IT Security System Audits CH.1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Regulatory compliance

- protects the reputation and integrity of the organizations that are required to comply. - It considers the interests of the consumer and shareholders. - has a farther-reaching economic impact on ensuring public confidence in organizations and capital markets

general steps to meeting compliance

1. Interpret the regulation and how it applies to the organization. 2. Identify the gap or determine where the organization stands with the compliance mandate. 3. Devise a plan to close the gap. 4. Execute the plan.

NIST 800-53A provides ________.

A guide for assessing security controls

TJX Breach

An unauthorized intruder first accessed systems in July 2005, and unauthorized access continued through mid-January 2007. On December 18, 2006, TJX discovered suspicious software on its systems and immediately initiated an investigation along with leading computer security firms. Within a few days, TJX had notified law enforcement officials and met with the U.S. Department of Justice and the U.S. Secret Service to brief them on the discovery. Shortly thereafter, TJX notified contracting banks and payment card processing companies. Before the public announcement of the incident, the company had notified the U.S. Federal Trade Commission (FTC), the U.S. Securities and Exchange Commission (SEC), and the Canadian authorities.

Which of the following best describes an audit used to determine if a Fortune 500 health care company is adhering to Sarbanes-Oxley and HIPAA regulations? A. IT audit B. Operational audit C. Compliance audit D. Financial audit E. Investigative audit

Compliance Audit

categories from where costs can occur following a breach

Discovery, notification, and response Lost productivity Opportunity Cost Regulatory fines Restitution Additional security and audit requirements Other liabilities

Interview

Discuss associated assessment objects with groups or individuals to understand or obtain evidence to support the existence and effectiveness of the security control. can include senior officials, information system owners, security officers, information system operators, and network administrators.

A security assessment is a method for proving the strength of security systems.

False

An IT security audit is an ________ assessment of an organization's internal policies, controls, and activities.

Independent

6. Which of the following is an assessment method that attempts to bypass controls and gain access to a specific system by simulating the actions of a would-be attacker? A. Policy review B. Penetration test C. Standards review D. Controls audit E. Vulnerability scan

Penetration test

The Big Four

PricewaterhouseCoopers (known as PwC), Deloitte, Ernst & Young (known as EY), and KPMG.

Test

Put associated assessment objects under specific conditions to compare actual behavior with what is expected to obtain evidence to support the existence and effectiveness of the security control. Objects can include hardware or software mechanisms or system operations or administration activities. Examples include testing actual security configuration settings and conducting penetration tests.

Which one of the following is not a method used for conducting an assessment of security controls? A. Examine B. Interview C. Test D. Remediate

Remediate

Categorizing information and information systems and then selecting and implementing appropriate security controls is part of a ________

Risk-Based Approach

Information technology audits

These address the risk exposures within IT systems and assess the controls and integrity of information systems.

Compliance audits

These determine if an organization is adhering to applicable laws, regulations, and industry requirements.

Financial audits

These determine whether an organization's financial statements accurately and fairly represent the financial position of the organization.

Investigative audits

These investigate company records and processes based on suspicious activity or alleged violations.

Operational audits

These provide a review of policies, procedures, and operational controls across different departments to ensure processes are adequate.

Technical (IT audit scope)

This examines the IT infrastructure and data communications.

Organizational (IT audit scope)

This examines the management control over IT and related programs, policies, and processes.

Application (IT audit scope)

This involves the applications that are strategic—for example, those typically used by finance and operations.

Compliance (IT audit scope)

This pertains to ensuring that specific guidelines, laws, or requirements have been met.

NIST Special Publication 800-53A

This publication defines a recommended assessment procedure, which includes a set of assessment objectives

Compliance initiatives typically are efforts around all except which one of the following? A. To adhere to internal policies and standards B. To adhere to regulatory requirements C. To adhere to industry standards and best practices D. To adhere to an auditor's recommendation

To adhere to an auditor's recommendation

The internal audit function may be outsourced to an external consulting firm. A. True B. False

True

Whereas only qualified auditors perform security audits, anyone may do security assessments.

True

Examination

Verify, inspect, or review associated assessment objects to understand or obtain evidence to support the existence and effectiveness of the security control. Examples include reviewing security policies and procedures and observing physical security mechanisms.

IT security assessment

a key activity that involves the management of risk

penetration test

an assessment method that attempts to bypass controls and gain access to a specific system by simulating the actions of a would-be attacker.

IT security audit

an independent assessment of an organization's internal policies, controls, and activities.

Payment Card Industry Data Security Standard (PCI DSS)

an industry-created standard that applies to organizations that process credit cards. Companies that meet a specific threshold for large volumes of credit card transactions are required to achieve compliance. This is done via an audit by an independent Qualified Security Assessor (QSA).

Internal compliance

an organization's ability to follow its own rules, which are typically based on defined policies.

risk

an uncertainty that might lead to a loss.

Internal auditors

are employed by the organization that they audit.

IT security assessment report

documents the findings of the assessment and provides the information necessary to determine the effectiveness of the controls.

general controls

embedded in IT services

application controls

embedded in business applications

Strict liability

even if there wasn't intent, government agencies can levy huge fines on organizations and some individuals can spend years in prison

assessment methods

examination, interview, and test

Security controls

include the physical, procedural, and technical mechanisms to safeguard systems.

external auditor

is independent of the organization and is often engaged from one of the big accounting and consulting firms.

black box pen test

makes no assumptions about the environment to be tested

National Institute of Standards and Technology (NIST)

provides a framework for effective security assessment plans in NIST Special Publication 800-53A

white box pen test

provides complete knowledge and information, such as network diagrams, about the environment to be tested

External compliance

refers to the need or desire for an organization to follow rules and guidelines set forth by external organizations and initiatives.

Governance

seeks to better run an organization using complete and accurate information and management processes or controls.

Risk management

seeks to mitigate risk through controls.

assessment objects

specification, mechanism, activity, and individual

A proposed merger in 2000 with Sprint would have eclipsed the merger with MCI; however, the merger was disapproved and WorldCom started to unravel. In an attempt to maintain its earnings, WorldCom liberally interpreted accounting rules to make its financial statements seem profitable. The company soon moved from liberal interpretation into outright fraud by creating false entries.

true

An assessment objective includes one or more statements that are directly related to a corresponding control to determine the validity and effectiveness of the control.

true

An audit is concerned about past results and performance, whereas an assessment considers previous and current results as well as expected performance.

true

At a fundamental level, internal compliance to corporate policies is critical to the success of any business.

true

Auditors should never be involved in the auditing of processes, systems, or applications that they themselves designed or implemented.

true

Audits are an independent evaluation. A security assessment may also be conducted independently, but it is not necessary. Many organizations use a combination of both.

true

Audits follow a rigorous approach and are conducted according to accepted principles. This also requires that auditors be qualified. The approach taken for an assessment can fall across a wide spectrum, but in many cases, they have taken a cue from audits with well-defined approaches and frameworks

true

Compliance embraces the organizational mission and noncompliance can harm or even impede business

true

Compliance frameworks, such as Control Objectives for Information and Related Technology (COBIT), and standards, such as NIST, help interpret how to comply with the regulations.

true

Compliance helps governance by ensuring such information and controls also satisfy applicable standards or regulations.

true

Compliance helps risk management by verifying that the desired controls are in place.

true

Compliance laws and regulations ensures there are proper information system controls throughout the environment to provide the necessary security of customer data, as well as ensure the integrity of the systems upon which business processes run

true

External auditors are typically limited to providing information about gaps discovered and leading the client to accepted principles.

true

In the event an organization passes an audit, the organization typically receives some type of certification or confirmation. This is not the case for assessments.

true

Initially, the TJX attackers accessed only historical data. To capture live transaction data, the attackers installed software that recorded the traffic. This enabled the attackers to steal credit card data as customer transactions were occurring in the store.

true

Internal auditors can provide recommendations for improvements; however, they should never be involved in the design or implementation of any system or control.

true

It's helpful to create an executive summary document that quickly highlights the key findings and recommendations in a security assessment report.

true

Many organizations use assessments to prepare for audits.

true

Meeting compliance often includes implementing mechanisms to prove that an organization has properly executed its plan.

true

Not all IT security assessments need to be comprehensive to cover all security controls or even all information systems.

true

On January 17, 2007, TJX announced it had become a victim of an intrusion into portions of its information systems that process and store customer transaction data.

true

On a strategic level, compliance ensures an organization can effectively meet organizational goals and objectives as planned. This means IT must ensure it is capable of delivering services to satisfy business needs and to stay compliant with external laws and regulations.

true

Organizations have spent and continue to spend large sums of money to achieve and maintain regulatory and industry compliance.

true

Organizations often outsource their internal audit functions to an external consulting firm.

true

Penetration tests often reveal weaknesses or easily exploited vulnerabilities within a system.

true

Publicly traded companies are required to engage external auditors.

true

Regular assessments and audits of the IT environment are important for ensuring compliance.

true

Risk management means deeming some risks acceptable so a company may accomplish its business goals.

true

Security auditing, in general, must follow a more rigid approach and process over a security assessment.

true

TJX did not break any laws, it was simply not compliant with stated payment card processing guidelines.

true

The Enron collapse was a result of a complex and methodical accounting scandal. The fallout was massive, resulting in thousands of employees who were laid off and who lost their life savings plans that were tied to the company's stock. In addition, shareholders saw a loss of $11 billion. Economically, the disaster perpetuated a lack of trust in the stock market and eroded public confidence.

true

The benefits provided to organizations as a result of information technology involve complex systems and processes.

true

The cost per record breached can be anywhere between $90 and $305, depending on the type of breach and how regulated the industry within which the breach occurs is.

true

The market value of WorldCom continued to grow substantially through these acquisitions, and high expectations continued to be placed on the company. This generated pressure to keep the stock price at elevated levels, which in turn allowed WorldCom to continue its acquisition spree.

true

The personnel who conduct security assessments can be internal or external to an organization

true

The point of infiltration in the TJX breach was a wireless network at a retail store using WEP instead of WPA.

true

Unlike external auditors, internal auditors are not independent of the organization they audit.

true

Without proper governance in place, an organization can have neither effective risk management nor compliance.

true

WorldCom spent approximately $60 billion and accumulated approximately $41 billion in debt via mergers and acquisitions.

true

You use an audit to assess the presence and effectiveness of IT controls and to ensure that those controls are compliant with stated policies.

true

a penetration test is not necessarily the best means by which to judge the security of an information system.

true

an IT audit includes elements of a regulatory compliance audit and an operational audit includes elements of a financial and IT audit.

true

an audit is an assessment

true

audits provide reasonable assurance that organizations are compliant with applicable regulations and other industry requirements.

true

compliance laws and regulations place an increased responsibility on information technology (IT) staff

true

it was the Enron fiasco that led to the downfall of Arthur Andersen as one of the largest auditing and consulting firms.

true

penetration tests operate under specific constraints and rules of engagement.

true

the Sarbanes-Oxley Act was created in response to the Enron scandal.

true

gray box pen test

variations between black-box and white-box tests

A risk-based approach to managing information security

• Identifying and categorizing the information and the information systems • Selecting and implementing appropriate security controls—actions or changes to be applied to systems to reduce weaknesses or potential losses • Assessing the controls for effectiveness • Authorizing the systems by accepting the risk based upon the selected security controls • Monitoring the security controls on a continual basis

IT security audit program goals

• Provide an objective and independent review of an organization's policies, information systems, and controls. • Provide reasonable assurance that appropriate and effective IT controls are in place. • Provide audit recommendations for both corrective actions and improvement to controls.


Set pelajaran terkait

Chapter 10: Information Systems with the Organization

View Set

Test 3 (Consumer Protection) P10

View Set

Chapter 2: Chemical Level of Organization

View Set

LEADERSHIP/ MANAGEMENT practice EAQ

View Set

Astronomy Midterm #1 Quiz Questions

View Set

EXAM 2 - Immunizations, Skin and Communicable Disease Quiz

View Set

Digital Art History-Test 1-Set 1

View Set

Semi , hemi ,and Demi meaning half

View Set