Uploaded by Kayla Grace

B6 - IT Notes

advertisement
Becker’s CPA Course
Business Environment
and Concepts
Version 4.0
Lydia McCracken
B6:M3 – B6:M6
Contents
B6:M3 – The Role of IT in Business ...................................................................................................................................... 1
B6:M4 – Data Management and Analytics .......................................................................................................................... 4
B6:M5 – System Development and Change Management .................................................................................................. 6
B6:M6 – IT Risks and Reponses ......................................................................................................................................... 10
B6:M3 – The Role of IT in Business
(1) The Role of IT in Business
Systematic Implementation of hardware and software so that data can be transmitted, modified, accessed, and
stored.
(2) IT Infrastructure
Multiple, interconnected technological components, with the infrastructure involving a combination of onpremise and outsourced hardware, software, and specialized personnel.
•
•
•
•
•
•
Hardware → Physical components of computers and computer-related accessories
Infrastructure Housing → Facilities and the safeguards on those facilities that contain hardware
Networking Devices → Enables connectivity and communication between devices on a computer
o Routers: Manage network traffic, determine the most efficient path through the network for the
packet to travel.
o Switches (Power Strip): Similar to routers, connect and divide devices with a computer network. Does
not perform as many advanced functions as a router.
o Gateway: Acts as intermediary between different networks. Transforms data from one protocol to
another. A protocol is a rule or set of rules that governs the way in which information is transmitted.
o Servers: Coordinates the computers, programs and data that are part of the network. Client sends a
request to the server, and it provides a response or executes some action.
o Firewall: Software or hardware, that protects a person’s or a company’s network traffic by filtering it
through security protocols with predefined rules.
▪ Circuit-Level Gateways: Verifying the source of a packet and meet rules and polices set by the
security team.
▪ Network Address Translation Firewalls: Assign an internal network address to specific
approved external sources.
▪ Stateful Multilayer Inspection Firewalls: Combines the two firewalls above.
▪ Next-Generation Firewalls: Different firewall rules to different applications as well as users.
Software → Applications, procedures, or programs that provide instructions for a computer to execute.
Networks → A group of computers and other machines that are interconnected electronically using a series
of networking devices.
o Local Area Network (LANs): Limited geographic area
o Wide Area Network (WANs): Connect other networks such as LANs together to provide broad
coverage.
Mobile Technology → Technology that travels! Allows organizational activities to occur in real time. An
extension of mobile technology is IoT (Internet of Things) which typically requires either Bluetooth or internet
(such as Google Home).
(3) The Role of Management Information Systems (MIS)
Enables companies to use data as part of their strategic planning process as well as the tactical execution of that
strategy.
•
Accounting Information System (AIS) → Collects, records, and stores accounting information, then complies
that information using accounting rules to report both financial and nonfinancial information to decision
makers. Also, creates an audit trail for accounting transactions.
o AIS Subsystems:
▪ Transaction Processing System (TPS): Converts economic events to financial transactions and
distributes the information
▪ Financial Reporting System (FRS) or General Ledger System (GLS): Aggregates daily financial
information from the TPS. Enable timely regulatory and financial reporting
▪ Management Reporting System (MRS): Information to solve day-to-day business problems.
o Functions of an AIS:
▪ Collect, record, and store data and transactions
▪ Transform data into information through compilation and reporting
▪ Safeguard and maintain data integrity
•
Decision Support System (DSS) → Interactive tools to support day-to-day decision making
o “What-if” Scenarios: Often used for forecasting activities of managerial importance
o Artificial Intelligence: An expert system is designed to mimic the knowledge and decision-making
abilities of the users who employ them so that decisions can be automated.
Executive Information Systems (EIS) → Provide senior executives with immediate and easy access to internal
and external information to assist in strategic decision making. Often present data in high-level reports and
visualizations that allow for big-picture decision making to ensure alignment with overall strategic objectives.
•
Data in an AIS is often processed and aggregated to become inputs to a DSS and an EIS to
enable management to make data-driven decision.
•
Customer Relationship Management (CRM) System → Enables organizations to monitor and manage
interactions between the organization and its past, current, and potential customers.
o CRM Objectives:
▪ Enhance existing customer satisfaction
▪ Attract new customers
▪ Targeted marketing
▪ Anticipate customer needs
▪ Enable cross-selling and upselling
▪ Forecast sales and manage sales staff
▪ Manage sales leads
o CRM Strategies:
▪ Create customer profiles
▪ Personalized experiences and promotions
▪ Automate recommendations and cross-selling opportunities
o CRM Benefits:
▪ Increase customer service
•
•
•
•
•
•
▪ Increase revenue/profits
▪ Making offerings that are perceived by the consumer to be tailored and unique to them
o Types of CRM:
▪ Operational CRM → Generates leads and converts them those into customers
▪ Analytical CRM → Insights to management to aid in the decision-making process
▪ Collaborative or Strategic CRM → Collaboration and sharing of customer information across
function such as sales, marketing, and support teams.
Inventory Management → Assist with tracking procurement, and distribution of inventory items. Usually
connected to a point-of-sale POS) system.
Knowledge Management System (KMS) → IT system that disseminates knowledge related to the
organization.
Supply Chain Management (SCM) → Unifies business process beginning with the original supplier and ending
with the customer.
o SCM Objectives: Achieving flexibility and responsiveness in meeting the demands of customers and
business partners (Planning → Sourcing → Making → Delivery)
o SCM Benefits:
▪ Enhanced control
▪ Reduce cash tired up in inventory
▪ Increases cash flow and its predictability
▪ Improve forecasting for procurement , delivery, and production
Enterprise Resource Planning (ERP) → Cross functional systems that are utilized to support different business
functions and allow for the integration of information across departments.
o ERP Benefits:
▪ Stores information in central repository
▪ Acts as the framework for integrating and improving organization's ability to monitor and
track sales
▪ Provide vital cross functional information
▪ Improve customer service
▪ Allows greater access controls
o ERP Disadvantages:
▪ Time to successfully implement
▪ Extremely cost prohibitive
▪ Integration of all the business units can be complex
▪ Significant changes to the business processes
Enterprise Performance Management (EPM) → Also known as Business Performance Management (BPM) or
Corporate Performance Management (CPM). Is factual solutions designed to help executives make strategic
decisions.
EPM is more management-process focused whereas ERP is more focused on
operational practice.
E-Commerce → Facilitates the sale of goods and services using the internet.
o Types of e-commerce:
▪ Business-to-Business (B2B): Buying and selling of goods and services between business
entities
▪ Business-to-Consumer (B2C): Business to interface and sell goods to their consumers
▪ Consumer-to-Business (C2B): Reversal of traditional buying and selling model
▪ Consumer-to-Consumer (C2C): Online marketplace in which individual consumers buy and
sell goods with each other.
▪ Government E-Commerce: Between government and any other entity
o Electronic Fund Transfer system (EFTs): EFT system uses an online network in a variety of
technologies to transact, process, and verify money transfers and credits among banks, businesses,
and consumers
(4) IT Outsourcing and Cloud Computing
o
o
o
o
o
Could Computing → Renting storage space, processor power, proprietary software, or a combination of the
three, on remote service from other company rather than buying or building those components.
▪ Infrastructure-as-a-Service (IaaS): Outsources any of the servers, storage, hardware, networking
services, and networking components to third party providers, and is generally billed on a per-use
basis.
▪ Platform-as-a-Service (PaaS): Rent tools or solutions remotely that are used to fulfill a specific
business purpose.
▪ Software-as-a-Service (SaaS): Company delivers a host subscription-based software services to
customers through licensing or service delivery.
IT Outsourcing Advantages
▪ Lower costs: Pay for what they need
▪ Expertise: Disorganization access to IT experts on all fractional cost basis
▪ Resources: Specialized in high quality resources
▪ Enhanced focus on the core business
IT Outsourcing Disadvantages
▪ Less control: loses some control over how the IT functions are performed and grants the outsourced
firm access to sensitive information
▪ Quality control
▪ Immediate access to IT support: Perceived lack of access to IT personnel
Outsourcing Risk
▪ Security and privacy practices
▪ Data access ability
▪ Data disposal
▪ Vulnerability for attacks
System and Organization Controls (SOC)
▪ SOC 1® → Attestation Engagement (SSAE) 18. Assurance that the service organizations controls are
designed and operating effectively so that the financial statements are not negatively impacted.
• Type 1: Fairness of the presentation of management's description of the service organization
system and the suitability of the design of controls
• Type 2: Also reports on the operating effectiveness of the controls to see the related control
objectives
▪ SOC 2® → SSAE 18. Need at the station concerning controls as they relate to security, processing
integrity, availability, and privacy (also has a type 1 and type 2 reports)
▪ SOC 3® → Attestation concerning controls as they relate to security, processing integrity, availability,
and privacy. However, this report is for companies that do not have the knowledge required to make
effective use of SOC 2® report.
B6:M4 – Data Management and Analytics
(1) The Evolving Role of Big Data in the Decision-Making Process
•
•
•
•
Data: Fact, occurrence, instance, or an otherwise measurable observation.
Big Data: Corporate accumulation of massive amounts of data that can be used for analysis, commonly
referred to as data analytics.
Dimensions of Big Data (5 Vs)
o Volume → Quantity of amount of data points
o Velocity → Speed of data accumulation or data processing
o Variety → Range of data types being used (Structure, Unstructured, Semi-Structured)
o Veracity → Reliability, quality, or integrity of the data
o Value → Insights Big Data can yield
Big Data Governance: Comes with challenges, such as ethical and legal concerns pertaining to the
organization itself, employees, customers, and stakeholders.
o Big Data Confidentiality → Safeguarded to protect it from an authorized access and exploitation
o
o
o
Big Data Privacy →Customer and patient data must be safeguarded from unauthorized access to
meet customer privacy expectations as well as regulatory requirements
Big Data Ethics → Understand the ethical implications at every step of the data lifecycle. Make
sure authorized personnel are granted the minimum level of access to data necessary to perform
their functions. Attempt to eliminate bias in the algorithm apply to decision support models.
Governance Responsibility → Should be led by a designated individual, should have input from
leaders across the organization, and periodically updated as necessary
(2) Data Management
•
•
Storing Data in Relational Databases: One of the most efficient and effective methods for many use cases
is to store data in a relational database.
o Relational Databases → Allow data to be stored in different tables and the tables are linked
through relationships using key fields.
Relational Database Concepts
o Tables → Establishes columns and rows to store specific types of data records
o Attributes (Columns) → Describes the characteristics or properties
o Records (Rows) → Record contains information about one entity within the table.
o Fields → intersection of column and row in which data is entered (data values)
o Data Types → Category of data
o Database Keys → Unique identifiers and create relationships within relational database
▪ Primary Key: Unique identifier for a specific row, made up of one or more attributes.
▪ Foreign Key: Attributes in one table that are also primary keys in another table.
o Relationships → Link between a primary key in one table and a foreign key in another table.
o Data Dictionary → Provides information about the data in a database. Typically lists each
attribute and denotes the features and limitations of that attribute.
o Database Views
▪ Logical Database View: How the data appears to a user
▪ Physical Database View: How the data is actually stored
o Data Queries and Reports → Extracting data is typically done via query tools
(3) Extract, Transform, and Load (ETL)
•
•
•
Data Extraction: Automated process, semi-automated process, or manual extraction. Native source and
the means of assessing the data must be determined this will dictate the tools needed for designing the
overall process of extraction.
o Data Identification → Understand the issue the business is trying to address to ensure that data
request has the proper scope to resolve it.
o Obtaining Data → If the ETL process is automated, API will most likely be designed.
▪ Requesting The Data: Recipient of the request must be provided with full details of what
is needed including the data file, type, format type, and required attributes.
▪ Manual Extraction: A person may have to use specialized data mining software or right
customized queries to obtain the data.
Transforming Data: Taking the often unstructured data, cleaning it, and validating it for sure it is accurate
and ready for analysis.
Loading the Data: Load the data into a software program for analysis or into a data storage location.
o Data Storage
▪ Operational Data Store: Capturing in operational activities from variety of input systems.
▪ Data Warehouse: Very large data repositories that are centralized and utilized for
reporting and analysis rather than for transaction purposes.
▪ Data Mart: Like data warehouse but is more focused on specific purpose such as
marketing or logistics and is often a subset of data warehouse.
▪ Data Lake: Similar to data warehouse, but it contains both structured and unstructured
data, with data mostly being in its natural or roll format.
o Data Storage Requirements
▪
▪
o
o
o
Entity Integrity: Each table must have a unique primary key as a record identifier
Preferential Integrity: A change to a primary key in one table must also cause a change to
any related foreign key in a table that is linked.
Storage Attributes
▪ Relevance
▪ Elements to be included and excluded
▪ Relationship between elements include validity, completeness, and accuracy
Types of Loading
▪ Initial Full Loading: Entire data set is loaded into our repository
▪ Incremental Loading: Difference between existing data and new data
▪ Full Refresh Loading: Entire data set is loaded into repository, replacing the previous load
Mode Verification: Vital validate it to ensure no data was lost in the process
(4) Data Analytics
•
•
Process of taking room data, identifying trends, and then transforming that knowledge into insights that
can help solve complex business problems. Once the ETL process has been performed, data analytics can
be utilized for a variety of tasks, including validation, planning, insights, risk mitigation, and decision
support.
Types Of Data Analytics
o Descriptive Analytics: What happened.
▪ Observant’s summary statistics
▪ Storing the data
▪ Analyzing data based on distinguishing characteristics
o Diagnostic Analytics: Why the event happened
▪ Performing a drill-down analysis
▪ Performing cluster or profile analysis
▪ Performing correlation analysis
▪ Performing sequence checks
o Predictive Analytics: Transitioning insight into foresight
▪ Regression analysis
▪ Classification analysis
▪ Decision tree
o Prescriptive Analytics: How to shape a desired event
▪ Artificial intelligence and machine learning
▪ Scenario modeling or “what-if” analysis
B6:M5 – System Development and Change Management
(1) Evolving the IT Infrastructure: Organizations update their IT infrastructure over time to keep pace with the
shifts or to be early adopters.
(2) Change Management Overview: Polices, procedures, and resources employed to govern change in an
organization.
• The Change Management Process
o Identify and define the need
o Design a high-level plan including goals
o Approval from management
o Appropriate budget and timeline
o Assign personnel
o Identify and address potential risks
o Implementation road map
o Necessary resources, including IT, and train the appropriate personnel
o Test the change
o Execute the implementation plan
o
Review and monitor change, test as needed
(3) Change Management Risks
•
•
•
Selection and Acquisition Risks
o Lack of expertise
o Lack of formal selection and acquisition process
o Software/Hardware Vulnerability and Incompatibility
Integration Risk
o User resistance
o Lack of management support
o Lack of stakeholder support
o Resource concerns
o Business disruption
o Lack of system integration
Outsourcing Risks
o Lack of organizational knowledge
o Uncertainty of the third party’s knowledge and management
o Lack of security
(4) Change Management Controls
•
•
Change Management and New Systems Controls: Controls are designed to minimize the possibility that
the inherent risks will cause business disruptions or negatively impact IT systems.
o Polices & Procedures: Clear change management guidelines, from selection to integration and
maintenance
o Emergency Change Polices: Separate contingency policies and procedures
o Standardized Change Requests: Using consistent forms and requests protocols
o Impact Assessment: Documentation noting the effect a change will have
o Authorization: Designated levels of authority
o Separation of Duties: Will help protect against assets or information being utilized improperly
o Conversion Controls: Minimize data conversion errors related to the impacted IT assets
o Reversion Access: Unexpected complications, ability to revert to the prior system or process that
existed before the change.
▪ Can be accomplished via parallel implementation.
o Pre-implementation Testing: Determine if the change is functioning properly and there are no
irregularities.
o Post-implementation Testing: Reconciling transactions processed in the new environment
against the same transactions that were processed in the previous environment.
o Ongoing Monitoring: Continuous periodic reviews
Outsourcing Controls
o Outsourcing policies and procedures
o System and organization controls (SOC) reports
o Utilize key performance indicators (KPIs)
(5) Managing Risks of System Development
•
System Development Life Cycle
o
Waterfall Model: Different teams of employees performing separate
tasks in sequence. Some challenges associated with this model:
▪
Great deal of time to complete
▪
Benefits not utilized until complete
▪
No customer input and change can be difficult to manage
▪
Some employees may be idle
o
o
•
Plan: Evaluates the needs for a new or improved information system.
Analyze: Information is gathered from all vital stakeholders. Compile and analyze all the needs of
the end users to establish specific and detailed goals.
o Design: Start with high-level conceptual designs. Creation of the technical implementation plan.
Individual technologies are evaluated and selected.
▪ Conceptual Design → Broad translation of the business requirements
▪ Logical Design → Hardware/Software specifications
▪ Physical Design → More granular platform and product specifications
o Develop: Buildings and rooms are prepared, hardware is purchased, and delivered, and
programmers create proprietary software to run the company’s new product if applicable.
o Test: System is checked for adherence to the business requirements.
▪ Backward-looking testing → Which tests against initial requirements
▪ Forward-looking testing → Conducted to see how well employees and customers can
perform tasks (user-acceptance testing)
o Deploy: Choose and document an implementation strategy
▪ Plunge or big Bang → Immediately deliver to all customers and clients (lowest cost,
highest risk)
▪ Ramped (Rolling, Phased) Conversion → Portions of the new system replace
corresponding parts of the old system (above-average cost, below-average risk)
▪ A/B Testing (Pilot, Canary) → Subset of users gets the new system first (average cost,
average risk)
▪ Blue/Green (or Other Pair of Colors), or Shadow → New system is fully deployed in
parallel with the old system (highest cost, lowest risk)
o Maintain: Ongoing adjustments and improvements
Systems Development and New System Risks
o Resource Risk: Expensive and time-consuming. Risk that allocation of resources related to
finance, labor or time is insufficient.
o Scheduling Risk: Uncertainty pertaining to the timeline and schedule. Work backwards to
establish milestones in the timeline.
o Technical Risk: Systems development is driven by the need for new or updated technology that
requires technical knowledge. May not be adequately staffed to handle problems that require
strong technical knowledge. If the technical design and functionality do not align with user needs
and the organizational strategies, this misalignment may require significant rework.
o Project Management Risk: team does not have clearly defined leadership, team member roles,
responsibilities, and project goals.
o User Resistance Risk: Employees will not accept the system, refusal to use the new system,
treating the system as scapegoat for any issue that arise, blatantly damaging components of the
system.
(6) Managing Risk of Legacy System
•
•
•
•
Legacy System: Outdated technology or system already in service. Benefits of maintaining a legacy system
versus phasing it out and replacing it usually do not outweigh the risks of keeping the system.
Reasons for Persistence of Legacy System
o Costs
o Time
o User resistance
o Features and customization
o Risk of information loss
Risks of Legacy Systems
o Security Vulnerability: May be extremely vulnerable regarding security
o Lack of Vendor Support: Eventually, support will end, and new vulnerabilities may not be
discovered in timely manner.
o Compatibility Issues: Incompatible with modern systems
o Lack of Efficiency and Effectiveness: Not be able to compare with the speed/reliability of a
modern system.
Mitigating Risks of Legacy Systems
o Isolating the System: Isolating risky legacy system from other systems
o Hardening: Turning off any unnecessary features
o Virtual Patches: Could be applied at the network level
o Monitoring: Frequent review and monitoring of legacy systems
(7) Information Systems and Change Management Testing Strategies
•
•
•
•
Purpose of Testing
o Whether the software is operating as expected
o Discovers errors, defects, missing components, and gaps in the software
o Meets the business and users’ requirements
Software Testing Process
o Testing plan
o Identify and prioritize the key areas
o Which type of test
o Execute
o Results and identify defects
o Report the findings
Guidelines for Successful Testing
o Emphasizes rapid cycle. Identifies major bugs
o Build robust automated testing
o Formal technical reviews
o Continuous testing approach
Types of Tests
o Unit Test: Validate the smallest components, isolate each part of the program and show that
each part is functioning properly and as designed.
o Integration Tests: If the units, once they are combined, function as designed together.
o System Tests: Evaluate the system as a whole. Determine whether it meets the functional and
technical specifications in addition to any specified quality.
▪ Functional Tests: Validate those functions are working effectively and efficiently
▪ Black-Box Testing: Testers focus on testing the system in the same manner an end user
would validate outcomes
▪ White-Box Testing: Provides the user with many details and focused on code and design
improvement.
▪ Exploratory Tests: Less-common or exception-based situations with no specified tst cases
▪
•
•
•
Performance Testing: Test the tun-time (speed) performance of software when
processing the required workload.
▪ Recovery Testing: Ability to recover from failures
▪ Security Testing: Rerun pervious test cases after new features or functionalities have
been incorporated.
▪ Regression Tests: Rerun pervious test cases after new features or functionalities have
been incorporated
▪ Stress Testing: How well it deals with abnormal resource demands.
▪ Sanity Testing: Exercises the logical reasoning and behavior of the software to determine
whether system logic is functioning as designed.
o Acceptance Tests: Whether the software works correctly for the intended user in the normal
work environment. QA team has a set of prewritten scenarios and test cases that are used to test
the application.
▪ Alpha Test: Tested by the customer under the supervision of the developer at the
developer’s site.
▪ Beta Test: Tested by the customer at his or her own site without the developer being
present.
Change Management Testing: Testing of the change process and controls both within the organization
and outside the organization.
o Inspecting policies and procedures
o Reviewing controls and test whether they are designed and operating effectively
Testing the Change: Organizations may test the actual change!
Testing Outsourced Changes: If the change management process was outsourced, then the same testing
that would be performed for an internally performed change should be executed.
B6:M6 – IT Risks and Reponses
(1) Understanding IT Risks
•
•
The overall process for understanding how risks can be identified and addressed is through the security
life cycle.
Security Life Cycle:
o Identify: What assets exist and identify and document the risks
o Assess: Likelihood of the risks, level of the impact of that threat
o Protect: Mitigation strategies. Developing and communicating security polices and procedures
and developing and implementing controls.
o Monitor: Continually monitor for new risks and ensure that current risk mitigation efforts are still
effective.
(2) Identifying IT Risks
•
•
Technology Risk: Disruption to business as a result of any information technology activity
o Security Risk: Unauthorized access or user of an organization’s information technology
o Availability Risk: Organization will not be able to access and utilize its information technology as
needed.
o Operational Risk: Organization is unable to operate effectively or efficiently due to issues
concerning information technology.
o Financial Risk: Risk of losing financial resources as a result of them being misused, lost, wasted, or
stolen.
o Compliance Risk: IT not sufficiently meeting the requirements of regulatory bodies.
o Strategic Risk: Risk of misalignment of business and IT strategies.
Types of IT Threats
o Natural and political disasters
o Errors in software and equipment malfunctions
o Accidental actions
•
•
o Intentional actions
Risk Management
o To successfully manage risk, organizations must meet the following three objectives:
▪ Integrate the management of IT into the overall risk management
▪ Make well-informed decisions abut the nature and extern of the risk, the risk appetite,
and the risk tolerance of the enterprise.
▪ Develop a response to the risk
o IT Risk Defined: Business risk associated with the use, ownership, operation, involvement,
influence, and adoption of IT within an enterprise.
IT Risk Mitigation Strategies and Roles: Starts with the people within the organization. Management must
determine what the overall risk appetite is for the organization and develop a security strategy that
includes policies and procedures to align that risk appetite with information systems and information
technology.
o Organization must include controls designed to safeguard confidentiality, integrity, and
availability of data.
o Organization must determine its risk appetite in order to build its information security policies
and procedures.
o Security policy is a document that defines how an organization plans to protect its IT
infrastructure and resources, including its tangible and intangible information assts.
o Goal of a good security policy is to require individuals to protect the IT infrastructure and
information.
o Security policy is communicated to everyone within an organization. Receipt and
understandability of security policy requires either an assessment or acknowledgement of
responsibility and recognition.
(3) The Role and Categorization of IT Controls
•
•
•
Categories of IT Controls
o General Controls: Ensure that an organization’s control environment is stable and well-managed
o Application Controls: Build into typical business process that use computer applications. Ensure
that transactions and data processed through the computer applications are accurate, complete,
valid, and authorized.
Nature of IT Controls
o Manual Controls: Performed by a person without making direct use of automated systems
o Automated Controls: Performed by an automated system without interference of a person
o IT-Dependent Manual Controls: Individual performing a control function with some use of an IT
component (combination)
Function of IT Control
o Preventive Controls: Take precautions to prevent problems
o Detective Controls: Find and reveal issues or deficiencies not averted by preventative controls
o Corrective Controls: Identify, repair, restore, and recover from issues that cause damage to a
system or process.
(4) System Access and Segregation of Duties
•
•
Vital that system access controls and segregation of duties exist to mitigate risks of fraud and error.
Defense-in-depth approach, multiple layers of security controls are implemented to ensure that
mitigating controls are in place if other controls fail.
Logical Access Controls: Utilize software and protocols to monitor and control access to information and
an organization’s IT infrastructure.
o User Access Controls: Identify which users access the system and to track their activity while
using this system.
o Authorization Controls: There must be a process to verify the individual who is accessing and
utilizing the system
▪
•
•
•
•
•
•
Passwords, personal identification numbers (PIN), biometrics, physical tokens, push
notifications, multifactor authentication.
Managing Passwords: Policy must address the following password characteristics – Requirement, length,
complexity, age, and rescue.
Access Control Lists: Restricts access and actions of authenticated users based on granted permissions.
o Create (or write) access
o Read only
o Update access
o Delete
Personnel Changes: Important that their access, authentication, and authorization is modified as
appropriate
o Documented in procedures
o HR should generate the request
o Mechanism to disable accounts when an employee leaves an organization
Network Security: Security in place to protect its private network from unauthorized access.
o Packet-Filtering Firewall: Inspect the header information found in packets of data that travel
between the organization’s network and the internet.
o Application-Based Firewall: Exchange of information but not the direct exchange of packets.
o Stateful Inspection: Packet header and destination
o Organizations may also employ intrusion detection systems (IDSs)
Vulnerability Controls
▪ Hardening: When application or systems are first installed, reduce their surface
vulnerability by turning off features or functions that are not needed.
▪ Patch Management: As vulnerabilities are discovered they should be addressed by
patches (fixes)
▪ Anti-malware Program: Implementing robust procedures around the uses of external
devices, accessing certain websites, and executing suspicious programs, in addition to
installing malware controls to monitor and identify threats.
o Data Encryption: Essential foundation for electronic commerce. Password or a digital key to
scramble a readable message into an unreadable message. Recipient uses another digital key to
decrypt the ciphertext message back into plaintext.
▪ Symmetric Encryption: Sender and recipient use the same key
▪ Asymmetric Encryption: Sender and recipient use the different keys
o Digital Certificates: Certify the identify of the owners of a particular public key. Contains that
party’s public key.
▪ Public Key Infrastructure (PKI): Refers to the system and processes used to issue and
manage asymmetric keys and digital certificates.
o Digital Signatures use asymmetric encryption to create legally binding electronic documents.
Web-based E-Signatures are an alternative and are provided by vendors as a software product.
Physical Controls: Monitor and control the environment of the workplace and computing facilities.
o Physical access controls are often preventive controls that stop or deter unauthorized access to a
facility. Physical access controls can also be applied to specific assets that may be at risk.
o Segregation of Duties: Reduces opportunities for anyone to be in a position to both perpetrate
and conceal errors or fraud in the normal course of one’s duties.
▪ Segregation od duties normally revolves around granting and/or restricting access to
production programs, production data, and execution activities.
▪ Following areas need to have proper segregation of duties: System programming, end
user transaction/data, data custody and storage, and authorization responsibility and
monitoring.
▪ Analysts = Hardware; Programmers = Software
▪ Security Administrators are responsible for restricting access to systems, applications, or
databases. If the security administrator were also a programmer for that system, that
individual could gain access to unauthorized areas as well give access to another person.
(5) Risks and Controls of Critical, Confidential, and Private Information
•
•
•
•
•
•
Important to understand how information should be safeguarded.
o Critical Information: Vital for the organizations to perform its essential functions and achieve its
strategic objectives.
o Confidentiality: Keep information within or about the organization from being misused or access
without authorization.
o Privacy: The rights of employees and customers to keep their personal information safe and to
understand how their information will be collected, used, and disclosed to others.
First, identify what data and information is stored in all their data repositories. Categorize the data as
confidential, private, and/or critical, and determine what risks exist and how those risks will be mitigated
and controlled.
Confidential information poses many risks as data loss may cause reputational, operational and /or
financial harm to an organization.
Privacy Risk: Impact the data if an organization’s employees, customers, and users. Protected by many
regulatory standards.
Reputational Risks: When customers’ private data is leaked or disclosed.
Policy Management and Training: Require users within an organization to adhere to strict guidelines
concerning safeguarding confidential and private information. Robust training program covering these
policies.
Download