Auditing Security

  • Uploaded by: Joseph Mghenja
  • 0
  • 0
  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Auditing Security as PDF for free.

More details

  • Words: 588
  • Pages: 9
AUDITING SECURITY This is a systematic evaluation of the security of a company's information system by measuring how well it conforms to a set of established criteria.

AUDITING FRAMEWORKS  

ISO 27001



• COBIT 5



• Federal Information Security Management Act (FISMA)



• NERC Reliability Standards



• ISPS Code



• HIPAA



• Sarbanes-Oxley (SOX)



• Trust Services



PCI-DSS



• BASEL II



• BSI-IT Grundschutz



• CESG

Assessing certification authorities: Key processes the involved when authorities are executing or delegating: 

1) auditing (what security measures are checked and how),



2) licensing of auditors (what skills sets or exams are required),



3) validation of monitoring tools (which scans or features are required),



4) certification on the security requirements (how audit reports and monitoring reports are assessed).

Continuous monitoring vs point-in-time assessment: Most of the frameworks are based around periodic, point-intime assessment of a provider or a service. In the IT industry, with the rapid changes of technology and products, the effectiveness of a point-in-time assessment might be limited – especially when considering online or cloud services that change continuously.

Incident reporting: Whatever structure is used in the auditing scheme, the governing body should have a way to make a cross-check to assess the overall effectiveness of the framework in place, including the quality of the certification authority and the quality of the auditors. An objective way of assessing the overall framework or any of the constituent parts, is by looking at incident reports and/or independent test results.

Preventive auditing vs. post-incident investigations: In most certification and audit frameworks the focus is on preventive and periodic audits. The goal of a preventive audit is to check whether or not all the necessary security measures are in place. Post-incident investigation is even more important, because it helps to understand the root cause of the incident, what are the lessons learnt and what could have prevented the incident. This is important to improve security and possibly the audit scheme itself too.

Compliance burden and entry barriers: The digital society is rapidly changing. New services (cloud e.g.), new products (smartphones e.g.), new usage scenarios (smart grids e.g.) are emerging continuously. An important goal of EU Member States and the European commission is to foster innovation.

PRIVACY OF INFORMATION SYSTEMS 

This is the privacy of personal information and usually relates to personal data stored on computer systems.



The need to maintain privacy is applicable to collected personal information, such as medical records, financial data, criminal records, political records, business related information or website data.



Privacy of information systems may be applied in numerous ways, including encryption, authentication and data masking - each attempting to ensure that information is available only to those with authorized access. These protective measures are geared toward preventing data mining and the unauthorized use of personal information, which are illegal in many parts of the world.

Privacy of information systems relates to different data types, including: Internet privacy (online privacy): All personal data shared over the Internet is subject to privacy issues. Most websites publish a privacy policy that details the website's intended use of collected online and/or offline collected data. Financial privacy: Financial information is particularly sensitive, as it may easily be used to commit online and/or offline fraud. Medical privacy: All medical records are subject to stringent laws that address user access privileges. By law, security and authentication systems are often required for individuals that process and store medical records.

Related Documents

Auditing Security
June 2020 13
Auditing
July 2020 32
Auditing
November 2019 42
Auditing
October 2019 36
24 Auditing
June 2020 14

More Documents from ""

Auditing Security
June 2020 13
Club Of Rome Report
November 2019 31
Informe 9 Titulacion.docx
December 2019 33
All The Heavens
April 2020 23
Eagle's Wings
April 2020 20
Freedom
April 2020 21