Page 342 -
P. 342

Chapter 8 Securing Information Systems 341


               TABLE 8.4  GENERAL CONTROLS

                TYPE OF GENERAL CONTROL   DESCRIPTION
                Software controls         Monitor the use of system software and prevent unauthorized access of software programs, system
                                          software, and computer programs.
                Hardware controls         Ensure that computer hardware is physically secure, and check for equipment malfunction. Organizations
                                          that are critically dependent on their computers also must make provisions for backup or continued
                                          operation to maintain constant service.
                Computer operations controls  Oversee the work of the computer department to ensure that programmed procedures are consistently
                                          and correctly applied to the storage and processing of data. They include controls over the setup of
                                          computer processing jobs and backup and recovery procedures for processing that ends abnormally.
                Data security controls    Ensure that valuable business data files on either disk or tape are not subject to unauthorized access,
                                          change, or destruction while they are in use or in storage.
                Implementation controls   Audit the systems development process at various points to ensure that the process is properly controlled
                                          and managed.
                Administrative controls   Formalize standards, rules, procedures, and control disciplines to ensure that the organization’s general
                                          and application controls are properly executed and enforced.




               You can find more detail about application and general controls in our Learning
               Tracks.


               RISK ASSESSMENT
               Before your company commits resources to security and information systems
               controls, it must know which assets require protection and the extent to which
               these assets are vulnerable. A risk assessment helps answer these questions
               and determine the most cost-effective set of controls for protecting assets.
                  A risk assessment determines the level of risk to the firm if a specific
                 activity or process is not properly controlled. Not all risks can be anticipated
               and  measured, but most businesses will be able to acquire some understand-
               ing of the risks they face. Business managers working with information
                 systems  specialists should try to determine the value of information assets,
               points of vulnerability, the likely frequency of a problem, and the potential
               for  damage. For example, if an event is likely to occur no more than once a
               year, with a  maximum of a $1,000 loss to the organization, it is not wise to
               spend $20,000 on the design and maintenance of a control to protect against
               that event. However, if that same event could occur at least once a day, with a
               potential loss of more than $300,000 a year, $100,000 spent on a control might
               be entirely appropriate.
                  Table 8.5 illustrates sample results of a risk assessment for an online order
               processing system that processes 30,000 orders per day. The likelihood of each
               exposure occurring over a one-year period is expressed as a percentage. The
               next column shows the highest and lowest possible loss that could be expected
               each time the exposure occurred and an average loss calculated by adding the
               highest and lowest figures together and dividing by two. The expected annual
               loss for each exposure can be determined by multiplying the average loss by its
               probability of occurrence.
                  This risk assessment shows that the probability of a power failure occurring in
               a  one-year period is 30 percent. Loss of order transactions while power is down
               could range from $5,000 to $200,000 (averaging $102,500) for each occurrence,







   MIS_13_Ch_08 Global.indd   341                                                                             1/17/2013   3:10:20 PM
   337   338   339   340   341   342   343   344   345   346   347