Page 23 - CITP Review
P. 23

such elements as the length of a password; how long it remains active before the user must change it;
            and factors to strengthen the password.


            Admin rights

            The broadest access is reserved for admin (administrators), who can view and access any file or folder
            contained in the O/S, for purposes of managing the O/S, and correcting mistakes, flaws, and other minor
            changes to files or folders. The admin access usually also assigns logical access credentials to the O/S
            to all other personnel.

            It is risky if too many users have admin rights because of the increased opportunity for someone to make
            a mistake using admin access. In addition, a person who commits a fraud and has O/S admin rights can
            delete files, access and change raw data, or perform other activities to hide a fraud or destroy evidence.


            Network level
            The network level generally resides above the O/S and application and thus needs to provide adequate
            access control to users. Similar to the operating system, access rights and administrative rights to the
            network are critical aspects to control, and are usually assessed at a relatively high IR. There is also a
            concern for external unauthorized access risk.


            Firewalls
            Firewall controls basically address the information security triangle of major points: availability,
            confidentiality, and integrity.

            An effective firewall will provide for adequate

              availability of its services and functionality,
              confidentiality of the data it stores and processes, and
              integrity over the results produced as information.
            Integrity and confidentiality are at risk from external hackers, and internally for the entity’s own
            employees. Some hacker tools are aimed at bringing systems down (for example, denial of service), so
            even availability is also at risk from external or internal malicious attacks.

            Firewall technology provides tools that can effectively reduce the risk of external unauthorized access
            and other external risks. Firewalls usually have configurations that allow various settings to filter traffic
            and establish connectivity rules. Thus, the CITP would be interested in examining the settings of the
            firewall, which exist in hardware or software.

            The types of firewalls include packet filtering firewalls, inspection firewalls, and proxy firewalls, which are
            especially related to applications. Wireless networks present additional risks because communications
            are easier to intercept than wired ones if not encrypted or protected.

            One problem with firewalls and threats or risks is that most malicious activity is actually perpetrated by
            insiders, such as employees, contractors, and so on. After all, anyone inside the entity is generally treated



            © 2019 Association of International Certified Professional Accountants. All rights reserved.    1-15
   18   19   20   21   22   23   24   25   26   27   28