Page 10 - DCAP516_COMPUTER_SECURITY
P. 10

Computer Security




                    Notes              Depending on the size of the organization, the program may be large or small, even a
                                       collateral duty of another management official. However, even small organizations can
                                       prepare a document that states organization policy and makes explicit computer security
                                       responsibilities. This element does not specify that individual accountability must be
                                       provided for on all systems. For example, many information dissemination systems do
                                       not require user identification and, therefore, cannot hold users accountable.

                                   1.3 Threats to Computer Security


                                   Computer systems are vulnerable to many threats that can inflict various types of damage
                                   resulting in significant losses. This damage can range from errors harming database integrity to
                                   fires destroying entire computer centers. Losses can stem, for example, from the actions of
                                   supposedly trusted employees defrauding a system, from outside hackers, or from careless data
                                   entry clerks. Precision in estimating computer security-related losses is not possible because
                                   many losses are never discovered, and others are “swept under the carpet” to avoid unfavorable
                                   publicity. The effects of various threats varies considerably: some affect the confidentiality or
                                   integrity of data while others affect the availability of a system.

                                   1.3.1 Errors and Omissions

                                   Errors and omissions are an important threat to data and system integrity. These errors are
                                   caused not only by data entry clerks processing hundreds of transactions per day, but also by all
                                   types of users who create and edit data. Many programs, especially those designed by users for
                                   personal computers, lack quality control measures. However, even the most sophisticated
                                   programs cannot detect all types of input errors or omissions. A sound awareness and training
                                   program can help an organization reduce the number and severity of errors and omissions.
                                   Users, data entry clerks, system operators, and programmers frequently make errors that
                                   contribute directly or indirectly to security problems. In some cases, the error is the threat, such
                                   as a data entry error or a programming error that crashes a system. In other cases, the errors
                                   create vulnerabilities. Errors can occur during all phases of the systems life cycle. A long-term
                                   survey of computer-related economic losses conducted by Robert Courtney, a computer security
                                   consultant and former member of the Computer System Security and Privacy Advisory Board,
                                   found that 65 percent of losses to organizations were the result of errors and omissions. This
                                   figure was relatively consistent between both private and public sector organizations.
                                   1.3.2 Fraud and Theft


                                   Computer systems can be exploited for both fraud and theft both by “automating” traditional
                                   methods of fraud and by using new methods. For example, individuals may use a computer to
                                   skim small amounts of money from a large number of financial accounts, assuming that small
                                   discrepancies may not be investigated. Financial systems are not the only ones at risk. Systems
                                   that control access to any resource are targets (e.g., time and attendance systems, inventory
                                   systems, school grading systems, and long-distance telephone systems). In addition to the use of
                                   technology to commit fraud and theft, computer hardware and software may be vulnerable to
                                   theft.

                                   1.3.3 Loss of Physical and Infrastructure Support

                                   The loss of supporting infrastructure includes power failures (outages, spikes, and brownouts),
                                   loss of communications, water outages and leaks, sewer problems, lack of transportation services,
                                   fire, flood, civil unrest, and strikes. These losses include such dramatic events as the explosion at





          4                                 LOVELY PROFESSIONAL UNIVERSITY
   5   6   7   8   9   10   11   12   13   14   15