Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

6.

Hardware Controls performed


Provided by the hardware manufacturers  Character or field validity check
- Today’s computers are design to be very -compares data characters or file that
reliable and most of them have built- in are written or read with a set of all valid
hardware controls characters or field
- Even with this, it is essential that the auditor  Address validity
evaluate the impact of hardware control on -check of storage location in memory or
the system reliability in a peripheral device
1) Redundant character check 6) Power protection
2) Duplicate process check - protects the hardware from power fluctuations
3) Echo check (spikes or surges)
4) Equipment check - enable the computer to continue operations in
5) Validity check case of power interruptions (UPS) Uninterrupted Power
6) Power protection Supply
7) Operational manual controls 7) Operational manual controls
1) Redundant character check a) Equipment failure logs
- a bit, two bits or a set of bits for the purpose of b) Environmental controls
detecting errors - Dust, temperature, humidity
- data are stored in a binary codes: sequence of c) Formal recovery procedures (written)
zeros and ones (bits) d) Preventive and corrective maintenance
- the single parity bit is the creation of an
additional bit for each character processed 7. System Software Controls
- the computer counts the number of 1 bits In System Software
each character to determine if the count is odd or even - A set of program routines that perform
- in an odd parity check, the computer will add a system level functions of management,
parity bit at 0 if the count is odd and a 1 if the count is application program support, tasks common
even to many application
2) Duplicate process check - Includes both the control of all operations
- uses the principle of complementary and the allocation of the resources, i.e., CPU
operations to detect and correct errors time, memory, input/output devices among
- an operation is performed twice, then the the various application programs
results are compared; any difference indicates a 1) Controls to program protection
hardware induced error 2) Controls for file protection
3) Echo check 3) Controls to handle errors
- purpose is to ensure that commands sent to 4) Security protection
peripherals or remote equipment are obeyed and that 5) Self-protection
data are received correctly 1) Controls to handle errors
- the peripherals or remote equipment send back a. Read or write error routines (save)
(Echo) a signal verifying that the command has been - retry, diagnose, propose action – close,
received and complied with etc.; prevents erroneously overwriting of existing record
4) Equipment check or files
- controls built-in into the circuitry of the b. Record length checks
computer to ensure that the equipment is functioning c. Storage device checks
properly and where necessary, automatic error - signals if a storage device is not
correction operational
- these automatic error correction are either: 2) Control for program protection
 Automatic error diagnosis, or - prevent application programs with interfering
 Automatic retry with each other during processing
5) Validity Check a. Boundary protection
- to ensure that actions taken by the computer - assignment of memory partitions to
are valid programs in a multiprogramming environment
 Operation validity b. Control over external reference (sub-routines)
-ensures that only valid instructions are in a linkage editing
c. Library program software : restriction of Computer abuse
access to use change of programs - The violation of a computer system to
- Passwords: used to limit access to perform malicious damage, crime or
programs under test status only but not on the programs invasion of privacy
used in production  Malicious damage includes looting and
- Encryption: Use of secret codes that sabotage
prevents understanding of the program without the  Crime includes embezzlement, industrial
necessary key espionage, and the sale of commercial
- Library software control reports: secrets
program listing identifying the version of each program,  Invasion of privacy includes discovery of
run date, last copied, last change to ensure that the confidential salary information, and the
current authorized version is used. renew of sensitive data by a competing
3) Controls for file protection company (financial information)
- to prevent unauthorized use or modification of ________________________________
data - Are general controls that prevent failures in
a. Checking internal file labels – to prevent systems security and provide for recovery
processing of wrong files and premature destructions from failures in system security; they are
b. Storage protection – prevent inadvertent generally categorized as:
overwriting 1) Controls that provide a secure system
c. Memory clear – removes the risk of sensitive 2) Controls for detecting failures in systems
data being available for subsequent access security
4) Security Protection 3) Controls for recovery from system
a. Maintenance of logs and activity information security failures
b. Password monitoring The three (3) general categories pertain
5) Self-Protection (manual) to:
a. Segregation of duties – assignment of a. Prevention
responsibilities for system software, library and b. Detection
operations should be separated. c. Correction or Recovery
b. Hardwiring – encode the software logic in 1) Controls that provide a secure system
hardware; modification can only be done by removal and a. Security Management
replacement of the hardware I. Establish security objective
II. Evaluate security risks
8. Systems Security Controls III. Develop a security plan
System Security IV. Assign responsibilities
- The protection of computer facilities, V. Test system security
equipment, programs, and data from VI. Evaluate system security
destruction by environmental hazards, by b. Facilities security controls
equipment error, software error or human I. Location controls
error, or by computer abuse II. Construction controls
Environmental hazards III. Access controls
- Include fires, floods, tornadoes, - Conventional keys
earthquakes, and other acts of God. - Magnetic stripe cards
Generally occur infrequently but with a high - Devices that can read physical
cost of occurrence. characteristics, e.g. finger prints
Errors - Signature verification system
- Include damage to disk storage by faulty disk c. Library controls
drives, mistakes in application program that I. Library function for access controls
destroy or damage data, and operator - Authorized users
mounting of incorrect files. Generally - Usage log
frequent but at low cost per incident II. Physical file control
- Internal header and trailer labels
- External labels
- Protection rings
- Read-only switch i. Further identification information made
d. On-line access controls periodically during use of the terminal
i. Physical security of terminals ii. Disconnecting and calling back the terminal
- Use of terminal locks iii. Authenticity code
ii. Authorization controls d. Systems Monitoring
- Authorized users i. CCTV
 Programs and data files that each ii. Disconnection after repeated unsuccessful
user can access should be identified attempts
in the authorization scheme iii. Log of all access failures
- Authorized terminals
iii. Identification on controls 3) Controls for recovery from system security failures
- Terminal identification a. Failure bypass procedures
- User identification (passwords) b. Recovery plan (Business Continuity Plan)
- Physiological key c. Recovery procedures
 Handprints, thumbprints i. Computer facilities and equipment
- Special key ii. Software
 Magnetic stripe cards iii. Data/source documents
 Optically encoded badge iv. Personnel
 Who is responsible for what
Some rules concerning passwords:  Substitute in case of injury
- Passwords should not be chosen because
they are easy to remember
- Should not be shared nor displayed
- Password file should be protected by the
operating system
- Unsuccessful attempts should be monitored
- Should be changed periodically
- More effective when used in combination
with other techniques
e. Data communication access control
i. Fragmentation – communication of a message
one (fragment) at a time
ii. Intermixing – communication of several
messages simultaneously
iii. Encryption – encoding of data to disguise their
meaning

2) Controls for detecting failures in systems security


a. Unauthorized Access Detection Devices
i. Micro-switches detects the presence of an
intruder by breaking or completing an electrical
circuit
ii. Beams – could be light, laser, ultraviolet or
infrared
iii. Ultrasonic (sound waves) and radar detectors;
these detect movements
iv. Microphones – sound can trigger an alarm
b. Fire Detection Devices
i. Heat – sensitive devices – fusable links built into
the nozzles of sprinker system
ii. Smoke – sensitive devices
c. Authentication

You might also like