@ChuckIsReady
2018-11-16T03:33:34.000000Z
字数 8310
阅读 457
未分类
Auditing
: a systematic process of objectively obtaining and evaluating evidence regarding assertions about economic actions and events to ascertain the degree of correspondence between those assertions and establishing criteria and communicating the results to interested usersInformation System Auditing Objectives
Validate information service functions
Validate the controls of the system development life cycle
Validate the access controls to equipment and facilities
Automate the internal auditing activities
Prepare internal training
Collaborate with external auditors
Internal Control Objectives
- Safeguard assets
- Ensure the accuracy and reliability of records
- Promote efficiency
- Measure compliance with policies and procedures
- Reduce the frequency of undesirable events
- more cost-effective
- identify undesirable events that elude preventive controls
- Uncover errors by comparing
- Reverse the effects
- Always take the best feasible corrective action
Structure of an IT Audit:
Audit Planning Phase
- Review Policies, Practices, and Structure
- Review General Controls and Application Controls
- Plan Tests of Controls and Substantive Testing Procedures
Tests of Control Phase
- Perform Tests Of Controls
- Evaluate Test Results
- Determine Degree Of Reliance on Controls
Substantive Testing Phase
- Perform Substantive Tests
- Evaluate Results And Issue Auditor’s Report
==>Audit Report
Categories of Control Activities
- General Controls
- Application Controls
- Independent Verification
- Transaction Authorization
- Segregation Of Duties
- Supervision
- Audit trail provision
- Access Control
Information Systems Audit Program
- Environmental controls
- Physical security controls
- Logical security controls
- IS operating controls
Areas to Concern Regarding Operating Security Controls
- Operational procedures and responsibilities
- Documented Operating Procedures
- Segregation of Duties
- Incident Handling
- Service Delivery
- Third party service delivery management
- Monitoring and Review of Third Party Services
- Managing Changes to Third Party
- Backup
- Information Backup
- Media handling
- Management of Removable Media and System Documentation, Disposal of Media
- Exchange of information
- Information Exchange Policies and Procedures
- Exchange Agreements
- Physical Media in Transit and Electronic Messaging
- Business Information Systems
- Monitoring
- Audit Logging
- Monitoring System Use
- Protection of Log Information and Administrator and Operator Logs
- Clock Synchronization
Provision of a Secure Area
- Security Perimeter
- Control on Physical Entry
- Sensitive Facilities and Security Office
- Delivery and Loading Areas
General Controls
- Disposal or re-use of equipment
- Clear desk and clear screen policy
(Other Types:)- Physical locks
- Security guards
- Video surveillance cameras
- General emergency and detection procedures
- Heating, ventilation, and cooling (HVAC) systems
- Emergency power and uninterruptible power supply (UPS) systems
- Insurance coverage
- Backups
Business Resumption Programs
Can be referred as disaster recovery programs
- List of key contact personnel
- Primary and secondary headquarters sites
- Identify and rank operational areas in terms of criticality and risk
- Events that should trigger the BRP
- Concise descriptions of actions to be taken in each operation area
- Measures to deal with potential psychological impact of disaster
Logical Security Controls
- Deal with the protection of system, application program and data
- Restrict access capabilities of system users
- Challenge
- Unauthorized activities by a system security administrator
- Solution
- Require a second system security administrator –segregate the duties
- System log
Access Controls
- Restrict use of computer system resources to authorized users
- Limit actions the authorized users can take
- Ensure users obtain only authentic computer system resources
The objective of IS auditor: to ensure the management practices for the development/acquisition, testing, implementation, maintenance, and disposal of systems and infrastructure will meet the organization’s objectives.
Traditional System Development Life Cycle Approach (SDLC)
Postimplementation Review
Advantage
Problems
- Potential risks
- The new system does not meet the users’ business needs, requirementsand expectations
- Project activities exceedthe limits of financial resources assigned to the project, and it may finally lead to late completion
Framework PPTM(People | Process| Tools| Measures)
Test Steps for Auditing Applications
Software Capability Maturity Model Integration (CMMI)
Five maturity levels
1. Initial
2. Managed
3. Defined
4. Quantitatively Managed
5. Optimizing
A maturity model can be used as a benchmark for assessing different organizations for equivalent comparison
Security Objectives
- Confidentiality
Resources are accessed by authorized parties- Integrity
No unauthorized modification to the system- Availability
Resources/services accessible as expected
- Additional objectives:
- Accountability
Resources/services accessible as expected- Authenticity
User/data origins are accurately identifiableDifferent Types of Threats
- Interception
unauthorized access
- Modification
unauthorized alters
- Fabrication
counterfeiting
- Interruption
unavailable
Caesar Cipher
C = E(p) = (p + k) mod (26)
p = D(C) = (C – k) mod (26)
Rail Fence Cipher
Problems:
- Key distribution
- Key management
- Authentication problem
- Repudiation problem
Means of User Authentication
- What the person knows
E.g., password, PIN
- What the person possesses
E.g., smart cards, token
- Who the person is (static biometrics)
E.g., recognition by fingerprint, retina, face
- What the person does (dynamic biometrics)
E.g., recognition by voice, handwriting
Two Factor Authentication (2FA)
Simple Password Protocol
challenge: response protocol for remote authentication via password
using nonce to assure message freshness and against replay of an oldmessage
Web SSO Exchange
Network Layer Security
IP Security (IPSec)
: A protocol suite for securing IP at the network layer
Goals
: secure traffic between any two IP systemsIPsec Services
- Access control
- Packet filtering
- Data integrity
- The packet has not been altered in transit
- Replay attack prevention
- Data origin authentication
- Source specified in the packet header
- Confidentiality
- Communication nodes can encrypt messages to prevent eavesdropping
IPsec plays a vital role in the routing architecture required for internetworking
- Pros
- Transparent to all applications
- Device authentication transparent to end users
- Adds to IP level end-to-end data reliability, secure sequencing of datagrams, authentication and confidentiality
- Secure routing architecture
- Cons
- Ties user to a single machine
- Crypto operations adds to packet overhead, affecting throughput and latency
- Complex to implement, choice of configurations
- Does not prevent traffic analysis
Transport Layer Security
- Provide end-to-end secure communication channel over the Internet:
- Secure Socket Layer (SSL)
- Transport Layer Security (TLS)
- Designed to prevent eavesdropping, tampering, and message forgery
- Can be used to encapsulate the application-specific protocols such as HTTP, FTP, SMTP, etc.
SSL Handshake
1. Establish security capabilities
- Client hello: including protocol version, session ID, cipher suite, compression method, and initial random numbers
2. Server authentication & key exchange
- Server hello, certificate, server key exchange, and certificate request.
3. Client authentication & key exchange
- Certificate, client key exchange, certificate verification
4. Finish
- Change cipher suite and finishFirewall
A choke point of control & monitoring by interconnect networks with differing trust
- Limitations
- Cannot protect from attacks bypassing it
- Cannot protect against internalthreats
- Cannot protect against access via Wireless LAN
- Cannot protect against malware imported via laptop, PDA, storage infected outside