




已阅读5页,还剩2页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
CHAPTER 8INFORMATION SYSTEMS CONTROLSFOR SYSTEMS RELIABILITYPART 2: CONFIDENTIALITY, PRIVACY,PROCESSING INTEGRITY, AND AVAILABILITYINTRODUCTION Questions to be addressed in this chapter include: What controls are used to protect the confidentiality of sensitive information? What controls are designed to protect privacy of customers personal information? What controls ensure processing integrity? What controls ensure that the system is available when needed? According to the Trust Services framework, reliable systems satisfy five principles: Security (discussed in Chapter 7) Confidentiality Privacy Processing integrity Availability.CONFIDENTIALITY Reliable systems protect confidential information from unauthorized disclosure. Confidential information includes sensitive data produced internally as well as that shared by business partners. Each organization will develop its own definitions, which usually include: business plans, pricing strategies, client and customer lists, and legal documents. Encryption is a fundamental control procedure for protecting the confidentiality of sensitive information. Confidential information should be encrypted while stored and during transmission to trusted parties. The internet provides inexpensive transmission, but data is easily intercepted. Encryption solves the interception issue. If data is encrypted before sending it, a virtual private network (VPN) is created. It is critical to encrypt any sensitive information stored in devices that are easily lost or stolen, such as laptops, PDAs, cell phones, and other portable devices. Many organizations have policies against storing sensitive information on these devices, but 81% of users do so anyway. Encryption alone is not sufficient to protect confidentiality. Access controls and strong authentication techniques are also needed. Strong controls should be used to limit the actions (read, write, change, delete, copy, etc.) that authorized users can perform when accessing confidential information. Access to system outputs should also be controlled. It is especially important to control disposal of information resources. Special procedures are needed for information stored on magnetic and optical media. Controls to protect confidentiality must be continuously reviewed and modified to respond to new threats created by technological advances. Many organizations now prohibit visitors from using cell phones while touring their facilities because of the threat caused by cell-cams. Phone conversations routed over the Internet are also vulnerable. Employee use of email and instant messaging (IM) probably represents two of the greatest threats to the confidentiality of sensitive information.PRIVACY In the Trust Services framework, the privacy principle is closely related to the confidentiality principle. The primary difference is that privacy focuses on protecting personal information about customers rather than organizational data. Key controls for privacy are the same that were previously listed for confidentiality. Federal and some state regulations require organizations to protect the privacy of customer information. The Trust Services privacy framework of the AICPA and CICA lists ten internationally recognized best practices for protecting the privacy of customers personal information: ManagementEstablish policies and procedures to protect privacy of personal information collected. Assign responsibility to a particular person or group. NoticeNotify individuals when their information is collected. Choice and consentGive customers a choice to opt out (U.S.) or opt in (Europe) to the collection of their personal information. CollectionMeans collect only what is needed. Use and retentionMeans retain only as long as needed. AccessAllow customers to access, review, and delete their information. Disclosure to Third PartiesProvide to third parties only per policy and require the same protection. SecurityTake reasonable steps to protect the information from loss or unauthorized disclosure. QualityMaintain the integrity of the information. Monitoring and enforcementAssign a third party to assure and verify compliance. A related concern involves the overwhelming volume of spam-unsolicited email that contains either advertising or offensive content. A 2003 Congressional Act, CAN-SPAM, provides criminal and civil penalties for violation of the law, applies to commercial email, and covers most legitimate email sent by organizations to customers, suppliers, or donors to non-profits. CAN-SPAM guidelines include: The senders identity must be clearly displayed in the message header. The subject field in the header must clearly identify the message as an advertisement or solicitation. The body must provide recipients with a working link that can be used to “opt out” of future email. The body must include the senders valid postal address. Organizations should not send email to randomly generated addresses or set up websites designed to harvest email addresses of potential customers. Organizations need to train employees on how to manage personal information collected from customers. One privacy-related issue is identity theft. Organizations have an ethical and moral obligation to implement controls to protect databases that contain their customers personal information.PROCESSING INTEGRITY A reliable system produces information that is accurate, timely, reflects results of only authorized transactions, and includes outcomes of all activities engaged in by the organization during a given period of time. Reliability requires controls over both data input quality and the processing of the data. Five categories of integrity controls are designed to meet the preceding objectives: Source data controls-Companies must establish control procedures to ensure that all source documents are authorized, accurate, complete, properly accounted for, and entered into the system or sent to their intended destination in a timely manner. Source data controls include forms design; pre-numbered forms sequence tests; turnaround documents; cancellation and storage of documents; authorization and segregation of duties; visual scanning; check digit verification; and RFID security. Data entry controls-Once data is collected, data entry control procedures are needed to ensure that its entered correctly. Common tests to validate input include: field checks, sign checks, limit checks, range checks, size checks, completeness checks, validity checks, and reasonableness tests. In addition to the preceding controls, when using batch processing, the following data entry controls should be incorporated: sequence checks, error logs, and batch totals. Online data entry controls include: automatic entry of data; prompting; pre-formatting; closed-loop verification; transaction logs; and error messages. Processing ControlsControls to ensure that data is processed correctly include: Data MatchingInvolves matching two or more items before processing can proceed. File LabelsExternal and internal labels to ensure that the correct and most current files are being updated. Recalculation of batch totals Cross-footing balance test Write-protection mechanisms Database processing integrity measuresinclude database administrators, data dictionaries, and concurrent update controls. Data conversion controls Data transmission controls-Organizations need controls to minimize the risk of data transmission errors. When the receiving unit detects a data transmission error, it asks the sending unit to re-send. This action is usually done automatically. Sometimes, the system may not be able to accomplish automatic resubmission and will ask the sender to re-transmit the data. There are two basic types of data transmission controls: Parity checkingadds an additional bit to the digit being transmitted. The receiving device performs parity checking to verify that the proper number of bits is received (odd or even) for each character. Message acknowledgment techniques include:o Echo checksThe sending unit calculates a summary statistic, and the receiving unit recalculates it to see that they match.o Trailer recordsThe sending unit stores control totals in a trailer record, and the receiving unit uses that information to verify the entire message was received.o Numbered batchesBatches being transmitted are numbered sequentially. The receiving unit uses those numbers to properly assemble the batches. Output controlsCareful checking of system output provides additional control over processing integrity. Output controls include: User review of output for reasonableness, completeness, and to be sure they are the intended recipient. Reconciliation procedures involve reconciling all transactions and system updates to control reports, etc., and reconciling control account balances to totals of subsidiary accounts. External data reconciliation involves reconciling stored data with data from outside the system.AVAILABILITY Reliable systems are available for use whenever needed. Threats to system availability originate from many sources, including hardware and software failures; natural and man-made disasters; human error; worms and viruses; and denial-of-service attacks and other sabotage. Organizations must develop disaster recovery and business continuity plans to enable them to quickly resume normal operations after such an event. Steps to minimize the risk of system downtime include: physical and logical access controls (Chapter 7); good computer security to minimize risk of theft or sabotage; preventive maintenance; use of redundant components to provide fault tolerance; surge protection devices; and an uninterruptible power supply. Risks associated with natural and man-made disasters can be reduced with proper location and design of rooms housing mission-critical servers and databases. Training is especially important. Well-trained operators are less likely to make mistakes and more able to recover if they do. Security awareness training, particularly concerning safe email and web-browsing practices, can reduce risk of virus and worm infection. Anti-virus software should be installed, run, and kept current. Email should be scanned for viruses at both the server and desktop levels. Newly acquired software and disks, CDs, or DVDs should be scanned and tested first on a machine that is isolated from the main network. Disaster recovery and business continuity plans are essential if an organization hopes to survive a major catastrophe. The objectives of a disaster recovery and business continuity plan are to: minimize the extent of the disruption, damage, and loss; temporarily establish an alternative means of processing information; resume normal operations as soon as possible; and train and familiarize personnel with emergency operations. Key components of effective disaster recovery and business continuity plans include: data backup procedures; provisions for access to replacement infrastructure (equipment, facilities, phone lines, etc.); thorough documentation; periodic testing; and adequate insurance.CHANGE MANAGEMENT CONTROLS Organizations constantly modify their information systems to reflect new business practices and to take advantage of advances in IT. Controls are needed to ensure such changes dont negatively impact reliability. Existing controls related to security, confidentiality, privacy, processing integrity, and availability should be modified to maintain their effectiveness after the change. Change management controls need to ensure adequate segregation of duties is maintained in light of the modifications to the organizational structure and adoption of new software. Important change management controls include: documentation of change requests in a standard format; approval of change requests at various levels of management; thorough testing; updated program, system, and procedure documentation; procedures for emergency changes; back-out plans; and monitoring of user rights and privileges.SUMMARY OF MATERIAL COVERED Controls used to protect the confidentiality of sensitive information. Controls used to protect the privacy of customer information. Controls that help ensure processing integrity. Controls to ensure that the system is available when needed.TEACHING TIPS Like the previous chapter, this chapter also includes a great deal of technical material with which the accountant should be familiar but probably not an expert. Understanding terminology is a valuable first step. In particular, practice with an encryption example, such as the example in the book or the Power Point supplement, can help students grasp an appreciation for how digital signatures are created and the role of digital certificate and certificate authorities.CHAPTER 8 CROSSWORD PUZZLEAcross1A verification procedure that checks accuracy of input data by using it to retrieve and display related information (2 words).5The system requests each input data item and waits for an acceptable response.10A check that ensures that the value is on the list of permissible responses for this field.11A check to de
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年静脉输液外渗应急演练方案、脚本及总结(2篇)
- 2025年电子商务师职业技能知识考试题与答案
- 摩托车复工安全知识培训课件
- 摩托摔车安全知识培训内容课件
- 摔跤力量训练课件
- 摄影博主基础知识培训课件
- 烹饪技术考试试题及答案
- 2025新款购房合同
- 2025混凝土班组合同范文
- 搭船的鸟课件
- 出租充电桩车位合同范本
- 2025年广元市中考数学试题卷
- 2025年9月新版劳务用工合同范本(可规避风险)
- 工会考试试题题库及答案解析-工会考试试题题库
- DB32- 4385-2022《锅炉大气污染物排放标准》
- 2022年西安陕鼓动力股份有限公司招聘笔试题库及答案解析
- 钢丝绳课件-图文
- 城市轨道交通安全管理课件(完整版)
- 健康照护教材课件汇总完整版ppt全套课件最全教学教程整本书电子教案全书教案课件合集
- 被执行人财产申报表
- 公对公借款协议
评论
0/150
提交评论