13. General Controls in EDP Setup


1.     OPERATING SYSTEM CONTROLS :-

1.1    Definition of OS
1.2    Tasks of OS
1.3    Objectives of OS :-
1.3.1      Protects OS from
1.3.2      Protects Users from
1.3.3      Protects Modules of OS from
1.4   Threats to OS :-
1.4.1      Accidental
1.4.2      Intentional

1.5  Security requirement for OS :-
1.5.1   Access control :-
A)      Components :-
i)        Log-in ID
ii)      Access token
iii)    Access control list
iv)     Discretionary access
B)      Using passwords :-
i)        Definition
ii)      Types
1.5.2    Protection from Destructive Programs
1.5.3    Audit trail :-
A)           Definition
B)           Objectives
C)           Implementation

2.       DATA MANAGEMENT CONTROLS :-

2.1    Access Control
2.1.1      Types of systems
2.1.2      Controls

2.2    Back-up control
2.2.1      File based environment
2.2.2      Database environment

3.     ORGANISATION STRUCTURE CONTROLS :-
3.1 Development Operation
3.2 Development Maintenance
3.3 Data Library Operation
3.4 DBA Functions
3.5 Alternate structuring for Development

 

4.       SYSTEM DEVELOPMENT CONTROLS :-

Group 1

4.1    Management Authorisation
4.2    User Specification
4.3    Auditor Participation

Group 2
 
4.4    Technical Design
4.5    Testing
4.6    User Acceptance

5.       SYSTEM MAINTENANCE CONTROLS :-

        Group 1
5.1    Authorisation
5.2    Technical Specification
5.3    Testing
5.4    Documentation
5.5    Access to Maintenance Commands

        Group 2
5.6   SPL control:-
5.6.1      Definition
5.6.2      Uncontrolled environment
5.6.3      Controlled environment
5.6.4      Benefits
5.7    Audit Trail

Group 3
 
5.8    Version Numbering
5.9    Message Sequence Numbering

6.    COMPUTER CENTRE SECURITY
       CONTROLS:-
6.1    Risks
6.2    Measures
:-
6.2.1      DRP :-
A)           Definition
B)           Components
C)           Recovery and Reconstruction
D)           DRP efficiency marking
6.2.2      Insurance


7.    INTERNET INTRANET CONTROLS :-
7.1  Failure of :-
7.1.1      Component
7.1.2      Equipment
7.2  Subversive (Rebellious) threats to data being transmitted :-
7.2.1   Types of gaining access
7.2.2   Types of threats
7.2.3   Controls :-
A)    Software Data based :-

i)  Encryption :-
a)  ­­Definition
b)   Process
c)   Types (with Definition, Process Drawbacks):-
¨     Private Key encryption
¨     Public key
encryption

ii)Firewall:-
a)    Definition
b)    Characteristics
c)    Types (with Functions Drawbacks) :-
¨    Network Level
¨    Application Level


B)     Communication Link based :-
i)        Message Transaction Log
ii)      Call Back Devices
iii)    Controlling “Denial of Service Attack” (with Process Definition)



8.       PC CONTROLS :-
8.1    Characteristics of PC
8.2    Risks
8.3    Solution :-

8.3.1      Access control :-
A)      Disk locks :-
i)     Purpose
ii)    Types :-
a)       Physical
b)       Soft lock
B)      System locks

8.3.2    Password Control
8.3.3    Backup :-
A)           Definition
B)           Types

Comments

0 Responses to "13. General Controls in EDP Setup"

Post a Comment

Place your order..

Buy MICS Unleashed here..
ISBN: 978-81-7666-523-0

Subscribe...

Quick reference ...