ExamPrep Notes Flashcards
Control Function Planning
(1) Efficient and effective use of the resources
(2) Upgrades and modification to system’s process to meet management’s goals and objectives
Control Function Reviewing
(1) Audit logs and user activities
(2) Changes to operation schedule
Control Function Detecting
(1) Unauthorized access attempts
(2) Incidents and problems
Control Function Monitoring
(1) System performance
(2) Environmental control to make sure variables such as temperature and humidity are set to maintain the proper conditions for equipment
(3) Vulnerabilities discovered and addressed
Control Function Limiting
(1) Physical access to those who have a need
(2) Logical access to code and applications to those who have a need
Control Function Ensuring
(1) Backup so that operations can be recovered in a timely fashion
(2) Detailed schedules for operations employees working on all shifts
(3) Job accountability and adequate audit records collected
Some common types of SLAs include the following:
(1) Uptime agreements (UAs)—UAs are one of the most well-known type of SLA. UAs detail the agreed-on amount of uptime. As an example, these can be used for network services, such as a WAN link or equipment-like servers.
(2) Time service factor (TSF)—The TSF is the percentage of help desk or response calls answered within a given time.
(3) Abandon rate (AR)—The AR is the number of callers that hang up while waiting for a service representative to answer.
(4) First call resolution (FCR)—The FCR is the number of resolutions that are made on the first call and that do not require the user to call back to the help desk to follow up or seek additional measures for resolution.
IS operations are responsible for
(1) monitoring resources,
(2) incident/problem handling,
(3) infrastructure operations,
(4) help desk and support, and
(5) change management.
Lights-Out Operations
Lights-out operations can take place without human interaction. These include job scheduling, report generation, report balancing, and backup.
If there is a downside to all this logging, it is that all the information must be recorded and reviewed. Reviewing it can be expedited by using ________ _______ _________. These tools parse the data and eliminate unneeded information.
audit reduction tools
As example of _________ ___________ __________ if an employee normally enters the building around 8 a.m. and leaves about 5 p.m., but now is seen entering the building at 3 a.m., a variance detection tool can detect this abnormality.
variance detection tool,
Another useful tool for an auditor is a variance detection tool, which
looks for trends that fall outside the realm of normal activity
Keystroke Monitoring
Capturing a user’s keystrokes for later review is an example of monitoring. Users need to be made aware of such activities through acceptable use policies and warning banners.
The time between when an incident occurs and when it is addressed is called the ___________ _________. Incident handling should look at ways to reduce the delay window to the smallest value possible.
delay window
Auditing Problem Reports - The auditor should know to
review the problem log to verify that problems are being resolved. Auditors must also check to see that the most appropriate department or individual is handling the problems.