Sie sind auf Seite 1von 15

5.4.

Controlling and Auditing


data Management Systems
Controlling Database Management Systems
Access Controls Backup Controls

Ensure that in the event of


Designed to prevent
data loss due to unauthorized
unauthorized individuals from
access, equipment failure, or
viewing, retrieving,
physical disaster, the
corrupting, or destroying the
organization can recover its
entity’s data
files and databases

User View, Data authorization


database backup, transaction
table, User-defined
log, checkpoint feature,
Procedures, Data encryption,
recovery module
Biometric Devices
User View or Subschema • is a subset of the total database
that defines the user’s data
domain and restricts his or her
access to the database
accordingly.
• The database administrator
typically is responsible for
defining user views.
Database Authorization Table
• contains rules that limit the
actions a user can take. Each
user is granted certain privileges
that are coded in the authority
table, which is used to verify the
user’s action requests.
User defined procedures
• allows the user to create a
personal security program or
routine to provide more
positive user identification
than a password can.
Data Encryption
• uses an algorithm to scramble selected data, thus making it
unreadable to an intruder browsing the database.
Biometric Devices
• which measure various
personal characteristics
such as fingerprints,
voiceprints, retina prints, or
signature characteristics.
These user characteristics
are digitized and stored
permanently in a database
security file or on an
identification card that the
user carries
Audit Objectives
1. to verify that individuals who are authorized to use the database
are limited to accessing only the data needed to perform their
duties
2. that unauthorized individuals are denied access to the database.
Audit Procedures
• RESPONSIBILITY FOR AUTHORITY TABLES AND SUBSCHEMAS.
• APPROPRIATE ACCESS AUTHORITY. The auditor can select a sample of
users and verify that their access privileges stored in the authority
table are consistent with their organizational functions.
• BIOMETRIC CONTROLS. The auditor should evaluate the costs and
benefits of biometric controls. Generally, these would be most
appropriate when a very limited number of users may access highly
sensitive data.
• ENCRYPTION CONTROLS. The auditor should verify that sensitive
data, such as passwords, are properly encrypted. This can be done by
printing the file contents to hard copy.
Database Backup
• makes a periodic backup of the entire database. This is an automatic
procedure that should be performed at least once a day. The backup
copy should then be stored in a secure remote area.
Transaction Log (Journal)
• provides an audit trail of all processed transactions. It lists
transactions in a transaction log file and records the resulting changes
to the database in a separate database change log.
Checkpoint Feature
• suspends all data processing while the system reconciles the
transaction log and the database change log against the database.
Recovery Module
• uses the logs and backup files to restart the system after a failure.
Audit Objectives
• to verify that database backup controls are adequate to facilitate the
recovery of lost, destroyed, or corrupted data.

Audit Procedures
Database backup should be a routine activity.
• The auditor should verify from system documentation that
production databases are copied at regular intervals (perhaps several
times an hour).
• The auditor should verify through documentation and observation
that backup copies of the database are stored off-site to support
disaster recovery procedures.
• http://www.engineering-bachelors-degree.com/business-
information-management/uncategorized/it-controls-part-iisecurity-
and-accesscontrolling-database-management-systems/

Das könnte Ihnen auch gefallen