0% found this document useful (0 votes)
12 views

Database Controls

information

Uploaded by

noeonedump
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Database Controls

information

Uploaded by

noeonedump
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Database Controls

Database Controls
 To maintain the integrity and availability of data the following controls may
be used :
 Enforcing definition standards
 Data backup and recovery
 Access control to data objects
 Assignment of privileged use
 Dealing with concurrent access problems i.e. data locks
 Ensuring accuracy, completeness and consistency of data elements and
relationships
 Database checkpoints
 Monitoring database performance
Tape and Disk Management Systems
 Automated tape management systems (TMS) or disk management systems
(DMS) are forms of specialized system software track and list tape/disk
resources needed for data center processing.
Utility Programs
 Utility programs consist of software to perform maintenance and routine that
may need to be repeated frequently. Utility programs are categorized by use
in the five functional areas.
 Understanding application systems via flowchart, profile analyzers,
executive path analyzers etc.
 Assessing or testing data quality
 Testing of programs ability to function correctly and maintain data
integrity
 Assisting in faster program development i.e. integrated development
environments
 Improving operational efficiency such as CPU and memory utilization
Software Licensing Issues
 Whether connectivity to software is local or remote, software copyright laws
must be followed to protect against the possibility of the company violating
licensing rules.
 To prevent or detect software licensing violations the auditor should:
 Review the document policies and procedures and any preventative
controls to guard against unauthorized use or copying of software
 Obtain copies of all software contacts to determine the license agreements
 Review the list of all standard, used and license applications and system
software
 Review software currently installed on user machines
Digital Rights Management
 Options available to prevent software license violations include :
 Centralizing control and automated distribution installation software
 Dumb terminals connecting to a secure LAN
 Installing metering software on the PCs
 Regular scanning of user PCs
 An alternative would be acquire a site license agreement from the vendor if
possible
Digital Rights Management
 Due to the growth of software piracy through peer t o peer or bit torrent
types of networks there’ve been many innovative ways to make nearly
impossible to pirate software
 DRM refers to access control technique to protect copyright holders and
impose limitation on the use of digital content
Network Infrastructure
Network Infrastructure
 Network are developed from the need to share information between devices.
 In general the links communicate in either analog or digital signals
 Methods for transmitting signals over analog telecommunication links use
either baseband or broadband
 Baseband refers to a single signal injection of the communication link
 Broadband is two or more signal on the same link often at different carrier
frequencies
Enterprise Network Architecture
 Today’s networks are part of a large, centrally managed, internetwork
architecture solution of high-speed local and wide are networks
 Some architectures might include clustering, types of functions in a network
segment such as web services or other application servers
 The auditor must understand information technologies associated with the
design and development of telecommunications infrastructures such as LAN or
WAN
Types of Networks
 Personal Area Network
 Local Area Network
 Wide Area Network
 Metropolitan Area Network
 Storage Area Network
Network Services
 Network File System
 E-mail Services
 Print Services
 Remote Access Services
 Directory Services
 Network Management
 Dynamic Host Configuration Protocol
 Domain Name Services
Network Standard and Protocol
 Network architecture standards allow the process or creating an integrated
environment that applications can work within by having a reference model
that can be used for structuring inter-computer and network communications
 Basically the goal is to have different platforms speaking the same language
 The major challenge of communications are :
 Interoperability
 Availability
 Flexibility
 Maintainability
OSI Architecture
 The purpose of the OSI architecture was to write a reference model that
organizations could use for building inter-computer and network
communications processes. This is a proof of concept model composed of
seven layers
OSI Architecture
 The purpose of the OSI architecture was
to write a reference model that
organizations could use for building
inter-computer and network
communications processes. This is a
proof of concept model composed of
seven layers

You might also like