Question

In: Accounting

Select one area of risk related to auditing operating systems and networks: Describe the threats associated...

Select one area of risk related to auditing operating systems and networks: Describe the threats associated with the risk area. What are the associated controls to address and reduce the likelihood of these threats? What are the audit objectives related to these controls? List the appropriate audit procedures to test these controls?

Solutions

Expert Solution

Hello,

Need for Protection of Operating Systems

As their are many issues but some of them are listed below:-

x    Widespread use of technology;

x    Interconnectivity of systems;

x    Devolution of management and control;

x    Attractiveness of conducting unconventional electronic attacks over more conventional
         physical attacks against organizations; and

x    External factors such as legislative, legal, and regulatory requirements or technological
               developments.

Audit objective of the controls is to maintain the below points in operating systems and network

x    Confidentiality: Prevention of the unauthorized disclosure of information;
x    Integrity: Prevention of the unauthorized modification of information; and
x    Availability: Prevention of the unauthorized withholding of information.

Following required to be checked in organisation whether they are present in organisation or not like mentioned below:-

User Security Policies - These include User Security Policy and Acceptable Usage Policy

x    User Security Policy - This policy sets out the responsibilities and requirements
         for all IT system users. It provides security terms of reference for Users, Line

Managers and System Owners.

x    Acceptable Usage Policy - This sets out the policy for acceptable use of email,
         Internet services and other IT resources.

Organization Security Policies - These include Organizational Information Security

Policy, Network & System Security Policy and Information Classification Policy.

x    Organizational Information Security Policy - This policy sets out the Group
         policy for the security of its information assets and the Information Technology (IT)

systems processing this information. Though it is positioned at the bottom of the hierarchy, it is the main IT security policy document.

x    Network & System Security Policy - This policy sets out detailed policy for
         system and network security and applies to IT department users.

x    Information Classification Policy - This policy sets out the policy for the
         classification of information.

Conditions of Connection - This policy sets out the Group policy for connecting to the network. It applies to all organizations connecting to the Group, and relates to the conditions that apply to different suppliers’ systems.

Issue selected is unauthorised Physical Access in organisation which may cause below :-

Physical Access Issues and Exposures

The following points elaborate the results due to accidental or intentional violation of

the access paths:

x     Abuse of data processing resources;

x     Blackmail;

x     Embezzlement (an act of dishonestly withholding assets for the purpose of conversion (theft) of such assets, by one or more persons to whom the assets

were entrusted, either to be held or to be used for specific purposes);

x     Damage, vandalism or theft to equipments or documents;

x     Public disclosure of sensitive information; and

x     Unauthorized entry.

Controls related to physical unauthorised access is mentioned below :-

(a) Locks on Doors: These are given as follows:

o    Cipher locks (Combination Door Locks) - Cipher locks are used in low security situations or when a large number of entrances and exits must be usable all the time. To enter, a person presses a four digit number, and the door will unlock for a predetermined period of time, usually ten to
thirty seconds.

o    Bolting Door Locks - A special metal key is used to gain entry when the lock is a bolting door lock. To avoid illegal entry, the keys should be not be duplicated.

o    Electronic Door Locks - A magnetic or embedded chip-based plastics   card key or token may be entered into a reader to gain access in these systems

(b) Physical Identification Medium: These are discussed below:

o    Personal Identification numbers (PIN): A secret number will be
         assigned to the individual, in conjunction with some means of identifying the individual, serves to verify the authenticity of the individual. The visitor will be asked to log on by inserting a card in some device and then entertheir PIN via a PIN keypad for authentication. His/her entry will be

matched with the PIN number available in the security database.

o    Plastic Cards: These cards are used for identification purposes.Customers should safeguard their card so that it does not fall into unauthorized hands.

o    Identification Badges-Special identification badges can be issued to personnel as well as visitors. For easy identification purposes, their colour of the badge can be changed. Sophisticated photo IDs can also be utilized as electronic card keys.

(c)    Logging on Facilities: These are given as under:

o    Manual Logging: All visitors should be prompted to sign a visitor’s log indicating their name, company represented, their purpose of visit, and person to see. Logging may happen at both fronts - reception and entrance to the computer room. A valid and acceptable identification such as a driver’s license, business card or vendor identification tag may also be asked for before allowing entry inside the company.

o    Electronic Logging: This feature is a combination of electronic and biometric security systems. The users logging can be monitored and the unsuccessful attempts being highlighted

(d)    Other means of Controlling Physical Access: Other important means of controlling physical access are given as follows:

o    Video Cameras: Cameras should be placed at specific locations and monitored by security guards. Refined video cameras can be activated by motion. The video supervision recording must be retained for possible future play back.

o Security Guards: Extra security can be provided by appointing guards aided with CCTV feeds. Guards supplied by an external agency should be made to sign a bond to protect the organization from loss.

o Controlled Visitor Access: A responsible employee should escort all visitors. Visitors may be friends, maintenance personnel, computer vendors, consultants and external auditors.

o Bonded Personnel: All service contract personnel, such as cleaning people and off-site storage services, should be asked to sign a bond. This may not be a measure to improve physical security but to a certain extent can limit the financial exposure of the organization.

o Dead Man Doors: These systems encompass a pair of doors that are typically found in entries to facilities such as computer rooms and document stations. The first entry door must close and lock, for the second door to operate, with the only one person permitted in the holding area.

o Non-exposure of Sensitive Facilities: There should be no explicit indication such as presence of windows of directional signs hinting the presence of facilities such as computer rooms. Only the general location of the information processing facility should be identifiable.

o Computer Terminal Locks: These locks ensure that the device to the desk is not turned on or disengaged by unauthorized persons.

o Controlled Single Entry Point: All incoming personnel can use controlled Single Entry Point. A controlled entry point is monitored by a receptionist. Multiple entry points increase the chances of unauthorized entry. Unnecessary or unused entry points should be eliminated or deadlocked.

o Alarm System: Illegal entry can be avoided by linking alarm system to inactive entry point and the reverse flows of enter or exit only doors, so as to avoid illegal entry. Security personnel should be able to hear the alarm when activated.

o Perimeter Fencing: Fencing at boundary of the facility may also enhance the security mechanism.

o Control of out of hours of employee-employees: Employees who are out of office for a longer duration during the office hours should be monitored carefully. Their movements must be noted and reported to the concerned officials frequently

o Secured Report/Document Distribution Cart: Secured carts, such as mail carts, must be covered and locked and should always be attended.

Thanks hope you like this compilation of answer


Related Solutions

Enterprise Risk Management (ERM) is directly related to auditing. Describe the relationship between ERM and auditing....
Enterprise Risk Management (ERM) is directly related to auditing. Describe the relationship between ERM and auditing. Why is ERM important to an organization?  
What are three control Risk associated with auditing a Company and for each control risk include:...
What are three control Risk associated with auditing a Company and for each control risk include: Identify the control risk Describe the factors that led you to identify the control risk Explain why you feel it is a key control risk Describe what testing you would plan to do to address the control risk
spoke about auditing but specifically risk-based audit. Risk-based audit focuses on auditing controls and systems rather...
spoke about auditing but specifically risk-based audit. Risk-based audit focuses on auditing controls and systems rather than numbers.
What are the manor threats to infrastructure systems and how can risk analysis be used to...
What are the manor threats to infrastructure systems and how can risk analysis be used to improve security?
Systematic risk: Select one: 1. is related to the overall economy. 2. is measured by beta....
Systematic risk: Select one: 1. is related to the overall economy. 2. is measured by beta. 3. is compensated for by the risk premium. 4. cannot be avoided if you wish to participate in the financial markets. 5. can be effectively eliminated through portfolio diversification.
Select one of the Healthy People 2020 objectives and identify how biological risk (including age-related risk),...
Select one of the Healthy People 2020 objectives and identify how biological risk (including age-related risk), environmental risk (including economic risk), and behavioral risk contribute to family health risks for that objective. Give examples. 2. Identify three public health problems in your community and discuss the implications of these problems for the health of families. How did you arrive at your conclusions?
Competency Evaluate the threats and risks associated with accounting information systems. Scenario Information BeGood Baking Supply...
Competency Evaluate the threats and risks associated with accounting information systems. Scenario Information BeGood Baking Supply is a small bakery supply company formed as a closely held corporation. The company supplies raw baking materials, paper goods, and equipment to restaurants and bakeries in three states in the upper mid-west. Most of its business, however, is located in a large metropolitan area. BeGood wants to increase its presence in the region and serve five states. In fact, the owners of BeGood...
Machine learning Neural Networks question: Which one statement is true about neural networks? (Select the single...
Machine learning Neural Networks question: Which one statement is true about neural networks? (Select the single best answer), and please explain why they are true or false: (A) We always train neural networks by optimising a convex cost function. (B) Neural networks are more robust to outliers than support vector machines. (C) Neural networks always output values between 0 and 1. (D) A neural network with a large number of parameters often can better use big training data than support...
Machine learning Neural Networks question: Which one statement is true about neural networks? (Select the single...
Machine learning Neural Networks question: Which one statement is true about neural networks? (Select the single best answer), and please explain why they are true or false: (A) We always train neural networks by optimising a convex cost function. (B) Neural networks are more robust to outliers than support vector machines. (C) Neural networks always output values between 0 and 1. (D) A neural network with a large number of parameters often can better use big training data than support...
Select one area of biological science and one female scientist involved in this area of science....
Select one area of biological science and one female scientist involved in this area of science. Take a few moments to reflect on the popularity of this subject in the last 50 years. What does the female scientist you selected have to say about females in this area of science and does she make a good role model for young women today entering into science. Does this subject relate more to males or females? How has it changed in the...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT