Page 58 - Auditinf Electronic System
P. 58

System security depends mainly on: operating systems and network and Proper
                                            Data base management
                                                  Auditor role:

          Use audit procedures to Verify the accurate structure of
              1) IT Function,
              2) operating systems
              3) network
              4) Proper Data base management:

              ❑ Obtain and review security policy
              ❑ Verify policy is communicated
              ❑ Review relevant documentation (org. chart, mission statement, key job

                 descriptions) to determine if individuals are performing incompatible tasks.
              ❑ Review systems documentation and maintenance records (using a sample of

                 applications)
              ❑ Verify whether maintenance programmers are not also original design

                 programmers
              ❑ Observe segregation policies in practice
              ❑ Review operations room access log to determine whether programmers enter

                 the facility for reasons other than system failures
              ❑ Review user rights and privileges
              ❑ Review Physical controls over computer centers
              ❑ Review applied Disaster recovery plan employed
              ❑ Test activation of authorization and authentication controls
              o All users are required to have passwords
              o password instructions for new users
              o passwords changed regularly
              o password file to determine that weak passwords are identified and

                 disallowed
              o encryption of password file and the encryption key is properly secured.
              o password standards
              o account lockout policies: The auditor should determine how many failed

                 logon attempts are allowed before the account is locked

              ❑ Test Audit trails control (verify existence of transaction log-Review sample
                 of transactions) review or verify…
                 1. Audit trails have been activated in accordance to the organization policy.
                 2. Archived log files to search for
                     ▪ unauthorized or terminated users
                     ▪ periods of inactivity

                                                                     59

58

           ‫جميع الحقوق محفوظة ـ الإعتداء على حق المؤلف بالنسخ أو الطباعة يعرض فاعله للمسائلة القانونية‬
   53   54   55   56   57   58   59   60   61   62   63