IT Controls Part II: Security and Access
IT Controls Part II: Security and Access
Step 2: SYN/ACK
Cleartext Encryption
Communication
Message Program
Ciphertext System
Key
Private Key Encryption
• Advance encryption standard (AES)
• A 128 bit encryption technique
• A US government standard for private key encryption
• Uses a single key known to both sender and receiver
• Triple Data Encryption Standard (DES )
• Considerable improvement over single encryption techniques
• Two forms of triple-DES encryption are EEE3 and EDE3
• EEE3 uses three different keys to encrypt the message three times.
• EDE3—one key encrypts, but two keys are required for decoding
• All private key techniques have a common problem
• The more individuals who need to know the key, the greater the
probability of it falling into the wrong hands.
• The solution to this problem is public key encryption.
Advanced Data Encryption
Technique
Public – Private Key Encryption
Message A Message B Message C Message D
Multiple people
may have the public key Public Key used for
encoding messages
EDI EDI
Translation Translation
Software Software
Direct Connection
Communications Communications
Software Software
EDI System with Controls
Company A Company B (Vendor)
Application Purchases Audit trail of Sales Order Application
Software System transactions between System Software
trading partners
EDI EDI
Translation Translation
Software Software
Transaction Transaction
Log Log
Communications Communications
Software Software
Other
Software limits Mailbox
vendor’s Use of VAN to
(Company B) Company VAN Company enforce use of
access to A’s mailbox B’s mailbox
passwords and
company A’s valid partners
database Other
Mailbox
Auditing Procedures for EDI