SlideShare a Scribd company logo
IT APPLICATIONS
Professional Stage Application Level, ICAB
Teacher: Mohammad Abdul Matin
Chapter 5
Controls and Standards
Chapter Outline
 Information System Security Controls
 Physical Security Controls
 Logical Security Controls
 Control and Standard for Information Integrity
 Control and Standard for Information Access Control
 Control and Standard for Computer Audit
 Control and Standard for System Implementation Phase
 Control and Standard for System Maint. and Evaluation
 Risks of IT Systems
 Controls for Personal Systems
Syllabus
 In the examination, candidates may be required to
a. describe in detail the controls and standards which are
applied to information systems for the purpose of audit and
security (regulatory and management controls, computer
risk management, back up procedures, controls over data
integrity, computer audit, passwords and logical access
system, personal security planning)
b. explain the risks to IT systems from hackers and viruses
Types of Security Control
Physical Security Controls
Lock | Access Control | Fire Protection
Logical Security Controls
Authentication | Anti Virus | Encryption
Environmental Controls
Security Policy | SOP | License | AMC | Warranty
Information System Operating Controls
Performance | Completion | Accuracy | Backup & Restore
Information System Security Policy
 Information System (IS)
Hardware, Network, Software, Applications, Databases involved
in recording, processing, analyzing, storing and reporting
information.
 IS Security Policy
High level statements stating goals regarding control and security
of Information Systems, which also…
– specifies who is responsible of implementation
– is established by management and approved by Board
– does not lay down detailed control procedures or SOPs
Sections of a Security Policy
• to provide guidelines on information processing,
reporting, MIS, etc. for management and Board
Purpose &
Responsibility
• guides on system life-cycle management, starting
with evaluation, procurement to monitoring
System Procurement
& Development
• defines access authorization and processes for
management to the information systemsAccess Terminals
• explains equipment & environment, information &
communication security, contingency & recovery
Equipment &
Information Security
• outline the engagement framework and service
levels in regard to development, management
Service Bureau
Programs
IS Security Standards
 Minimum criteria, rules and procedures established in
an organization that must be implemented for ensuring
achievement of IS Security Policy objectives.
The IS Security Standards….
– are implemented under the direction of Management
– specify detailed requirements of each IS control; e.g. length of
passwords, construction of passwords, backup retention
period, etc.
– are not specific to any particular computer platform. It’s more
generally applicable.
Physical Security Controls
 Physical Locks
 Security Guards
 Video Surveillance Cameras
 General Emergency and Detection Controls
 Heating, Ventilation and Cooling Systems
 Insurance Coverage
 Periodic Backups
 Emergency Power and UPS
 Business Resumption Programs
 Backup System Security Administrator
Logical Security Control
 User ID and Passwords
 Remote Access Controls
• Dedicated Leased Lines
• Automatic Dial-back
• Secure Socket Layer (SSL)
• Multifactor Authentication
• Virtual Private Network (VPN)
 Computer Operations Audit
 Backup and Recovery Procedures
 Integrity / Completeness Checks
Control & Standards for Information
Integrity
 Policy & Procedures
– Formal documented policy addressing purpose, scope, roles,
committees, coordination among entities, etc.
– Formal guideline on the process of establishing information
integrity policy
 Flaw Remediation
– Establishing a process for proactive identification, reporting
and addressing flaws/vulnerability (that can take effect into
errors/faults)
– Patch management, system updates, service packs, etc.
Control & Standards for Information
Integrity (cont.)
 Malicious Code Protection
– Gateway filtering/protection for email, web, removable media
– Software for in-depth protection
 Security Alerts and Advisories
– Following and keeping up-to-date with different popular alerts
 Security Functionality Verification
– Monitoring and notification system for automated security test
failures or exposed vulnerabilities
 Software and Information Integrity
– Software integrity with version control, release management, etc.
– Master Data Management (MDM)
Control & Standards for Information
Integrity (cont.)
 Spam Protection
– Spam protection in gateways, messaging, servers and devices
– Keeping spam signature database updated
– Combine multiple software to strengthen protection
 Information Input Restrictions
– Role based authorization, location/schedule based access, etc.
 Information Input Accuracy, Completeness, Validity and
Authenticity
– Input validation based on format, context, length, source, etc.
– Completeness check based on transaction definition, etc.
Control & Standards for Information
Access Control
 Access Control Policy and Procedures
– Formal document outlining information access policy
 Identification and Authentication Policy & Procedures
– Access identification guidelines formally documented
 Account Management
– User / group / system ID definitions with authorization matrix
– Account add/move/delete processes and procedures
 Account Review
– Automated account and access audit
– Reviewing, analyzing and reporting on audit records
Control & Standards for Information
Access Control (cont.)
 User Identification and Authentication
– User authentication with single and multifactor verification
 Device Identification and Authentication
– Bidirectional negotiation and authentication of devices
 Passwords
– Changing default passwords
– Complexity of passwords
– Expiration and repeatability of passwords
– Keeping passwords away from login IDs
– Control and log for master passwords
Questions
 Explain the physical security control and logical security
controls
 What do you mean by Information System Security
Standards?
Thank You

More Related Content

PPTX
ICAB - ITA Chapter 5 class 9-10 - Controls and Standards
PPTX
ICAB - ITK Chapter 2 Set 1 - Information Technology Architecture
PPTX
ICAB - ITK Chapter 5 Set 1 - Internal Control in IT Systems
PPTX
ICAB - ITK Chapter 5 Set 2 - Internal Control in IT Systems
PPTX
ICAB - ITK Chapter 3 class 6-7 - Management of IT
PPTX
Information System Architecture and Audit Control Lecture 1
PPT
3c 2 Information Systems Audit
PPT
IT System & Security Audit
ICAB - ITA Chapter 5 class 9-10 - Controls and Standards
ICAB - ITK Chapter 2 Set 1 - Information Technology Architecture
ICAB - ITK Chapter 5 Set 1 - Internal Control in IT Systems
ICAB - ITK Chapter 5 Set 2 - Internal Control in IT Systems
ICAB - ITK Chapter 3 class 6-7 - Management of IT
Information System Architecture and Audit Control Lecture 1
3c 2 Information Systems Audit
IT System & Security Audit

What's hot (20)

PPT
Information System Architecture and Audit Control Lecture 2
PDF
IT General Controls Presentation at IIA Vadodara Audit Club
PPT
Security audit
PPTX
Control and Audit Information System
PPTX
Information Systems Audit - Ron Weber chapter 1
PPT
Introduction to it auditing
PPTX
Procedural Controls
PDF
Internal controls in an IT environment
PPT
008.itsecurity bcp v1
PPTX
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
PPTX
IT General Controls
PPTX
ITGC audit of ERPs
PPTX
Auditing SOX ITGC Compliance
PDF
Basics in IT Audit and Application Control Testing
PDF
Control and audit of information System (hendri eka saputra)
PPTX
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
PPTX
03.1 general control
PPTX
PPTX
Business Objectives & Control Objectives in Information Technology
Information System Architecture and Audit Control Lecture 2
IT General Controls Presentation at IIA Vadodara Audit Club
Security audit
Control and Audit Information System
Information Systems Audit - Ron Weber chapter 1
Introduction to it auditing
Procedural Controls
Internal controls in an IT environment
008.itsecurity bcp v1
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
IT General Controls
ITGC audit of ERPs
Auditing SOX ITGC Compliance
Basics in IT Audit and Application Control Testing
Control and audit of information System (hendri eka saputra)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
03.1 general control
Business Objectives & Control Objectives in Information Technology
Ad

Viewers also liked (14)

PPTX
ICAB - ITA Chapter 1 class 3 - IT Strategy
PPTX
ICAB - ITA Chapter 1 class 1-2 - IT Strategy
PPTX
ICAB - ITA Chapter 1 class 4 - E Commerce & EDI
PPTX
ICAB - ITA Chapter 1 class 5-6 - IT in Enterprise in Bangladesh
PPTX
ICAB - ITK Chapter 1 class 1 - Information within Organization
PPTX
ICAB - ITK Chapter 1 class 2-3 - Information within Organization
PPTX
ICAB - ITK Chapter 3 class 4 - Management of IT
PPTX
ICAB - ITK Chapter 3 class 5 - Management of IT
PPTX
ICAB - ITK Chapter 3 Class 9-10 - Management of IT
PPT
Decision making
PPTX
ICAB - ITK Chapter 2 Set 2 - Information Technology Architecture
PPT
Financial statement analysis
PDF
The Top 10 Sales Conferences of 2016
PDF
Digital Strategy 101
ICAB - ITA Chapter 1 class 3 - IT Strategy
ICAB - ITA Chapter 1 class 1-2 - IT Strategy
ICAB - ITA Chapter 1 class 4 - E Commerce & EDI
ICAB - ITA Chapter 1 class 5-6 - IT in Enterprise in Bangladesh
ICAB - ITK Chapter 1 class 1 - Information within Organization
ICAB - ITK Chapter 1 class 2-3 - Information within Organization
ICAB - ITK Chapter 3 class 4 - Management of IT
ICAB - ITK Chapter 3 class 5 - Management of IT
ICAB - ITK Chapter 3 Class 9-10 - Management of IT
Decision making
ICAB - ITK Chapter 2 Set 2 - Information Technology Architecture
Financial statement analysis
The Top 10 Sales Conferences of 2016
Digital Strategy 101
Ad

Similar to ICAB - ITA Chapter 5 class 7-8 - Controls and Standards (20)

PPT
Information Security Framework
PPT
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
ODP
Securing control systems v0.4
PDF
The Information Office
PPT
It Audit And Forensics
PDF
Mis presentation by suraj vaidya
PPT
Integrating Physical And Logical Security
PDF
CISSP Cheatsheet.pdf
PPTX
Applying Security Control to Implement EFG FCU Standards
PPTX
Security
PPTX
Chapter-2-Control-Audit-Security-ioenotes.pptx
PPTX
Secure Software Development Best Practices
PPTX
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
PDF
The Basics of Security and Risk Analysis
PPT
Meletis BelsisManaging and enforcing information security
PPT
IM Unit 4 Security and its a control.ppt
PPTX
Database development and security certification and accreditation plan pitwg
PDF
Ch06 Policy
PPT
Information Security Identity and Access Management Administration 07072016
PDF
محتويات مادة آمن الشبكات
Information Security Framework
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
Securing control systems v0.4
The Information Office
It Audit And Forensics
Mis presentation by suraj vaidya
Integrating Physical And Logical Security
CISSP Cheatsheet.pdf
Applying Security Control to Implement EFG FCU Standards
Security
Chapter-2-Control-Audit-Security-ioenotes.pptx
Secure Software Development Best Practices
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
The Basics of Security and Risk Analysis
Meletis BelsisManaging and enforcing information security
IM Unit 4 Security and its a control.ppt
Database development and security certification and accreditation plan pitwg
Ch06 Policy
Information Security Identity and Access Management Administration 07072016
محتويات مادة آمن الشبكات

Recently uploaded (20)

PDF
Complications of Minimal Access Surgery at WLH
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Lesson notes of climatology university.
PDF
Classroom Observation Tools for Teachers
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Computing-Curriculum for Schools in Ghana
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Presentation on HIE in infants and its manifestations
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
Complications of Minimal Access Surgery at WLH
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Lesson notes of climatology university.
Classroom Observation Tools for Teachers
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Microbial diseases, their pathogenesis and prophylaxis
202450812 BayCHI UCSC-SV 20250812 v17.pptx
human mycosis Human fungal infections are called human mycosis..pptx
Cell Types and Its function , kingdom of life
Microbial disease of the cardiovascular and lymphatic systems
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Computing-Curriculum for Schools in Ghana
Module 4: Burden of Disease Tutorial Slides S2 2025
Abdominal Access Techniques with Prof. Dr. R K Mishra
GDM (1) (1).pptx small presentation for students
Anesthesia in Laparoscopic Surgery in India
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Presentation on HIE in infants and its manifestations
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf

ICAB - ITA Chapter 5 class 7-8 - Controls and Standards

  • 1. IT APPLICATIONS Professional Stage Application Level, ICAB Teacher: Mohammad Abdul Matin Chapter 5 Controls and Standards
  • 2. Chapter Outline  Information System Security Controls  Physical Security Controls  Logical Security Controls  Control and Standard for Information Integrity  Control and Standard for Information Access Control  Control and Standard for Computer Audit  Control and Standard for System Implementation Phase  Control and Standard for System Maint. and Evaluation  Risks of IT Systems  Controls for Personal Systems
  • 3. Syllabus  In the examination, candidates may be required to a. describe in detail the controls and standards which are applied to information systems for the purpose of audit and security (regulatory and management controls, computer risk management, back up procedures, controls over data integrity, computer audit, passwords and logical access system, personal security planning) b. explain the risks to IT systems from hackers and viruses
  • 4. Types of Security Control Physical Security Controls Lock | Access Control | Fire Protection Logical Security Controls Authentication | Anti Virus | Encryption Environmental Controls Security Policy | SOP | License | AMC | Warranty Information System Operating Controls Performance | Completion | Accuracy | Backup & Restore
  • 5. Information System Security Policy  Information System (IS) Hardware, Network, Software, Applications, Databases involved in recording, processing, analyzing, storing and reporting information.  IS Security Policy High level statements stating goals regarding control and security of Information Systems, which also… – specifies who is responsible of implementation – is established by management and approved by Board – does not lay down detailed control procedures or SOPs
  • 6. Sections of a Security Policy • to provide guidelines on information processing, reporting, MIS, etc. for management and Board Purpose & Responsibility • guides on system life-cycle management, starting with evaluation, procurement to monitoring System Procurement & Development • defines access authorization and processes for management to the information systemsAccess Terminals • explains equipment & environment, information & communication security, contingency & recovery Equipment & Information Security • outline the engagement framework and service levels in regard to development, management Service Bureau Programs
  • 7. IS Security Standards  Minimum criteria, rules and procedures established in an organization that must be implemented for ensuring achievement of IS Security Policy objectives. The IS Security Standards…. – are implemented under the direction of Management – specify detailed requirements of each IS control; e.g. length of passwords, construction of passwords, backup retention period, etc. – are not specific to any particular computer platform. It’s more generally applicable.
  • 8. Physical Security Controls  Physical Locks  Security Guards  Video Surveillance Cameras  General Emergency and Detection Controls  Heating, Ventilation and Cooling Systems  Insurance Coverage  Periodic Backups  Emergency Power and UPS  Business Resumption Programs  Backup System Security Administrator
  • 9. Logical Security Control  User ID and Passwords  Remote Access Controls • Dedicated Leased Lines • Automatic Dial-back • Secure Socket Layer (SSL) • Multifactor Authentication • Virtual Private Network (VPN)  Computer Operations Audit  Backup and Recovery Procedures  Integrity / Completeness Checks
  • 10. Control & Standards for Information Integrity  Policy & Procedures – Formal documented policy addressing purpose, scope, roles, committees, coordination among entities, etc. – Formal guideline on the process of establishing information integrity policy  Flaw Remediation – Establishing a process for proactive identification, reporting and addressing flaws/vulnerability (that can take effect into errors/faults) – Patch management, system updates, service packs, etc.
  • 11. Control & Standards for Information Integrity (cont.)  Malicious Code Protection – Gateway filtering/protection for email, web, removable media – Software for in-depth protection  Security Alerts and Advisories – Following and keeping up-to-date with different popular alerts  Security Functionality Verification – Monitoring and notification system for automated security test failures or exposed vulnerabilities  Software and Information Integrity – Software integrity with version control, release management, etc. – Master Data Management (MDM)
  • 12. Control & Standards for Information Integrity (cont.)  Spam Protection – Spam protection in gateways, messaging, servers and devices – Keeping spam signature database updated – Combine multiple software to strengthen protection  Information Input Restrictions – Role based authorization, location/schedule based access, etc.  Information Input Accuracy, Completeness, Validity and Authenticity – Input validation based on format, context, length, source, etc. – Completeness check based on transaction definition, etc.
  • 13. Control & Standards for Information Access Control  Access Control Policy and Procedures – Formal document outlining information access policy  Identification and Authentication Policy & Procedures – Access identification guidelines formally documented  Account Management – User / group / system ID definitions with authorization matrix – Account add/move/delete processes and procedures  Account Review – Automated account and access audit – Reviewing, analyzing and reporting on audit records
  • 14. Control & Standards for Information Access Control (cont.)  User Identification and Authentication – User authentication with single and multifactor verification  Device Identification and Authentication – Bidirectional negotiation and authentication of devices  Passwords – Changing default passwords – Complexity of passwords – Expiration and repeatability of passwords – Keeping passwords away from login IDs – Control and log for master passwords
  • 15. Questions  Explain the physical security control and logical security controls  What do you mean by Information System Security Standards?