SlideShare a Scribd company logo
1 of 41
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Accounting Information Systems, 8e
James A. Hall
Chapter 16
IT Controls Part II: Security
and Access
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Objectives for Chapter 16
 Be able to identify the principal threats to the
operating system and the control techniques used
to minimize the possibility of actual exposures.
 Be familiar with the principal risks associated with
electronic commerce conducted over intranets and
the Internet and understand the control techniques
used to reduce these risks.
 Be familiar with the risks to database integrity and
the controls used to mitigate them.
 Recognize the unique exposures that arise in
connection with electronic data interchange (EDI)
and understand how these exposures can be
reduced.
2
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Operating Systems
 Perform three main tasks:
 translates high-level languages into
the machine-level language
 allocates computer resources to user
applications
 manages the tasks of job scheduling
and multiprogramming
3
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Requirements for Effective Operating
Systems Performance
 Protect against tampering by users
 Prevent users from tampering with the
programs of other users
 Safeguard users’ applications from accidental
corruption
 Safeguard its own programs from accidental
corruption
 Protect itself from power failures and other
disasters
4
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Operating Systems Security
 Log-On Procedure
 first line of defense – user IDs and passwords
 Access Token
 contains key information about the user
 Access Control List
 defines access privileges of users
 Discretionary Access Control
 allows user to grant access to another user
5
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Operating Systems Controls
Access Privileges
 Audit objectives: verify that access
privileges are consistent with separation of
incompatible functions and organization
policies
 Audit procedures: review or verify…
 policies for separating incompatible functions
 a sample of user privileges, especially access to
data and programs
 security clearance checks of privileged
employees
 formal acknowledgements to maintain
confidentiality of data
 users’ log-on times
6
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Operating Systems Controls
Password Control
 Audit objectives: ensure adequacy and
effectiveness of password policies for
controlling access to the operating system
 Audit procedures: review or verify…
 passwords required for all users
 password instructions for new users
 passwords changed regularly
 password file for weak passwords
 encryption of password file
 password standards
 account lockout policies
7
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Operating Systems Controls
Malicious & Destructive Programs
 Audit objectives: verify effectiveness of
procedures to protect against programs such
as viruses, worms, back doors, logic bombs,
and Trojan horses
 Audit procedures: review or verify…
 training of operations personnel concerning
destructive programs
 testing of new software prior to being
implemented
 currency of antiviral software and frequency of
upgrades
8
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Operating System Controls
Audit Trail Controls
 Audit objectives: used to (1) detect
unauthorized access, (2) facilitate event
reconstruction, and/or (3) promote
accountability
 Audit procedures: review or verify…
 how long audit trails have been in place
 archived log files for key indicators
 monitoring and reporting of security violations
9
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Database Management Controls
Two crucial database control issues:
Access controls
 Audit objectives: (1) those authorized to use
databases are limited to data needed to
perform their duties and (2) unauthorized
individuals are denied access to data
Backup controls
 Audit objectives: backup controls can
adequately recover lost, destroyed, or
corrupted data
10
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Access Controls
 User views - based on sub-schemas
 Database authorization table - allows
greater authority to be specified
 User-defined procedures - used to
create a personal security program or
routine
 Data encryption - encoding algorithms
 Biometric devices - fingerprints, retina
prints, or signature characteristics
11
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
12
Database Authorization Table
Figure 16-2
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Access Controls
Audit procedures: verify…
 responsibility for authority tables &
subschemas
 granting appropriate access authority
 use or feasibility of biometric controls
 use of encryption
13
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Subschema Restricting Access
14
Figure 16-1
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Backup Controls
 Database backup – automatic periodic
copy of data
 Transaction log – list of transactions that
provides an audit trail
 Checkpoint features – suspends data
during system reconciliation
 Recovery module – restarts the system
after a failure
15
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Backup Controls
 Audit procedures: verify…
 that production databases are
copied at regular intervals
 backup copies of the database
are stored off site to support
disaster recovery
16
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Internet and Intranet Risks
 The communications component is a unique
aspect of computer networks:
 different than processing (applications) or data
storage (databases)
 Network topologies – configurations of:
 communications lines (twisted-pair wires, coaxial
cable, microwaves, fiber optics)
 hardware components (modems, multiplexers,
servers, front-end processors)
 software (protocols, network control systems)
17
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Sources of Internet & Intranet Risks
Internal and external subversive activities
Audit objectives:
1. prevent and detect illegal internal and Internet
network access
2. render useless any data captured by a
perpetrator
3. preserve the integrity and physical security of
data connected to the network
Equipment failure
Audit objective: the integrity of the electronic
commerce transactions by determining that
controls are in place to detect and correct
message loss due to equipment failure
18
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Risks from Subversive Threats
 Include:
 unauthorized interception of a
message
 gaining unauthorized access to an
organization’s network
 a denial-of-service attack from a
remote location
19
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
IC for Subversive Threats
Firewalls provide security by channeling all
network connections through a control
gateway.
 Network level firewalls
 Low cost and low security access control
 Do not explicitly authenticate outside users
 Filter junk or improperly routed messages
 Experienced hackers can easily penetrate the
system
 Application level firewalls
 Customizable network security, but expensive
 Sophisticated functions such as logging or user
authentication
20
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Dual-Homed Firewall
21
Figure 16-4
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
IC for Subversive Threats
 Denial-of-service (DOS) attacks
 Security software searches for
connections which have been half-
open for a period of time.
 Encryption
 Computer program transforms a
clear message into a coded (cipher)
text form using an algorithm.
22
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
SYN Flood DOS Attack
23
Sender Receiver
Step 1: SYN messages
Step 2: SYN/ACK
Step 3: ACK packet code
In a DOS Attack, the sender sends hundreds of messages, receives the
SYN/ACK packet, but does not response with an ACK packet. This
leaves the receiver with clogged transmission ports, and legitimate
messages cannot be received.
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Controlling DOS Attacks
 Controlling for three common forms of DOS attacks:
 Smurf attacks—organizations can program firewalls to
ignore an attacking site, once identified
 SYN flood attacks—two tactics to defeat this DOS attack
• Get Internet hosts to use firewalls that block invalid IP
addresses
• Use security software that scan for half-open connections
 DDos attacks–many organizations use Intrusion Prevention
Systems (IPS) that employ deep packet inspection (DPI)
• IPS works with a firewall filter that removes malicious packets from the
flow before they can affect servers and networks
• DPI searches for protocol non-compliance and employs
predefined criteria to decide if a packet can proceed to its
destination
(See chapter 12 for more on DOS attacks)
24
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Encryption
 The conversion of data into a secret code for storage
and transmission
 The sender uses an encryption algorithm to convert
the original cleartext message into a coded ciphertext.
 The receiver decodes / decrypts the ciphertext back
into cleartext.
 Encryption algorithms use keys
 Typically 56 to 128 bits in length
 The more bits in the key the stronger the encryption method.
 Two general approaches to encryption are private key
and public key encryption.
25
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Private Key Encryption
 Advance encryption standard (AES)
 A 128 bit encryption technique
 A US government standard for private key encryption
 Uses a single key known to both sender and receiver
 Triple Data Encryption Standard (DES )
 Considerable improvement over single encryption techniques
 Two forms of triple-DES encryption are EEE3 and EDE3
 EEE3 uses three different keys to encrypt the message three
times.
 EDE3—one key encrypts, but two keys are required for
decoding
 All private key techniques have a common problem
 The more individuals who need to know the key, the greater
the probability of it falling into the wrong hands.
 The solution to this problem is public key encryption. 26
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
The Advanced Encryption Standard
Technique
27
Figure 16-5
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
EEE3 and EDE3 Encryption
28
Figure 16-6
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
IC for Subversive Threats
 Digital signature – electronic authentication
technique to ensure that…
 transmitted message originated with the authorized
sender
 message was not tampered with after the signature
was applied
 Digital certificate – like an electronic
identification card used with a public key
encryption system
 Verifies the authenticity of the message sender
29
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Digital Signature
Figure 16-7
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
IC for Subversive Threats
 Message sequence numbering – sequence
number used to detect missing messages
 Message transaction log – listing of all
incoming and outgoing messages to detect the
efforts of hackers
 Request-response technique – random
control messages are sent from the sender to
ensure messages are received
 Call-back devices – receiver calls the sender
back at a pre-authorized phone number before
transmission is completed
31
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Auditing Procedures for
Subversive Threats
 Review firewall effectiveness in terms of
flexibility, proxy services, filtering, segregation
of systems, audit tools, and probing for
weaknesses.
 Review data encryption security procedures
 Verify encryption by testing
 Review message transaction logs
 Test procedures for preventing unauthorized
calls
32
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
IC for Equipment Failure
Line errors are data errors from
communications noise.
 Two techniques to detect and correct
such data errors are:
 echo check - the receiver returns the
message to the sender
 parity checks - an extra bit is added onto
each byte of data similar to check digits
33
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Vertical and Horizontal Parity
using Odd Parity
34
Figure 16-8
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Auditing Procedures for Equipment
Failure
 Using a sample of messages from the
transaction log:
 examine them for garbled contents
caused by line noise
 verify that all corrupted messages were
successfully retransmitted
35
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Electronic Data Interchange
 Electronic data interchange (EDI) uses
computer-to-computer communications
technologies to automate B2B purchases.
 Audit objectives:
1. Transactions are authorized, validated, and in
compliance with the trading partner agreement.
2. No unauthorized organizations can gain access
to database
3. Authorized trading partners have access only to
approved data.
4. Adequate controls are in place to ensure a
complete audit trail.
36
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
EDI Risks
 Authorization
 automated and absence of human
intervention
 Access
 need to access EDI partner’s files
 Audit trail
 paperless and transparent
(automatic) transactions
37
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
EDI Controls
 Authorization
 use of passwords and value added
networks (VAN) to ensure valid
partner
 Access
 software to specify what can be
accessed and at what level
 Audit trail
 control log records the transaction’s
flow through each phase of the
transaction processing
38
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
39
EDI System
Figure 16-9
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
40
EDI System using Transaction
Control Log for Audit Trail
Figure 16-10
Hall, Accounting Information Systems, 8e
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part.
Auditing Procedures for EDI
 Tests of Authorization and Validation Controls
 Review procedures for verifying trading partner
identification codes
 Review agreements with VAN
 Review trading partner files
 Tests of Access Controls
 Verify limited access to vendor and customer files
 Verify limited access of vendors to database
 Test EDI controls by simulation
 Tests of Audit Trail Controls
 Verify existence of transaction logs
 Review a sample of transactions
41

More Related Content

What's hot

Chapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's PerspectiveChapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's Perspectiveermin08
 
Introduction to Transaction Processing Chapter No. 2
Introduction to Transaction Processing   Chapter No. 2Introduction to Transaction Processing   Chapter No. 2
Introduction to Transaction Processing Chapter No. 2Qamar Farooq
 
The Revenue Cycle
The Revenue Cycle The Revenue Cycle
The Revenue Cycle Qamar Farooq
 
Lecture 21 expenditure cycle part i - accounting information systesm james ...
Lecture 21  expenditure cycle part i - accounting information systesm  james ...Lecture 21  expenditure cycle part i - accounting information systesm  james ...
Lecture 21 expenditure cycle part i - accounting information systesm james ...Habib Ullah Qamar
 
Lecture 10 documentation techniques -transaction processing- james a. hall b...
Lecture 10  documentation techniques -transaction processing- james a. hall b...Lecture 10  documentation techniques -transaction processing- james a. hall b...
Lecture 10 documentation techniques -transaction processing- james a. hall b...Habib Ullah Qamar
 
Ethics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom sEthics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom sBabasab Patil
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsSammer Qader
 

What's hot (20)

Pp 11-new
Pp 11-newPp 11-new
Pp 11-new
 
Chapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's PerspectiveChapter 1 - The Information System: An Accountant's Perspective
Chapter 1 - The Information System: An Accountant's Perspective
 
James hall ch 7
James hall ch 7James hall ch 7
James hall ch 7
 
Pp 03-new
Pp 03-newPp 03-new
Pp 03-new
 
Pp 04-new revised by hall
Pp 04-new revised by hallPp 04-new revised by hall
Pp 04-new revised by hall
 
James hall ch 8
James hall ch 8James hall ch 8
James hall ch 8
 
James hall ch 15
James hall ch 15James hall ch 15
James hall ch 15
 
Pp 12-new
Pp 12-newPp 12-new
Pp 12-new
 
James hall ch 4
James hall ch 4James hall ch 4
James hall ch 4
 
Introduction to Transaction Processing Chapter No. 2
Introduction to Transaction Processing   Chapter No. 2Introduction to Transaction Processing   Chapter No. 2
Introduction to Transaction Processing Chapter No. 2
 
Pp 06-new
Pp 06-newPp 06-new
Pp 06-new
 
James hall ch 5
James hall ch 5James hall ch 5
James hall ch 5
 
The Revenue Cycle
The Revenue Cycle The Revenue Cycle
The Revenue Cycle
 
Lecture 21 expenditure cycle part i - accounting information systesm james ...
Lecture 21  expenditure cycle part i - accounting information systesm  james ...Lecture 21  expenditure cycle part i - accounting information systesm  james ...
Lecture 21 expenditure cycle part i - accounting information systesm james ...
 
James hall ch 9
James hall ch 9James hall ch 9
James hall ch 9
 
Lecture 10 documentation techniques -transaction processing- james a. hall b...
Lecture 10  documentation techniques -transaction processing- james a. hall b...Lecture 10  documentation techniques -transaction processing- james a. hall b...
Lecture 10 documentation techniques -transaction processing- james a. hall b...
 
Pp 17-new
Pp 17-newPp 17-new
Pp 17-new
 
Ethics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom sEthics fraud & internal control ppt @ dom s
Ethics fraud & internal control ppt @ dom s
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
 
Pp 05-new
Pp 05-newPp 05-new
Pp 05-new
 

Similar to Pp 16-new

Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docxAccess Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docxdaniahendric
 
Effects of IT on internal controls
Effects of IT on internal controlsEffects of IT on internal controls
Effects of IT on internal controlsLou Foja
 
Lecture 8- information technology slides
Lecture 8- information technology slidesLecture 8- information technology slides
Lecture 8- information technology slidesAiman Niazi
 
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...PascalOtieno
 
03.1 general control
03.1 general control03.1 general control
03.1 general controlMulyadi Yusuf
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentationAlan Holyoke
 
What is security testing and why it is so important?
What is security testing and why it is so important?What is security testing and why it is so important?
What is security testing and why it is so important?ONE BCG
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence SystemJoseph Yosi Margalit
 
Self-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsSelf-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsIRJET Journal
 

Similar to Pp 16-new (20)

Pp 15-new
Pp 15-newPp 15-new
Pp 15-new
 
Pp 03-new
Pp 03-newPp 03-new
Pp 03-new
 
Pp 02-new
Pp 02-newPp 02-new
Pp 02-new
 
Pp 13-new
Pp 13-newPp 13-new
Pp 13-new
 
Lecture 5.pptx
Lecture 5.pptxLecture 5.pptx
Lecture 5.pptx
 
Pp 14-new
Pp 14-newPp 14-new
Pp 14-new
 
Access Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docxAccess Control, Authentication, and Public Key Infrastructure .docx
Access Control, Authentication, and Public Key Infrastructure .docx
 
Effects of IT on internal controls
Effects of IT on internal controlsEffects of IT on internal controls
Effects of IT on internal controls
 
Lecture 8- information technology slides
Lecture 8- information technology slidesLecture 8- information technology slides
Lecture 8- information technology slides
 
Whitman_Ch02.pptx
Whitman_Ch02.pptxWhitman_Ch02.pptx
Whitman_Ch02.pptx
 
Whitman_Ch06.pptx
Whitman_Ch06.pptxWhitman_Ch06.pptx
Whitman_Ch06.pptx
 
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...
ETHICS FRAUD AND INTERNAL CONTROL AND AUDITING COMPUTERIZED FINANCIAL SYSSTEM...
 
03.1 general control
03.1 general control03.1 general control
03.1 general control
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
What is security testing and why it is so important?
What is security testing and why it is so important?What is security testing and why it is so important?
What is security testing and why it is so important?
 
Pp 09-new
Pp 09-newPp 09-new
Pp 09-new
 
Pp 09-new
Pp 09-newPp 09-new
Pp 09-new
 
Operasting system service
Operasting system serviceOperasting system service
Operasting system service
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
Self-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsSelf-Protecting Technology for Web Applications
Self-Protecting Technology for Web Applications
 

More from Sri Apriyanti Husain

7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...Sri Apriyanti Husain
 
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...Sri Apriyanti Husain
 
15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husainSri Apriyanti Husain
 
15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husainSri Apriyanti Husain
 
Formulir pendaftaran-s3 p ps feb ub
Formulir pendaftaran-s3 p ps feb ubFormulir pendaftaran-s3 p ps feb ub
Formulir pendaftaran-s3 p ps feb ubSri Apriyanti Husain
 
Informasi pendaftaran pasca s2 & s3
Informasi pendaftaran  pasca s2 & s3Informasi pendaftaran  pasca s2 & s3
Informasi pendaftaran pasca s2 & s3Sri Apriyanti Husain
 
Informasi pendaftaran pasca s2 & s3
Informasi pendaftaran  pasca s2 & s3Informasi pendaftaran  pasca s2 & s3
Informasi pendaftaran pasca s2 & s3Sri Apriyanti Husain
 
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...Sri Apriyanti Husain
 
Review jurnal akuntansi forensik uas pp_ak kelas malam
Review jurnal akuntansi forensik uas pp_ak kelas malamReview jurnal akuntansi forensik uas pp_ak kelas malam
Review jurnal akuntansi forensik uas pp_ak kelas malamSri Apriyanti Husain
 
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24Sri Apriyanti Husain
 
Profit over people; neoliberalism, global order 1888363894
Profit over people; neoliberalism, global order 1888363894Profit over people; neoliberalism, global order 1888363894
Profit over people; neoliberalism, global order 1888363894Sri Apriyanti Husain
 
Review disertasi pak bambang haryadi
Review disertasi pak bambang haryadiReview disertasi pak bambang haryadi
Review disertasi pak bambang haryadiSri Apriyanti Husain
 
Review disertasi pak bambang haryadi
Review disertasi pak bambang haryadiReview disertasi pak bambang haryadi
Review disertasi pak bambang haryadiSri Apriyanti Husain
 
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014Sri Apriyanti Husain
 
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...Sri Apriyanti Husain
 
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokok
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokokPsak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokok
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokokSri Apriyanti Husain
 

More from Sri Apriyanti Husain (20)

7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
 
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
7. audit atas laporan keuangan pendapat auditor atas laporan keuangan dan lap...
 
15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain
 
15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain15 ma aksya_tafakkur ke 1_sri apriyanti husain
15 ma aksya_tafakkur ke 1_sri apriyanti husain
 
Formulir pendaftaran-s3 p ps feb ub
Formulir pendaftaran-s3 p ps feb ubFormulir pendaftaran-s3 p ps feb ub
Formulir pendaftaran-s3 p ps feb ub
 
Informasi pendaftaran pasca s2 & s3
Informasi pendaftaran  pasca s2 & s3Informasi pendaftaran  pasca s2 & s3
Informasi pendaftaran pasca s2 & s3
 
Informasi pendaftaran pasca s2 & s3
Informasi pendaftaran  pasca s2 & s3Informasi pendaftaran  pasca s2 & s3
Informasi pendaftaran pasca s2 & s3
 
Tugas regresi berganda
Tugas regresi bergandaTugas regresi berganda
Tugas regresi berganda
 
Alfamart
AlfamartAlfamart
Alfamart
 
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...
146020300111009 sri apriyanti husain review jurnal_metode penelitian non posi...
 
Review jurnal akuntansi forensik uas pp_ak kelas malam
Review jurnal akuntansi forensik uas pp_ak kelas malamReview jurnal akuntansi forensik uas pp_ak kelas malam
Review jurnal akuntansi forensik uas pp_ak kelas malam
 
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24
Review jurnal akuntansi forensik uas pp_ak kelas malam angkatan 24
 
Profit over people; neoliberalism, global order 1888363894
Profit over people; neoliberalism, global order 1888363894Profit over people; neoliberalism, global order 1888363894
Profit over people; neoliberalism, global order 1888363894
 
Review disertasi pak bambang haryadi
Review disertasi pak bambang haryadiReview disertasi pak bambang haryadi
Review disertasi pak bambang haryadi
 
Review disertasi full
Review disertasi fullReview disertasi full
Review disertasi full
 
Review disertasi pak bambang haryadi
Review disertasi pak bambang haryadiReview disertasi pak bambang haryadi
Review disertasi pak bambang haryadi
 
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014
Psak 65-laporan-keuangan-konsolidasian-ifrs-10-consolidated-fs-22012014
 
Psak 62-kontrak-asuransi-140212
Psak 62-kontrak-asuransi-140212Psak 62-kontrak-asuransi-140212
Psak 62-kontrak-asuransi-140212
 
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...
Psak 58-aset-tidak-lancar-yang-dimiliki-untuk-dijual-dan-operasi-yang-dihenti...
 
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokok
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokokPsak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokok
Psak 55-pengakuan-instrumen-keuangan-ias-39-18122013-pokok
 

Recently uploaded

Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyTyöeläkeyhtiö Elo
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...Call Girls in Nagpur High Profile
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130Suhani Kapoor
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptxFinTech Belgium
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Pooja Nehwal
 
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ₹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free DeliveryPooja Nehwal
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdfAdnet Communications
 
The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfGale Pooley
 
Quarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingQuarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingMaristelaRamos12
 
Dividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxDividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxanshikagoel52
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfAdnet Communications
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designsegoetzinger
 
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130  Available With RoomVIP Kolkata Call Girl Serampore 👉 8250192130  Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Roomdivyansh0kumar0
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfGale Pooley
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfGale Pooley
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesMarketing847413
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spiritegoetzinger
 

Recently uploaded (20)

Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
 
Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
 
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ₹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf
 
The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdf
 
Quarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingQuarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of Marketing
 
Dividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxDividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptx
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdf
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designs
 
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130  Available With RoomVIP Kolkata Call Girl Serampore 👉 8250192130  Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdf
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdf
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast Slides
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
 

Pp 16-new

  • 1. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Accounting Information Systems, 8e James A. Hall Chapter 16 IT Controls Part II: Security and Access
  • 2. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Objectives for Chapter 16  Be able to identify the principal threats to the operating system and the control techniques used to minimize the possibility of actual exposures.  Be familiar with the principal risks associated with electronic commerce conducted over intranets and the Internet and understand the control techniques used to reduce these risks.  Be familiar with the risks to database integrity and the controls used to mitigate them.  Recognize the unique exposures that arise in connection with electronic data interchange (EDI) and understand how these exposures can be reduced. 2
  • 3. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Operating Systems  Perform three main tasks:  translates high-level languages into the machine-level language  allocates computer resources to user applications  manages the tasks of job scheduling and multiprogramming 3
  • 4. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Requirements for Effective Operating Systems Performance  Protect against tampering by users  Prevent users from tampering with the programs of other users  Safeguard users’ applications from accidental corruption  Safeguard its own programs from accidental corruption  Protect itself from power failures and other disasters 4
  • 5. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Operating Systems Security  Log-On Procedure  first line of defense – user IDs and passwords  Access Token  contains key information about the user  Access Control List  defines access privileges of users  Discretionary Access Control  allows user to grant access to another user 5
  • 6. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Operating Systems Controls Access Privileges  Audit objectives: verify that access privileges are consistent with separation of incompatible functions and organization policies  Audit procedures: review or verify…  policies for separating incompatible functions  a sample of user privileges, especially access to data and programs  security clearance checks of privileged employees  formal acknowledgements to maintain confidentiality of data  users’ log-on times 6
  • 7. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Operating Systems Controls Password Control  Audit objectives: ensure adequacy and effectiveness of password policies for controlling access to the operating system  Audit procedures: review or verify…  passwords required for all users  password instructions for new users  passwords changed regularly  password file for weak passwords  encryption of password file  password standards  account lockout policies 7
  • 8. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Operating Systems Controls Malicious & Destructive Programs  Audit objectives: verify effectiveness of procedures to protect against programs such as viruses, worms, back doors, logic bombs, and Trojan horses  Audit procedures: review or verify…  training of operations personnel concerning destructive programs  testing of new software prior to being implemented  currency of antiviral software and frequency of upgrades 8
  • 9. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Operating System Controls Audit Trail Controls  Audit objectives: used to (1) detect unauthorized access, (2) facilitate event reconstruction, and/or (3) promote accountability  Audit procedures: review or verify…  how long audit trails have been in place  archived log files for key indicators  monitoring and reporting of security violations 9
  • 10. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Database Management Controls Two crucial database control issues: Access controls  Audit objectives: (1) those authorized to use databases are limited to data needed to perform their duties and (2) unauthorized individuals are denied access to data Backup controls  Audit objectives: backup controls can adequately recover lost, destroyed, or corrupted data 10
  • 11. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Access Controls  User views - based on sub-schemas  Database authorization table - allows greater authority to be specified  User-defined procedures - used to create a personal security program or routine  Data encryption - encoding algorithms  Biometric devices - fingerprints, retina prints, or signature characteristics 11
  • 12. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. 12 Database Authorization Table Figure 16-2
  • 13. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Access Controls Audit procedures: verify…  responsibility for authority tables & subschemas  granting appropriate access authority  use or feasibility of biometric controls  use of encryption 13
  • 14. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Subschema Restricting Access 14 Figure 16-1
  • 15. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Backup Controls  Database backup – automatic periodic copy of data  Transaction log – list of transactions that provides an audit trail  Checkpoint features – suspends data during system reconciliation  Recovery module – restarts the system after a failure 15
  • 16. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Backup Controls  Audit procedures: verify…  that production databases are copied at regular intervals  backup copies of the database are stored off site to support disaster recovery 16
  • 17. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Internet and Intranet Risks  The communications component is a unique aspect of computer networks:  different than processing (applications) or data storage (databases)  Network topologies – configurations of:  communications lines (twisted-pair wires, coaxial cable, microwaves, fiber optics)  hardware components (modems, multiplexers, servers, front-end processors)  software (protocols, network control systems) 17
  • 18. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Sources of Internet & Intranet Risks Internal and external subversive activities Audit objectives: 1. prevent and detect illegal internal and Internet network access 2. render useless any data captured by a perpetrator 3. preserve the integrity and physical security of data connected to the network Equipment failure Audit objective: the integrity of the electronic commerce transactions by determining that controls are in place to detect and correct message loss due to equipment failure 18
  • 19. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Risks from Subversive Threats  Include:  unauthorized interception of a message  gaining unauthorized access to an organization’s network  a denial-of-service attack from a remote location 19
  • 20. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. IC for Subversive Threats Firewalls provide security by channeling all network connections through a control gateway.  Network level firewalls  Low cost and low security access control  Do not explicitly authenticate outside users  Filter junk or improperly routed messages  Experienced hackers can easily penetrate the system  Application level firewalls  Customizable network security, but expensive  Sophisticated functions such as logging or user authentication 20
  • 21. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Dual-Homed Firewall 21 Figure 16-4
  • 22. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. IC for Subversive Threats  Denial-of-service (DOS) attacks  Security software searches for connections which have been half- open for a period of time.  Encryption  Computer program transforms a clear message into a coded (cipher) text form using an algorithm. 22
  • 23. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. SYN Flood DOS Attack 23 Sender Receiver Step 1: SYN messages Step 2: SYN/ACK Step 3: ACK packet code In a DOS Attack, the sender sends hundreds of messages, receives the SYN/ACK packet, but does not response with an ACK packet. This leaves the receiver with clogged transmission ports, and legitimate messages cannot be received.
  • 24. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Controlling DOS Attacks  Controlling for three common forms of DOS attacks:  Smurf attacks—organizations can program firewalls to ignore an attacking site, once identified  SYN flood attacks—two tactics to defeat this DOS attack • Get Internet hosts to use firewalls that block invalid IP addresses • Use security software that scan for half-open connections  DDos attacks–many organizations use Intrusion Prevention Systems (IPS) that employ deep packet inspection (DPI) • IPS works with a firewall filter that removes malicious packets from the flow before they can affect servers and networks • DPI searches for protocol non-compliance and employs predefined criteria to decide if a packet can proceed to its destination (See chapter 12 for more on DOS attacks) 24
  • 25. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Encryption  The conversion of data into a secret code for storage and transmission  The sender uses an encryption algorithm to convert the original cleartext message into a coded ciphertext.  The receiver decodes / decrypts the ciphertext back into cleartext.  Encryption algorithms use keys  Typically 56 to 128 bits in length  The more bits in the key the stronger the encryption method.  Two general approaches to encryption are private key and public key encryption. 25
  • 26. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Private Key Encryption  Advance encryption standard (AES)  A 128 bit encryption technique  A US government standard for private key encryption  Uses a single key known to both sender and receiver  Triple Data Encryption Standard (DES )  Considerable improvement over single encryption techniques  Two forms of triple-DES encryption are EEE3 and EDE3  EEE3 uses three different keys to encrypt the message three times.  EDE3—one key encrypts, but two keys are required for decoding  All private key techniques have a common problem  The more individuals who need to know the key, the greater the probability of it falling into the wrong hands.  The solution to this problem is public key encryption. 26
  • 27. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. The Advanced Encryption Standard Technique 27 Figure 16-5
  • 28. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. EEE3 and EDE3 Encryption 28 Figure 16-6
  • 29. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. IC for Subversive Threats  Digital signature – electronic authentication technique to ensure that…  transmitted message originated with the authorized sender  message was not tampered with after the signature was applied  Digital certificate – like an electronic identification card used with a public key encryption system  Verifies the authenticity of the message sender 29
  • 30. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Digital Signature Figure 16-7
  • 31. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. IC for Subversive Threats  Message sequence numbering – sequence number used to detect missing messages  Message transaction log – listing of all incoming and outgoing messages to detect the efforts of hackers  Request-response technique – random control messages are sent from the sender to ensure messages are received  Call-back devices – receiver calls the sender back at a pre-authorized phone number before transmission is completed 31
  • 32. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Auditing Procedures for Subversive Threats  Review firewall effectiveness in terms of flexibility, proxy services, filtering, segregation of systems, audit tools, and probing for weaknesses.  Review data encryption security procedures  Verify encryption by testing  Review message transaction logs  Test procedures for preventing unauthorized calls 32
  • 33. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. IC for Equipment Failure Line errors are data errors from communications noise.  Two techniques to detect and correct such data errors are:  echo check - the receiver returns the message to the sender  parity checks - an extra bit is added onto each byte of data similar to check digits 33
  • 34. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Vertical and Horizontal Parity using Odd Parity 34 Figure 16-8
  • 35. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Auditing Procedures for Equipment Failure  Using a sample of messages from the transaction log:  examine them for garbled contents caused by line noise  verify that all corrupted messages were successfully retransmitted 35
  • 36. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Electronic Data Interchange  Electronic data interchange (EDI) uses computer-to-computer communications technologies to automate B2B purchases.  Audit objectives: 1. Transactions are authorized, validated, and in compliance with the trading partner agreement. 2. No unauthorized organizations can gain access to database 3. Authorized trading partners have access only to approved data. 4. Adequate controls are in place to ensure a complete audit trail. 36
  • 37. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. EDI Risks  Authorization  automated and absence of human intervention  Access  need to access EDI partner’s files  Audit trail  paperless and transparent (automatic) transactions 37
  • 38. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. EDI Controls  Authorization  use of passwords and value added networks (VAN) to ensure valid partner  Access  software to specify what can be accessed and at what level  Audit trail  control log records the transaction’s flow through each phase of the transaction processing 38
  • 39. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. 39 EDI System Figure 16-9
  • 40. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. 40 EDI System using Transaction Control Log for Audit Trail Figure 16-10
  • 41. Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,in whole or in part. Auditing Procedures for EDI  Tests of Authorization and Validation Controls  Review procedures for verifying trading partner identification codes  Review agreements with VAN  Review trading partner files  Tests of Access Controls  Verify limited access to vendor and customer files  Verify limited access of vendors to database  Test EDI controls by simulation  Tests of Audit Trail Controls  Verify existence of transaction logs  Review a sample of transactions 41