Page 139 - DCOM509_ADVANCED_AUDITING
P. 139

Advanced Auditing




                    Notes             Delivery and Support:  This domain is concerned with the  actual delivery of required
                                       services, which range from traditional operations over security and continuity aspects to
                                       training. In order to deliver services, the necessary support processes must be set up. This
                                       domain includes the  actual processing of data by application systems, often classified
                                       under application controls. This domain contains 13 processes divided into 126 control
                                       objectives.

                                      Monitoring: All IT processes need to be regularly assessed over time for their quality and
                                       compliance with control requirements. This domain thus addresses management’s oversight
                                       of the organization’s control process and independent assurance provided by internal and
                                       external audit or obtained from alternative sources.  This domain contains 4 processes
                                       divided into 24 control objectives.

                                   Here, it may be important to mention that the CobiT principles lay down the control objectives
                                   and are independent of the level of the technology or software.


                                          Example: Under Acquisition and Implementation domain, one of the processes is Acquire
                                   and Maintain Application Software, within which under Application Software Testing, CobiT
                                   has to say that, “Unit testing, application testing, integration testing, system testing and load
                                   and stress testing should be performed according to the project test plan and established testing
                                   standards before it is approved by the user. Adequate measures should be conducted to prevent
                                   disclosure of sensitive information used during testing.”

                                   8.3.1 Operating System Controls


                                   Operating System is an interface between user and computer. It manages memory, devices,
                                   peripherals and various tasks; controls computer’s resources  and provides base for writing
                                   application programmes. The operating systems fall into categories of single user and multi-
                                   user (network) environment. The most common type of single user operating system is DOS
                                   (Disk Operating System). This also forms the base of some other single user operating systems
                                   such as Windows 95/98. Those, who have worked on Windows 95/98 operating systems, might
                                   have noticed that before this operating system boot, certain DOS commands are run. Actually
                                   these operating systems are based on DOS. However, Windows 2000 is independent of DOS. The
                                   only security available in DOS is the boot level password, which can be set up by the owner. It
                                   may appear that once a boot level password is set up for the system it may not allow one to boot,
                                   but the fact is that just by opening the CPU and replacing the battery will remove the boot level
                                   password. As such, no security is available with boot level password.
                                   Multi-user operating systems have better security features. Novell Netware, which generally
                                   works on client server  architect, provides security at Net-user level as well  as for  accessing
                                   database. In this operating system, one can create new users, manage rights to different users,
                                   create drive mappings and assign rights to file system / directories (S: Supervisory rights; R:
                                   Read right; W: write right; C: create right; E: erase right; M: modify right; F: File scan and A:
                                   Access control).



                                     Did u know?  One needs a server console and to login as supervisor from server console, no
                                     password is required? Hence, one has to have physical controls to server room access in
                                     Novell Netware system.
                                   The UNIX operating system, which is generally used for server cantered processing, requires
                                   the password for booting. UNIX divides the universe of users into three categories i.e. user,




          134                               LOVELY PROFESSIONAL UNIVERSITY
   134   135   136   137   138   139   140   141   142   143   144