A7
A7
8-2
Trust Services Framework
• Security
− Access to the system and data is controlled and restricted
to legitimate users.
• Confidentiality
− Sensitive organizational data is protected.
• Privacy
− Personal information about trading partners, investors, and
employees are protected.
• Processing integrity
− Data are processed accurately, completely, in a timely
manner, and only with proper authorization.
• Availability
− System and information are available.
8-3
Security Life Cycle
Security is a management issue
8-4
How to Mitigate Risk of Attack
Preventive Controls Detective Controls
• People • Log analysis
• Process • Intrusion detection
• IT Solutions systems
• Physical security • Penetration testing
• Change controls and • Continuous monitoring
change management
8-5
Preventive: People
• Culture of security
− Tone set at the top with management
• Training
− Follow safe computing practices
Never open unsolicited e-mail attachments
Use only approved software
Do not share passwords
Physically protect laptops/cellphones
− Protect against social engineering
8-6
Preventive: Process
8-7
Preventive: IT Solutions
• Antimalware controls
• Network access controls
• Device and software hardening controls
• Encryption
8-8
Preventive: Other
8-9
Corrective
8-10
Chapter 9 Learning Objectives
9-11
Protecting Confidentiality and Privacy of
Sensitive Information
• Identify and classify information to protect
• Where is it located and who has access?
• Classify value of information to organization
• Encryption
• Protect information in transit and in storage
• Access controls
• Controlling outgoing information (confidentiality)
• Digital watermarks (confidentiality)
• Data masking (privacy)
• Training
9-12
Generally Accepted Privacy Principles
• Management • Access
− Procedures and policies − Customer should be able to
with assigned responsibility review, correct, or delete
and accountability information collected on
them
• Notice
• Disclosure to third parties
− Provide notice of privacy
policies and practices prior
to collecting data • Security
• Choice and consent • Protect from loss or
− Opt-in versus opt-out unauthorized access
approaches • Quality
• Collection
− Only collect needed • Monitoring and enforcement
information • Procedures in responding
• Use and retention to complaints
− Use information only for • Compliance
stated business purpose 9-13
Encryption
• Preventative control
9-5
Encryption
Steps
• Takes plain text and
with an encryption key
and algorithm,
converts to unreadable
ciphertext (sender of
message)
• To read ciphertext,
encryption key
reverses process to
make information
readable (receiver of
message)
9-
15
Types of Encryption
Symmetric Asymmetric
• Uses one key to encrypt and • Uses two keys
decrypt − Public—everyone has
• Both parties need to know access
the key − Private—used to decrypt
− Need to securely (only known by you)
communicate the shared
key − Public key can be used by
all your trading partners
− Cannot share key with
multiple parties, they get • Can create digital signatures
their own (different) key
from the organization
9-16
Virtual Private Network
9-17
Chapter 10 Learning Objectives
10-18
Processing Integrity Controls
• Input
− Forms design
Sequentially prenumbered
− Turnaround documents
10-19
Processing Integrity: Data Entry Controls
• Field check • Completeness check
− Characters in a field are proper − Verifies that all required data is
type entered
• Sign check • Validity check
− Data in a field is appropriate − Compares data from
sign (positive/negative) transaction file to that of master
• Limit check file to verify existence
− Tests numerical amount • Reasonableness test
against a fixed value
− Correctness of logical
• Range check
relationship between two data
− Tests numerical amount
items
against lower and upper limits
• Size check • Check digit verification
− Input data fits into the field − Recalculating check digit to
verify data entry error has not
been made
10-
20
Processing Controls
• Data matching • Cross-footing
− Two or more items must be − Verifies accuracy by
comparing two alternative
matched before an action ways of calculating the same
takes place total
• File labels • Zero-balance tests
− For control accounts (e.g.,
− Ensures correct and most payroll clearing)
updated file is used
• Write-protection mechanisms
• Recalculation of batch totals − Protect against overwriting or
erasing data
• Concurrent update controls
− Prevent error of two or more
users updating the same
record at the same time
10-
21
Output Controls
10-22
Availability Controls
• Preventive maintenance • Backup procedures
• Fault tolerance − Incremental
Copies only items that have
− Use of redundant changed since last partial
components backup
• Data center location and − Differential backup
design Copies all changes made
− Raised floor since last full backup
− Fire suppression • Disaster recovery plan (DRP)
− Procedures to restore
− Air conditioning organization’s IT function
− Uninterruptible power Cold site
supply (UPS) Hot site
− Surge protection • Business continuity plan (BCP)
• Patch management and − How to resume all
antivirus software operations, not just IT
10-
23