Page 13 - Internal Auditor Middle East - December 2017
P. 13

TO COMMENT on the article,
              EMAIL the author at ahmed.malaji@LTRC.GOV.JO                                         IT Control




                                                                             Management Reports:
                                                                             Creating management reports that include
                                                                             Key Performance Indicators in terms of
                                                                             the business disruption due to security
                                                                             incidents, the number of installed,
                                                                             maintained and developed systems,
                                                                             and the time required to respond to the
                                                                             detected security incidents.
                                                                             Information System Security Testing:
                                                                             There are many techniques that can
                                                                             be used to examine the system and
                                                                             detect vulnerabilities and weaknesses,
                                                                             where a person can try penetrating the
                                                                             information system (authorized person or
                                                                             security consulting company) to identify
                                                                             and handle gaps and vulnerabilities.
                                                                             Role of internal auditor in ensuring the
                                                                             effectiveness of detective controls:
                                                                             The role of the internal auditor in
          several technologies used to protect   to normal when needed.      assessing the detective controls
          data and systems from manipulation,   The role of the internal auditor in   include ensuring whether or not the
          including routers, firewalls, and intrusion   ensuring the effectiveness of preventive   administrative reports are prepared and
          prevention systems.                                                the audit trail/log file is effective, where
                                           controls:                         the internal auditor can request a specific
           • Main Router: It is used to connect the   The role of the internal auditor is to   sample from the log file analysis and
           information system to the Internet.
                                           ensure that procedures and techniques   ensure that all transactions/activities in
           • Firewalls: It works in conjunction with   are used effectively and efficiently, for   the file were made by authorized users,
           the main router to filter information   example:                  and match the privileges granted to the
           transmitted in or out of the information   Request the IT Department to provide  a   users with the  user access authorization
           system.                         list of all the addresses and websites that   matrix.
           • TCP / IP Protocol: It is used to   accessed the information systems through   Third: Corrective Controls:
           communicate data in the form of   the main router, as well as the websites
           streams of bytes over the Internet.   and addresses that were prevented from   They include ensuring that all identified
           Through this protocol, a set of rules   entering through intrusion detection   vulnerabilities and weaknesses have been
           called the Access Control List “ACL” is   systems and firewalls. This will be useful,   corrected. These controls include:
           used to determine the accepted/ rejected   particularly upon noticing the repetition   Computer Emergency Response Team
           data streams. The most effective   of certain websites and addresses.
           data filtering technique is Intrusion   Second: Detective Controls:  (CERT): It consists of technical and
           Prevention Systems.                                               operations management specialists to
                                           There are no preventive systems capable   handle major incidents and regularly:
           • Internal Firewalls: They are used to   to completely protect the information
           divide departments and divisions within   systems from cyber attacks due to the   • Recognize the problem;
           an organization so that a particular   continuous evolution of attackers’ methods   • Contain the problem;
           department or division cannot access
           to the information systems of the other   and inherited vulnerabilities in any   • Solve the problem; and
           division.                       information system. Hence, there should
                                           be controls that detect any attempt to   • Follow-up.
           • Put key computers such as e-mail   attack the information systems. Through
           computers in a separate network outside   detective controls, the effectiveness of   Chief Security Officer: A specific
           the company’s internal network.                                   individual responsible for the
                                           preventive controls systems is determined.  organization’s scope of security. Such a
           • There shall be special procedures for                           person should report to the COO or CEO
           wireless network security.      Log Analysis: It is a file that records all   and be independent of the information
                                           user’s activities, e.g. deleting, modifying,
          Encryption: Encryption is the ultimate   and adding database records.  system management functions.
          block in the development of preventive
          controls, through which data is converted   Intrusion Detection Systems (IDS): It   Ahmed Salameh Al-Malaji, Accounting
          from clear readable text to cipher   creates a log of addresses and websites that   Information Systems - Internal Auditor at the
          unreadable data, and data can be returned   are allowed to pass to the firewall.  Land Transport Regulatory Authority / Jordan

          DECEMBER 2017                                                       INTERNAL AUDITOR - MIDDLE EAST     11
   8   9   10   11   12   13   14   15   16   17   18