Cisa - Iba (MKS)
Cisa - Iba (MKS)
Introduction
2 Course Objectives
To help you understand
The concept of IS Audit
ISACA Audit Standards and Requirements
Understanding Information Systems and their life cycle
Understanding different types of technologies supporting
Information Systems
Auditing these technologies
Additionally:
Preparing to challenge the CISA paper
3 History of ISACA
Currently:
Engaged Professionals: More than 520,000
Members: More than 130,000 in 188 countries
Members and Certification-Holders: More than
159,000
Chapters: More than 215
Certified Information Systems Auditor®
(CISA®).More than 130,000 CISAs have been
certified since its inception in 1978.
5 Certified Information Systems Auditor
(CISA)
Designed for personnel that will audit and review information systems.
Assurance that systems are designed, developed, implemented and
maintained to support business needs and objectives.
Requires understanding of the concepts behind information systems audit –
not just the definitions.
6 CISA Exam Review Course Overview
The CISA CPE policy requires the attainment of CPE hours over an annual and
three-year certification period. CISAs must comply with the following
requirements to retain certification:
Attain and report an annual minimum of twenty (20) CPE hours.
Submit annual CPE maintenance fees to ISACA international headquarters in full.
ISACA members: US $45
ISACA nonmembers: US $85
Attain and report a minimum of one hundred and twenty (120) CPE hours for a three-
year reporting period.
Respond and submit required documentation of CPE activities if selected for the
annual audit.
Comply with ISACA’s Code of Professional Ethics.
Abide by ISACA's IT auditing standards.
Chapter 1
The Process of Auditing
Information Systems
13
14 OBJECTIVES
The objective of this domain is to ensure that the CISA candidate has the
knowledge necessary to provide audit services in accordance with IS audit
standards to assist the organization with protecting and controlling
information systems.
Engagement Letter:
An engagement letter is more focused on a particular audit exercise that is
sought to be initiated in an organization with a specific objective in mind.
19 Audit
Internal vs. External
Internal
Internal audit function are established through Audit Charter approved by BoD
and Audit Committee.
External
Scope and objectives of the services should be documented in formal contract or
statement of work.
Skills and knowledge should be taken into consideration when planning audits
and assigning staff to specific audit assignments.
Detailed training staff plan should be drawn for the year based on the
organization’s direction in terms of technology and related risk that needs to be
addressed.
21 Planning an Audit
Risk based approach by evaluating the risk in respect to defined and relevant risk factors that
influence the frequency and/or business impact of risk scenarios.
Risk Assessment can be done by:
Quantitative
Qualitative
Hybrid approach (mixture of both quantitative and qualitative can also be used).
1. Support the implementation of, and encourage compliance with, appropriate standards,
procedures for the effective governance and management of enterprise information systems
and technology, including: audit, control, security and risk management.
2. Perform their duties with objectivity, due diligence and professional care, in accordance with
professional standards.
3. Serve in the interest of stakeholders in a lawful manner, while maintaining high standards of
conduct and character, and not discrediting their profession or the Association.
4. Maintain the privacy and confidentiality of information obtained in the course of their activities
unless disclosure is required by legal authority. Such information shall not be used for personal
benefit or released to inappropriate parties.
5. Maintain competency in their respective fields and agree to undertake only those activities they
can reasonably expect to complete with the necessary skills, knowledge and competence.
6. Inform appropriate parties of the results of work performed, including the disclosure of all
significant fact known to them that, if not disclosed, may distort the reporting of the results.
7. Support the professional education of stakeholders in enhancing their understanding of the
governance and management of enterprise information systems and technology including:
audit, control, security and risk management.
25 ISACA IS Audit and Assurance
Standards
Standards contain statements of mandatory requirements for IS audit and
assurance. They inform:
IS audit and assurance professionals of the minimum level of acceptable
performance required to meet the professional responsibilities set out in the ISACA
Code of Professional Ethics.
Management and other interested parties of the profession's expectations
concerning the work of practitioners.
Holders of the Certified Information Systems Auditor (CISA) designation of their
requirements. Failure to comply with these standards may result in an investigation
into the CISA holder's conduct by the ISACA Board of Directors or appropriate
ISACA group and, ultimately, in disciplinary action.
26 ISACA IS Audit and Assurance
Standards
There are three categories of standards and guidelines:
General: The guiding principles under which the IS assurance profession
operates. They apply to the conduct of all assignments, and deal with the IS
audit and assurance professional's ethics, independence, objectivity and
due care as well as knowledge, competency and skill.
Performance: Deal with the conduct of the assignment, such as planning
and supervision, scoping, risk and materiality, resource mobilization,
supervision and assignment management, audit and assurance evidence,
and the exercising of professional judgment and due care.
Reporting: Address the types of reports, means of communication and the
information communicated.
27 ISACA IS Audit and Assurance
Standards
General Requirements:
1001 Audit Charter: Document the audit function and agreed upon and
approved at an appropriate level within an enterprise.
1002 Organizational Independence: Should be independent of the area or
activity being reviewed.
1003 Professional Independence: IS audit professionals should be independent
and objective in both attitude and appearance in all matters of audit and
assurance engagements.
1004 Reasonable Expectation: That the engagement can be completed in
accordance with IS Audit and Assurance standards and where required
industry’s standards and regulations. Enables conclusion on the subject matter
and addresses any restrictions. And Management understands its obligations
and responsibilities with respect to the provision of appropriate, relevant and
timely information required to perform the engagement.
28 ISACA IS Audit and Assurance
Standards
General Requirements:
1005 Due Professional Care: Should exercise due professional care, including
observance of applicable professional audit standards, in planning,
performing and reporting on the results of engagements.
1006 Proficiency: Should have the required skills and proficiency in conducting
IS audit and assurance and have the competency to perform work required.
1007 Assertions: Should review the assertions against which audit will be
performed and should determine that these assertions are capable of being
audited and the assertions are sufficient, valid and relevant.
1008 Criteria: Should select criteria on which the subject matter will be
assessed. This criteria should be objective, complete, relevant, measureable,
understandable, widely recognized, authoritative and understood by all
readers and users of the report. Should also consider the source of the criteria.
Focus should be on those issued by relevant authoritative bodies before
accepting lesser-known criteria.
29 ISACA IS Audit and Assurance
Standards
Performance Requirements:
1201 Engagement Planning: Should plan engagement to address:
objective(s), scope, timeline and deliverables, compliance with
applicable laws and auditing standards, use of risk based approach
(where appropriate), engagement specific issues, documentation and
reporting requirements.
1202 Risk Assessment in Planning: Should use an appropriate risk
assessment approach and supporting methodology to develop the
overall IS audit plan and determine priorities for the effective allocation of
IS audit resources. Should identify and assess risk relevant to the area
under review during planning individual engagements. Should also
consider subject matter risk, audit risk and related exposure to the
enterprise.
30 ISACA IS Audit and Assurance
Standards
Performance Requirements:
1203 Performance and Supervision: Should conduct audit in accordance with approved IS
audit plan to cover identified risk and within agreed schedule. Audit and assurance
professionals should provide supervision to IS audit staff to accomplish audit objectives and
meet applicable professional audit standards. Should only accept task that are within their
knowledge and skills or for which they have a reasonable expectation of either acquiring the
skills during the engagement or achieving the task under supervision. Should obtain sufficient
and appropriate evidence to achieve the audit objective. Should document the audit process,
describing the audit work and the audit evidence that supports findings and conclusions.
Should also identify and conclude on findings.
1204 Materiality: Should consider potential weaknesses or absences of controls while planning
an engagement and whether they could result in a significant deficiency or a material
weakness in relation to respective audit risk. Should also determine the cumulative effect of
minor control deficiencies or weaknesses and determine whether it is translated in to significant
deficiency or material weakness. Should disclose the following in the report:
Absence of controls or ineffective controls.
Significance of the control deficiency
Probability of these weaknesses resulting in a significant deficiency or material weakness
31 ISACA IS Audit and Assurance
Standards
Performance Requirements:
1205 Evidence: Sufficient and appropriate evidence should be obtain to draw
reasonable conclusions to base the engagement results. Should evaluate the sufficiency
of evidence obtained to support conclusions and achieve engagement objectives.
1206 Using the work of other experts: Should consider using the work of other experts for
the engagement where appropriate. Before using the work, adequacy of other expert’s
professional qualifications, competencies, relevant experience, resources,
independence and quality-control processes should be assessed before engagement.
Should be determine whether the work of other experts will be relied upon and
incorporate directly or referred separately in the report. Should apply additional test
procedures to gain sufficient and appropriate evidence in circumstances where the work
of other experts does not provide sufficient and appropriate evidence.
1207 Irregularity and Illegal Acts: Should consider the risk of irregularities and illegal acts
and document and communicate it to the appropriate party in a timely manner. Should
also maintain professional skepticism during the engagement.
32 ISACA IS Audit and Assurance
Standards
Reporting:
1401 Reporting: Should provide a report to communicate the results upon completion that may
include:
the intended recipients,
any restriction on content and circulation,
scope,
engagement objectives,
period of coverage and the nature,
timing and extent of the work performed,
findings,
conclusions and recommendations.
Any qualification or limitation, signature, date and distribution according to the terms of the audit charter or
engagement letter.
Should also ensure that findings in the audit report are supported by sufficient and appropriate evidence.
33 ISACA IS Audit and Assurance
Standards
Reporting:
1402 Follow-up Activities: Should monitor relevant information to conclude
whether management has planned / taken appropriate, timely action to
address reported audit findings and recommendations.
34 Internal Controls
Preventive
Detect problems before they arise.
Attempt to predict potential problems before they occur and make adjustments.
Detective
Use controls that detect and report the occurrence of an error, omission or malicious act.
Corrective
Minimize the impact of a threat.
Compliance Audits: Include specific test of controls to demonstrate adherence to specific regulatory or
industry standards.
Financial Audits: Conducted to assess the accuracy of financial reporting. Emphasis is financial
information integrity and reliability.
Operational Audits: Evaluate the internal control structure in a given process or area. E.g. IS audits of
application controls.
Integrated Audits: Combines financial and operational audit sets. Targeted to assess overall objectives
within an organization.
Administrative Audits: Oriented to assess issues related to the efficiency of operational productivity within
an organization.
IS Audits: Conducted to determine whether the information systems and related resources adequately
safeguard and maintain assets’ confidentiality, integrity and availability.
Specialized Audit: Targets specific area or requirement dictated by other auditing standards. E.g.
Specialized reviews of examining services performed by third parties.
Forensic Audits: They are specialized audits to discover, disclose and follow up on fraud and crime
activities. The primary purpose is the development of evidence for review by law enforcement and
judicial authorities.
37 Audit Phases
Audit Scope
Audit Subject
Audit Objective
Pre-Audit Planning
area to be purpose of the specific systems, Technical Skills
audited. audit. function or unit & resources,
of the sources of
organization to information,
be included in locations or
the review. facilities and
develop
communication
plan.
Cont……
38 Audit Phases
data gathering Identify and select Identify methods Determine frequency Disclose procedures of
with management
or review results
Audit risk can be defined as the risk that information may contain a material
error that may go undetected during the course of the audit. It is influenced by:
Inherent Risk: It is the risk level or exposure of the process/entity to be audited without
taking into account the controls that management has implemented. Inherent risk
exists independent of an audit and can occur because of the nature of the business.
Control Risk: The risk that a material error exists that would not be prevented or
detected on a timely basis by the system of internal controls.
Detection risk: The risk that material errors or misstatements that have occurred will not
be detected by the IS auditor.
Overall audit risk: The probability that information or financial reports may contain
material errors and that the auditor may not detect an error that has occurred. An
objective in formulating the audit approach is to limit the audit risk in the area under
scrutiny so the overall audit risk is at a sufficiently low level at the completion of the
examination.
41 Risk Assessment and Treatment
Risk assessments: It should identify, quantify and prioritize risk against criteria
for risk acceptance and objectives relevant to the organization. It should
be performed periodically to address changes in the environment, security
requirements, risk situation and when significant changes occur.
Treating Risk: Risk is treated through the given possible responses:
Risk mitigation: Applying appropriate controls to reduce the risk.
Risk acceptance: Knowingly and objectively not taking action, providing the risk
clearly satisfies the organization's policy and criteria for risk acceptance.
Risk avoidance: Avoiding risk by not allowing actions that would cause the risk to
occur.
Risk transfer/sharing: Transferring the associated risk to other parties (e.g., insurers
or suppliers).
42 Evidence
There is no specific format for an IS Audit report. The exact format may vary
depending on the organization. However, every audit report should have the
following structure and content.
An introduction to the report, statement of audit objectives, limitations to the audit and
scope, period of audit coverage, IS audit methodology and guidelines
Audit findings included in separate sections and often grouped in sections by
materiality and/or intended recipient
The IS auditor's overall conclusion and opinion on the adequacy of controls and
procedures examined during the audit, and the actual potential risk identified as a
consequence of detected deficiencies
The IS auditor's reservations or qualifications with respect to the audit. This may state
that the controls or procedures examined were found to be adequate or inadequate.
Detailed audit findings and recommendations.
A variety of findings that may include minor in nature which can be presented to the
management in an alternate format such as by memorandum.
47 Audit Documentation
1. Evaluate the IT strategy, including the IT direction, and the processes for the strategy’s
development, approval, implementation and maintenance for alignment with the
organization's strategies and objectives.
2. Evaluate the effectiveness of the IT governance structure to determine whether IT
decisions, directions and performance support the organization's strategies and
objectives.
3. Evaluate IT organizational structure and human resources (personnel) management to
determine whether they support the organization's strategies and objectives.
4. Evaluate the organization's IT policies, standards and procedures and the processes for
their development, approval, release/publishing, implementation and maintenance to
determine whether they support the IT strategy and comply with regulatory and legal
requirements.
5. Evaluate IT resource management, including investment, prioritization, allocation and
use for alignment with the organization's strategies and objectives.
6. Evaluate IT portfolio management, including investment, prioritization and allocation, for
alignment with the organization's strategies and objectives.
51 Ten Tasks within the Domain 2
COBIT 5
ISO/IEC 27001 - Information security management systems
ITIL® - IT Service Management (ITSM)
ISO/IEC 38500 - Governance of IT for the organization
ISO/IEC 20000 - Service Management System (SMS) standard
57 Audit Role in Governance of Enterprise
IT
Organizations adopt generally
accepted good practices ensured by
the establishment of controls.
Audit provides good practice
recommendations.
Improve the quality of IT governance.
Monitoring of compliance.
58 IT Governance Committees
Strategic alignment
Return on Investment (ROI)
IT Steering Committee
High level committee to ensure IT is in harmony
with the business goals and objectives.
Representatives from senior management,
business units, HR, finance, IT.
67 Maturity and Process Improvement
Step 2
Step 1 Evaluation of Step 3 Step 4 Step 5
Asset Threats and Evaluation of the Calculation of Evaluation of and
Identification Vulnerabilities to Impact Risk Response to Risk
Assets
75 Risk Analysis Methods
Qualitative Analysis
Method – Subjective
Quantitative Analysis
Method
Semi-Quantitative
Analysis Method
76 Information Technology Management
Practices
Human Resource Management
Hiring - Some of the common controls include:
Background checks (e.g., criminal, financial, professional, references, qualifications)
Confidentiality agreements or nondisclosure agreements. Specific provision may be made in these agreements to abide by the
security policies of the previous employer and not to exploit the knowledge of internal controls in that organization.
Employee bonding to protect against losses due to theft, mistakes and neglect. (Note: Employee bonding is not always an
accepted practice all over the world; in some countries, it is not legal.)
Conflict of interest agreements
Codes of professional conduct/ethics
Non-compete agreements
Nondisclosure agreements
Employee Handbook
Training
Mandatory vacations (fraud prevention/detection)
Changes in job role and access levels
Termination Policies
77 Information Security Management
Information security management provides the lead role to ensure that the
organization's information and the information processing resources under
its control are properly protected.
This would include leading and facilitating the implementation of an
organization wide information security program that includes the
development of a BIA, a BCP and a DRP related to IT department functions
in support of the organization's critical business processes.
A major component in establishing such programs is the application of risk
management principles to assess the risk to IT assets, mitigate the risk to an
appropriate level as determined by management and monitor the
remaining residual risk.
78 Performance Optimization
Includes:
Plan
Continuous
improvement
methodologies, such as Act Do
the PDCA cycle.
Comprehensive best
practices, such as ITIL Check
Frameworks, such as
COBIT
79 IT Roles and Responsibilities
Project Planning
Risk Assessment
Business Impact Assessment
BC Strategy Development
BC Plan Development (Strategy Execution)
BC Awareness Training
BC Plan Testing
BC Plan Monitoring, Maintenance and Updating
84 Incident Management
1. Evaluate the business case for the proposed investments in information systems acquisition,
development, maintenance and subsequent retirement to determine whether it meets the
business objectives.
2. Evaluate IT supplier selection and contract management processes to ensure that the
organization's service levels and requisite controls are met.
3. Evaluate the project management framework and controls to determine whether business
requirement are achieved in a cost-effective manner while managing risks to the organization.
4. Conduct reviews to determine whether a project is progressing in accordance with project plans,
is adequately supported by documentation and has timely and accurate status reporting.
5. Evaluate controls for information systems during the requirements, acquisition, development and
testing phases for compliance with the organization's policies, standards, procedures and
applicable external requirements.
6. Evaluate the readiness of information systems for implementation and migration into production
to determine whether project deliverables, controls and organization's requirements are met.
7. Conduct post-implementation reviews of systems to determine whether project deliverables,
controls and organization's requirements are met.
94 Portfolio/Program Management
A program is a group of projects and time-bound tasks that are closely linked together
through common objectives, a common budget, intertwined schedules and strategies.
Programs have a limited time frame (start and end date) and organizational boundaries.
The objectives of project portfolio management are:
Optimization of the results of the project portfolio
Prioritizing and scheduling projects
Resource coordination (internal and external)
Knowledge transfer throughout the projects
95 Business Case Development and
Approval
A business case:
Provides the information required for an
organization to decide whether a project should
proceed.
Is normally derived from a feasibility study as part
of project planning.
Should be of sufficient detail to describe the
justification for setting up and continuing a
project.
General IT Project Aspects
96
Feasibility
Requirement
Design or
Purchase
Configure or
Development
Final Testing &
Implementatio
n
Post
Implementatio
n
109 Software Testing
Testing
Type of Testing:
Unit Testing
Interface or Integration Testing
System Testing
Final Acceptance Testing (User Acceptance Testing)
Quality assurance
Documentation
Coding Standards
Testing should first be done in a secure area separate from production.
Integrated Test Facilities (ITF) tests the system under production-like conditions.
Load Tests
May use (sanitized) production data
111 Implementation Planning
Phased Changeover
Abrupt ChangeoverCutover
New
System
113 Post-Implementation
At the most basic level, the e-mail process can be divided into two principal
components:
Mail servers, which are hosts that deliver, forward and store mail
Clients, which interface with users and allow users to read, compose, send and store e-
mail messages
Security of Email
SMTP (simple mail transfer protocol) is inherently insecure
Phishing
Spoofing
Insecure configuration of email servers
Denial of Service attacks
Distribution of malware
115 Point of Sale (PoS) Devices
Output controls provide assurance that the data delivered to users will be
presented, formatted and delivered in a consistent and secure manner.
Types of Output Controls
Logging and storage of negotiable, sensitive and critical forms in a secure place.
Computer generation of negotiable instruments, forms and signatures.
Report distribution
Balancing and reconciling
Output error handling
Output report retention
Verification of receipt of reports
124 Observing and Testing Users
6. Evaluate data quality and life cycle management to determine whether they
continue to meet strategic objectives.
7. Evaluate problem and incident management practices to determine whether
problems and incidents are prevented, detected, analyzed, reported and
resolved in a timely manner to support organization's objectives.
8. Evaluate change and release management practice to determine whether
changes made to systems and applications are adequately controlled and
documented.
9. Evaluate end-user computing to determine whether the processes for end-user
computing are effectively controlled and support the organization's objectives.
10. Evaluate IT continuity and resilience (backups/restores, disaster recovery plan
[DRP]) to determine whether it is controlled effectively and continues to
support the organization’s objectives.
130 Management of IS Operations
IS operations are processes and activities that support and manage the entire IS
infrastructure, systems, applications and data, focusing on day-to-day activities.
Procedures detailing instructions for operational tasks and procedures coupled
with appropriate IS management oversight are necessary parts of the IS control
environment.
This documentation should include:
Operations procedures based on operating instructions and job flows for computer and
peripheral equipment.
Procedures for monitoring systems and applications.
Procedures for detecting systems and applications errors and problems.
Procedures for handling IS problems and escalation of unresolved issues.
Procedures for backup and recovery.
135 Software Licensing
ANYONE CAN DECLARE AN EMERGENCY, ONLY THE BCP COORDINATOR CAN DECLARE A DISASTER (Anyone
can pull the fire alarm or trigger an emergency alarm. Only the BCP coordinator or someone specified in the
BCP can declare a disaster which will then trigger failover to another facility)
145 Disaster Recovery Planning
Business Impact Analysis (BIA)
Initiated by BCP Committee
Identifies and prioritizes all business processes based on criticality
Addresses the impact on the organization in the event of loss of a specific
services or process
Quantitative: Loss of revenue, loss of capital, loss due to liabilities, penalties and fines, etc.
Qualitative: loss of service quality, competitive advantage, market share, reputation, etc.
Establishes key metrics for use in determining appropriate counter-measures
and recovery strategy
IMPORTANCE (relevance) vs. CRITICALITY (downtime)
The Auditing Department is certainly important, though not usually critical.
THE BIA FOCUSES ON CRITICALITY
146 Disaster Recovery Planning
Business Impact Analysis (BIA)
147 Disaster Recovery Planning
Recovery Alternatives
148 Disaster Recovery Planning
Backup and Restoration
Full backup
Complete backup of all files.
Archive Bit is reset.
Incremental backup
Backs up all files that have been modified
since last backup.
Archive Bit is reset.
149 Disaster Recovery Planning
Testing
The test should strive to accomplish the following tasks:
Verify the completeness and precision of the response and recovery plan.
Evaluate the performance of the personnel involved in the exercise.
Appraise the demonstrated level of training and awareness of individuals who are not
part of the recovery/response team.
Evaluate the coordination among the team members and external vendors and
suppliers.
Measure the ability and capacity of the backup site to perform prescribed processing.
Assess the vital records retrieval capability.
Evaluate the state and quantity of equipment and supplies that have been relocated
to the recovery site.
Measure the overall performance of operational and information systems processing
activities related to maintaining the business entity.
150 Development Of Disaster Recovery Plans
IT DRP Contents
1. Evaluate the information security and privacy policies, standards and procedures for
completeness, alignment with generally accepted practices and compliance with
applicable external requirements.
2. Evaluate the design, implementation, maintenance, monitoring and reporting of physical
and environmental controls to determine whether information assets are adequately
safeguarded.
3. Evaluate the design, implementation, maintenance, monitoring and reporting of system
and logical security controls to verify the confidentiality, integrity and availability of
information.
4. Evaluate the design, implementation and monitoring of the data classification processes
and procedures for alignment with the organization's policies, standards, procedures and
applicable external requirements.
5. Evaluate the processes and procedures used to store, retrieve, transport and dispose of
assets to determine whether information assets are adequately safeguarded.
6. Evaluate the information security program to determine its effectiveness and alignment
with the organization's strategies and objectives.
155 Importance of Information Security
Management
Security objectives to meet
organization's business requirements
include:
Ensure the availability, integrity and
confidentiality of information and
information systems.
Ensure compliance with laws,
regulations and standards.
156 Key Elements of Information Security
Management
Key elements of information security
management:
Senior management commitment and support
Policies and procedures
Security awareness and education
Risk Management
Monitoring and compliance
Incident handling and response
157 Critical Success Factors to Information
Security Management
Strong commitment and support by the
senior management on security training.
Professional risk-based approach must
be used systematically to identify
sensitive and critical resources.
Clearly defined roles and responsibility
for information security.
158 Classification of Information Assets
Sensitivity vs. Criticality
Sensitivity of Information
is commensurate with the losses to an organization if that information is
revealed to unauthorized individuals.
Criticality of Information
on the other hand, is an indicator of how the loss of the information would
impact the fundamental business processes of the organization.
159 Classification of Information Assets
Classification aims to quantify how much loss an organization would likely suffer
if the information was lost.
Information assets can be classified by sensitivity, criticality, or both.
Each classification level should have its own handling and destruction
requirements.
Classification reduces risk
The inventory record of each information asset should include:
Importance of the asset
The information asset owner
The process for granting access
The person responsible for approving access rights and access levels
The extent and depth of security controls
160 Information Security Control Design
Financial loss
Legal repercussions
Loss of credibility or competitive edge
Blackmail / industrial espionage / organized crime
Disclosure of confidential, sensitive or embarrassing information
Sabotage
165 Perpetrators
Hackers (crackers)
Script kiddies
Employees (authorized or unauthorized)
IT Personnel
End users
Former employees
Nations
Interested or educated outsiders
166 Common Attacks
Botnets
Brute Force Attack
Denial of Service (DoS) attack / Distributed DoS
Email Spoofing
Phishing
Trojan Horses
Logic Bomb
Trap Doors (Back doors)
Man in the Middle (MITM) attack
Pharming
Salami
Viruses / Worms / Spyware
167 Logical Access Exposures
Once a person has been identified through the user ID or a similar value, he
must be authenticated, which means he must prove he is who he says he is.
There are three types of authentication factors:
1. Something a person knows (authentication by knowledge) can be a password, PIN,
mother’s maiden name or a combination to a lock. It is the least expensive
mechanism to implement.
2. Something a person has (authentication by ownership) can be a key, swipe card,
access card, or badge. A downside to this method is that the item can be lost or
stolen, which could result in unauthorized access.
3. Something specific to a person (authentication by characteristic) is based on a
physical attribute of a person referred to as biometrics such as finger print, facial
recognition, voice recognition, iris scanner etc.
Strong authentication contains two or all of these three methods.
172 Passwords