150 likes | 465 Vues
Access Controls. Shelly Aremia Liana Viljoen Kayla Samstag Eric Dowd. What are access controls?. Controls that provide security against internal and external threats 2 Types of access controls: Physical controls Logical controls. Physical Assets that need control:.
E N D
Access Controls Shelly Aremia Liana Viljoen Kayla Samstag Eric Dowd
What are access controls? • Controls that provide security against internal and external threats • 2 Types of access controls: • Physical controls • Logical controls
Physical Assets that need control: • Buildings including their power and security • Technology centers • Telecommunication rooms (switches, hubs, routers) • Customer documentation • Audit files • Inventory
Examples of Physical controls • Biometric devices • Security guards • Locks and keys • Surveillance • Alarm system
Logical Assets • Servers and their operating systems • Network systems • Database systems or file systems • Users Applications • Communication systems • Online Reports • Audit logs
Examples of logical controls • Firewalls • Encryption • Passwords • Authentication system
Aligning risks and control Level of protection Level of Risk
Auditing access controls • Risk assessment • Test of controls • Analysis • Feedback
Issues affecting risks • Size of the system • Complexity • Local vs. Remote • Wireless Technologies • Shared files and databases • Changes to infrastructure
Test of Controls • Penetration tests • Monitor controls • Review controls
Risk monitoring tactics • Number of external intrusion attempts • Number of internal unauthorized attempts • Number of security incidents caused by unauthorized access • Number of entitlement reviews not in compliance
Works Cited • www.questbiometrics.com, 2005. “Biometrics solutions; Classification of Biometric Technologies based on physical traits.” • Participating with Safety Briefing no. 3 “Passwords & Access Controls”, March 2002. Paul Mobbs, Association forProgressive Communications. • Access Controls, www.wikipedia.org • Singleton, Tommie W. “What every IT Auditor should know about Access Controls. Information systems Control Journal. Volume 4. 2008 • Muthukrishan Ravi. G38 Access Controls ISACA. www.isaca.org. February 1, 2008.