System Analysis and Desing Ignou Sem 3
System Analysis and Desing Ignou Sem 3
12.0 INTRODUCTION
Every business process can experience events that can hamper and in some cases may
stop normal operations of business. Even best designed system can’t control the
prevention of natural disaster. In today’s ever-changing world of information
assurance and network security, it can become extremely difficult to keep up on the
latest vulnerabilities, viruses, patches, trends, technology, hacker behaviors and
activity. It’s easy for the information systems security professional to get caught up in
attending the logical aspects of security such as reviewing log files, making
configuration changes, troubleshooting, and other technical duties.
12.1 OBJECTIVES
After going through this unit, you should be able to:
Is auditors are those people who make it sure that the system does what it is supposed
to do. Although the audit can be carried out by the internal team of IT professionals, it
is advisable that the audit is carried out by external auditors as they are neither
stakeholders nor friendly with the stakeholders. Above all there is nothing like an
unbiased opinion.
• To improve the quality of information systems, prevent failure and minimize the
effects of failure, and speed up the process of recovery in the event of a failure.
This will help Information System to be more reliable.
• To make an information system more secure from natural as well as manmade
disasters, unauthorized access, and other destructive actions.
• To improve the cost performance of an information system by optimum utilization
of its resources, which leads to increase in efficiency.
During the course of audit, the Information Systems Auditor will obtain sufficient,
reliable, relevant and useful evidence to achieve the audit objectives effectively. The
audit findings and conclusions are to be supported by appropriate analysis and
interpretation of this evidence.
To achieve the above objective, the following documents should be made available to
the auditors A diagram of the Information System (Application)
1. Network diagram
2. A hierarchical diagram of the project team
The system auditor shall firmly maintain professional ethics as an impartial evaluator.
The system auditor shall be aware of the ethical demands on himself or herself and
meet the internal and external trust by performing an accurate and sincere system
audit.
17
Implementation and 12.2.3 Confidentiality
Security of Systems &
MIS The system auditor with strict adherence to professional ethics must maintain
confidentiality of the information provided to him to carryout his or her activity and
should not, without sufficient reason, divulge any information that is classified as
confidential information by the audited organization.
Audit of broken links: This is applicable to web site and other intranet applications.
The most irritating things on a web site is not finding a link document. There are
automated software to find broken/unavailable links on web site.
Database Audit: Database audits involve checking the database integrity and
availability. The information that is sent to the database should be checked with the
information actually stored on the database.
Control environment: This includes reviewing the system’s security, its operating
platform, system documentation and the interaction it has with other systems.
Data Input Controls: This involves reviewing the controls which ensure that data
that enters into the system is accurate, complete and valid as per the standard.
Examples include verifying system tables, limit checks, range checks and redundant
data checks.
Processing Controls: These controls ensure that the data is properly processed and
that automatic calculations performed by the system are accurate. This is tested by
assessing controls built into the programs and by processing test data through the
system and comparing the results of processing with expected results. Also, there will
be checks on currency of stored data, default values and reporting exceptions.
Output Controls: In this, review of the system generated reports to ensure that they
are accurate and the reports produced are reliable, timely and relevant is done. Also, it
is checked whether cost savings can be achieved by reducing the number of reports
produced. Data control personnel perform visual review of computer output and
reconciliation of totals.
c) Utility tools: Used by the auditors to perform common data processing functions
like sorting, creating and printing files. These tools are not designed for audit
purposes specifically.
Various commercial Audit Software are available to carry out System Audit. Some of
them are:
1. Visual Audit Pro
2. IDEA
3. E-Z Audit
Visual Audit Pro: It audits automatically over a network. It audits activities like, use
log on/off, collects information about software and its version, collects information
about hardware inventory like serial number, model, memory and associated
peripheral devices, user information, registry information etc.
E-Z Audit: With this software one can know information on capacity of RAM, name
of network card with its connect speed, MAC address and TCP/IP information. You
can also find out how many local, removeable and network drives are there on the
system, what printers are connected, both networked and local, etc.. On software
front, it gives information on name and version of OS running on the system with
service packs, installed programs and their names, EXE files and DLL versions.
IDEA (Interactive Data Extraction and Analysis): IDEA can be used to import
information from database to be audited for further analysis to auditor. It helps to
corroborate audit evidence effectively. For example it can check for duplicate
payment on a single invoice. It is useful to analyze system log for fraud detection.
Consider the audit of a Payroll Package. The potential fraud that can occur in a payroll
system is very high. Therefore, audit software is used as detection tool for fraud. The
Audit software looks for salary unusually high, extracting information without a
department number, extract information on bank account number. It also can extract
information on fictitious employee, compare it with personnel database. It can also
compare payment details of two different months.
20
12.4.2 Test Data Audit and Security of
Computer Systems
Test data is used to test the correctness of the software. When test data is processed
with the entity’s normal processing systems, the auditors should ensure that the test
transactions are subsequently eliminated from the system. When using the test data,
the IS auditors should be aware that the test data should only point out the erroneous
processing and should not change the data that is produced by the system during real
life.
System log should be analyzed to provide detailed information on all normal and
abnormal transactions during each processing period. System access and attempted
access violations can be automatically logged by the computer and can be reported for
check & review. Listing of terminal addresses and locations can be used to look for
incorrectly logged, missing or additional terminals.
Applying the principles of Information System Security and Audit raised in this write-
up will ensure that an organization’s information assets and systems are adequately
controlled, monitored and assessed.
Create
Business process
Information system
Exploit Reduce
Vulnerability Attacks Controls
The source of threats can be either external or internal. Historically virus has been the
major potential external security threat but as organizations are diversifying their
activity over multiple locations and with evolution of new technology it is difficult to
perceive when an unauthorized intruder may try to hack upon organization’s vital
information and cause damage. Internal security threats are more common although
the integrity of employee is checked before being inducted into the organization.
Employee of an organization can pose serious threats to information security as they
are closely associated with the system and know the vulnerabilities that can be
targeted.
Risk Analysis
The common questions asked in evaluating the risks are given below.
• Are the risks such as fire, earthquakes and the scope of their effects on the
information system been made clear?
22
• Has the loss, the organization would suffer from a halt or the like of the Audit and Security of
information system been analyzed? Computer Systems
• Is the time permissible for recovery of operation and the order of priority of
recovery been determined?
It is therefore possible to rank the events in order of estimated loss. But the problem
associated with the quantitative approach is estimating the probability of occurrence
of the event, also in some cases the events are interrelated making the probability
calculation even more difficult. Notwithstanding above difficulty, many organizations
have adopted and implemented this approach successfully.
Potential threats
• Denial of service (DoS), which can be described as any action that prevent a
system from normal operation. It may be the unauthorized destruction,
modification, or delay of service. DoS is common where the number of requests
outnumber the maximum number of connections possible. Under such
circumstances, legitimate users have to wait for large amount of time for response
to their request.
• Internet Protocol (IP) spoofing, which allows an intruder via the Internet/intranet
to effectively impersonate a local system's IP address in an attempt to gain access
to the system. The system in this case may misinterpret the incoming connection
as originating from a trusted host.
• A Trojan horse program generally performs unintended destructive functions that
may include destroying data, collecting invalid or falsifying data. Trojan horses
can be attached to e-mails.
24
• Viruses are computer programs that may be embedded in other program and have Audit and Security of
the capability to self-replicate. Once active, they may result in either Computer Systems
nondestructive or destructive invalid outcomes in the host computer. The virus
program may also move into multiple platforms, data files, or devices on a system
and spread through multiple systems in a network or through emails to other
systems.
Contingency and emergency plans establish recovery procedures that address specific
threats. These plans help prevent minor incidents from escalating into disasters. For
example, a contingency plan might provide a set of procedures that define the
condition and response required to return a computing capability to nominal operation.
An emergency plan might be a specific procedure for shutting down equipment in the
event of a fire or for evacuating a facility in the event of an earthquake.
In-House Backup
This level is the minimum acceptable and is mandatory for all installations and
application’s systems. Define in detail all in-house back up procedures, the techniques
used, files copied, frequency, etc.
The alternate storage area should be located in an area reasonably accessible to the
installation, but not subject to the same degree of major threat as the site. It is
recommended that, as a rule of thumb, the alternate storage area be no closer than one
mile from the site. However, the distance may vary from location to location.
25
Implementation and Although they vary from organization to organization, they generally comprise the
Security of Systems & following:
MIS
• A contingency audit questionnaire
• A dependency analysis document - questions and guidance
• A Business Impact Analysis questionnaire.
• An audit questionnaire for disaster recovery or business continuity plan
• A checklist, action list and framework for disaster recovery
The toolkit is designed to help review the full spectrum of business continuity and
disaster recovery issues.
The very first step for contingency planning is to identify the contingency events
covered and the appropriate actions for each. Contingency events usually refer to
varying degrees of loss across six major asset categories: Data, Software,
Communications, Hardware, Personnel, and Facility. The cause of the loss is dealt
with in the Risk assessment, the primary concern in the contingency plan is the degree
of loss, impact on the mission and techniques for coping.
Contingency Events
Loss of Data: To Identify key data and the type or degree of loss/damage that would
be required for necessary recovery action. It can be done as follows:
Loss of Software: To identify key software and the degree of criticality for necessary
recovery action. It can be done as follows:
Loss of Personnel: Loss of Personnel can result from employee leaving the
organization, illness, death, family emergency and a number of other events. The
following steps can be taken to minimize this type of loss:
Loss of the Facility: The loss of facility in general is due to some catastrophic
natural action such as fire, flood, storm, earthquake, etc. However, a facility may
become non-functional temporarily due to failure of power, or any other events that
could render the facility non-functional.
Preparing contingency plan involves people from all activities. The people should
understand their role in the event of disaster and should be ready to react to the
situation. Following are the major step involved in contingency planning :
Develop the Plan: The contingency plan is a detailed milestone to move the
organization from a disrupted status to the status of normal operation. The role and
responsibility of each employee and service provider are defined clearly in the event
of disaster.
Testing the Plan: Once the plan is ready, it should be subjected to rigorous testing
and evaluation. The plan should be initially tested in a simulated environment.
Persons who would actually be involved in the event of a real disaster should test the
plan.
Maintaining the Plan: Once the plan is created and tested it must be kept updated so
that it remain relevant and applicable to changed business environment. The changes
27
Implementation and in the business process must be reflected in the plan and all changes in it should be
Security of Systems & communicated to all concerned.
MIS
12.5.4 Viruses
Viruses are one of the major security threats to computer system. The first computer
viruses were written in mid-eighties. The first virus written was a boot sector virus.
Today, there are several tens of thousands of viruses.
Computer virus is nothing but a program that is loaded into your computer without
your knowledge. This is only basic information . But, what makes people fear from
Virus is the disastrous impact on remaining programs in your machine due to this
program. The difference between a computer virus and other programs is that viruses
are designed to self-replicate usually without the knowledge of the user. Computer
viruses are called viruses because they share some of the traits of biological virus. A
computer virus passes from computer to computer like a biological virus passes from
person to person. A computer virus must piggyback on top of some other program or
document in order to get executed. Once it is running, it is then able to infect other
programs or documents. Obviously, the analogy between computer and biological
viruses seems superficial, but, there are enough similarities as the name suggest.
Virus carries out instruction for replication. The effect of virus can vary from
annoying messages, to the disastrous consequences (for example, the CIH virus,
which attempts to overwrite the Flash BIOS, can cause irreparable damage to certain
machines). Superficially, it looks as if virus which can format hard disk is more
damaging but damage can be avoided by taking backups. Think of a virus which
corrupts data by changing the numbers randomly on a spreadsheet application or
changes + to –. This is certainly disastrous.
Viruses can be hidden in programs available on floppy disks or CDs, hidden in email
attachments or in material downloaded from the web. If the virus has no obvious
payload, a user without anti-virus software may not even be aware that a computer is
infected.
A computer that has an active copy of a virus on its machine is considered infected.
The way in which a virus becomes active depends on how the virus has been
designed, e.g. macro viruses can become active if the user simply opens, closes or
saves an infected document.
Prevention
The best way for users to protect themselves against viruses is to apply the following
anti-virus measures:
• Make backups of all software (including operating systems). So,if a virus attack
has been made, you can retrieve safe copies of your files and software.
• Inform all users that the risk of infection grows exponentially when people
exchange floppy disks, download web material or open email attachments without
caution.
• Have anti-virus (AV) software installed and updated regularly to detect, report
and disinfect viruses.
• Visit sites which give information on the Internet about latest virus, it’s behavior
and assess their potential threat.
• In case of doubt about a suspicious item that anti-virus software does not
recognize, contact your anti-virus team immediately for guidance.
28
Audit and Security of
12.6 CONCURRENT AUDIT TECHNIQUES Computer Systems
Most of the Audit techniques collect data after transaction is completed. So, the
outcome of the Audit is usually useful only for the future. The outcomes may be used
as precautionary measures for the future.
In the case of Concurrent Audit Techniques, Data is collected while the transaction is
in progress. This is very much useful for high risk transactions as they will be put on
hold in case the Audit desires so. If any other Audit technique is used, then , such high
risk transactions are processed after which it will be found that these transactions are
invalid.
12.6.4 SCARF
It stands for System Control Audit Review File. It is one of the complex Audit
techniques. This technique will embed Audit software in the host application. This will
enable audit software to monitor the Systems transactions uninterruptedly. The
information that is collected during Audit process will be stored in a special audit file
known as SCARF master file.
12.7 SUMMARY
Auditing IT system is a crucial activity to provide feedback to the system. The process
of audit the report can be a food-for-thought for improving the information system. It
is surprising that only very few companies take this activity seriously. Audits not only
bring out the potentially weak areas in a system but also provide inputs for future
improvement. It also helps in improving business efficiency.
12.8 SOLUTIONS/ANSWERS
Check Your Progress 1
1. Improvement of Reliability, Security and Efficiency of Information Systems
2. Information System Auditors
3. Computer Assisted Audit Techniques
James F.Peters and Witold Pedryez; John Wiley & Sons; Software Engineering-An
Engineering Approach;2000
Reference Websites
http://www.contingency-planning-disaster-recovery-guide.co.uk
http://www.disasterrecoveryworld.com
30