About | HeinOnline Law Journal Library | HeinOnline Law Journal Library | HeinOnline

129024 1 (1986-01-01)

handle is hein.gao/gaobacvtu0001 and id is 1 raw text is: 

r.


I


The use of micros in business is increasing at an
astounding rate as managers, clerks, and office
workers enter the information age. Many tasks
that were considered too small to automate on the
company mainframe are now done with micros.
But with computing power at everyone's finger-
tips, auditors and management must deal with the
risks and exposures of micro use.


            he security problems involved
            with micros are many, but man-
            agement has audit methods and
            tools available to solve them. The
            first step is to identiy audit prob-
lems, after which auditors and management
must  implement   the necessary  counter-
measures

Audit  problems with micros
   Micros are vulnerable to risks of three major
types:
   * Physical security of hardware
   * Physical security of data and software
   * Data integrity
To establish a secure micro environment, plan-
ners must address each of these problem types
with the appropriate strategies and equipment.


Physical security of hardware
   Although micros pose unique hardware se-
cunty problems, their solutions are relatively
simple, requiring little more than good business
sense.

   Theft. Micros represent a large investment
in small, often portable, packages that are easy


to steal. Modular design adds further risks; for
example. a half-height disk drive module can
be hidden in a bnefcase. Many micros have re-
movable circuit cards and memory clips that
could disappear just as easily. Employees may
steal micro components because they have sim-
ilar computers at home and want compatible
equipment.


      With   computing   power   at
    everyone's  fingertips, auditors
  and  management must deal with
  the  risks and  exposures   of micro
                   use.


   A micro used at a single workstation can be
secured to the workstation or locked in a cabi-
net specifically designed to house a micro Also
available are rolling, lockable cabinets that al-
low the unit to be used in different areas Al-
though  these measures do not eliminate the
possibility of theft. they do reduce ask. A small
investment in theft deterrence often provides
adequate protection

   Damage.   Portable micros must be moni-
tored closely because they are most often used
away  from the office Users of such equipment
should be instructed in its proper care Prob-
lems can stem from heat, vibration, or shock.
heat damage, for example, can occur if a micro
is stored in the trunk of a car on a hot day.
   Some computers have a routine that must be
 followed before they can be relocated. This rou-


O)_-L    A4D       2?       K  Winter 1986  49


                                                             129024




Microcomputer Security: Audit

         Problems and Solutions



                    Frederick Gallegos and Daniel Basica

What Is HeinOnline?

HeinOnline is a subscription-based resource containing thousands of academic and legal journals from inception; complete coverage of government documents such as U.S. Statutes at Large, U.S. Code, Federal Register, Code of Federal Regulations, U.S. Reports, and much more. Documents are image-based, fully searchable PDFs with the authority of print combined with the accessibility of a user-friendly and powerful database. For more information, request a quote or trial for your organization below.



Contact us for annual subscription options:

Already a HeinOnline Subscriber?

profiles profiles most