Chapter 3 Section 1 Auditing Operating System and Network
Chapter 3 Section 1 Auditing Operating System and Network
• IP Spoofing
• Denial of Service Attack
• Equipment Failure
AUDITING ELECTRONIC
DATA INTERCHANGE
(EDI)
Electronic Data Interchange (EDI)
General definition:
Functional Group
● a collection of transaction sets (electronic
documents) for a particular business
application such as group of sales
invoices or purchase orders
Transaction Set
● composed of data segments and data
elements
Data Segment
● an information category on the document,
such as part number, unit price, or vendor
name
Data Elements
● specific items of data related to a
segment
Example of ANSI X.12 Format
Benefits of EDI
1. Data keying.
2. Error reduction.
3. Reduction of paper.
4. Automated procedures.
5. Inventory reduction.
Financial EDI
1. Some VANs have the capability of validating passwords and user ID codes
for the vendor by matching these against a valid customer file. The VAN
rejects any unauthorized trading partner transactions before they reach the
vendor’s system.
2. Before being converted, the translation software can validate the trading
partner’s ID and password against a validation file in the firm’s database.
3. Before processing, the trading partner’s application software references the
valid customer and vendor files to validate the transaction.
Access Control
1. The auditor should determine that access to the valid vendor or customer file
is limited to authorized employees only. The auditor should verify that
passwords and authority tables control access to this file and that the data
are encrypted.
2. The trading agreement will determine the degree of access a trading
partner should have to the firm’s database records (such as inventory levels
and price lists). The auditor should reconcile the terms of the trading
agreement against the trading partner’s access privileges stated in the
database authority table.
3. The auditor should simulate access by a sample of trading partners and
attempt to violate access privileges.
Tests of Audit Trail Controls
Internet employs
communications
technologies based on
packet switching.
Virtual Private Networks (VPN)
Extranets
● a password-controlled network for private users rather than the general public
● used to provide access between trading partner internal databases
The International Standards Organization, has developed a layered set of protocols called the open system
interface (OSI).
OSI Model - provides standards by which the products of different manufacturers can interface with one
another in a seamless interconnection at the user level
Purpose: create a modular environment that reduces complexity and permits changes to one layer without
adversely affecting another
Internet Protocols
Transfer control protocol/Internet protocol (TCP/IP)
● the basic protocol that permits communication between Internet sites
● controls how individual packets of data are formatted, transmitted, and received
● known as a reliable protocol because delivery of all the packets to a destination is guaranteed
Security Protocols
Secure sockets layer (SSL)
● a low-level encryption scheme used to secure transmissions in higher-level HTTP format
HTML
Hypertext markup language (HTML)
● the document format used to produce Webpages.
● defines the page layout, fonts, and graphic elements as well as hypertext
links to other documents on the Web
● used to lay out information for display in an appealing manner