Database Controls
Database Controls
Database Controls
To maintain the integrity and availability of data the following controls may
be used :
Enforcing definition standards
Data backup and recovery
Access control to data objects
Assignment of privileged use
Dealing with concurrent access problems i.e. data locks
Ensuring accuracy, completeness and consistency of data elements and
relationships
Database checkpoints
Monitoring database performance
Tape and Disk Management Systems
Automated tape management systems (TMS) or disk management systems
(DMS) are forms of specialized system software track and list tape/disk
resources needed for data center processing.
Utility Programs
Utility programs consist of software to perform maintenance and routine that
may need to be repeated frequently. Utility programs are categorized by use
in the five functional areas.
Understanding application systems via flowchart, profile analyzers,
executive path analyzers etc.
Assessing or testing data quality
Testing of programs ability to function correctly and maintain data
integrity
Assisting in faster program development i.e. integrated development
environments
Improving operational efficiency such as CPU and memory utilization
Software Licensing Issues
Whether connectivity to software is local or remote, software copyright laws
must be followed to protect against the possibility of the company violating
licensing rules.
To prevent or detect software licensing violations the auditor should:
Review the document policies and procedures and any preventative
controls to guard against unauthorized use or copying of software
Obtain copies of all software contacts to determine the license agreements
Review the list of all standard, used and license applications and system
software
Review software currently installed on user machines
Digital Rights Management
Options available to prevent software license violations include :
Centralizing control and automated distribution installation software
Dumb terminals connecting to a secure LAN
Installing metering software on the PCs
Regular scanning of user PCs
An alternative would be acquire a site license agreement from the vendor if
possible
Digital Rights Management
Due to the growth of software piracy through peer t o peer or bit torrent
types of networks there’ve been many innovative ways to make nearly
impossible to pirate software
DRM refers to access control technique to protect copyright holders and
impose limitation on the use of digital content
Network Infrastructure
Network Infrastructure
Network are developed from the need to share information between devices.
In general the links communicate in either analog or digital signals
Methods for transmitting signals over analog telecommunication links use
either baseband or broadband
Baseband refers to a single signal injection of the communication link
Broadband is two or more signal on the same link often at different carrier
frequencies
Enterprise Network Architecture
Today’s networks are part of a large, centrally managed, internetwork
architecture solution of high-speed local and wide are networks
Some architectures might include clustering, types of functions in a network
segment such as web services or other application servers
The auditor must understand information technologies associated with the
design and development of telecommunications infrastructures such as LAN or
WAN
Types of Networks
Personal Area Network
Local Area Network
Wide Area Network
Metropolitan Area Network
Storage Area Network
Network Services
Network File System
E-mail Services
Print Services
Remote Access Services
Directory Services
Network Management
Dynamic Host Configuration Protocol
Domain Name Services
Network Standard and Protocol
Network architecture standards allow the process or creating an integrated
environment that applications can work within by having a reference model
that can be used for structuring inter-computer and network communications
Basically the goal is to have different platforms speaking the same language
The major challenge of communications are :
Interoperability
Availability
Flexibility
Maintainability
OSI Architecture
The purpose of the OSI architecture was to write a reference model that
organizations could use for building inter-computer and network
communications processes. This is a proof of concept model composed of
seven layers
OSI Architecture
The purpose of the OSI architecture was
to write a reference model that
organizations could use for building
inter-computer and network
communications processes. This is a
proof of concept model composed of
seven layers