SlideShare uma empresa Scribd logo
1 de 51
7 Chapter   Securing Information Systems
STUDENT LEARNING OBJECTIVES Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Online Games Need Security, Too Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],Online Games Need Security, Too Essentials of Business Information Systems Chapter 7 Securing Information Systems
Online Games Need Security, Too Essentials of Business Information Systems Chapter 7 Securing Information Systems
System Vulnerability and Abuse ,[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Why Systems Are Vulnerable ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Contemporary Security Challenges and Vulnerabilities Figure 7-1 The architecture of a Web-based application typically includes a Web client, a server, and corporate information systems linked to databases. Each of these components presents security challenges and vulnerabilities. Floods, fires, power failures, and other electrical problems can cause disruptions at any point in the network. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Wi-Fi Security Challenges Figure 7-2 Many Wi-Fi networks can be penetrated easily by intruders using sniffer programs to obtain an address to access the resources of a network without authorization. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Malicious Software: Viruses, Worms, Trojan Horses, and Spyware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Malicious Software: Viruses, Worms, Trojan Horses, and Spyware ,[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems Malware is active throughout the globe. These three charts show the regional distribution of worms and computer viruses worldwide reported by Trend Micro over periods of 24 hours, 7 days, and 30 days. The virus count represents the number of infected files and the percentage shows the relative prevalence in each region compared to worldwide statistics for each measuring period.
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Interactive Session: Technology Bot Armies Launch a Digital Data Siege System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Internal Threats: Employees ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Software Vulnerability System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Business Value of Security and Control Essentials of Business Information Systems Chapter 7 Securing Information Systems
Legal and Regulatory Requirements for Electronic Records Management Business Value of Security and Control Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object]
Electronic Evidence and Computer Forensics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Business Value of Security and Control Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems EXPOSURE PROBABILITY LOSS RANGE EXPECTED ANNUAL LOSS Power failure 30% $5K - $200K $30,750 Embezzlement 5% $1K - $50K $1,275 User error 98% $200 - $40K $19,698
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Security Profiles for a Personnel System Figure 7-3 These two examples represent two security profiles or data security patterns that might be found in a personnel system. Depending on the security profile, a user would have certain restrictions on access to various systems, locations, or data in an organization. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],Disaster Recovery Planning and Business Continuity Planning
Establishing a Framework for Security and Control Essentials of Business Information Systems Chapter 7 Securing Information Systems The Role of Auditing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Auditor’s List of Control Weaknesses Figure 7-4 This chart is a sample page from a list of control weaknesses that an auditor might find in a loan system in a local commercial bank. This form helps auditors record and evaluate control weaknesses and shows the results of discussing those weaknesses with management, as well as any corrective actions taken by management. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Access Control Technologies and Tools for Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems This NEC PC has a biometric fingerprint reader for fast yet secure access to files and networks. New models of PCs are starting to use biometric identification to authenticate users.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Firewalls, Intrusion Detection Systems, and Antivirus Software Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
A Corporate Firewall Figure 7-5 The firewall is placed between the firm’s private network and the public Internet or another distrusted network to protect against unauthorized traffic. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Firewalls, Intrusion Detection Systems, and Antivirus Software Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Securing Wireless Networks Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],Encryption and Public Key Infrastructure Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Encryption and Public Key Infrastructure Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
Public Key Encryption Figure 7-6 A public key encryption system can be viewed as a series of public and private keys that lock data when they are transmitted and unlock the data when they are received. The sender locates the recipient’s public key in a directory and uses it to encrypt a message. The message is sent in encrypted form over the Internet or a private network. When the encrypted message arrives, the recipient uses his or her private key to decrypt the data and read the message. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Encryption and Public Key Infrastructure Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
Digital Certificates Figure 7-7 Digital certificates help establish the identity of people or electronic assets. They protect online transactions by providing secure, encrypted, online communication. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ensuring System Availability Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ensuring System Availability Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ensuring Software Quality Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
Interactive Session: Organizations Can Salesforce.com On-Demand Remain in Demand? ,[object Object],[object Object],[object Object],[object Object],[object Object],Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems

Mais conteúdo relacionado

Mais procurados

InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
learnt
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
mlw32785
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
Ali Habeeb
 

Mais procurados (20)

InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Laudon mis14 ch01
Laudon mis14 ch01Laudon mis14 ch01
Laudon mis14 ch01
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Information security
Information securityInformation security
Information security
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and Control
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
It Policies
It PoliciesIt Policies
It Policies
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Information security
Information securityInformation security
Information security
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Security and Control.ppt
Security and Control.pptSecurity and Control.ppt
Security and Control.ppt
 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2
 
Information Systems, Organizations and Strategy - Management Information System
Information Systems, Organizations and Strategy - Management Information SystemInformation Systems, Organizations and Strategy - Management Information System
Information Systems, Organizations and Strategy - Management Information System
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
4. Fundamental MIS Information Systems Presentation
4. Fundamental MIS  Information Systems Presentation4. Fundamental MIS  Information Systems Presentation
4. Fundamental MIS Information Systems Presentation
 

Destaque

8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
Hemant Nagwekar
 
E-commerce: Digital Markets, Digital Goods
E-commerce: Digital Markets, Digital GoodsE-commerce: Digital Markets, Digital Goods
E-commerce: Digital Markets, Digital Goods
linda_perangin
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
Prof. Othman Alsalloum
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
Omid Aminzadeh Gohari
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and Control
Albrecht Jones
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
Prof. Othman Alsalloum
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security control
Cheng Olayvar
 

Destaque (17)

8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
 
E-commerce: Digital Markets, Digital Goods
E-commerce: Digital Markets, Digital GoodsE-commerce: Digital Markets, Digital Goods
E-commerce: Digital Markets, Digital Goods
 
E-commerce, digital markets, and digital goods
E-commerce, digital markets, and digital goodsE-commerce, digital markets, and digital goods
E-commerce, digital markets, and digital goods
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and Control
 
Case study 7
Case study 7Case study 7
Case study 7
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
 
Laudon mis14 ch02
Laudon mis14 ch02Laudon mis14 ch02
Laudon mis14 ch02
 
Introduction to Data Management
Introduction to Data ManagementIntroduction to Data Management
Introduction to Data Management
 
Data Management for Dummies
Data Management for DummiesData Management for Dummies
Data Management for Dummies
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security control
 
3c 2 Information Systems Audit
3c   2   Information Systems Audit3c   2   Information Systems Audit
3c 2 Information Systems Audit
 
Review questions
Review questionsReview questions
Review questions
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
E Business Systems
E Business SystemsE Business Systems
E Business Systems
 

Semelhante a Securing information systems

Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
alinainglis
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
joellemurphey
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
arnoldmeredith47041
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
angelaag98
 

Semelhante a Securing information systems (20)

Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
386sum08ch8
386sum08ch8386sum08ch8
386sum08ch8
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and security
 

Mais de Prof. Othman Alsalloum

Information systemsfromfunctionsprospective
Information systemsfromfunctionsprospectiveInformation systemsfromfunctionsprospective
Information systemsfromfunctionsprospective
Prof. Othman Alsalloum
 
Information systems, organizations, management, and strategy
Information systems, organizations, management, and strategyInformation systems, organizations, management, and strategy
Information systems, organizations, management, and strategy
Prof. Othman Alsalloum
 
Informational needs of organizations in an information society
Informational needs of organizations in an information societyInformational needs of organizations in an information society
Informational needs of organizations in an information society
Prof. Othman Alsalloum
 
E strategy, internet communities, and global ec
E strategy, internet communities, and global ecE strategy, internet communities, and global ec
E strategy, internet communities, and global ec
Prof. Othman Alsalloum
 
Definitions of management information systems
Definitions of management information systemsDefinitions of management information systems
Definitions of management information systems
Prof. Othman Alsalloum
 
Knowledge creation and knowledge architecture
Knowledge creation and knowledge architectureKnowledge creation and knowledge architecture
Knowledge creation and knowledge architecture
Prof. Othman Alsalloum
 

Mais de Prof. Othman Alsalloum (20)

Information systemsfromfunctionsprospective
Information systemsfromfunctionsprospectiveInformation systemsfromfunctionsprospective
Information systemsfromfunctionsprospective
 
Types of information systems
Types of information systemsTypes of information systems
Types of information systems
 
Information systems organization
Information systems organizationInformation systems organization
Information systems organization
 
E business digitalgoods
E business digitalgoodsE business digitalgoods
E business digitalgoods
 
Digital firms admin
Digital firms adminDigital firms admin
Digital firms admin
 
Managing the digital firm
Managing the digital firmManaging the digital firm
Managing the digital firm
 
Information what is it
Information what is itInformation what is it
Information what is it
 
Information systems
Information systemsInformation systems
Information systems
 
Information systems, organizations, management, and strategy
Information systems, organizations, management, and strategyInformation systems, organizations, management, and strategy
Information systems, organizations, management, and strategy
 
Information systems in the enterprise
Information systems in the enterpriseInformation systems in the enterprise
Information systems in the enterprise
 
Understanding knowledge
Understanding knowledgeUnderstanding knowledge
Understanding knowledge
 
Strategic use of information systems
Strategic use of information systemsStrategic use of information systems
Strategic use of information systems
 
Overview of electronic commerce
Overview of  electronic commerceOverview of  electronic commerce
Overview of electronic commerce
 
Informational needs of organizations in an information society
Informational needs of organizations in an information societyInformational needs of organizations in an information society
Informational needs of organizations in an information society
 
E strategy, internet communities, and global ec
E strategy, internet communities, and global ecE strategy, internet communities, and global ec
E strategy, internet communities, and global ec
 
E commerce market mechanisms
E commerce market mechanismsE commerce market mechanisms
E commerce market mechanisms
 
Definitions of management information systems
Definitions of management information systemsDefinitions of management information systems
Definitions of management information systems
 
Data mining knowing the unknown
Data mining knowing the unknownData mining knowing the unknown
Data mining knowing the unknown
 
Knowledge creation and knowledge architecture
Knowledge creation and knowledge architectureKnowledge creation and knowledge architecture
Knowledge creation and knowledge architecture
 
Types of information systems
Types of information systemsTypes of information systems
Types of information systems
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Securing information systems

  • 1. 7 Chapter Securing Information Systems
  • 2.
  • 3.
  • 4.
  • 5. Online Games Need Security, Too Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 6.
  • 7.
  • 8. Contemporary Security Challenges and Vulnerabilities Figure 7-1 The architecture of a Web-based application typically includes a Web client, a server, and corporate information systems linked to databases. Each of these components presents security challenges and vulnerabilities. Floods, fires, power failures, and other electrical problems can cause disruptions at any point in the network. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 9.
  • 10.
  • 11. Wi-Fi Security Challenges Figure 7-2 Many Wi-Fi networks can be penetrated easily by intruders using sniffer programs to obtain an address to access the resources of a network without authorization. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 12.
  • 13.
  • 14. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems Malware is active throughout the globe. These three charts show the regional distribution of worms and computer viruses worldwide reported by Trend Micro over periods of 24 hours, 7 days, and 30 days. The virus count represents the number of infected files and the percentage shows the relative prevalence in each region compared to worldwide statistics for each measuring period.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. Security Profiles for a Personnel System Figure 7-3 These two examples represent two security profiles or data security patterns that might be found in a personnel system. Depending on the security profile, a user would have certain restrictions on access to various systems, locations, or data in an organization. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 34.
  • 35.
  • 36. Sample Auditor’s List of Control Weaknesses Figure 7-4 This chart is a sample page from a list of control weaknesses that an auditor might find in a loan system in a local commercial bank. This form helps auditors record and evaluate control weaknesses and shows the results of discussing those weaknesses with management, as well as any corrective actions taken by management. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 37.
  • 38. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems This NEC PC has a biometric fingerprint reader for fast yet secure access to files and networks. New models of PCs are starting to use biometric identification to authenticate users.
  • 39.
  • 40. A Corporate Firewall Figure 7-5 The firewall is placed between the firm’s private network and the public Internet or another distrusted network to protect against unauthorized traffic. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 41.
  • 42.
  • 43.
  • 44.
  • 45. Public Key Encryption Figure 7-6 A public key encryption system can be viewed as a series of public and private keys that lock data when they are transmitted and unlock the data when they are received. The sender locates the recipient’s public key in a directory and uses it to encrypt a message. The message is sent in encrypted form over the Internet or a private network. When the encrypted message arrives, the recipient uses his or her private key to decrypt the data and read the message. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 46.
  • 47. Digital Certificates Figure 7-7 Digital certificates help establish the identity of people or electronic assets. They protect online transactions by providing secure, encrypted, online communication. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 48.
  • 49.
  • 50.
  • 51.