4-1. Protection of Information Flashcards
What is the source of IT security principles? How is it used?
AICPA Assurance Services Executive Committee (ASEC) principles.
Used to evaluate system controls and confidentiality and privacy of information processed by system.
IT security principles: what are 5 trust service principles?
Security, availability, processing integrity, confidentiality, privacy.
IT security principles: what is the foundation of systems reliability? Whose issue is this?
Security.
A top management issue.
IT security principles: What does security procedures do?
- Restrict access to only authorized users
- Protect the confidentiality and privacy of sensitive information
- Provide integrity of information
- Protect against attacks
IT security principles: what is availability concerned about?
Is system operational and usable as specified in commitments and agreements?
Does internal control support (or impede) system availability?
IT security principles: what are 5 elements Processing integrity is concerned with?
Completeness, validity, accuracy, timeliness, authorization of system processing.
IT security principles: Processing integrity: what is a question does it concerned with?
Does system of internal control help ensure that system processes execute as intended without error or manipulation?
IT security principles: confidentiality: what is the question is it concerned with?
Is confidential information protected consistent with the organizations’ commitments and agreements?
IT security principles: privacy: what is the question is it concerned with?
Does system’s collection, use, retention, disclosure, and disposal of personal information conform to its own commitments and with generally accepted privacy principles (GAAP)?
IT security principles: what is GAPP?
Generally accepted privacy principles.
IT security principles: what are 10 sub-principles of GAAP?
- Management: the entity defines documents, communicates, and assigns accountability for its privacy policies and procedures.
- Notice: the entity tells people about its privacy policies and procedures and explains why personal information is collected, used, retained, and disclosed.
- Choice and consent: Users (in US) can opt out of collection of personal information.
- Collection: collects personal info only for identified purposes.
- Use and retention: uses personal info consistent with stmts about use. Retains only as long as needed or allowed by law or regulation.
- Access: people can access, review and update their info.
- Disclosure to third parties: third parties receive info according to policy and individual consent.
- Security for privacy: protect personal info against unauthorized access.
- Quality: personal info is accurate, complete, and relevant.
- Monitoring and enforcement: someone monitors the entity’s compliance with privacy policies and procedures and has procedures to address privacy-related complaints and disputes.
IT security principles: what are criteria for assessing achievement of IT security principles?
- Organization and management: organizational structures and processes for managing and supporting people includes criteria addressing accountability, integrity, ethical values and qualifications of personnel and the operational conditions in which they function.
- Communications: communication of policies, processes, procedures, commitments, and requirements.
- Risk management and design and implementation of controls: how the entity (i) identifies potential risks, (ii) analyzes risks, (iii) develops risk responses, and (iv) conducts ongoing monitoring of risks and risk management.
- Monitoring of controls: including the suitability, and design and operating effectiveness of the controls and actions to address identified deficiencies.
- Logical and physical access controls: how entity restricts access, providers and removes access, and prevents unauthorized access.
- System operations: management of execution of system procedures including detecting and mitigating processing deviations.
- Change management: identification of needed changes, management of changes, and prevention of unauthorized changes.
IT security principles: why is time-based model of controls important?
Because preventative control can be compromised given enough time and resources. Therefore, detection and correction must be timely.
IT security principles: what does time-based model of controls do?
Evaluate the effectiveness of an organization’s security by measuring and comparing the 3 categories of controls.
IT security principles: how does time-based model of controls work?
- P = time it takes an intruder to break through the organization’s preventative controls
- D = time it takes to detect that an attack is in progress
- C = time to respond to the attack
If P > (D+C), then security procedures are effective.
IT security principles: what are examples of multiple layers of controls/holistic approach?
Combination of firewalls, passwords, and other preventative procedures to restrict access.
IT security principles: what are examples of IT preventative controls used for defense-in-depth?
- Authentication controls to identify the person or device attempting access (log analysis - manual, intrusion detection systems - automated monitoring)
- Authorization controls to restrict access to authorized users. These controls are implemented with an access control matrix and compatibility tests
- Training to teach employees why security measures are important and teach them to use safe computing practices.
- Managerial reports
- Security testing
IT security principles: define defense-in-depth.
The strategy of implementing multiple layers of controls to avoid having a single point of failure at a greater cost.
IT security principles: what are examples of corrective controls?
- A computer emergency response team
- A chief security officer
- Patch managend: involves fixing known vulnerabilities and installing the latest updates to antivirus software, firewalls, operating systems, and application programs
Cyber-risk assessment: which COSO is applicable? Application?
Principle 6: “Organization specifies objectives with sufficient clarity ti enable identification and assessment of risks relating to objectives”
*Assessing cyber risks begins with understanding the value of information systems to an organization - requires collaboration and coordination between business unit and IT stakeholders.
Cyber-risk: risk identification and fraud: which COSO? Application?
Principle 7: “Organization identifies, analyzes and manages risks.”
Principle 8: “Organization considers fraud risks.”
*Assess likelihood and severity of cyber risk impact - require collaboration.
*Consider industry-specific attacks.
Cyber-risk assessment: what is COSO #9? Application?
“Organization identifies and assesses changes that could impact internal control.”
*Risks: rapidly changing technologies and cyber criminals quick adaption to changes yield new methods of exploiting vulnerabilities.