|
|||||
VU
Information
System (CS507)
Audit
trails and logs
An
audit trail is a logical record of
computer activities/usage/processing pertaining to an
operating
or application
system or user activities. An information
system may have several
audit trails, each
devoted to a
particular type of activity.
All these audit trails are
primarily extracted from the
audit
log
recorded on chronological basis.
The audit log is maintained
only for the list of
activities
specified
for which the log is to be
maintained. The information can be
recorded varies
including
but
not limited to
1.
Time stamp for the log in/out
time
2.
Terminal in use
3.
Files accessed
4.
Transactions performed
5.
Amendments made
Audit
trails can provide a means to
help accomplish several security-related objectives,
including
individual
accountability, reconstruction of events
(actions that happen on a computer
system),
intrusion
detection, and problem analysis, as
well as evidence of the
correct processing
regimes
within
a system
There
are typically two kinds of
audit records:
(1)
An event-oriented log ----
this usually contain records
describing system events,
application
events,
or user events. An audit
trail should include
sufficient information to establish
what events
occurred
and who (or what)
caused them.
(2)
A record of every keystroke----
often
called keystroke monitoring. Keystroke
monitoring is
the
process used to view or record
both the keystrokes entered
by a computer user and
the
computer's
response during an interactive
session. Keystroke monitoring is
usually considered a
special
case of audit trails.
35.1
Documentation
Audit
trails and logs are a form
of documentation which helps in reviewing
various activities
undertaken
by various users. Any alterations and
modifications made in the
documentation should
be
logged as well for
monitoring the integrity.
Documentation may include program
code of
application
softwares, technical manuals, user
manuals and any other
system-related
documentation.
This would help to see that
data is not modified on the
instructions of the
users.
Log of
all amendments should be supported by
proper authorization by responsible
officers.
Accountability
through audit trails
Audit
trails are technical mechanism that
helps managers maintains individual
accountability.
Users
can be identified by the log
being maintained. Users are
informed of what the
password
allows
them to do and why it should
be kept secure and
confidential. Audit trails help to
provide
variants
from normal behavior which
may lead to unauthorized
usage of resources. For
example
· Audit
trails can be used together
with access controls to
identify and provide
information
about users suspected of
improper modification of data
(e.g., introducing
errors
into a database).
· An
audit trail may record
"before" and "after" images,
also called snapshots of
records.
149
VU
Information
System (CS507)
This
helps in audit evaluation
work.
35.2
Audit trails and types
of errors
Audit
trail analysis can often
distinguish between operator-induced errors (during
which the system
may
have performed exactly as instructed) or
system-created errors (e.g., arising
from a poorly
tested
piece of replacement code).
For Example a system fails or
the integrity of a file
(either
program or
data) is questioned, an analysis of the
audit trail can reconstruct
the series of steps
taken by
the system, the users,
and the application. Knowledge of
the conditions that existed
at the
time
of, for example, a system
crash, can be useful in avoiding
future mishaps.
Intrusion
detection
Intrusion
detection refers to the process of
identifying attempts to penetrate a
system and gain
unauthorized
access. If audit trails have
been designed and
implemented to record appropriate
information,
they can assist in intrusion
detection. Intrusion detection system can
be made part of
the
regular security system to effectively
detect intrusion. Real time
intrusion detection is technical
and
complex to achieve but
reasonable extent can be
attained. Real-time intrusion detection
is
primarily
aimed at outsiders attempting to
gain unauthorized access to
the system.
Variance
detection and audit
trails
Trends/variance-detection
tools look for anomalies in
user or system behavior. It is
possible to
monitor
usage trends and detect
major variations. The log
can be detected and analyzed
to detect
the
irregularity. For example, if a
user typically logs in at 9
a.m., but appears at 4:30
a.m. one
morning,
this may indicate either a
security problem or a malfunctioning of
the system clock,
that
may
need to be investigated. The
log can be sorted/filtered
for all log ins befor 9
a.m. from that
particular
terminal.
Audit
trails and logs have
significant importance in conducting
audit of information system in
a
computerized
environment. Where computer equipment
becomes a major component
of
information
management, auditing through
the computer gets more
delicate and sensitive.
Audit
trail
and logs help in auditing
through the computer as
against auditing around the
computer.
35.3
Definition of Audit
In
accounting and finance terms, audit is a
process which includes an examination of
records or
financial
accounts to check their accuracy, an
adjustment or correction of accounts an
examined
and
verified account. However the concept is
a bit different in case of
information systems. An
examination
of systems, programming and
datacenter procedures in order to
determine the
efficiency
of computer operations.
35.4
IS audit
Information
systems include accounting
and finance function as a critical
part of the entire
system.
Hence,
these days audit of
information systems as whole
incisively focuses on finance
and
accounting
aspect as well. For example,
all banks and financial
institutions have soft
wares
supporting
interest computations. During the
audit of IS, the integrity
of the source
code/program
instructions
have to be checked and
assurance obtained that these
have not been tampered
with or
altered
in any manner.
An
information technology (IT)
audit or information systems
(IS) audit is an examination of
the
controls
within an entity's Information
technology infrastructure. When
transactions are
150
VU
Information
System (CS507)
executed
and recorded through computers,
the lack of physical audit
trail requires
implementation
of controls with the
Information systems so as to give
the same result as
controls
are implemented in a manual
information system IS audit
focuses more on examining
the
integrity of controls and ensuring
whether they are properly
working. Obtained
evidence
evaluation
can ensure whether the
organization's information systems
safeguard assets,
maintains
data integrity, and is operating
effectively and efficiently to
achieve the organization's
goals
or objectives.
35.5
Parameters of IS audit
Regarding
Protection-of-Information-Assets, one purpose of an IT
audit is to review and
evaluate
an organization's
information system's availability,
confidentiality, and integrity by
answering
questions
such as:
1.
Will the organization's computer
systems be available for the
business at all times
when
required?
(Availability)
2.
Will the information in the
systems be disclosed only to
authorize users?
(Confidentiality)
3.
Will the information
provided by the system
always be accurate, reliable,
and timely?
(Integrity)
4.
Besides, the availability,
confidentiality and integrity of
information systems receiving IT
auditor
consideration; it has been suggested by
other authors that
information system
utility,
possession and authenticity
also be considered by answering
questions such as:
5.
Will the organization's computer
system provide useful
information when
required?
(Utility)
6.
Will the physical aspects of
the organization's computer systems be
protected from the
threat
of theft? (Possession)
7.
Will the information
provided by the system
always be genuine, original
without
unauthorized
change? (Authenticity)
35.6
Risk Based Audit
Approach
This
approach to audit proceeds
with following steps
1.
Understanding the business
process
2.
Understanding the control
structure built in the
system
3.
Understanding of inherent risks
(risks which are covered
through instituting)
controls,
which
can occur in the absence of
controls e.g.
· Political
legal factors affecting the
business,
· Nature
of industry the organization
exists
4.
Risk assessment
5. Categorization
of risks identified
As in
the case of other audits, an
IS audit can also be streamlined
based on this approach.
The
purpose of ensuring
a high level of IS security and
conducting effective IS audit,
presupposes
risk
assessment which helps in implementation
of security policy. Risk management is
the core
line
of this entire IT/IS audit. It is a very
important concept, now we would
discuss this
concept in
detail.
151
Table of Contents:
|
|||||