Chapter 7 Information System Security and Control Essay Questions: 1. Hackers and their companion viruses are an increasing problem, especially on the Internet. What can a digital company do to protect itself from this? Is full protection feasible? Why or why not? 2. Define the terms input controls, processing controls, and output controls distinguishing among them. 3. The three major concerns of system builders and users are disaster, security, and administrative error. Of the three, which do you think is most difficult to deal with? Why? 4. Define a fault-tolerant computer system and a high-availability computer system. How do they differ? When would each be used? 5. Define the terms load balancing, mirroring, and clustering, distinguishing among them. 6. Discuss the issue of security challenges on the Internet as that issue applies to the global enterprise. List at least 10 Internet security challenges. 7. How does a firewall work and what does it do? Describe the two major types of firewall technology and how each works. 8. What is a digital certificate? How does it work? 9. What is required of an MIS auditor, how does he/she accomplish the task, and what does the MIS audit reveal? 10. How are encryption, authentication, digital signatures, and digital certificates each used to ensure security in electronic commerce?
Answers of Essay Questions: 1. Hackers and their companion viruses are an increasing problem, especially on the Internet. What can a digital company do to protect itself from this? Is full protection feasible? Why or why not? For protection, a company must institute good security measures, which will include firewalls, investigation of personnel to be hired, physical and software security and controls, antivirus software, and internal education measures. These measures are best put in place at the time the system is designed, and careful attention paid to them. A prudent company will engage in disaster protection measures, frequent updating of security software, and frequent auditing of all security measures and of all data upon which the company depends. Full protection may not be feasible in light of the time and expenses involved, but a risk analysis can provide insights into which areas are most important and vulnerable. These are the areas to protect first. 2. Define the terms input controls, processing controls, and output controls distinguishing among them. a) Input controls check the data for accuracy and completeness when they enter the system. There are specific input controls for input authorization, data conversion, data editing, and error handling. b) Processing controls establish that data are complete and accurate during updating. Run control totals, computer matching, and programmed edit checks c) Output controls ensure that the results of computer processing are accurate, complete, and properly distributed. 3. The three major concerns of system builders and users are disaster, security, and administrative error. Of the three, which do you think is most difficult to deal with? Why? a) Disaster might be the most difficult because it is unexpected, broad-based, and frequently life threatening. In addition, the company cannot know if the disaster plan will work until a disaster occurs, and then it s too late to make corrections. b) Security might be the most difficult because it is an ongoing problem, new viruses are devised constantly, and hackers get smarter every day. Furthermore, damage done by a trusted employee from inside cannot be obviated by system security measures. c) Administrative error might be most difficult because it isn t caught until too late, and the consequences may be disastrous. Also, administrative error can occur at any level and through any operation or procedure in the company. 4. Define a fault-tolerant computer system and a high-availability computer system. How do they differ? When would each be used? Both systems use backup hardware resources. Fault-tolerant computer systems contain extra memory chips, processors, and disk storage devices that can back the system up and keep it running to prevent a system failure. High-availability computing places the emphasis on quick recovery from a system crash. A high-availability system includes redundant servers, mirroring, load balancing, clustering, storage area networks, and a good disaster recovery plan. The main difference between them is that fault-tolerant computer systems don t go down; high-availability computer systems go down, but can recover quickly. Companies needing a technology platform with 100 percent, 24-hr system availability, use 75
fault-tolerant computer systems. High-availability computing environments are a minimum requirement for firms with heavy electronic commerce processing or that depend on digital networks for their internal operations. 5. Define the terms load balancing, mirroring, and clustering, distinguishing among them. a) Load balancing uses multiple servers to distribute large numbers of access requests. The requests are directed to the most available server so that no single device is overwhelmed. Post offices, banks, and other firms that use service windows use load balancing when all customers go into a main line, and as each person comes to the front of the line, he or she chooses the next available service window in the group. b) Mirroring uses a backup server to duplicate all the processes and transactions of the primary server. If the primary server fails, the backup server immediately takes its place with no interruption in service. This is a very expensive process because each server requires two machines at all times. c) Clustering links two computers together so the second computer can act as a backup to the primary computer. If the primary computer fails, the second computer picks up its processing with no pause in the system. The second computer is not a mirror of the first; it simply picks up processing where the first one left off. 6. Discuss the issue of security challenges on the Internet as that issue applies to the global enterprise. List at least 10 Internet security challenges. Large public networks, including the Internet, are more vulnerable because they are virtually open to anyone and because they are so huge that when abuses do occur, they can have an enormously widespread impact. When the Internet becomes part of the corporate network, the organization s information systems can be vulnerable to actions from outsiders. Computers that are constantly connected to the Internet via cable modem or DSL line are more open to penetration by outsiders because they use a fixed Internet address where they can be more easily identified. The fixed Internet address creates the target for hackers. To benefit from electronic commerce, supply chain management, and other digital business processes, companies need to be open to outsiders such as customers, suppliers, and trading partners. Corporate systems must be extended outside the organization so that employees working with wireless and other mobile computing devices can access them. This requires a new security culture and infrastructure, allowing corporations to extend their security policies to include procedures for suppliers and other business partners. Some of the challenges to Internet security are computer viruses, line taps, loss of the machine itself, tapping, sniffing, message alteration, theft and fraud, hacking, computer viruses, vandalism, denial of service attacks, copying of data, and alteration of data. 7. How does a firewall work and what does it do? Describe the two major types of firewall technology and how each works. A firewall is a computer program generally placed between internal LANS and WANS and external networks such as the Internet. Its controls access to the organization s internal networks by acting as a gatekeeper to examine each user s credentials before the user is allowed to access the network. The firewall identifies names, Internet protocol addresses, applications, and other characteristics of incoming traffic. It checks this information against the access codes programmed into the system 76
by the network administrator. The two major types of firewall are: a) Proxies stop data originating outside the organization at the firewall, inspect them, and pass a proxy to the other side of the firewall. If a user outside the company wants to communicate with the user inside the organization, the outside user first talks to the proxy application and the proxy application communicates with the firm s internal computer. Because the actual message doesn t pass through the firewall, proxies are considered one of the most secure firewall. The problem is that they consume system resources and can cause network performance degradation. b) Stateful inspection scans each packet of incoming data, and checks its source, destination address, or service. It sets up state tables to track information over multiple packets. User-defined access rules identify every type of packet that the organization does not want to admit. This system is theoretically not as secure because some data pass through the firewall, but it consumes fewer network resources than proxies. 8. What is a digital certificate? How does it work? A digital certificate is a data file used to establish the identity of people and electronic assets for protection of online transactions. It uses a trusted third party known as a certificate authority to validate a user s identity. It can be run as a function inside an organization or by an outside company. The certificate authority verifies a digital certificate user s identity off-line. This information is put into a certificate authority server, which generates an encrypted digital certificate containing owner identification information and a copy of the owner s public key. The certificate authority makes its own public key available publicly either in print or on the Internet. The recipient of an encrypted message uses the certificate authority s public key to decode the digital certificate attached to the message, verifies it was issued by the certificate authority, and then obtains the sender s public key and identification information contained in the certificate. Using this information, the recipient can send an encrypted reply. 9. What is required of an MIS auditor, how does he/she accomplish the task, and what does the MIS audit reveal? An MIS audit identifies all of the controls that govern individual information systems and assesses their effectiveness. To accomplish this, the auditor must acquire a thorough understanding of the operations, physical facilities, telecommunications, control systems, data security objectives, organizational structure, personnel, manual procedures, and individual applications of the company. The auditor usually interviews key individuals, who use and operate a specific information system, concerning their activities and procedures. Application controls, overall integrity controls, and control disciplines are examined. The auditor traces the flow of sample transactions through the system and performance tests, using, if appropriate, automated audit software. The audit itself lists and ranks all control weaknesses and estimates the probability of their occurrence. It then assesses the financial and organizational impact of each threat. It includes a section for notifying management of such weaknesses and for management s response. Management is then expected to devise a plan to counter the significant weaknesses 77
10. How are encryption, authentication, digital signatures, and digital certificates each used to ensure security in electronic commerce? a) Encryption scrambles the message according to a key, sends the scrambled message, and unscrambles the message at the other end using a matching key. b) Authentication uses digital signatures and digital certificates to make sure that the messages are sent between known parties, and changed or copied during transmission. c) Digital signatures are digital codes attached to an electronically transmitted message that are used to verify the origins and content of the message. d) Digital certificates are data files used to establish the identity of people and electronic assets for protection of online transactions. They use a trusted third party to validate the user s identities, with combinations of public and private encryption codes to scramble and unscramble the messages. 78