127
2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 1 Chapter 5 Protection of Information Assets 2007 2007 CISA CISA Review Course Review Course

Chap5 2007 Cisa Review Course

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 1

Chapter 5

Protection of Information Assets

20072007 CISACISA Review Course Review Course

Page 2: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 2

Chapter Overview

• Importance of Information Security Management

• Logical Access Exposures and Controls• Network Infrastructure Security• Auditing Information Security Management

Framework • Auditing Network Infrastructure Security• Environmental Exposures and Controls• Physical Access Exposures and Controls• Mobile Computing.

Page 3: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 3

Chapter Objective

Ensure that the CISA candidate…

“understands and can provide assurance that the security architecture (policies, standards, procedures and controls) ensures the confidentiality, integrity and availability of information assets.”

Page 4: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 4

Chapter 5 Summary

According to the CISA Certification Board, this content area will represent approximately 31% of the CISA examination. (approximately 62 questions)

Page 5: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 5

5.1. Importance of Information Security Management

Page 6: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 6

5.1. Importance of Information Security Management

• Security objectives to meet organization’s business requirements include : – Ensure the continued availability of their information

systems.– Ensure the integrity of the information stored on their

computer systems.– Preserve the confidentiality of sensitive data.– Ensure conformity to applicable laws, regulations and

standards.– Ensure adherence to trust and obligation in relation to any

information relating to an identified or identifiable individual

– Preserve the confidentiality of sensitive data in store and in transit.

Page 7: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 7

5.1. Importance of Information Security Management

5.1.1. Key Elements of Information Security Management – Senior management commitment and support – Policies and procedures– Organization– Security awareness and education– Monitoring and compliance– Incident handling and response

5.1. Importance of Information Security Management

Page 8: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 8

5.1.2. Information Security Management Roles and Responsibilities- IS security steering committee- Executive management- Security advisory group– Chief Privacy Officer (CPO)– Chief security officer (CSO)– Process owners– Information assets owners and data owners– Users– External parties – Security specialists/advisors– IT developers– IS auditors

5.1. Importance of Information Security Management

Page 9: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 9

5.1. Importance of Information Security Management

5.1.3. Information Asset Inventories– Clear identification of asset– Location– Security/risk classification– Asset group– Owner

Page 10: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 10

5.1.4. Classification of Information Assets– Who has access rights and to what?

– The level of access to be granted

– Who is responsible for determining the access rights and access levels?

– What approvals are needed for access?

5.1. Importance of Information Security Management

Page 11: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 11

5.1.5. System Access Permissions– Logically or physically based– Need-to-know basis– Four IT layers of security provided for

networks– Access to information resources– Access Capabilities– Reviews of access authorization

5.1. Importance of Information Security Management

Page 12: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 12

5.1. Importance of Information Security Management

5.1.6. Mandatory and Discretionary Access Controls

- Mandatory Enforces corporate security policy Compares sensitivity of information resources

• Discretionary- Enforces data-owner-defined sharing of information

resources.

Page 13: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 13

5.1.7. Privacy Management Issues and the Role of IS Auditors- The goals of a privacy impact assessment

Pinpoint the nature of personally identifiable information associated with business processes

• Document the collection, use, disclosure and destruction of personally identifiable information

• Ensure that accountability for privacy issues exists• Be the foundation for informed policy, operations and system

design decisions based on an understanding of privacy risk and the options available for mitigating that risk.

5.1. Importance of Information Security Management

Page 14: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 14

5.1.8. Critical success factors to information security management– Information Security Policy – Senior management commitment and

support on security training – Security Awareness Training– Professional Risk-based Approach

5.1. Importance of Information Security Management

Page 15: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 15

5.1.9. Information security and External Parties– Identification of Risks Related to External

Parties – Addressing Security When Dealing With Customers

– Addressing Security in Third-party Agreements

5.1. Importance of Information Security Management

Page 16: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 16

5.1.10. HUMAN RESOURCES SECURITY AND THIRD PARTIES – Screening – Terms and Conditions of Employment – During Employment – Termination or Change of Employment – Removal of Access Rights

5.1. Importance of Information Security Management

Page 17: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 17

5.1.11. Computer crime issues and exposures– Threats to business include the following:

Financial lossLegal repercussionsLoss of credibility or competitive edgeBlackmail/industrial espionage Disclosure of confidential, sensitive or

embarrassing informationSabotage

5.1. Importance of Information Security Management

Page 18: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 18

5.1.11. Computer crime issues and exposures (Cont.)– Computer crime vs. computer abuse– “Crime” depending on statistics of the

jurisdiction– Civil offense vs. criminal offence– When should a crime be suspected?

5.1. Importance of Information Security Management

Page 19: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 19

5.1.11. Computer crime issues and exposures (Cont.) • Possible perpetrators include:

- Hackers- Script Kiddies- Crackers- Employees (authorized or unauthorized)

IS personnelEnd users

- Former employees- Interested or educated outsiders- Part-time and temporary personnel- Third parties- Accidental ignorant

5.1. Importance of Information Security Management

Page 20: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 20

5.2. Logical Access Exposures and Controls

Page 21: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 21

Logical access controls are the primary means of managing and protecting resources to reduce risks to a level acceptable to an organization.

5.2. Logical Access Exposures and Controls

Page 22: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 22

5.2. Logical Access Exposures and Controls

• Trojan horses or Trojan horses or backdoors backdoors

• Rounding downRounding down• Salami techniquesSalami techniques• Viruses Viruses • WormsWorms• Logic bombsLogic bombs• Trap DoorsTrap Doors

• Asynchronous Asynchronous attacksattacks

• Data leakageData leakage• Wire-tappingWire-tapping• War drivingWar driving• PiggybackingPiggybacking• Computer Computer

shutdownshutdown• Denial of service Denial of service

attackattack

5.2.1. Logical Access Exposures

Page 23: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 23

5.2.2. Familiarization with the organization's IT environment– These layers are:

the networkoperating system platformdatabase and application layers

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls

Page 24: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 24

5.2.3. Paths of Logical Access

– General points of entryNetwork connectivity

Remote access

Operator console

Online workstations or terminals

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls

Page 25: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 25

5.2.4. Logical Access Control Software

- Prevents unauthorized access and modification to an organization’s

sensitive data and use of system critical functions

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls

Page 26: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 26

5.2.4. Logical access control software functionality• General operating systems access control functions include:

- User identification and authentication mechanisms - Restricted logon IDs - Rules for access to specific information resources - Create individual accountability and auditability- Create or change user profiles - Log events - Log user activities - Report capabilities

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls

Page 27: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 27

5.2.4. Logical Access Control Software - Database and/or application-level access

control functions include: Create or change data files and database profiles Verify user authorization at the application and transaction

levels Verify user authorization within the application Verify user authorization at the field level for changes

within a database Verify subsystem authorization for the user at the file level Log database/data communications access activities for

monitoring access violations

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls

Page 28: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 28

5.2.5. Identification and Authentication– Logon-ids and passwords

Features of passwordsPassword syntax (format) rules

– Token devices- one time passwords

– Biometric• Management of Biometrics

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls

Page 29: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 29

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls5.2.5. Identification and Authentication

– Single sign-on (SSO)SSO is the process for the consolidating all organization platform-based administration, authentication and authorization functions into a single centralized administrative function. A single sign-on product that interfaces with:

client-server and distributed systems mainframe systems network security including remote access mechanisms

Page 30: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 30

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls5.2.5. Identification and Authentication

– Single sign-on (SSO) advantages Multiple passwords are no longer required, therefore, whereby

a user may be more inclined and motivated to select a stronger password

It improves an administrator’s ability to manage users’ accounts and authorizations to all associates systems

It reduces administrative overhead in resetting forgotten passwords over multiple platforms and applications

It reduces the time taken by users to log into multiple applications and platforms

Page 31: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 31

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls

5.2.5. Identification and Authentication– Single sign-on (SSO) disadvantages include:

Support for all major operating system environments is difficultThe costs associated with SSO development can be

significant when considering the nature and extent of interface development and maintenance that may be necessary

The centralized nature of SSO presents the possibility of a single point of failure and total compromise of an organization’s information assets

Page 32: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 32

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls

5.2.6. Social EngineeringIs the human side of breaking into a corporate network. The best means of defense for social engineering is an ongoing security awareness program, wherein all employees are educated about the risks involved in attacks.

Page 33: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 33

5.2. Logical Access Exposures and Controls

• PhishingThis normally takes the form of an e-mail,though it may be a personal or telephone approach, pretending to be an authorized person or organization legitimately

requesting information.

5.2.6. Social Engineering

Page 34: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 34

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls5.2.7. Authorization Issues

– Typical access restrictions at the file level include:

Read, inquiry or copy only Write, create, update or delete only Execute only A combination of the above

Page 35: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 35

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls

5.2.7. Authorization Issues– Access control lists refer to:

Users (including groups, machines, processes)

who have been given permission to use a

particular system resourceThe types of access permitted

Page 36: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 36

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls

5.2.7. Authorization Issues

- Logical access security administration

Centralized environment

Decentralized environment

Page 37: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 37

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls

5.2.7. Authorization Issues- Advantages of conducting security in a

decentralized environment The security administration is on-site at the

distributed location Security issues are resolved in a more timely

manner Security controls are monitored on a more

frequent basis

Page 38: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 38

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls

5.2.7. Authorization Issues- Risks associated with distributed

responsibility for security administration Local standards might be implemented rather

than those required Levels of security management might be below

chat can be maintained by central administration. Unavailability of management checks and audits.

Page 39: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 39

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls

5.2.7. Authorization Issues

Remote access securityToday’s organizations require remote access connectivity to their information resources for different types of users such as employees, vendors, consultants, business partners and customer representatives. In providing this capability, a variety of methods and procedures are available to satisfy an organization’s business need for this level of access.

Page 40: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 40

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls

5.2.7. Authorization Issues– Remote access security risks include:

Denial of service Malicious third partiesMisconfigured communications softwareMisconfigured devices on the corporate computing

infrastructureHost systems not secured appropriatelyPhysical security issues over remote users’ computers

Page 41: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 41

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls

5.2.7. Authorization Issues– Remote access security controls include:

Policy and standards

Proper authorizations

Identification and authentication mechanisms

Encryption tools and techniques, such as the use of VPN

System and network management

Page 42: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 42

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls5.2.7. Authorization5.2.7. Authorization IssuesIssues

Remote access using personal digital assistants (PDAs).Remote access using personal digital assistants (PDAs).- - Control issues to address include:Control issues to address include:

ComplianceCompliance Approval Approval Standard PDA applicationsStandard PDA applications Due careDue care Awareness training PDA applicationsPDA applications SynchronizationSynchronization EncryptionEncryption Virus detection and controlVirus detection and control Device registration Camera use

Page 43: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 43

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls5.2.7. Authorization Issues5.2.7. Authorization Issues

• Access issues with mobile technologyAccess issues with mobile technology

These devices should be strictly controlled both by These devices should be strictly controlled both by policy and by denial of use. Possible actions include:policy and by denial of use. Possible actions include:Banning all use of transportable drives in the security policyBanning all use of transportable drives in the security policy

Where no authorized used of USB ports exists, disabling use with a Where no authorized used of USB ports exists, disabling use with a logon script which removes them form the system directorylogon script which removes them form the system directory

If they are considered necessary for business use, encrypting all data If they are considered necessary for business use, encrypting all data transported or saved by these devicestransported or saved by these devices

Page 44: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 44

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls

5.2.7. Authorization Issues5.2.7. Authorization Issues

• Audit logging in monitoring system accessAudit logging in monitoring system access

provides management an audit trail to monitor provides management an audit trail to monitor activities of a suspicious nature, such as a activities of a suspicious nature, such as a hacker attempting brute force attacks on a hacker attempting brute force attacks on a privileged logon IDprivileged logon ID

Page 45: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 45

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls

5.2.7. Authorization Issues5.2.7. Authorization Issues• Audit logging in monitoring system accessAudit logging in monitoring system access

- Access rights to system logs- Access rights to system logsA periodic review of system-generated logs A periodic review of system-generated logs can detect security problems, including can detect security problems, including attempts to exceed access authority or gain attempts to exceed access authority or gain system access during unusualsystem access during unusual hours.hours.

Page 46: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 46

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls

5.2.7. Authorization Issues5.2.7. Authorization Issues

• Audit logging in monitoring system accessAudit logging in monitoring system access

- Tools for audit trails (logs) analysis- Tools for audit trails (logs) analysis Audit reduction toolsAudit reduction tools

Trends/variance-detection toolsTrends/variance-detection tools

Attack signature-detection toolsAttack signature-detection tools

Page 47: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 47

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls5.2.7. Authorization Issues5.2.7. Authorization Issues

• Audit logging in monitoring system accessAudit logging in monitoring system access- Cost considerationCost consideration- Audit concernsAudit concernsPatterns or trends that indicate abuse of access privileges, Patterns or trends that indicate abuse of access privileges, such as concentration on a sensitive applicationsuch as concentration on a sensitive applicationViolations (such as attempting computer file access that is not Violations (such as attempting computer file access that is not authorized) and/or use of incorrect passwordsauthorized) and/or use of incorrect passwords effectiveness of IDs and IPs and management of detected effectiveness of IDs and IPs and management of detected and prevented intrusionand prevented intrusion

Page 48: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 48

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls

5.2.7. Authorization Issues5.2.7. Authorization Issues• Restrict and monitor access to computer Restrict and monitor access to computer

features that bypass cost considerationfeatures that bypass cost consideration- Generally, only system software Generally, only system software programmers should have access to:programmers should have access to: Bypass label processing (BLP)Bypass label processing (BLP) System exitsSystem exits Special system logon IDsSpecial system logon IDs

Page 49: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 49

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls

5.2.7. Authorization Issues5.2.7. Authorization Issues• Naming conventions for logical access Naming conventions for logical access controlscontrols

- Are structures used to govern user access to Are structures used to govern user access to

the system and user authority to access/use the system and user authority to access/use

computer resources, such as files, programs computer resources, such as files, programs

and terminals.and terminals.

Page 50: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 50

5.2. Logical Access 5.2. Logical Access Exposures Exposures and Controlsand Controls5.2.8. Storing, Retrieving, Transporting and Disposing of Confidential Information

- Management should define and implement procedures to prevent access to, or loss of, sensitive information and software from computers, disks, and other equipment or media when they are stored, disposed of or transferred to another user.

Page 51: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 51

Which of the following BEST provides access control to payroll data being processed on a local server?

A. Logging of access to personal informationB. Separate password for sensitive

transactions C. Software restricts access rules to authorized staff D. System access restricted to business hours

Chapter 5 Question 1Chapter 5 Question 1

Page 52: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 52

A utility is available to update critical tables in case of data inconsistency. This utility can be executed at the OS prompt or as one of menu options in an application. The BEST control to mitigate the risk of unauthorized manipulation of data is to:A. delete the utility software and install it as and when required.B. provide access to the utility on a need-to-use basis.C. provide access to the utility to user management.D. define access so that the utility can be executed only in the menu option.

Chapter 5 Question 5Chapter 5 Question 5

Page 53: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 53

An organization is proposing to install a single sign-on facility giving access to all systems. The organization should be aware that:A. maximum unauthorized access would be possible if a password is disclosed.B. user access rights would be restricted by the additional security parameters.C. the security administrator’s workload would increase.D. user access rights would be increased.

Chapter 5 Question 6Chapter 5 Question 6

Page 54: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 54

5.3. Network Infrastructure Security

Page 55: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 55

5.3.1. LAN SecurityLocal area networks facilitate the storage and retrieval of programs and data used by a group of people. LAN software and practices also need to provide for the security of these programs and data. – LAN risk and issues – Dial-up access controls

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

Page 56: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 56

5.3.2. Client-Server Security – Control techniques in place

Securing access to data or applicationUse of network monitoring devicesData encryption techniquesAuthentication systemsUse of application level access control programs

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

Page 57: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 57

5.3.2. Client/Server Security• Client/server risks and issues

Access controls may be weak in a client-server environment.

Change control and change management procedures.

The loss of network availability may have a serious impact on the business or service.

Obsolescence of the network components The use of modems to connect the network to

other networks

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

Page 58: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 58

5.3.2. Client/Server Security• Client/server risks and issues

The connection of the network to public switched telephone networks may be weak

Changes to systems or data Access to confidential data and data

modification may be unauthorized Application code and data may not be located

on a single machine enclosed in a secure computer room, as with mainframe computing

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

Page 59: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 59

5.3.3. Wireless Security Threats and Risk Mitigation– Threats categorization:

• Errors and omissions• Fraud and theft committed by authorized or

unauthorized users of the system• Employee sabotage• Loss of physical and infrastructure support• Malicious hackers• Industrial espionage• Malicious code• Foreign government espionage• Threats to personal privacy

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

Page 60: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 60

5.3.3. Wireless Security Threats and Risk Mitigation– Security requirements

• Authenticity

• Nonrepudiation

• Accountability

• Network availability

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

Page 61: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 61

5.3.4. Internet Threats and Security• Network Security Threats• Passive attacks

Network analysis Eavesdropping Traffic analysisActive attacks Brute-force attack Masquerading Packet replay Phishing Message modification Unauthorized access through the Internet or web-based

services Denial of service Dial-in penetration attacks E-mail bombing and spamming E-mail spoofing

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

Page 62: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 62

5.3.4. Internet Threats and Security– Threat impact

Loss of incomeIncreased cost of recoveryIncreased cost of retrospectively securing systemsLoss of information Loss of trade secretsDamage to reputationLegal and regulatory noncomplianceFailure to meet contractual commitmentsLegal action by customers for loss of confidential data

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

Page 63: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 63

5.3.4. Internet Threats and Security– Causal factors for internet attacks

Availability of tools and techniques on the Internet

Lack of security awareness and training Exploitation of security vulnerabilities Inadequate security over firewalls

– Internet security controls

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

Page 64: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 64

• Firewall Security Systems

–Firewall general features

–Firewall typesRouter packet filteringApplication firewall systemsStateful inspection

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

5.3.4. Internet Threats and Security

Page 65: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 65

• Firewall Security Systems

– Examples of firewall

implementations

Screened-host firewall

Dual-homed firewall

Demilitarized zone (DMZ)

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

5.3.4. Internet Threats and Security

Page 66: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 66

• Firewall Security Systems

– Firewall issues

A false sense of security

The circumvention of firewall

Misconfigured firewalls

What constitutes a firewall

Monitoring activities may not occur on a regular basis

Firewall policies

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

5.3.4. Internet Threats and Security

Page 67: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 67

5.3. Network Infrastructure Security

• Firewall Security Systems

• Firewall Platforms– Using hardware or software

– appliances versus normal servers

5.3.4. Internet Threats and Security

Page 68: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 68

• Intrusion Detection Systems (IDS)

An IDS works in conjunction with routers and

firewalls by monitoring network usage anomalies.

• Network-based IDSs

• Host-based IDSs

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

5.3.4. Internet Threats and Security

Page 69: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 69

• Intrusion Detection Systems (IDS)

Components:

• Sensors that are responsible for collecting data

• Analyzers that receive inputo from sensors and

determine intrusive activity

• An administration console

• A user interface

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

5.3.4. Internet Threats and Security

Page 70: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 70

• Intrusion Detection Systems (IDS)

Types include:

• Signature-based

• Statistical-based

• Neural networks

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

5.3.4. Internet Threats and Security

Page 71: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 71

• Intrusion Detection Systems (IDS)

Features:

• Intrusion detection

• Gathering evidence on intrusive activity

• Automated response

• Security monitoring

• Interface with system tolls

• Security policy management

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

5.3.4. Internet Threats and Security

Page 72: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 72

• Intrusion Detection Systems (IDS)

Limitations:

• Weaknesses in the policy definition

• Application-level vulnerabilities

• Backdoors into applications

• Weaknesses in identification and authentication

schemes

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

5.3.4. Internet Threats and Security

Page 73: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 73

5.3. Network Infrastructure Security

• Honeypots and Honeynets• High interaction – Give hackers a real

environment to attack

• Low interaction – Emulate production environments

5.3.4. Internet Threats and Security

Page 74: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 74

5.3.5. Encryption

– Key elements of encryption systems

• Encryption algorithm

• Encryption key

• Key length

– Private key cryptographic systems

– Public key cryptographic systems

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

Page 75: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 75

5.3.5. Encryption (Continued)

– Elliptical curve cryptosystem (ECC)

– Quantum cryptography

– Advanced Encryption Standard (AES)

– Digital signatures

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

Page 76: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 76

5.3.5. Encryption (Continued)

– Digital signatures

Data integrity

Authentication

Nonrepudiation

Replay protection

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

Page 77: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 77

5.3. Network Infrastructure Security

• Digital Envelope – Used to send encrypted information

and the relevant key along with it.

– The message to be sent, can be encrypted by using either:

• Asymmetric key

• Symmetric key

5.3.5. Encryption (Continued)

Page 78: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 78

5.3.5. Encryption (Continued)– Public key infrastructure

• Digital certificates• Certificate authority (CA)• Registration authority (RA)• Certificate revocation list (CRL)• Certification practice statement (CPS)

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

Page 79: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 79

5.3.5. Encryption (Continued)– Use of encryption in OSI protocols

Secure sockets layer (SSL)Secure Hypertext Transfer Protocol (S/HTTP)IP securitySSHSecure multipurpose Internet mail extensions

(S/MIME)Secure electronic transactions (SET)

5.3. Network Infrastructure 5.3. Network Infrastructure SecuritySecurity

Page 80: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 80

5.3. Network Infrastructure Security

• Encryption risks and password protection

• Viruses

• Virus and worm controls

• Technical controls

• Anti-virus software implementation strategies

5.3.5. Encryption (Continued)

Page 81: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 81

5.3. Network Infrastructure Security

• Virus and Worm Controls

• Management Procedural Controls

• Technical controls

• Anti-virus software implementation strategies

5.3.6. Viruses

Page 82: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 82

5.3. Network Infrastructure Security5.3.7. VOICE-OVER IP

- AdvantagesUnlike traditional telephony VoIP innovation

progresses at market rates

• Lower costs per call, or even free calls, especially for long-distance calls

• Lower infrastructure costs. Once IP infrastructure is installed, no or little additional telephony infrastructure is needed.

Page 83: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 83

5.3. Network Infrastructure Security

5.3.7. VOICE-OVER IP- VoIP Security Issues• Inherent poor security

– The current Internet architecture does not provide the same physical wire security as the phone lines.

• The key to securing VoIP – security mechanisms such as those

deployed in data networks (e.g., firewalls, encryption) to emulate the security level currently used by PSTN network users.

Page 84: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 84

5.3. Network Infrastructure Security

5.3.8. Private Branch Exchange (PBX )

- Attributes

- PBX Risks and Audit

Page 85: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 85

Which of the following is the MOST effective anti-virus control?: A. Scanning e-mail attachments on the

mail server.

B. Restoring systems from clean copies.

C. Disabling floppy drives.

D. An online anti-virus scan with up-to-

date virus definitions.

Chapter 5 Question 2Chapter 5 Question 2

Page 86: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 86

An IS auditor has just completed a review of an organization that has a mainframe and a client-server environment where all production data reside. Which of the following weaknesses would be considered the MOST serious?A. The security officer also serves as the database administrator.B. Password controls are not administered over the client-server environment.C. There is no business continuity plan for the mainframe system’s noncritical applications.D. Most local area networks do not back up file-server-fixed disks regularly.

Chapter 5 Question 4Chapter 5 Question 4

Page 87: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 87

A B-to-C e-commerce web site as part of its information security program wants to monitor, detect and prevent hacking activities and alert the system administrator when suspicious activities occur. Which of the following infrastructure components could be used for this purpose?

A. Intrusion detection systemsB. FirewallsC. RoutersD. Asymmetric encryption

Chapter 5 Question 7Chapter 5 Question 7

Page 88: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 88

Which of the following BEST determines whether complete encryption and authentication protocols for protecting information while being transmitted exist?

A. A digital signature with RSA has been implemented.

B. Work is being done in tunnel mode with the nested services of AH and ESP.

C. Digital certificates with RSA are being used.D. Work is being done in transport mode with the

nested services of AH and ESP..

Chapter 5 Question 8Chapter 5 Question 8

Page 89: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 89

Which of the following concerns about the security of an electronic message would be addressed by digital signatures?

A. Unauthorized readingB. TheftC. Unauthorized copyingD. Alteration

Chapter 5 Question 9Chapter 5 Question 9

Page 90: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 90

Which of the following would be MOST appropriate to ensure the confidentiality of transactions initiated via the Internet?

A. Digital signatureB. Data Encryption Standard (DES)C. Virtual private network (VPN)D. Public key encryption

Chapter 5 Question 10Chapter 5 Question 10

Page 91: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 91

5.4. AuditingInformationSecurity Framework

Page 92: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 92

5.4.1. AUDITING INFORMATION SECURITY FRAMEWORK

– Review written policies, procedures and standards

– Logical access security policies– Formal security awareness and training– Data ownership (data classification scheme)– Data owners

5.4. AUDITING INFORMATION SECURITY FRAMEWORK

Page 93: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 93

5.4.1. Auditing Information Security Management (Cont.) – Data custodians– Security administrator– New IT Users– Data users– Documented authorizations– Terminated employee access– Access standards– Security Baselines– Access Standards

5.4. AUDITING INFORMATION SECURITY FRAMEWORK

Page 94: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 94

5.4.2. Auditing Logical Access– Familiarization with the organization's IT

environment

– Documenting the access paths– Interviewing systems personnel– Reviewing reports from access control software– Reviewing application systems operations

manual

5.4. AUDITING INFORMATION SECURITY FRAMEWORK

Page 95: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 95

5.4.3. Techniques for Testing Security– Use of terminal cards and keys

– Terminal identification

– Logon-ids and passwords

– Controls over production resources

– Logging and reporting of computer access violations

5.4. AUDITING INFORMATION SECURITY FRAMEWORK

Page 96: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 96

5.4.3. Techniques for Testing Security

(Continued)

– Follow-up access violations

– Investigation of computer crime

– Protection of Evidence

– Identification of methods of bypassing security and compensating controls

– Review access controls and password administration

5.4. AUDITING INFORMATION SECURITY FRAMEWORK

Page 97: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 97

5.4.4. INVESTIGATION

TECHNIQUES

– Investigation of Computer

Crime

– Protection of Evidence and

Chain of Custody

5.4. AUDITING INFORMATION SECURITY FRAMEWORK

Page 98: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 98

An IS auditor reviewing the log of failed logon attempts would be MOST concerned if which of the following accounts was targeted?A. Network administratorB. System administratorC. Data administratorD. Database administrator

Chapter 5 Question 3Chapter 5 Question 3

Page 99: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 99

5.5. Auditing Network

Infrastructure Security

Page 100: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 100

5.5.1. Auditing Remote Access– Auditing Internet “Points of Presence”– Network penetration tests– Full network assessment reviews– LAN networks assessments– Development and authorization of

network changes– Unauthorized changes

5.5. Auditing Network 5.5. Auditing Network Infrastructure SecurityInfrastructure Security

Page 101: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 101

5.5. Auditing Network Infrastructure Security

5.5.1. Auditing Remote Access

Computer Forensics

• “It is the process of identifying, preserving,

analyzing and presenting digital evidence in a

manner that is legally acceptable in any legal

proceedings”.

Page 102: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 102

5.6. Environmental Exposures and Controls

Page 103: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 103

5.6.1. Environmental Issues and

Exposures

Environmental exposures are due primarily to

naturally occurring events, such as lightning

storms, earthquakes, volcanic eruptions,

hurricanes, tornados and other types of extreme

weather conditions.

5.6. Environmental 5.6. Environmental Exposures and Controls Exposures and Controls

Page 104: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 104

5.6.1. Environmental Issues and Exposures

– Power failures can be grouped into distinct

categories Total failure (blackout)

Severely reduced voltage (brownout)

Sags, spikes and surges

Electromagnetic interference (EMI)

5.6. Environmental5.6. EnvironmentalExposures and Controls Exposures and Controls

Page 105: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 105

5.6.2. Controls for Environmental Exposures

– Alarm control panels

– Water detectors

– Handheld fire extinguishers

– Manual fire alarms

– Smoke detectors

– Fire suppression systems

– Strategically locating the computer room

5.6. Environmental 5.6. Environmental Exposures and Controls Exposures and Controls

Page 106: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 106

5.6.2. Controls for Environmental Exposures (cont.)

– Regular inspection by fire department

– Fireproof walls, floors and ceilings surrounding the

computer room

– Electrical surge protectors

– Uninterruptible power supply/generator

– Emergency power-off switch

– Power leads from two substations

5.6. Environmental 5.6. Environmental Exposures and Controls Exposures and Controls

Page 107: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 107

5.6.2. Controls for Environmental Exposures

(cont.)

– Wiring placed in electrical panels and conduit

– Prohibiting against eating, drinking and smoking

within the information processing facility

– Fire resistant office materials

– Documented and tested emergency evacuation plans

5.6. Environmental 5.6. Environmental Exposures and Controls Exposures and Controls

Page 108: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 108

5.6.3. Auditing Environmental Controls– Water and smoke detectors– Handheld fire extinguishers– Fire suppression systems– Regular inspection by fire department– Fireproof walls, floors and ceilings

surrounding the computer room– Electrical surge protectors

5.6. Environmental 5.6. Environmental Exposures and ControlsExposures and Controls

Page 109: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 109

5.6.3. Auditing Environmental Controls (cont.)– Power leads from two substations– Fully documented and tested business

continuity plan– Wiring placed in electrical panels and conduit– UPS/generator– Documented and tested emergency evacuation

plans– Humidity/temperature control

5.6. Environmental 5.6. Environmental Exposures and ControlsExposures and Controls

Page 110: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 110

5.7. Physical Access Exposures and Controls

Page 111: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 111

5.7.1. Physical Access Issues and Exposures

– Physical access exposures

• Unauthorized entry• Damage, vandalism or theft to equipment or documents• Copying or viewing of sensitive ore copyrighted

information• Alteration of sensitive equipment and information• Public disclosure of sensitive information• Abuse of data processing resources• Blackmail• Embezzlement

5.7. Physical Access 5.7. Physical Access Exposures and ControlsExposures and Controls

Page 112: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 112

5.7.1. Physical Access Issues and Exposures

– Possible perpetratorsDisgruntled

On strike

Threatened by disciplinary action or dismissal

Addicted to a substance or gambling

Experiencing financial or emotional problems

Notified of their termination

5.7. Physical Access5.7. Physical AccessExposures and ControlsExposures and Controls

Page 113: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 113

5.7.2. Physical Access Controls– Bolting door locks

– Combination door locks (cipher locks)

– Electronic door locks

– Biometric door locks

– Manual logging

– Electronic logging

5.7. Physical Access5.7. Physical AccessExposures and ControlsExposures and Controls

Page 114: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 114

5.7.2. Physical Access Controls (continued)– Identification badges (photo IDs)– Video cameras– Security guards– Controlled visitor access– Bonded personnel– Deadman doors

5.7. Physical Access5.7. Physical AccessExposures and ControlsExposures and Controls

Page 115: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 115

5.7.2. Physical Access Controls

(continued)– Not advertising the location of sensitive

facilities– Computer workstation locks– Controlled single entry point– Alarm system– Secured report/document distribution cart

5.7. Physical Access5.7. Physical AccessExposures and ControlsExposures and Controls

Page 116: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 116

5.7.3. Auditing Physical Access

– Touring the information processing facility (IPF)

– Testing of physical safeguards

5.7. Physical Access5.7. Physical AccessExposures and Controls Exposures and Controls

Page 117: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 117

5.8. Mobile Computing

Page 118: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 118

5.9. Case Study

Page 119: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 119

CASE STUDY SCENARIOManagement is currently considering ways in which to enhance the physical security and protection of its data center. The IS auditor has been asked to assist in this process by evaluating the current environment and making recommendations for improvement. The data center consists of 15,000 square feet (1,395 square meters) of raised flooring on the ground floor of the corporate headquarters building.

Chapter 5Chapter 5CASE STUDY

Page 120: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 120

CASE STUDY SCENARIO (Cond…)A total of 22 operations personnel require regular access. Currently, access to the data center is obtained using a proximity card, which is assigned to each authorized individual. There are three entrances to the data center, each of which utilizes a card reader and has a camera monitoring the entrance. These cameras feed their signals to a monitor at the building reception desk, which cycles through these images along with views from other cameras inside and outside the building.

Chapter 5Chapter 5CASE STUDY

Page 121: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 121

CASE STUDY SCENARIO (Cont…)Two of the doors to the data center also have key locks that bypass the electronic system so that a proximity card is not required for entry. Use of proximity cards is written to an electronic log. This log is retained for 45 days. During the review, the IS auditor noted that 64 proximity cards are currently active and issued to various personnel. The data center has no exterior windows, although one wall is glass and overlooks the entry foyer and reception area for the building.

Chapter 5Chapter 5CASE STUDY

Page 122: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 122

5.10. Practice Questions

Page 123: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 123

CASE STUDY QUESTIONS1. Which of the following risks would be

mitigated by supplementing the proximity card system with a biometric scanner to provide two-factor authentication?A. Piggybacking or tailgatingB. Sharing access cardsC. Failure to log accessD. Copying of keys

Chapter 5Chapter 5CASE STUDY

Page 124: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 124

CASE STUDY QUESTIONS2. Which of the following access mechanisms

would present the greatest difficulty in terms of user acceptance?

A. Hand geometry recognition

B. Fingerprints

C. Retina scanning

D. Voice recognition

Chapter 5Chapter 5CASE STUDY

Page 125: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 125

5.11. Answers to Practice Questions

Page 126: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 126

5.12. Suggested Resources for

Reference

Page 127: Chap5 2007 Cisa Review Course

2007 CISA© Review Course © 2006 ISACA All rights reserved www.isaca.org Chap 5 - Pag - 127

Group Discussion

Chapter 5Chapter 5RecapRecap