Page 345 -
P. 345

344 Part Two  Information Technology Infrastructure


                                   devises plans for the restoration of computing and communications services
                                   after they have been disrupted. Disaster recovery plans focus primarily on
                                   the technical issues involved in keeping systems up and running, such as
                                   which files to back up and the maintenance of backup computer systems or
                                   disaster recovery  services.
                                     For example, MasterCard maintains a duplicate computer center in Kansas
                                   City, Missouri, to serve as an emergency backup to its primary computer center
                                   in St. Louis. Rather than build their own backup facilities, many firms  contract
                                   with disaster  recovery firms, such as Comdisco Disaster Recovery Services in
                                   Rosemont, Illinois, and SunGard Availability Services, headquartered in Wayne,
                                   Pennsylvania. These disaster recovery firms provide hot sites  housing spare
                                   computers at locations around the country where  subscribing firms can run their
                                   critical applications in an emergency. For example, Champion Technologies,
                                   which supplies chemicals used in oil and gas operations, is able to switch its
                                   enterprise systems from Houston to a SunGard hot site in Scottsdale, Arizona,
                                   in two hours.
                                     Business continuity planning focuses on how the company can restore
                                     business operations after a disaster strikes. The business continuity plan
                                     identifies critical  business processes and determines action plans for  handling
                                   mission-critical functions if systems go down. For example, Deutsche Bank,
                                   which provides investment banking and asset management services in 74
                                     different countries, has a well-developed business continuity plan that it
                                     continually updates and refines. It maintains full-time teams in Singapore,
                                   Hong Kong, Japan, India, and Australia to coordinate plans addressing loss of
                                   facilities, personnel, or critical systems so that the company can continue to
                                   operate when a catastrophic event occurs. Deutsche Bank’s plan distinguishes
                                   between processes critical for business  survival and those critical to crisis
                                     support and is coordinated with the company’s disaster recovery planning for
                                   its computer centers.
                                     Business managers and information technology specialists need to work
                                   together on both types of plans to determine which systems and business
                                     processes are most critical to the company. They must conduct a business
                                   impact analysis to identify the firm’s most  critical systems and the impact a
                                     systems outage would have on the business. Management must determine the
                                   maximum amount of time the business can survive with its systems down and
                                   which parts of the business must be restored first.


                                   THE ROLE OF AUDITING

                                   How does management know that information systems security and controls
                                   are  effective? To answer this question, organizations must conduct comprehen-
                                   sive and systematic audits. An MIS audit examines the firm’s overall security
                                   environment as well as controls  governing individual information systems. The
                                   auditor should trace the flow of sample transactions through the system and
                                   perform tests, using, if appropriate, automated audit software. The MIS audit
                                   may also examine data quality.
                                     Security audits review technologies, procedures, documentation, training,
                                   and  personnel. A thorough audit will even simulate an attack or disaster to
                                   test the response of the  technology, information systems staff, and business
                                   employees.
                                     The audit lists and ranks all control weaknesses and estimates the probabil-
                                   ity of their occurrence. It then assesses the financial and organizational impact








   MIS_13_Ch_08 Global.indd   344                                                                             1/17/2013   3:10:21 PM
   340   341   342   343   344   345   346   347   348   349   350