Page 59 - Demo
P. 59


                                    جميع الحقوق محفوظة ـ اإلعتداء عىل حق املؤلف 59 بالنسخ أو الطباعة يعرض فاعله للمسائلة القانونيةSystem security depends mainly on: operating systems and network and Proper Data base management Auditor role:Use audit procedures to Verify the accurate structure of 1) IT Function,2) operating systems3) network4) Proper Data base management:  Obtain and review security policy  Verify policy is communicated  Review relevant documentation (org. chart, mission statement, key job descriptions) to determine if individuals are performing incompatible tasks.  Review systems documentation and maintenance records (using a sample of applications)  Verify whether maintenance programmers are not also original design programmers  Observe segregation policies in practice  Review operations room access log to determine whether programmers enter the facility for reasons other than system failures Review user rights and privileges  Review Physical controls over computer centers  Review applied Disaster recovery plan employed  Test activation of authorization and authentication controls o All users are required to have passwords o password instructions for new users o passwords changed regularly o password file to determine that weak passwords are identified and disallowed o encryption of password file and the encryption key is properly secured. o password standards o account lockout policies: The auditor should determine how many failed logon attempts are allowed before the account is locked  Test Audit trails control (verify existence of transaction log-Review sample of transactions) review or verify…1. Audit trails have been activated in accordance to the organization policy. 2. Archived log files to search for  unauthorized or terminated users  periods of inactivity 
                                
   53   54   55   56   57   58   59   60   61   62   63