_____ concerns the completeness, validity, accuracy, timeliness, and authorization of system process.
Processing integrity
An organization implements an integrated package of authentication controls related to its critical systems. This is an example of:
Defense in depth.
_____ concerns whether the system is operational and usable as specified in commitments and agreements.
Availability
According to the AICPA ASEC, the requirement of notice related to privacy states:
Individuals must be told about privacy policies including why information is collected, used, retained, and disclosed.
The AICPA Assurance Services Executive Committee (ASEC) principles and criteria can be used to evaluate:
(1) the controls of a system and (2) the confidentiality and privacy of the information processed by the system.
ASEC specifies five trust services principles:
Time-based model of controls
P>D+C, so time it takes intruder to break through should be more than time to defect and correct attack for system to be effective
Defense in depth
The strategy of implementing multiple layers of controls to avoid having a single point of failure. Combination of firewalls, passwords, etc.
IT detective controls include:
IT corrective controls include:
Assessments of cyber risk impact:
Should assess the likelihood and severity of impacts and should be led by senior management in consultation with business and IT stakeholders.
Managing cyber risks requires:
Attempting to prevent cyber breaching but addressing those that occur through detective and corrective controls.
Principle 6—The organization specifies objectives with sufficient clarity to enable the identification and assessment of risks relating to objectives.
Unless management understands which systems are critical to organizational objectives and which are not, it will underallocate scarce resources to mission-critical systems and overallocate resources to unimportant systems.
Principle 7—The organization identifies risks to the achievement of its objectives across the entity and analyzes risks in order to determine how the risks should be managed.
Principle 8—The organization considers the potential for fraud in assessing risks to the achievement of objectives.
led by senior management, in collaboration with business and IT stakeholders
Principle 9—The organization identifies and assesses changes that could significantly impact the system of internal control.
Rapidly changing technologies and cyber-criminals’ quick adaption to these changes yields new methods of exploiting system vulnerabilities
Principle 10—The organization selects and develops control activities that contribute to the mitigation of risks to the achievement of objectives to acceptable levels.
Principle 11—The organization selects and develops general control activities over technology to support the achievement of objectives.
Principle 12—The organization deploys control activities through policies that establish what is expected and procedures that put policies into action.
Preventive, detective, and corrective controls are all essential to addressing cyber risks. Well-designed preventive controls may stop attacks from being realized by keeping intruders outside of the organization’s internal IT environment and keeping the information systems secure.
Principle 13—The organization obtains or generates and uses relevant, quality information to support the functioning of internal control.
Control system data must be transformed into actionable, high-quality information that informs and communicates about the effectiveness of cyber-related controls.
Principle 14—The organization internally communicates information, including objectives and responsibilities for internal control, necessary to support the functioning of internal control.
Communication about cyber risks should include all personnel, personnel responsible for managing and monitoring cyber risks and controls, and the board of directors.
The need for a cybersecurity framework
The goals of the framework included creating a common language for understanding, and cost-effective means for managing, organizational cybersecurity risks without imposing regulations.
The need for a cybersecurity framework
The goals of the framework included creating a common language for understanding, and cost-effective means for managing, organizational cybersecurity risks without imposing regulations. Consists of 3 parts: the core, the profile, the implementation tiers.
Core elements of cybersecurity framework:
Complete the missing words in the following sentence: ____ are actions that implement _____.
Procedures, policies
All polities, including IT policies should:
Important IT policies: