SlideShare a Scribd company logo
General and Application Control - Security  and Control Issues in  Information Systems Part 2
WRAP UP:
The function whose mission is to establish
security policies and the associated
procedures and control elements over the
information assets
Methods, policies, and organizational procedures
that ensure safety of organization’s assets, accuracy
and reliability of its records, and operational
adherence to management standards
Allows trustful
operations by
guaranteeing that
the handler of
information is
whoever she or he
claims to be.
General and Application Control - Security  and Control Issues in  Information Systems Part 2
General and Application Control - Security  and Control Issues in  Information Systems Part 2
Controls for design,
security and use of
Information
Systems in
organization
Specific
controls for
each
application.
General and Application Control - Security  and Control Issues in  Information Systems Part 2
General and Application Control - Security  and Control Issues in  Information Systems Part 2
Automated and manual procedures that
ensure only authorized data are processed
by application
Unique to each computerized application
Classified as (1) input controls, (2) processing
controls, (3) output controls and (4) storage
controls
Control totals: Input, processing, Storage
Edit checks: Input, Storage
Computer matching: Input, processing,
Storage
Run control totals: Processing, output,
Storage
Report distribution logs: Output, storage
• Input controls
– Data is accurate and consistent
on entry
– Direct keying of data, double
entry or automated input
– Data conversion, editing and
error handling
– Field validation on entry
– Input authorization and auditing
– Checks on totals to catch
errors
• Input controls
-Data input controls ensure
the accuracy, completeness,
and timeliness of data
during its conversion from
its original source into
computer data, or entry into
a computer application.
• Processing controls
– Data is accurate and complete on processing
– Checks on totals to catch errors
– Compare to master records to catch errors
– Field validation on update
– -Data processing controls are used to ensure the
accuracy, completeness, and timeliness of data
during either batch or real-time processing by the
computer application.
• Output controls
– Data is accurate, complete and
properly distributed on output
– Checks on totals to catch errors
– Review processing logs
– Track recipients of data
– - Data output controls are used
to ensure the integrity of output
and the correct and timely
distribution of any output
produced.
• Processing controls
– Data is accurate and complete on processing
– Checks on totals to catch errors
– Compare to master records to catch errors
– Field validation on update
– -Data processing controls are used to ensure the
accuracy, completeness, and timeliness of data
during either batch or real-time processing by the
computer application.
• Storage controls
–Stored data may be called
upon when new data is
being processed
– the combination of data
forming new outputs.
- Data is often kept on a
storage medium such as a
hard drive.
General and Application Control - Security  and Control Issues in  Information Systems Part 2
• Public, accessible network
• Abuses have widespread effect
• Fixed Internet addresses
• Corporate systems extended
outside organization
General and Application Control - Security  and Control Issues in  Information Systems Part 2
Encryption
Authentication
Message integrity
Digital signatures
Digital certificates
Public key infrastructure (PKI)
Public Key Encryption
Authentication, message integrity, digital signature, digital
certificates
Security for wireless internet access
1. Service set identifiers (SSID)
-Identify access points in network
-Form of password for user’s radio network
interface card
-Broadcast multiple time per second
-Easily picked up by sniffer programs, war
driving
Security for wireless internet access
2. Wired Equivalent Privacy (WEP):
-Initial security standard
-Call for access point and all users to
share the same 40-bit encrypted
password
Security for wireless internet access
3. Wi-Fi Protected Access (WPA)
specification
-128-bit, non-static encryption key
-Data-packet checking
Methods that protect
physical facilities and their
contents from loss and
destruction. Computer
centers are prone to many
hazards such as accidents,
thefts, fire, natural
disasters, destructions etc.
system that holds the door
for intruders and prevents
them from accessing the
resources by verifying them
as unauthorized persons on
the basis of biometrics
authentication
Computers can fail for several
reasons like power failures,
electronic circuitry malfunctions,
mechanical malfunctions of
peripheral equipment and hidden
programming errors. To protect
from these failure precaution, any
measure with automatic and
remote maintenance capabilities
may be required.
General and Application Control - Security  and Control Issues in  Information Systems Part 2

More Related Content

PPTX
Auditing information System
PPTX
Introduction to Computer Programming
PPTX
Procedural Controls
PPTX
Security and Control Issues in information Systems
PPT
The Importance of Security within the Computer Environment
PPTX
Information System Architecture and Audit Control Lecture 1
PPTX
03.1 general control
PPTX
Data/File Security & Control
Auditing information System
Introduction to Computer Programming
Procedural Controls
Security and Control Issues in information Systems
The Importance of Security within the Computer Environment
Information System Architecture and Audit Control Lecture 1
03.1 general control
Data/File Security & Control

What's hot (20)

PPTX
IT General Controls
PPT
IT System & Security Audit
PPT
Security audit
PPTX
Security
PDF
IT General Controls Presentation at IIA Vadodara Audit Club
PPTX
"Backoff" Malware: How to Know If You're Infected
PPTX
PPTX
Achieving Continuous Monitoring with Security Automation
PDF
Functional safety-overview
PDF
Information Security Continuous Monitoring within a Risk Management Framework
PPTX
Auditing in Computerized Environment
PDF
Security Framework
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
PDF
It Security Audit Process
DOCX
Effects of IT on internal controls
PPTX
FISMA NextGen - Continuous Monitoring, Near Real-Time Risk Management
PPT
5.4 it security audit (mauritius)
PPTX
Security and Audit Report Sign-Off—Made Easy
PPTX
IS audit checklist
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
IT General Controls
IT System & Security Audit
Security audit
Security
IT General Controls Presentation at IIA Vadodara Audit Club
"Backoff" Malware: How to Know If You're Infected
Achieving Continuous Monitoring with Security Automation
Functional safety-overview
Information Security Continuous Monitoring within a Risk Management Framework
Auditing in Computerized Environment
Security Framework
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
It Security Audit Process
Effects of IT on internal controls
FISMA NextGen - Continuous Monitoring, Near Real-Time Risk Management
5.4 it security audit (mauritius)
Security and Audit Report Sign-Off—Made Easy
IS audit checklist
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Ad

Similar to General and Application Control - Security and Control Issues in Information Systems Part 2 (20)

PPTX
Security and Control Issues in Information System
PPTX
Security and management
PPTX
Computer system security and control-2.pptx
PDF
CISA-Exam-Prep-Domain-5-2019.pdf. CISA exam
PPTX
1. Introduction to Information Security.pptx
DOCX
Cat21:Development Mangement Information Systems
PPTX
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
DOCX
Security and Ethical Challenges Contributors Kim Wanders.docx
DOCX
Security and Ethical Challenges Contributors Kim Wanders.docx
PPSX
8 Access Control
PDF
IS-Intro.pdf
PDF
Mis presentation by suraj vaidya
PPTX
04 - Annexe 20sdsdsdsadsadsdsdsad22.pptx
PPT
Security (IM).ppt
PPTX
CCS TOPIC 1.pptx
PPT
Controls in information system
PPTX
informations_security_presentations.pptx
PPTX
IT.pptx
PPT
M.Florence Dayana/Cryptography and Network security
PPT
8. operations security
Security and Control Issues in Information System
Security and management
Computer system security and control-2.pptx
CISA-Exam-Prep-Domain-5-2019.pdf. CISA exam
1. Introduction to Information Security.pptx
Cat21:Development Mangement Information Systems
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
8 Access Control
IS-Intro.pdf
Mis presentation by suraj vaidya
04 - Annexe 20sdsdsdsadsadsdsdsad22.pptx
Security (IM).ppt
CCS TOPIC 1.pptx
Controls in information system
informations_security_presentations.pptx
IT.pptx
M.Florence Dayana/Cryptography and Network security
8. operations security
Ad

More from Dr. Rosemarie Sibbaluca-Guirre (20)

PPTX
Korean Language: Culture 한국어 개요
PPTX
Korean Language Overview 한국어 개요
PPTX
Conjunction 접속사
PPTX
PPTX
Usage of Particles 입자의 사용
PPTX
Usage of Particles 입자의 사용
PPTX
Korean Word Order 한국어 단어 순서
PPTX
Korean Number 한국 번호
PPTX
ISAD 313-3_ TOOLS OF THE SYSTEM ANALYSIS.pptx
PPTX
ISAD 313-1_INTRODUCTION TO SYSTEMS.pptx
PPTX
ISAD 313-2_ SYSTEM ANALYSIS.pptx
PPTX
ISAD 313-4_ RESEARCH PROJECT.pptx
PPTX
ISAD 313-3_ SYSTEM FLOW.pptx
PPTX
ISAD 313-3_ MODELS.pptx
PPTX
ACCT11_9_Financial Position.pptx
PPTX
ACCT11_8_Equity.pptx
PPTX
ACCT11_7_Performance.pptx
PPTX
ACCT11_6_Worksheet.pptx
PPTX
ACCT11_5_Adjusting Entries.pptx
PPTX
ACCT11_4_Trial Balance.pptx
Korean Language: Culture 한국어 개요
Korean Language Overview 한국어 개요
Conjunction 접속사
Usage of Particles 입자의 사용
Usage of Particles 입자의 사용
Korean Word Order 한국어 단어 순서
Korean Number 한국 번호
ISAD 313-3_ TOOLS OF THE SYSTEM ANALYSIS.pptx
ISAD 313-1_INTRODUCTION TO SYSTEMS.pptx
ISAD 313-2_ SYSTEM ANALYSIS.pptx
ISAD 313-4_ RESEARCH PROJECT.pptx
ISAD 313-3_ SYSTEM FLOW.pptx
ISAD 313-3_ MODELS.pptx
ACCT11_9_Financial Position.pptx
ACCT11_8_Equity.pptx
ACCT11_7_Performance.pptx
ACCT11_6_Worksheet.pptx
ACCT11_5_Adjusting Entries.pptx
ACCT11_4_Trial Balance.pptx

Recently uploaded (20)

PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Pre independence Education in Inndia.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Institutional Correction lecture only . . .
PDF
Insiders guide to clinical Medicine.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
01-Introduction-to-Information-Management.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Pre independence Education in Inndia.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
VCE English Exam - Section C Student Revision Booklet
Institutional Correction lecture only . . .
Insiders guide to clinical Medicine.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Module 4: Burden of Disease Tutorial Slides S2 2025
Abdominal Access Techniques with Prof. Dr. R K Mishra
Renaissance Architecture: A Journey from Faith to Humanism
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Cell Types and Its function , kingdom of life
01-Introduction-to-Information-Management.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
O5-L3 Freight Transport Ops (International) V1.pdf

General and Application Control - Security and Control Issues in Information Systems Part 2

  • 2. WRAP UP: The function whose mission is to establish security policies and the associated procedures and control elements over the information assets Methods, policies, and organizational procedures that ensure safety of organization’s assets, accuracy and reliability of its records, and operational adherence to management standards
  • 3. Allows trustful operations by guaranteeing that the handler of information is whoever she or he claims to be.
  • 6. Controls for design, security and use of Information Systems in organization Specific controls for each application.
  • 9. Automated and manual procedures that ensure only authorized data are processed by application Unique to each computerized application Classified as (1) input controls, (2) processing controls, (3) output controls and (4) storage controls
  • 10. Control totals: Input, processing, Storage Edit checks: Input, Storage Computer matching: Input, processing, Storage Run control totals: Processing, output, Storage Report distribution logs: Output, storage
  • 11. • Input controls – Data is accurate and consistent on entry – Direct keying of data, double entry or automated input – Data conversion, editing and error handling – Field validation on entry – Input authorization and auditing – Checks on totals to catch errors
  • 12. • Input controls -Data input controls ensure the accuracy, completeness, and timeliness of data during its conversion from its original source into computer data, or entry into a computer application.
  • 13. • Processing controls – Data is accurate and complete on processing – Checks on totals to catch errors – Compare to master records to catch errors – Field validation on update – -Data processing controls are used to ensure the accuracy, completeness, and timeliness of data during either batch or real-time processing by the computer application.
  • 14. • Output controls – Data is accurate, complete and properly distributed on output – Checks on totals to catch errors – Review processing logs – Track recipients of data – - Data output controls are used to ensure the integrity of output and the correct and timely distribution of any output produced.
  • 15. • Processing controls – Data is accurate and complete on processing – Checks on totals to catch errors – Compare to master records to catch errors – Field validation on update – -Data processing controls are used to ensure the accuracy, completeness, and timeliness of data during either batch or real-time processing by the computer application.
  • 16. • Storage controls –Stored data may be called upon when new data is being processed – the combination of data forming new outputs. - Data is often kept on a storage medium such as a hard drive.
  • 18. • Public, accessible network • Abuses have widespread effect • Fixed Internet addresses • Corporate systems extended outside organization
  • 20. Encryption Authentication Message integrity Digital signatures Digital certificates Public key infrastructure (PKI)
  • 22. Authentication, message integrity, digital signature, digital certificates
  • 23. Security for wireless internet access 1. Service set identifiers (SSID) -Identify access points in network -Form of password for user’s radio network interface card -Broadcast multiple time per second -Easily picked up by sniffer programs, war driving
  • 24. Security for wireless internet access 2. Wired Equivalent Privacy (WEP): -Initial security standard -Call for access point and all users to share the same 40-bit encrypted password
  • 25. Security for wireless internet access 3. Wi-Fi Protected Access (WPA) specification -128-bit, non-static encryption key -Data-packet checking
  • 26. Methods that protect physical facilities and their contents from loss and destruction. Computer centers are prone to many hazards such as accidents, thefts, fire, natural disasters, destructions etc.
  • 27. system that holds the door for intruders and prevents them from accessing the resources by verifying them as unauthorized persons on the basis of biometrics authentication
  • 28. Computers can fail for several reasons like power failures, electronic circuitry malfunctions, mechanical malfunctions of peripheral equipment and hidden programming errors. To protect from these failure precaution, any measure with automatic and remote maintenance capabilities may be required.

Editor's Notes

  • #6: Recall there are numerous threats to Information Systems
  • #12: To minimise likelihood of threats, must control the environment in which Information Systems are developed and deployed
  • #13: To minimise likelihood of threats, must control the environment in which Information Systems are developed and deployed
  • #15: To minimise likelihood of threats, must control the environment in which Information Systems are developed and deployed
  • #17: To minimise likelihood of threats, must control the environment in which Information Systems are developed and deployed
  • #19: Physical facility control is methods that protect physical facilities and their contents from loss and destruction. Computer centers are prone to many hazards such as accidents, thefts, fire, natural disasters, destructions etc. Therefore physical safeguards and various control procedures are required to protect the hardware, software and vital data resources of computer using organizations.
  • #20: Physical facility control is methods that protect physical facilities and their contents from loss and destruction. Computer centers are prone to many hazards such as accidents, thefts, fire, natural disasters, destructions etc. Therefore physical safeguards and various control procedures are required to protect the hardware, software and vital data resources of computer using organizations.
  • #28: Biometric Access Control is a system that holds the door for intruders and prevents them from accessing the resources by verifying them as unauthorized persons on the basis of biometrics authentication. In Biometric Access Control system, biometric authentication refers to the recognition of human beings by their physical uniqueness. Biometric Access Control system works on substantiation. Biometric Access Control system scans the person and matches his/her biometric data with the previously stored information in the database before he/she can access the secured zone or resources. If the compared information matches, the Biometric Access Control system allows the person to access the resources. Today, Biometric Access Control system is considered to be the best and one of the most secured authentication systems amongst the other access control devices.