and therefore the whole process with its
objectives must be properly set up and communicated to the people working within the
organisation. In setting up a control policy for the organisation the cost must justify the benefits
gained from these controls. A level of control must be found that will ensure that the system is
safe and sound, that the controls placed on the system are not having a choking effect on the
throughput of the organisation, and that the costs of the controls are not out of proportion to the
loss that would be incurred if a disruption were to take place. This will depend on the risk
appetite of the organisation.
13
1.6 THEFT AND FRAUD PREVENTION
Theft preventive controls include the control of physical access to the system. Physical access
begins with controlling entrance to the computer room or building. Access to the IS is more
difficult because access from remote sites must also be controlled.
Management and the board of directors are responsible for establishing appropriate control
measures to protect their information system from wilful, intentional misdeeds, as well as
unintentional errors and omissions. It is, however, important that they not spend more on these
control measures than the benefits to be received from them.
Summary
Computer fraud includes the theft, misuse or misappropriation of assets by altering the
computer-readable files, by altering the logic of the computer software, or by stealing
computers, software applications or information (Hall 2008:130-131). Installing proper security
measures or controls must be a top priority for management.
14
MAC4866/505
Install reliable antivirus software that scans for, identifies and destroys viruses.
Make sure that the latest versions of the antivirus programs are used.
Scan all incoming e-mail for viruses at server level rather when it hits users’ desktops.
All software should be certified as virus-free before loading it into the system.
Deal with trusted software retailers.
Some software suppliers use electronic techniques to make tampering evident.
Check new software on an isolated machine with virus detection software.
Have two backups of all files. Data files should be backed up separately from programs to
avoid contaminating backup data.
If you use flash drives, diskettes, or CDs, do not put them in strange machines as they
may become infected.
Firewalls are used to prevent unauthorised access to computer networks. An intrusion detection
system (IDS) monitors the system for unusual activity and reports it.
1.7.3 E-mail
There are many problems associated with the use of e-mail, including work interruption, volume
of e-mails, lack of personal communication and viruses. Strict policies must be put in place to
control the use and misuse of e-mail.
Summary
To enjoy the benefits of the internet, organisations have to combat the risks associated with its
use.
15
1.8. CONTROLLING DISTRIBUTED SYSTEMS AND COMMUNICATION NETWORKS
Where computer systems are more advanced, particularly those with remote terminals and
communication networks and those that use database management systems, the security risks
are higher than when a single computer is used.
Practical application
(2) Users gain access to information by Authentication software that verifies the
using a false identity to commit fraud identities of both sender and receiver
(3) Unauthorised user on one network gains Firewall software that prevents information
access to another from being accessed by those who are
unauthorised
(4) Parties may deny engagement in Non-repudiation with a digital sign, provides
transaction an audit trail for transactions
(Lewin 2003:178)
Strong passwords are needed to reduce network vulnerability and increase security. While a
truly impenetrable password is not possible, a strong password will at least require a lot of time
and powerful computer systems to crack. Strong passwords integrate all of the following
features (Wakefield 2004:6, 8):
The following control procedures can be used to ensure complete and accurate data entry
(Leitch & Davis 2001):
Note: There are more control procedures than those listed above. Refer to other textbooks or
the internet to expand this list (e.g. Wessels, Grobbelaar, McGee & Prinsloo 2007).
Although audit trails are difficult to maintain in an online processing environment, the following
procedures can assist in establishing effective audit trails (Leitch & Davis 2001):
the use of codes which identify the user, the terminal, the type of transaction, and the
sequential numbering of transactions within transaction type
confirmation feedback to the terminal operator before final data entry
periodic review of transactions and control totals by supervisors
use of transaction logs and automatic notification at the beginning and end of transaction
information
Concurrency procedures must be introduced to control the simultaneous usage of the same
records, files and data elements in a database. This can be done through priority allocation to
prevent lock-up situations and preserve the integrity of data (Leitch & Davis 2001).
Another means of preventing unauthorised access is data coding or data encryption. This
involves the storing and/or transmitting of data in coded format. Coding can be incorporated into
database processing and provides effective protection against the direct access of data from a
17
database. The coding scheme must, however, be protected to uphold security (Leitch & Davis
2001).
Each user should have a subschema which limits that user’s ability to enquire, add, modify
or delete data.
Control procedures should be in place to check every modification or deletion.
Lock-out procedures should be introduced to provide automatic prevention of computer
lock-ups of concurrent updating when two users attempt to access the same data item
simultaneously.
Transaction and recovery file logs that are separate from the database should be
maintained.
Periodic scans and editing of the database should be carried out.
There should be an effective database administration function separate from the
operational control of day-to-day operations.
It is necessary to keep a documented record of the database structure and a data
dictionary which describes each data element.
There should be adequate backup and recovery controls.
The level of control and security of small businesses’ computer systems may differ from that of
larger businesses, depending on their systems architecture and not necessarily on the size of
the business. It will also depend on the risk appetite of their personnel. Small business
computers tend to have no hardcopy console log and few of them have features that limit
access to programs. Another weakness from a control point of view is that small systems tend
to be very accessible and easy to use (Eccels et al 2000:421).
18
MAC4866/505
Proper control is also necessary when using a service bureau, because sending the
organisation’s data to another physical location could lead to a loss of security and
confidentiality (Eccles et al 2000:417).
Summary
Distributed systems and communication networks introduces new dimensions of complexity and
requires more sophisticated control procedures. It is therefore important to have a
comprehensive control strategy, which should include contingency controls and a disaster plan.
References
Bodnar, GH & Hopwood, WS. 2010. Accounting information systems. 10th edition. Upper
Saddle River, NJ: Pearson.
Eccles, MG, Julyan, FW, Boot, G & Van Belle, JP. 2000. The principles of business computing.
5th edition. Kenwyn: Juta.
Gelinas Jr, UJ & Dull, RB. 2008. Accounting information systems. 7th edition. Mason, OH:
Thomson South-Western.
Hall, J. 2008. Accounting information systems. 6th edition. Mason, OH: Cengage Learning.
Leitch, RA & Davis, KR. 2001. Accounting information systems: theory and practice. 2nd
edition. Englewood Cliffs, NJ: Prentice-Hall.
Romney, MB & Steinbart, PJ. 2009. Accounting information systems. 11th edition. London:
Pearson Education.
Wakefield, RL. 2004. Network security and password policies. The CPA Journal, July:
6, 8.
Wessels, PL, Grobbelaar, E, McGee, A & Prinsloo, GTM. 2007. Information systems in a
business environment. Durban: LexisNexis.
19
RISK MANAGEMENT (P3)
We will now discuss cyber risks. You may think but this is a technical matter for IT
professionals. However, because of the scale of risks involved it is vital that management
accountants play an active role with regard to this issue in their organisations. Cyber risks relate
to the use of information technology and digital data. You have seen in news media what large-
scale cyberattacks can cause, for example massive economic damage, geopolitical tensions
and widespread loss of trust in the internet and organisations for that matter.
Component outcomes:
20
MAC4866/505
Business information
Classified information
There are a number of examples PII information and business information in your textbooks.
Firstly, an organisation must understand how technology interacts with the organisation in order
to protect it from any cyber security threats. These technological interactions could include:
Type of technologies that the organisation uses for example, Enterprise Resource Planning
(ERP)
It is critical for an organisation to understand what is happening in the outside world as this
could have a significant impact on the organisation’s cyber security risks.
Cyber security objectives need to set by management and they need to link to the cyber
security risks that have been identified. The Association of International Certified Professional
Accountants (AICPA) outlines some key cyber security objectives namely:
21
1.5 Types of cyber security risks
Types of cyber security risks include Malware, Application attacks and Hackers.
Please go to the link below to watch a video on the key essentials to Cyber security risk
and threat management.
https://www.facebook.com/watch/live/?v=251249295555819&ref=watch_permalink
1.5.1 Malware
Malware is a term used to define various types of malicious software irrespective of their
purpose. Examples of the most common types include, Ransomware, Botnets, Trojans,
Malvertising, Viruses and Spyware.
Please refer to your textbook for more information on these.
These are increasingly more common as the use of applications (apps) become more common.
The aim is similar to malware, which is to steal data or users identities. Some of the most
common types are:
A hacker is a computer expert that gains unauthorised access to a computer system. It can be
both internal (disgruntled employee) and external. There are different reasons why someone
may want to hack a computer system for example:
Black hat hackers – gain access without permission with malicious intent
Grey hat hackers – not specifically good or bad but sell their skills for monetary gain
White hat hackers – they are used by the organisation to understand weaknesses in the
systems
22
MAC4866/505
Please see the link below and refer to your textbooks for more information on Hackers.
https://players.brightcove.net/1485859309/default_default/index.html?videoId=5846547140001
1.5.4 Social Engineering
This is the manipulation of people to make them perform specific actions or reveal confidential
information.
Studies by Dr Robert Cialdini identified six principles that can persuade of influence someone,
namely:
Reciprocity
Scarcity
Authority
Consistency
Liking
Consensus
More on these principles can be found at the link below:
https://conceptually.org/concepts/6-principles-of-influence
Techniques known as phishing or spear phishing are types of social engineering used to gain
access to a system or network by hackers.
Spear phishing, this is a phishing attempt to target a specific individual who is considered to
have specific information or access to this information.
Refer to your textbooks for more information on the above.
1.6 Cryptocurrency
Cryptocurrencies like bitcoin make it possible to send and receive money anonymously thereby
making the threat of cyber security more significant. Bitcoin is the currency of choice for
Hackers.
Read the article below on why Hackers love bitcoin.
https://www.theguardian.com/technology/2017/may/15/digital-gold-why-hackers-love-bitcoin-
ransomware
23
1.7.1 What is social media
“Social media is any digital tool that allows users to quickly create and share content with the
public. Social media encompasses a wide range of websites and apps. Some, like Twitter,
specialise in sharing links and short written messages. Others, like Instagram and TikTok, are
built to optimise the sharing of photos and videos” (The balance small business, n.d.).
Social media presents a number of opportunities namely:
Advertising
Brand development
Communication
There are a number of risks associated with social media to organisations namely:
Productivity – employees can waste company time on social media during work hours.
Hacking – accessing organisation specific accounts and sending messages posing as the
organisation.
Inactivity – Not keeping a social media account or keeping it up-to-date can be damaging
for an organisation.
Costs – a well-run social media presence will come at a cost or non-compliance could
results in fines.
Refer to your textbooks to see more detail on the risks to organisations from social media.
1.7.3 Risks of social media to individuals
As most of you may use social media in one form or another you will be aware of these risks
namely:
Going viral – a person can become famous or infamous very quickly through social media.
Internet trolling – abusive responses by others to incite individuals normally after going viral.
24
MAC4866/505
Employment – companies will view a potential candidate’s social media accounts or even
dismiss employees due to negative comments made on social media.
Legal sanction – legal action due to social media posts and the whereabouts at the time of a
crime can be used by law enforcement.
Physical theft – criminals may identify possible unoccupied properties due to social media
posts.
Identity fraud – criminals can build up a portfolio about an individual due to poorly protected
accounts.
It is important to be aware of how organisational change can have an impact on cyber security.
1.8.1 Organisational changes
Expansion
Acquisition
Restructure
Hardware update
Regulations
Refer to your textbooks for more detail on these.
Below are some examples of how changing of systems can be undertaken by organisations:
Direct changeover
Parallel running
Pilot changeover
Phased changeover
Refer to your textbooks for more detail on these.
1.8.3 Vulnerabilities
Organisations need to be aware of their vulnerabilities to cyber security threats, these can be:
After having considered the information that needs protecting and the types of attacks the
organisation needs protecting from, an organisation needs to be aware of the implications of a
security breach or attack. These include:
Downtime
Reputation damage
Customer flight
Industry consequences
Legal consequences
The above are self-explanatory, please refer to your textbooks to see more detail on these
impacts.
In your textbook, you will see a section in this chapter on legislation surrounding information
systems in the UK and EU which is the General Data Protection Regulation (GDPR), this was
mentioned in Tut 502 and Tut 505. There are also examples of other legislation (US, Asia-
Pacific, China & Singapore). South Africa has the POPI Act, which comes into force on the 1st of
July 2020. Please make sure that you know what these regulations entail.
Summary
In a digital world one of the major threats is cyber risks. After studying this section ask yourself
can I recommend suitable company polices on cyber security and suitable preventive and
detective controls in response to vulnerabilities?
Relevant articles
https://www.weforum.org/reports/the-global-risks-report-2020
https://www.mckinsey.com/business-functions/mckinsey-digital/our-insights/staying-ahead-on-
cyber-security
https://insights.cgma.org/story/cybersecurity/page/1
https://www.cimaglobal.com/Members/Insights/2019-CIMA-Insights/Five-simple-cybersecurity-
tips-for-your-small-business/
http://www3.weforum.org/docs/GAC16/Social_Media_Impact_Digital.pdf
https://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/cyber-security-resource-
center.html
References
Kaplan Publishing, 2019. Official study text. Risk Management. Strategic Level. P3. Berkshire.
UK. Kaplan Publishing.
The Balance small business, n.d. Available from: https://www.thebalancesmb.com/what-is-
social-media-2890301. [Accessed 25 June 2020].
26
MAC4866/505
Component outcomes:
AICPA cyber security framework recommends a security mechanism based around three
principles namely:
Protection
Detection
Response
These three principles can be used in various ways across the different levels within the system.
It must be noted that corporate governance, tone from the top and communication are key to
these three principles being effective in risk management in general.
27
Roles specifically mentioned by the AICPA framework include:
Role Responsibility
Now refer to your textbooks to see the various ways for an organisation to address these
governance considerations, which include the various roles, board meetings, a handbook on
policies and procedures, etc.
2.1.2 Cyber security risk information and communication
The AICPA framework in accordance with CIMA’s risk management cycle highlights the
importance of information, which can be internal and external. Now refer to your textbooks for
examples of these different types of communication methods.
2.2 Protection
The previous chapter highlighted the various interactions that make an organisation vulnerable.
However, it is also vital to be aware of the ever expanding number of areas that need to be
protected. Above in the beginning of this tutorial letter the various controls and prevention
methods was discuss, read this in conjunction with this.
2.2.1 Areas to be protected
Servers
Desktops
Laptops
Mobile devices
Networks
Data storage
Business applications
This list will continue to grow as more and more connected devices are created.
Refer to your textbook for more detailed discussion on each of these.
28
MAC4866/505
These include:
Software updates
Configurations
Security products
Authentication – password or pin numbers (read in your textbooks the problems and
precautions with passwords
Protecting secrets – encryption where only authorised recipients can view the
data/information
2.4 Certification
This is the digital verification of sender and receiver, there is also a private and public part of a
certificate. The different types are Secure Sockets Layer (SSL) certificates which is now
replaced by Transport Layer Security (TSL) certificates. It is very important that these
certificates do not expire.
See the links below to understand what certification is.
https://www.youtube.com/watch?v=hExRDVZHhig
https://www.cloudflare.com/learning/ssl/transport-layer-security-tls/
Intrusion detection and prevention systems – there are now apps that can monitor activities,
Intrusion Detection Systems (IDS) & Intrusion Prevention Systems (IPS)
2.7 Response
Not only do organisations need to be able to detect threats, but they also need to develop a
response strategy. This has brought on the development of Computer Incident Response
Teams (CIRTs) or Computer Security Response Teams (CSIRTs).
The primary function of the CIRT or CSIRT is to keep the organisation functioning by:
Help provide data and information to support decision making and developing a planned
response
Assist with communications during the critical periods with various stakeholder groups
Refer to your textbooks for the example – Maersk NotPetya
The YouTube clip below gives a good explanation of CIRTs/CSIRTs
https://www.youtube.com/watch?v=eBJDKBFSLqs
Desktops – Physical: locks (doors and cable locks), authentication: password, policies:
automatic screensavers, security updates
Laptops – same as the above but also fingerprint and iris scanners, policies: safe storage
guidelines
Bring your own device (BYOD) – Policies: acceptable use, allowable software usage
30
MAC4866/505
2.8.3 Business continuity plan (BCP) and Disaster recovery plan (DRP)
The aim of a business continuity plan is to minimise the extent of disruption, damage or loss of
information and to establish a temporary alternative way of processing information. Hence, the
objective is to resume normal business operations as quickly as possible and to familiarise
personnel with proper emergency procedures (Romney & Steinbart 2009:332).
Disasters happen and disaster prevention is the first step in managing disaster risks, ranging
from natural disasters to deliberate actions and human error (Bodnar & Hopwood 2010:205).
The first step in a disaster recovery plan is to obtain the support of senior management, as well
as the board’s approval. The design of a plan should include the following major components
(Bodnar & Hopwood 2010:206):
Apart from including the allocation of responsibilities, the priorities, backup and standby
arrangements as well as communication with personnel, a contingency plan should also include
adequate insurance cover.
Recovery strategies and procedures should include the availability of an emergency response
centre or an alternative backup site if the primary computing site is destroyed or unusable.
Organisations know that it is just a matter of time until they will be subjected to a cyber-attack,
therefore BCP and DRP need to form part of their cyber risk management process.
BCP is a strategy to keep an organisation running with minimal disruption if a disaster strikes.
DRP is a strategy to restore the data and applications should the data centre, servers or other
infrastructure be damaged or destroyed.
31
DRP involves:
Backups should be stored in a secure location, preferably an off-site location. Organisations that
must ensure continuous online operations must replicate their data in real time on primary and
secondary systems. This data replication strategy is called continuous data protection (CDP)
and the site that contains copies of the primary site’s programs and data files is a mirror site
(Gelinas & Dull 2008:266).
Mirror site
32
MAC4866/505
Illustration
Answer:
Thanks to an effective disaster recovery plan, Nasdaq was up and running six days after the 11
September 2001 terrorist attack that destroyed the twin towers of the World Trade Centre.
Nasdaq’s headquarters was located on the 49th and 50th floors of One Liberty Plaza, just across
the street from the World Trade Centre. When the first plane hit, Nasdaq’s security guards
immediately evacuated personnel from the building. Most of the employees were out of the
building by the time the second plane crashed into the other tower. Although employees were
evacuated from the headquarters and the office in Times Square had temporarily lost telephone
service, Nasdaq was able to relocate to a backup centre at the Marriott Marquis. Once there,
Nasdaq executives went through their list of priorities: first, their personnel; second, the state of
their traders; third, the physical damage; and lastly, the trading industry situation.
A contingency plan should be tested on a regular basis to ensure that everyone in the
organisation knows what to do when a disaster occurs. It is far better to discover problems with
the implementation of the plan during a test, rather than when there is an actual emergency.
Nasdaq’s extremely redundant and dispersed systems also helped the company quickly reopen
the market. Each trader is linked to two Nasdaq connection centres, and there are 20
connection centres in the United States. The centres are connected to each server using two
separate paths and sometimes two distinct vendors. Servers are kept in different buildings and
have two network topologies. Even with the electricity out in Lower Manhattan, Nasdaq’s
systems were relatively unaffected.
When personnel could no longer occupy the Manhattan office and phone lines were out in the
Times Square office, Nasdaq still had offices in Maryland and Connecticut, which allowed it to
monitor the regulatory processes. This also lessened the risk of losing all Nasdaq’s senior
management. Even if large numbers of people had been lost in One Liberty Plaza, the company
still would have had members of its senior management in other locations.
Nasdaq also took such precautions as having its executives carry more than one mobile phone
in case one service provider goes down and investing in interruption insurance to help defer the
costs of closing the market. Planning and foresight saved Nasdaq from losing what could have
been tens of millions of dollars (Romney & Steinbart 2009:333).
A contingency plan should be tested on a regular basis to ensure that everyone in the
organisation knows what to do when a disaster occurs. It is far better to discover problems with
the implementation of the plan during a test, rather than when there is an actual emergency.
33
2.8.4 ISO27001 Information security management
ISO Standards are standards that cover a wide range of activities in an organisation from
producing a product, managing a process, delivering a service or supplying materials. There are
more than 21300 international standards developed by the International Organisation for
Standardization (ISO).
ISO27001 is the framework for all issues related to an organisation’s information risk
management processes.
Read the report below on ISO27001.
https://advisera.com/27001academy/what-is-iso-27001/
Refer to your textbooks for more on the ISO27001.
In your textbooks a definition of Blockchain is given, see the YouTube clip below for an
explanation of Blockchain technology.
https://www.youtube.com/watch?v=27nS3p2i_3g&feature=youtu.be
Transactions are recorded by a number of participants using a network that operates via
the internet. These same records are maintained by a number of different parties.
Details of the transaction taking place is recorded by everyone namely the value, the time,
the date and the details of the parties involved. For the transaction to be accepted it takes
the agreement of all participants in the chain to update their ledgers.
When a new block is added, it is linked to the previous block by using a cryptographic
hash, which is generated from the contents of the previous block. This is to make sure that
the chain is never broken and that each block is permanently recorded.
This is an important topic, Blockchain can fundamentally revolutionise the accounting profession
as it allows unchangeable and transparent record keeping for all financial related data.
Benefits of Blockchain to the accounting profession include:
34
MAC4866/505
There is a lot of information on the internet on this topic, below is just a few links that you can go
through, you can research much more on this topic.
https://www.icaew.com/-/media/corporate/files/technical/information-technology/thought-
leadership/blockchain-and-the-future-of-accountancy.ashx
https://www.accountingtoday.com/news/blockchain-unlocking-new-potential
https://www.youtube.com/watch?v=URjWivgtaRo
Now refer to your textbooks.
2.9.4 Risks
It was thought that Blockchain would be unhackable, but cyber criminals always find a way to
penetrate a system.
Below is an article in the CIMA member magazine where a number of risks are discussed.
https://www.fm-magazine.com/issues/2018/aug/blockchain-risks-and-rewards.html
Refer to your textbooks to read about the 51% rule.
Due to the large amount of devices logging into organisation’s systems the need for centralised
monitoring has become essential.
There are a number of elements to centralised monitoring including:
Summary
In the above section, we discussed how to manage cyber threats through cyber security
processes and what the objectives and controls should be. After studying this chapter ask
yourself do I know how to manage cyber threats through cyber security processes?
Relevant articles
https://www.fm-magazine.com/news/2019/may/cybercrime-costs-201920981.html
https://www.journalofaccountancy.com/podcast/how-to-fend-off-cyberattacks.html
https://invenioit.com/continuity/4-real-life-business-continuity-examples/
35
https://101blockchains.com/introduction-to-blockchain-features/
References
36
MAC4866/505
Component outcomes:
System components
Configuration changes
37
3.3 Malware analysis
The objective of malware analysis is to find out how the malware got onto the system and its
purpose. This will help the organisation improve their detection and defence strategy in future.
There are two techniques that can be used namely reverse engineering and decompilation and
disassembly.
3.3.1 Reverse engineering
This technique involves deconstructing (breaking down) the malware to learn more about it, how
did it gain access to the system and whether it was a targeted or untargeted attack. The
malware is often protected by many layers of code so this exercise can be very time consuming.
38
MAC4866/505
Besides the above levels there are other considerations to take into account in software security
namely:
3.5.1 Design review
When the software for some devices were designed these devices did not have the importance
as they have now. The design review considers the implication of technology development and
the interconnectivity of these devices.
3.5.2 Code review
A code review considers how the code is written and how someone proves that they should be
allowed access to the software.
With regard to the authentication process organisations can use a two step verification or a two
factor authentication.
3.5.3 Security testing
This is an internal audit type review to check controls are being carried out (compliance) and
are appropriate for the risk (substantive).
There are two key software controls that are used by most organisations today namely:
Version control – monitors the various devices on the system to ensure that all software is
still supported by the software provider.
Patch management – if there is a flaw in a service provider’s software they will update the
software to correct the flaw.
39
It involves six actions for an organisation to consider namely:
3.6.1 Identify all the issues
Set understandable and achievable targets that prioritises cyber security risks and remembering
basic controls namely business process controls and IT controls not just cyber security controls.
3.6.3 Work out how best to deliver the new cyber security system
Reviewing of different potential solutions and selecting the most appropriate. There is no one
solution organisations have different attitudes towards risks and risk appetites.
Employees at all levels must be involved and understand their roles with regard to cyber
security risk management.
Refer to your textbooks for a more detailed discussion with examples on the above.
3.7 Frameworks
Various groups and commentators have development frameworks with the aim of organisation’s
communicating to various stakeholders the processes and controls they have in place for cyber
security.
3.7.1 AICPA
The AICPA reporting framework has three key components in the report namely:
Management’s description – This is the main part of the report, it includes a description of
the sensitive information, risks and controls in place. The detail in this part of the report
should be in compliance with the AICPA description criteria. This criteria is discussed below
in 3.7.3.
Management’s assertion – Management give their opinion on whether the risks were set
out are in line with the criteria and if the controls are appropriate.
40
MAC4866/505
The practitioner’s opinion – The final section is where the qualified accountant gives their
opinion on the description of the risks and if the controls will be successful.
3.7.3 Criteria
AICPA uses two sets of criteria in order to help with the writing and evaluation of the
management description that also allows for comparability of the reports. These two criteria
include:
Description criteria – this is a comprehensive 33 page document that details the areas that
an organisation needs to take into account when identifying the cyber security risks it may
be subjected to and the necessary controls to be put in place. You now need to refer to your
textbooks for further discussion on this, there are approximately six pages on what the
description criteria entails.
Control criteria – this is a comprehensive document that is over 300 pages long. It lists the
various potential risks and controls an organisation could have in place. Students you don’t
need to study this 300 page document, but have a look at the examples of the information in
your textbook this is two pages long. You can on your own conduct further research.
Below is a link to a video on the AICPA framework and a number of other resources
https://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/aicpacybersecurityinitiative.h
tml
The link below will take you to the 33 page description criteria of the framework.
https://www.aicpa.org/InterestAreas/FRC/AssuranceAdvisoryServices/DownloadableDocuments
/Cybersecurity/Description-Criteria.pdf
The link below is an example of a report, have a look at this to see how detailed the
report should be.
https://www.aicpa.org/content/dam/aicpa/interestareas/frc/assuranceadvisoryservices/download
abledocuments/illustrative-cybersercurity-risk-management-report.pdf
Students you will not be tested on the 300 page control criteria document or the 33 page
description criteria document. However, you will be tested on what is given in the textbook on
these two.
3.7.4 National Institute of Standards and Technology (NIST) cyber security framework
NIST is a non-regulatory agency in the United States that developed a framework for cyber
security. It involves three components namely:
Implementation tiers – help organisations select the most appropriate level of cyber
security program and use as a communication tool to linking risk appetite, budget and
mission priority.
Core – provides a set of cyber security activities, based on five principles namely:
o Identify
o Protect
o Detect
41
o Respond
o Recover
These are depicted in the diagram below.
Profiles – these map the objectives to the desired outcomes included in the core.
Confidentiality, integrity and availability, also known as the CIA Triad. These are the three
elements that support the model. The model is used to assist organisations understand their
information security and set up policies to help secure the organisation.
Please see the YouTube clip below for a brief explanation of the AIC Triad.
https://www.youtube.com/watch?v=11_Hp5Dvx5E&feature=youtu.be
Refer to your textbooks for more detail on the AIC Triad.
Summary
In the above section, the cyber security tools and techniques along with the reporting
frameworks were discussed. Irrespective of the name of the framework they all operate along
similar concepts namely, understanding the data, keeping it safe from an attack, establishing
any issues and having a clear plan on dealing with any issues should they occur. After studying
this chapter ask yourself, can I recommend cyber security tools and techniques and what
frameworks can be used to report cyber risks?
42
MAC4866/505
References
Bodnar, GH & Hopwood, WS. 2010. Accounting information systems. 10th edition. Upper
Saddle River, NJ: Pearson.
Eccles, MG, Julyan, FW, Boot, G & Van Belle, JP. 2000. The principles of business computing.
5th edition. Kenwyn: Juta.
Gelinas Jr, UJ & Dull, RB. 2008. Accounting information systems. 7th edition. Mason, OH:
Thomson South-Western.
Hall, J. 2008. Accounting information systems. 6th edition. Mason, OH: Cengage Learning.
Leitch, RA & Davis, KR. 2001. Accounting information systems: theory and practice. 2nd
edition. Englewood Cliffs, NJ: Prentice-Hall.
Kaplan Publishing, 2019. Official study text. Managing Finance in a Digital World. Operational
level. E1. Berkshire. UK. Kaplan Publishing.
Romney, MB & Steinbart, PJ. 2009. Accounting information systems. 11th edition. London:
Pearson Education.
43