Auditing Database Systems - 1
Auditing Database Systems - 1
Databases
Systems
Barradas, Kathleen
Bauyon, Saira
Ilagan, Jammica
Maguindayao, Joyce
Auditing Database Systems
01 Data Management
Approaches
03 Databases in a
Distributed Environment
Database Views
• Internal View/Physical View. This is the lowest level
of representation, which is one step removed from the
physical database. This internal view describes the
structures of data records, the linkages between files,
and the physical arrangement and sequence of records
in a file.
Informal Access
This feature allows authorized users to process data independent of
professional programmers by providing a “friendly” environment for
integrating and retrieving data to produce ad hoc management reports.
Database
Administrator
Responsible for managing the
database resource
Database Administrator
Operation
Change and
Database Design Implementation and
Growth
Planning Maintenance
Logical Database Determine access Plan for change
Develop policy Evaluate database and growth
organization’s External Users’ performance
database strategy views Implement security Evaluate new
controls Reorganize technology
Define database Internal view of database as user
environment databases Specify test needs demand
procedures
Define data Database controls Review standards
requirements Establish and procedures
programming
Develop data standards
dictionary
Database Administrator
System
Management
Professionals
Database
Administrators
Advantages
• Data stored at local sites increases user’s control
With data replicated at every site, data access for query purposes is ensured and
lockouts and delays due to data traffic are minimized
Concurrency Control
• Presence of complete and accurate data at all user sites
In the shared database environment, access control risks include corruption, theft,
misuse, and destruction of data. These threats originate from both unauthorized intruders
and authorized users who exceed their access privileges. Several control features are now
reviewed.
User Views
Data Encryption- Database systems also use encryption procedures to protect highly sensitive stored
data, such as product formulas, personnel pay rates, password files, and certain financial data thus making
it unreadable to an intruder “browsing” the database.
Biometric Devices
When an individual attempts to access the database, a special scanning device captures his or her biometric
characteristics, which it compares with the profile data stored on file or the ID card.
Inference Controls
Inference controls attempt to prevent three types of compromises to the database.
1. Positive compromise- the user determines the specific value of a data item.
2. Negative compromise- the user determines that a data item does not have a specific
value.
3. Approximate compromise- the user is unable to determine the exact value of an item
but is able to estimate it with sufficient accuracy to violate the confidentiality of the data.
Audit Objective Relating to Database Access
• Verify that database access authority and privileges are granted to users in
accordance with their legitimate needs.
• Biometric Controls
The auditor should evaluate the costs and benefits of biometric controls.
• Inference Controls
The auditor should verify that database query controls exist to prevent
unauthorized access via inference.
• Encryption Controls
The auditor should verify that sensitive data, such as passwords, are
properly encrypted.
Backup Controls
• Backup. The backup feature makes a periodic backup of the entire database. This is an automatic
procedure that should be performed at least once a day.
• Transaction Log (Journal). The transaction log feature provides an audit trail of all processed
transactions.
• Checkpoint Feature. The checkpoint facility suspends all data processing while the system
reconciles the transaction log and the database change log against the database.
• Recovery Module. The recovery module uses the logs and backup files to restart the system after a
failure.
Audit Objective Relating to Database Backup
• Verify that controls over data resource are sufficient to preserve the integrity
and physical security of the database.