Page 12 - Internal Auditor Middle East - December 2017
P. 12

IT Control





          By Ahmed salameh Al-Malaji          Edited By: Hossam Samy
          Are your


          organization’s



          IT control



          systems


          reliable?




                                           the organization’s security by measuring   for cyber attack.So, the computer security
                                           and comparing the relationships among   includes the use of a set of firewalls,
                                           the following three variables:    passwords, and other preventive, detective
                                                                             and corrective countermeasures to prevent
                                           P: The time it takes for an attacker to   unauthorized persons from getting an
                                           break through the preventive controls of   access to systems, data and devices.
                                           an organization.
                                                                             First: Preventive Controls:
                                           D: The time it takes to detect the
                                           occurrence of the attack.         Key types of preventive controls used for
                                                                             information systems include:
                                           C: The time it takes to respond.
                                                                             Authorization: This control determines
                                           If P> (D + C), then, security measures are   who is authorized to access the system by
                                           effective. Otherwise, security measures are   either giving him a password, a fingerprint
         There is no doubt that all small, medium   not ineffective.         or an access card.
         and large organizations have Information
         systems, whether computerized or manual.   This model is also used for comparing and   Authentication: It is another layer
         These systems are used for processing   assessing cost and benefits of  controls   of preventive controls in which the
         the data and extract a large amount of   implementation. For example, if your   permission for accessing the subsystems is
         useful information which represent a main   organization will invest 10,000 cash units   given after confirming that the employee
         source for decision-making inside and   to improve security and have the following   has an access permit to the master system.
         outside the organization. The information   options:                Appropriate privileges must be given
         systems must be highly reliable. To be so,                          according to the job description of the
         it must have five key principles: safety,   • Buy a firewall that will add 15 minutes   employee.
         confidentiality, privacy, processing   to P duration.
         Integration and availability.       • Update the intrusion detection system   It is necessary to have a user access
                                                                             authorization matrix for the systems in the
         Safety                              that will reduce D duration by 18   IT Department.
                                             minutes.
         It is the main element of these principles.   • Invest in a new method of quick   Training: Staff should be trained on how
         Despite the complexity of information   response to the intrusion process to   to protect and maintain their PCs, and
         systems security, and the need for   reduce C duration by 20 minutes.  employees should be made aware of social
         information security specialists, but                               engineering and its methods of cheating
         it is the matter of senior management   Certainly, the third option, i.e. investing in   the employees.
         within the organization and not only the   a new method, will make the organization   Physical Access Controls: The main
                                           more beneficial while other factors shall
         information technology department, as   remain unchanged.           server room must be protected from
         the senior management is responsible for                            unauthorized access through the access
         the accuracy of the data and reports issued   Defense in depth      card or fingerprint. Visitors must be
         by the organization.              The defense in depth includes the use   accompanied while roaming the premises
                                                                             of the organization and PCs must be
         Time Security Model               of multiple layers of controls to avoid   protected from misuse.
                                           existence of gaps that may hinder the
         This model evaluates the effectiveness of   operation of the system or be vulnerable to   Remote Access Controls: There are

          10     INTERNAL AUDITOR - MIDDLE EAST                                                                                                                                DECEMBER 2017
   7   8   9   10   11   12   13   14   15   16   17