You are on page 1of 31

C

Information Systems Controls


for System Reliability
Part 2: Confidentiality, Privacy,
Processing Integrity, and
Availability
2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

1 of 136

INTRODUCTION
Questions to be addressed in this chapter include:
What controls are used to protect the confidentiality of
sensitive information?
What controls are designed to protect privacy of
customers personal information?
What controls ensure processing integrity?
How are information systems changes controlled to
ensure that the new system satisfies all five
principles of systems reliability?

2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

2 of 136

INTRODUCTION
Reliable systems satisfy
five principles:

AVAILABILITY

PROCESSING INTEGRITY

PRIVACY

CONFIDENTIALITY

SYSTEMS
RELIABILITY

Information Security
(discussed in Chapter 7)
Confidentiality
Privacy
Processing integrity
Availability

SECURITY
2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

3 of 136

CONFIDENTIALITY
Maintaining confidentiality requires that
management identify which information is
sensitive.
Each organization will develop its own definitions
of what information needs to be protected.
Most definitions will include:

Business plans
Pricing strategies
Client and customer lists
Legal documents

2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

4 of 136

CONFIDENTIALITY
Table 8-1 in your textbook summaries key
controls to protect confidentiality of information:
Situation

Controls

Storage

Encryption and access controls

Transmission

Encryption

Disposal

Shredding, thorough erasure, physical


destruction

Overall

Categorization to reflect value and training


in proper work practices

2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

5 of 136

CONFIDENTIALITY
It is critical to encrypt any sensitive information
stored in devices that are easily lost or stolen,
such as laptops, PDAs, cell phones, and other
portable devices.
Many organizations have policies against storing
sensitive information on these devices.
81% of users admit they do so anyway.

2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

6 of 136

CONFIDENTIALITY
Access to system outputs should also be controlled:
Do not allow visitors to roam through buildings unsupervised.
Require employees to log out of any application before
leaving their workstation unattended, so other employees do
not have unauthorized access.
Workstations should use password-protected screen savers
that automatically engage when there is no activity for a
specified period.
Access should be restricted to rooms housing printers and
fax machines.
Reports should be coded to reflect the importance of the
information therein, and employees should be trained not to
leave reports with sensitive information laying in plain view.

2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

7 of 136

CONFIDENTIALITY
Many organizations are taking steps to address
the confidentiality threats created by email and
IM.
One response is to mandate encryption of all email
with sensitive information.
Some organizations prohibit use of freeware IM
products and purchase commercial products with
security features, including encryption.
Users sending emails must be trained to be very
careful about the identity of their addressee.
EXAMPLE: The organization may have two employees
named Allen Smith. Its critical that sensitive information go to
the correct Allen Smith.
2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

8 of 136

PRIVACY

SECURITY
2008 Prentice Hall Business Publishing

AVAILABILITY

PROCESSING INTEGRITY

PRIVACY

CONFIDENTIALITY

SYSTEMS
RELIABILITY

In the Trust Services


framework, the privacy
principle is closely related to
the confidentiality principle.
Primary difference is that
privacy focuses on protecting
personal information about
customers rather than
organizational data.
Key controls for privacy are
the same that were
previously listed for
confidentiality.

Accounting Information Systems, 11/e

Romney/Steinbart

9 of 136

PRIVACY
COBIT section DS 11 addresses the
management of data and specifies the need to
comply with regulatory requirements.
A number of regulations, including the Health
Insurance Portability and Accountability Act
(HIPAA) and the Financial Services
Modernization Act (aka, Gramm-Leach-Billey
Act) require organizations to protect the privacy
of customer information.

2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

10 of 136

PRIVACY
The Trust Services privacy framework of the AICPA and CICA
lists ten internationally recognized best practices for protecting
the privacy of customers personal information:

Management
The organization assigns one
Notice
or more employees to be
responsible for assuring and
Choice and consent
verifying compliance with its
Collection
stated policies.
Use and retention
Also provides for procedures
Access
to respond to customer
Disclosure to Third Parties complaints, including thirdSecurity
party dispute-resolution
processes.
Quality
Monitoring and enforcement

2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

11 of 136

PRIVACY
One topic of concern is cookies used on Web
sites.
A cookie is a text file created by a Website and stored
on a visitors hard drive. It records what the visitor has
done on the site.
Most Websites create multiple cookies per visit to
make it easier for visitors to navigate the site.
Browsers can be configured to refuse cookies, but it
may make the Website inaccessible.
Cookies are text files and cannot do anything other
store information, but many people worry that they
violate privacy rights.
2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

12 of 136

PRIVACY
Another privacy-related issue that is of growing
concern is identity theft.
Organizations have an ethical and moral obligation to
implement controls to protect databases that contain
their customers personal information.

2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

13 of 136

PRIVACY
Consequently, organizations must carefully follow the CANSPAM guidelines, which include:
The senders identity must be clearly displayed in the message header.
The subject field in the header must clearly identify the message as an
advertisement or solicitation.
The body must provide recipients with a working link that can be used to
opt out of future email.
The body must include the senders valid postal address.
Organizations should not:
Send email to randomly generated addresses.
Set up Websites designed to harvest email addresses of
potential customers.
Experts recommend that organizations redesign their
own Websites to include a visible means for visitors
to opt in to receive email.

2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

14 of 136

PROCESSING INTEGRITY
COBIT control objective

SECURITY
2008 Prentice Hall Business Publishing

AVAILABILITY

PROCESSING INTEGRITY

PRIVACY

CONFIDENTIALITY

SYSTEMS
RELIABILITY

DS 11.1 addresses the


need for controls over the
input, processing, and
output of data.
Identifies six categories of
controls that can be used
to satisfy that objective.
Six categories are grouped
into three for discussion.

Accounting Information Systems, 11/e

Romney/Steinbart

15 of 136

PROCESSING INTEGRITY
Three categories/groups of integrity
controls are designed to meet the
preceding objectives:
Input controls
Processing controls
Output controls

2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

16 of 136

PROCESSING INTEGRITY
Once data is collected, data entry control procedures are
needed to ensure that its entered correctly. Common
tests to validate input include:

Field check
Sign check
Limit check
Range check
Size (or capacity) check
Completeness check
Validity check
Reasonableness test
Check digit verification

2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

17 of 136

PROCESSING INTEGRITY
Processing Controls
Processing controls to ensure that data is
processed correctly include:

Data matching
File labels
Recalculation of batch totals
Cross-footing balance test
Write-protection mechanisms
Database processing integrity procedures

2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

18 of 136

AVAILABILITY

AVAILABILITY

PROCESSING INTEGRITY

PRIVACY

CONFIDENTIALITY

SYSTEMS
RELIABILITY

Reliable systems are available


for use whenever needed.
Threats to system availability
originate from many sources,
including:

Hardware and software failures


Natural and man-made disasters
Human error
Worms and viruses
Denial-of-service attacks and
other sabotage

SECURITY
2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

19 of 136

AVAILABILITY
COBIT control objectives DS 12.1 and 12.4
address the importance of proper location and
design of rooms housing mission-critical servers
and databases.
Raised floors protect from flood damage.
Fire protection and suppression devices reduce
likelihood of fire damage.
Adequate air conditioning reduces likelihood of
damage from over-heating or humidity.
Cables with special plugs that cannot be easily
removed reduce risk of damage due to accidentally
unplugging.
2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

20 of 136

AVAILABILITY
An uninterruptible power supply (UPS)
provides protection from a prolonged power
outage and buys the system enough time to
back up critical data and shut down safely.

2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

21 of 136

AVAILABILITY
Training is especially important.
Well-trained operators are less likely to make mistakes
and more able to recover if they do.
Security awareness training, particularly concerning
safe email and Web-browsing practices, can reduce
risk of virus and worm infection.

Anti-virus software should be installed, run, and


kept current.
Email should be scanned for viruses at both the
server and desktop levels.
Newly acquired software and disks, CDs, or
DVDs should be scanned and tested first on a
machine that is isolated from the main network.
2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

22 of 136

AVAILABILITY

COBIT control objective DS 13.1 stresses the


importance of defining and documenting
operational procedures and ensuring that
operations staff understand their
responsibilities.

2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

23 of 136

AVAILABILITY
Key components of effective disaster
recovery and business continuity plans
include:
Data backup procedures
Provisions for access to replacement
infrastructure (equipment, facilities, phone
lines, etc.)
Thorough documentation
Periodic testing
Adequate insurance
2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

24 of 136

CHANGE MANAGEMENT CONTROLS


Organizations constantly modify their information
systems to reflect new business practices and to take
advantage of advances in IT.
Controls are needed to ensure such changes dont
negatively impact reliability.
Existing controls related to security, confidentiality,
privacy, processing integrity, and availability should be
modified to maintain their effectiveness after the change.
Change management controls need to ensure adequate
segregation of duties is maintained in light of the
modifications to the organizational structure and
adoption of new software.

2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

25 of 136

CHANGE MANAGEMENT CONTROLS


Important change management controls include:
All change requests should be documented in a
standard format that identifies:
Nature of the change
Reason for the change
Date of the request

All changes should be approved by appropriate levels


of management.
Approvals should be clearly documented to provide an audit
trail.
Management should consult with the CSO and other IT
managers about impact of the change on reliability.
2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

26 of 136

Attacks threatening confidentiality


In general, two types of attack threaten the confidentiality of
information: snooping and traffic analysis. Snooping refers
to unauthorized access to or interception of data. Traffic
analysis refers other types of information collected by an
intruder by monitoring online traffic.
Attacks threatening integrity
The integrity of data can be threatened by several kinds of
attack: modification, masquerading, replaying and
repudiation.

16.27
2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

27 of 136

Attacks threatening availability


Denial of service (DoS) attacks may slow down or totally
interrupt the service of a system. The attacker can use several
strategies to achieve this. They might make the system so
busy that it collapses, or they might intercept messages sent
in one direction and make the sending system believe that
one of the parties involved in the communication or message
has lost the message and that it should be resent.

16.28
2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

28 of 136

Security services
Standards have been defined for security services to achieve
security goals and prevent security attacks. Figure 16.3
shows the taxonomy of the five common services.

Figure 16.3 Security services


16.29
2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

29 of 136

Techniques
The actual implementation of security goals needs some help
from mathematics. Two techniques are prevalent today: one
is very generalcryptographyand one is specific
steganography.
Cryptography
Some security services can be implemented using
cryptography. Cryptography, a word with Greek origins,
means secret writing.
Steganography
The word steganography, with its origin in Greek,
means covered writing, in contrast to cryptography,
which means
16.30
secret
writing.
2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart
30 of 136

End

2008 Prentice Hall Business Publishing

Accounting Information Systems, 11/e

Romney/Steinbart

31 of 136

You might also like