Control Audit and Security of Information System: Units
Control Audit and Security of Information System: Units
Information System
Units
Manually
Manually
Computer
Computer Auditor Compares Processed
Processed
Output
Output Results
Results
C. Integrated Test Facility (ITF) Approach
Computer
Computer
Application
Application DataFiles
Data Files
System
System ITF Data
Reports
Reports Reports
Reports Manually
Manually
WithOnly
With Only WithOnly
With Only Auditor Processed
Processed
ActualData
Actual Data ITFData
ITF Data Compares Results
Results
D. Parallel Simulation
Actual
Actual
Transactions
Transactions
Computer
Computer Auditor’s
Auditor’s
Application
Application Simulation
Simulation
System
System Program
Program
ActualClient
Client Auditor Compares Auditor
Auditor
Actual Simulation
Report
Report Simulation
Report
Report
E. Audit Software
Computer programs that permit computers to be
used as auditing tools include:
1. Generalized audit software
Perform tasks such as selecting sample data
from file, checking computations, and
searching files for unusual items.
2. P.C. Software
Allows auditors to analyze data from
notebook computers in the field.
F. Embedded Audit Routines
1. In-line Code – Application program performs
audit data collection while it processes data
for normal production purposes.
2. System Control Audit
Review File (SCARF)–
The Auditor
Edit tests for audit
transaction analysis are
included in program.
Exceptions are written
to a file for audit review.
What is Security?
• “The quality or state of being secure—to be free
from danger”
• A successful organization should have multiple
layers of security in place:
– Physical security
– Personal security
– Operations security
– Communications security
– Network security
– Information security
Types of Security
• Physical Security: To Protect physical
items, object or areas
• Personal Security: To protect the individual
or group of individuals who are authorized
• Operation Security: To protect the details of
a particular operation or activities.
Types of Security
• Communication Security: To protect
communication media, technology and
content
• Network Security: To protect networking
components, connections and contents
• Information Security: To protect
information assets
What is Information Security?
• The protection of information and its critical
elements, including systems and hardware that use,
store, and transmit that information
• Necessary tools: policy, awareness, training,
education, technology
• C.I.A. triangle was standard based on
confidentiality, integrity, and availability
• C.I.A. triangle now expanded into list of critical
characteristics of information
CIA triangle “Security triad”
y
authorized users access
Av
l it
the information from being shut down
ti a
ai l
due to external or
en
ab
Information internal threats or
id
ili
attacks
nf
ty
Security
Co
Integrity
• Data and information is
accurate and protected
from tampering by
unauthorized persons.
• Data and information is
consistent and validated.
Critical Characteristics of Information
• Electronic commerce
– Systems that support electronically executed
business transactions
– The fundamental purpose of e-commerce is to
execute online transactions
• E-commerce is not new; however, recent rapid
development of the Internet is surely responsible for
the popularity of e-commerce.
• The new way of commerce through the Internet creates
vast opportunities, but at the same time, it poses
challenges.
Types of E-Commerce
• Business-to-consumer e-commerce (B2C)
– Connects individual consumers with sellers , cutting
out the middleman
– E.g. Amazon.com
• Business-to-business e-commerce (B2B)
– Supports business transactions on across private
networks, the Internet, and the Web
• Consumer-to-consumer e-commerce (C2C)
– Connects individual sellers with people shopping for
used items
– E.g. ebay.com
Different Transaction Processing for Different Needs
Thank You