IT controls : Security and access
25 important questions on IT controls : Security and access
What are the three main tasks performed by the operating system?
- Allocating PC resources to users, workgroups, and applications (e.g. authorizing access).
- Managing the tasks of job scheduling and multiprogramming.
What are the five fundamental control objectives the OS must achieve?
(2) protect users from each other,
(3) protect users from themselves,
(4) be protected from itself, and
(5) be protected from its environment.
What is the operating system security?
- Higher grades + faster learning
- Never study anything twice
- 100% sure, 100% understanding
What is the log-on procedure?
What is the access token?
What are the threats to operating system integrity?
- Accidental threats include hardware failures and errors in user application programs, which can result in unintentional disclosure of confidential information.
- Intentional threats include attempts to illegally access data or violate user privacy for financial gain.
- A growing threat is destructive programs from which there is no apparent gain, which comes from three kind of resources: (1) Privileged personnel abusing their authority, (2) individuals (internal and external) identifying and exploiting security flaws, and (3) individuals inserting PC viruses or other destructive programs to the OS.
What are the user access privileges?
What are the auditors objective and procedures with the user access privileges?
Auditor’s procedures:
- Review organization’s policies.
- Review privileges of a selection of user groups and individuals (determining if their access
rights are appropriate for their job).
- Review personnel records (determining whether privileged employees undergo a security
check).
- Review employee records (determining whether users formally acknowledged their
responsibility)
- Review users’ permitted log-on times (should be commensurate with the tasks being
performed).
What are the auditor's objectives and privileges with virus control?
Auditor’s procedures:
- Determining if operations personnel have been educated about destructive programs and are aware of risky computing practices.
- Verify that new software is tested prior to being implemented.
- Verify that antiviral software is installed and upgraded regularly.
Which two types of audit logs are defined?
- Event monitoring: Summarizes key activities related to system resources (e.g. recording the user IDs, time, and duration of a session; programs that are executed; and resources accessed)
What are the audit trail objectives?
(1) Detecting unauthorized access (real time or after the fact),
(2) reconstructing events (reconstruct the steps that led to events), and
(3) personal accountability (monitor user activity at the lowest level of detail, a preventive control that can influence behavior).
Audit logs are useful to accountants in measuring the potential damage and financial loss.
What are the auditor's objectives and auditor's procedures with the audit trail?
Auditor’s procedures:
- Verify that the audit trail has been activated according to organization policy.
- Evaluate security violation cases, reported by the organization’s security group, to assess the effectiveness of the security group.
What are access controls?
What is the database authorization table?
What are the user defined procedures?
What are biometric devices?
What are back-up controls?
What are the four backup and recovery features in backup controls?
- Transactions log: Provides an audit trail of all processed transactions and records the resulting changes to the database in a separate database change log.
- Checkpoint feature: Suspends all data processing while the system reconciles the transaction log and the database change log against the database (automatically several times an hour).
- Recovery module: Uses the logs and backup files to restart the system after a failure.
What are the auditor's objectives and auditor's procedures for back-up controls?
Auditor’s procedures:
- Verify from system documentation that production databases are copied at regular intervals.
- Verify through documentation and observation that backup copies of the database are stored off-site to support disaster recovery procedures.
What is a digital signature?
What is a digital certificate?
What is message sequence numbering?
What is a message transaction log?
What is a request-response technique?
What is a call-back device?
The question on the page originate from the summary of the following study material:
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding