SlideShare uma empresa Scribd logo
1 de 17
SECURITY AND CONTROL IN
 INFORMATION SYSTEMS
• Security concepts covers a wide array of activities,
   includes products and processes to prevent
   unauthorized access, modification and deletion of
   information knowledge, data and facts.
• Information Systems Concerns:
1. Unintentional threats
      • Human error – in design or use of system
      • Environmental hazards – acts of God and other
      • Computer system failures – faulty products

2. Intentional threats
      • Systems are subject to a wide variety of hazards from criminal
        attacks
GOALS OF INFORMATION SECURITY
1) Prevention
• Prevent computer or information violations from occurring.
   - Simple incidents are losing a password, or leaving a terminal
   logged on overnight
2) Detection
• Detection includes identifying the assets under attack, how it
   occurred and by whom.
3) Response
• Refers to developing strategies and techniques to deal with
   an attack or loss.
RISK TO IS : 1. Risk to Application and Data
a) Computer crime
• The unauthorized use, access, modification, and destruction of hardware,
    software, data, or network resources.
• The unauthorized release of information
• The unauthorized copying of software
• Denying an end user access to his or her own hardware, software, data, or
    network resources

b) Hacking
• Hacking is the obsessive use of computers, or the unauthorized access and use
    of networked computer systems.
• Illegal hackers (also called crackers) frequently assault the Internet and other
    networks to steal or damage data and programs.
• Hackers can monitor e-mail, web server access, or file transfers to extract
    passwords or steal network files, or to plant data that will cause a system to
    welcome intruders.
• Use remote services that allow one computer on a network to execute programs
    on another computer to gain privileged access within a network.
RISK TO IS : 1. Risk to Application and Data

c) Cyber-Theft
- Many computer crimes involve the theft of money.
- Involve unauthorized network entry and fraudulent alternation of
    computer databases to cover the tracks of the employees involved.

d) Unauthorized Use at Work
- This may range from doing private consulting or personal finances, or
   playing video games to unauthorized use of the Internet on company
   networks.

e) Software Piracy
- Unauthorized copying of software or software piracy is a major form of
    software theft because software is intellectual property, which is
    protected by copyright law and user licensing agreements.
RISK TO IS : 1. Risk to Application and Data

f) Piracy of Intellectual Property
• Software is not the only intellectual property subject to
    computer-based piracy. Other forms of copyrighted material,
    such as music, videos, images, articles, books, and other
    written works.

g) Computer Viruses and Worms
• Virus - is a program code that cannot work without being
   inserted into another program. Worm - is a distinct program
   that can run unaided. They typically enter a computer system
   through illegal or borrowed copies of software or through
   network links to other computer systems.
RISK TO IS : 1. Risk to Hardware
a) Natural Disaster
• Disasters that pose a risk to IS include fires, floods,
   hurricanes, which can destroy hardware, software and can
   causing total @ partial paralysis of systems @
   communications lines.

b) Blackout & Brownout
• Blackout – loses of electrical power.
• Brownout – the voltage of power decreases @ short
   interruptions in the flow of power.
• Vandalism - occur when human beings deliberately destroy
   computer systems.
Major Types of Defense Strategies
1. Encryption
       Encryption characteristics include:
•      Passwords, messages, files, and other data can be transmitted in scrambled form and
       unscrambled by computer systems for authorized users only.
•      Encryption involves using special mathematical algorithms, or keys, to transform digital
       data into a scrambled code before they are transmitted, and to decode the data when they
       are received.

2. Authentication
•     Authentication is a critical part of a security system. It is part of the process referred to as
      Identification and authentication (I&A). Identification process starts when a user ID or
      Logon name is typed into a sign on screen. Authentication methods are based on one or
      more of three factors.
      1) password or PIN.
      2) smart card or an identification device.
      3) fingerprints or retinal pattern.
Major Types of Defense Strategies
3. Firewalls
• Firewall computers and software is another important method for control
    and security on the Internet and other networks. A network firewall can
    be a communications processor, typically a router, or a dedicated server,
    along with firewall software.

4. E-Mail Monitoring
• Internet and other online e-mail systems are one of the favourite avenues
    of attack by hackers for spreading computer viruses or breaking into
    networked computers.

5. Virus Defenses (Antivirus Software)
• Antivirus software scan’s the computers memory, disks and all email. It
    uses a virus definition file that is updated regularly.
5 Major Characteristics of Firewall
• A firewall serves as a “gatekeeper” computer system
• A firewall computer screens all network traffic for proper
  passwords and other security.
• only allows authorized transmissions in and out of the
  network.
• Firewalls have become an essential component of
  organizations connecting to the Internet.
• Firewalls can deter, but not completely prevent, unauthorized
  access (hacking) into computer networks.
Major Types of Defense Strategies
6. Backup Files
• Backup files, which are duplicate files of data or programs, are another
    important security measure.
• Files can be protected by file retention measures that involve storing
    copies of files from previous periods.
• Several generations of files can be kept for control purposes.

7. Security Monitors
• System security monitors are programs that monitor the use of computer
    systems and networks and protect them from unauthorized use, fraud,
    and destruction.
Major Types of Defense Strategies
8. Biometric Controls
Uses physical characteristics to identify the user.
• Voice verification
• Fingerprints
• Hand geometry
• Signature dynamics
• Retina scanning
• Face recognition
• Genetic pattern analysis

5. Disaster Recovery
• Hurricanes, earthquakes, fires, floods, criminal and terrorist acts, and human error
    can all severely damage an organization's computing resources. Many
    organizations, like airlines and banks can be crippled by losing even a few hours of
    computing power.
Business Recovery Plan
• Business recovery plan – concern on the
  disaster recovery has spread beyond banks,
  insurance companies and data centers. It the
  traditional recovery fanatics.
9 Steps of the Development a Business
                      Recovery Plan
1. Obtain management’s commitment to the plan
   Top management must be convinced of the potential damages that paralysis of information
   systems may cause.

2. Establish a planning committee
   Coordinator establishes a planning committee comprising representative from all business
   unit that are dependent on computer-based ISs.

3. Perform risk assessment and impact analysis
   The committee assesses which operations would be hurt by disasters and how long the
   organization could continue to operate without damaged resources.

4. Prioritize recovery needs
   The disaster recovery coordinator ranks each IS application according to its effect on an
   organization’s ability to achieve its mission.
9 Steps of the Development a
                     Business Recovery Plan
5. Select a recovery plan
   Recovery plan alternatives are evaluated by considering advantages and disadvantages in
   terms of risk reduction, cost and the speed.

6. Select vendors
   Vendor’s ability to provide telecommunications alternatives, experience and capacity to
   support current applications.

7. Develop and implement the plan
   The plan includes organizational and vendor responsibilities and the sequence of events that
   will take place.

8. Test the plan
   Walk through with each business unit, simulations as if a real disaster had occurred and
   deliberate interruption of the system and implementation of the plan.

9. Continually test and evaluate
   Must be aware of the plan al the times.
General Controls to Minimize Errors and
      Disasters of Information Systems
–    Software controls—monitors the use of system software and prevents
     unauthorized access of software programs, system software, and computer
     programs.
–    Hardware controls—ensure that computer hardware is physically secure
     and functioning properly.
–    Computer operations controls—oversee the work of the computer
     department to ensure that programmed procedures are consistently and
     correctly applied.
–    Data security controls—ensures that valuable business data files are not
     subjected to unauthorized access, change, or destruction.
–    Implementation controls—audit the systems development process at
     various points to ensure that the process is properly controlled and
     managed.
–    Administrative controls—formalized standards, rules, procedures, and
     control disciplines to ensure that the organization’s controls are properly
     executed and enforced.
Security Management Steps to Protect
 Computer System Resources

Mais conteúdo relacionado

Mais procurados

Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information SystemDaryl Conson
 
GDSS Group Decision Support System
GDSS Group Decision Support SystemGDSS Group Decision Support System
GDSS Group Decision Support SystemEnaam Alotaibi
 
Management Information System (Full Notes)
Management Information System (Full Notes)Management Information System (Full Notes)
Management Information System (Full Notes)Harish Chand
 
Unit 3 Management Information System
Unit 3 Management Information SystemUnit 3 Management Information System
Unit 3 Management Information SystemAbhishek Iyer
 
MIS 17 Cross-Functional Enterprise Systems
MIS 17 Cross-Functional Enterprise SystemsMIS 17 Cross-Functional Enterprise Systems
MIS 17 Cross-Functional Enterprise SystemsTushar B Kute
 
Management information systems
Management information systemsManagement information systems
Management information systemsnavin1
 
Three dimensions of information systems
Three dimensions of information systemsThree dimensions of information systems
Three dimensions of information systemsSuleyman Ally
 
Six major types of information systems
Six major types of information systemsSix major types of information systems
Six major types of information systemsMohanraj V
 
Functional information system
Functional  information systemFunctional  information system
Functional information systemamazing19
 
Management Information Systems
Management  Information  SystemsManagement  Information  Systems
Management Information SystemsRam Dutt Shukla
 
Transaction processing system (TPS)
Transaction processing system (TPS)Transaction processing system (TPS)
Transaction processing system (TPS)Jaisha Jaikishan
 
The evolution of management information system
The evolution of management information systemThe evolution of management information system
The evolution of management information systemCheryl Asia
 
Decision Support System in MIS.pptx
Decision Support System in MIS.pptxDecision Support System in MIS.pptx
Decision Support System in MIS.pptxrajalakshmi5921
 
Executive information system ( eis )
Executive information system ( eis )Executive information system ( eis )
Executive information system ( eis )Puja Dhakal
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information systemPROF.JITENDRA PATEL
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing systemanjana1994
 
Strategic analysis and choice
Strategic analysis and choice Strategic analysis and choice
Strategic analysis and choice Krishna Kumar Paul
 

Mais procurados (20)

Knowledge Work System
Knowledge Work SystemKnowledge Work System
Knowledge Work System
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 
GDSS Group Decision Support System
GDSS Group Decision Support SystemGDSS Group Decision Support System
GDSS Group Decision Support System
 
Management Information System (Full Notes)
Management Information System (Full Notes)Management Information System (Full Notes)
Management Information System (Full Notes)
 
Unit 3 Management Information System
Unit 3 Management Information SystemUnit 3 Management Information System
Unit 3 Management Information System
 
MIS 17 Cross-Functional Enterprise Systems
MIS 17 Cross-Functional Enterprise SystemsMIS 17 Cross-Functional Enterprise Systems
MIS 17 Cross-Functional Enterprise Systems
 
Management information systems
Management information systemsManagement information systems
Management information systems
 
Three dimensions of information systems
Three dimensions of information systemsThree dimensions of information systems
Three dimensions of information systems
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Six major types of information systems
Six major types of information systemsSix major types of information systems
Six major types of information systems
 
Functional information system
Functional  information systemFunctional  information system
Functional information system
 
Management Information Systems
Management  Information  SystemsManagement  Information  Systems
Management Information Systems
 
Structure of MIS
Structure of MISStructure of MIS
Structure of MIS
 
Transaction processing system (TPS)
Transaction processing system (TPS)Transaction processing system (TPS)
Transaction processing system (TPS)
 
The evolution of management information system
The evolution of management information systemThe evolution of management information system
The evolution of management information system
 
Decision Support System in MIS.pptx
Decision Support System in MIS.pptxDecision Support System in MIS.pptx
Decision Support System in MIS.pptx
 
Executive information system ( eis )
Executive information system ( eis )Executive information system ( eis )
Executive information system ( eis )
 
Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information system
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
 
Strategic analysis and choice
Strategic analysis and choice Strategic analysis and choice
Strategic analysis and choice
 

Destaque

Mis of hero honda
Mis of hero hondaMis of hero honda
Mis of hero hondaneelnmanju
 
Management Information Systems in Maruti Suzuki
Management Information Systems in Maruti SuzukiManagement Information Systems in Maruti Suzuki
Management Information Systems in Maruti SuzukiMohammad Mohtashim
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security controlCheng Olayvar
 

Destaque (6)

Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
Mis of hero honda
Mis of hero hondaMis of hero honda
Mis of hero honda
 
Management Information Systems in Maruti Suzuki
Management Information Systems in Maruti SuzukiManagement Information Systems in Maruti Suzuki
Management Information Systems in Maruti Suzuki
 
McDonald's information systems
McDonald's information systemsMcDonald's information systems
McDonald's information systems
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security control
 
MIS in walmart
MIS in walmartMIS in walmart
MIS in walmart
 

Semelhante a Security & control in management information system

Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).pptGooglePay16
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for businessDaniel Thomas
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkataamiyadutta
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
Computer Security
Computer SecurityComputer Security
Computer SecurityAkNirojan
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityGeevarghese Titus
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
Chapter 13
Chapter 13Chapter 13
Chapter 13bodo-con
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1misecho
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 

Semelhante a Security & control in management information system (20)

Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
Unit v
Unit vUnit v
Unit v
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
Chapter-2 (1).pptx
Chapter-2 (1).pptxChapter-2 (1).pptx
Chapter-2 (1).pptx
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Mis
MisMis
Mis
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 

Mais de Online

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3Online
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2Online
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1Online
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4Online
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++Online
 
Functions
FunctionsFunctions
FunctionsOnline
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and outputOnline
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selectionOnline
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetitionOnline
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++Online
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission techniqueOnline
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Online
 
Lan technologies
Lan technologiesLan technologies
Lan technologiesOnline
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technologyOnline
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocolsOnline
 
Internet protocol
Internet protocolInternet protocol
Internet protocolOnline
 
Application protocols
Application protocolsApplication protocols
Application protocolsOnline
 
Addressing
AddressingAddressing
AddressingOnline
 
Transport protocols
Transport protocolsTransport protocols
Transport protocolsOnline
 
Leadership
LeadershipLeadership
LeadershipOnline
 

Mais de Online (20)

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++
 
Functions
FunctionsFunctions
Functions
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and output
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selection
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetition
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission technique
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technology
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocols
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Application protocols
Application protocolsApplication protocols
Application protocols
 
Addressing
AddressingAddressing
Addressing
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Leadership
LeadershipLeadership
Leadership
 

Último

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 

Último (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Security & control in management information system

  • 1. SECURITY AND CONTROL IN INFORMATION SYSTEMS
  • 2. • Security concepts covers a wide array of activities, includes products and processes to prevent unauthorized access, modification and deletion of information knowledge, data and facts. • Information Systems Concerns: 1. Unintentional threats • Human error – in design or use of system • Environmental hazards – acts of God and other • Computer system failures – faulty products 2. Intentional threats • Systems are subject to a wide variety of hazards from criminal attacks
  • 3. GOALS OF INFORMATION SECURITY 1) Prevention • Prevent computer or information violations from occurring. - Simple incidents are losing a password, or leaving a terminal logged on overnight 2) Detection • Detection includes identifying the assets under attack, how it occurred and by whom. 3) Response • Refers to developing strategies and techniques to deal with an attack or loss.
  • 4. RISK TO IS : 1. Risk to Application and Data a) Computer crime • The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources. • The unauthorized release of information • The unauthorized copying of software • Denying an end user access to his or her own hardware, software, data, or network resources b) Hacking • Hacking is the obsessive use of computers, or the unauthorized access and use of networked computer systems. • Illegal hackers (also called crackers) frequently assault the Internet and other networks to steal or damage data and programs. • Hackers can monitor e-mail, web server access, or file transfers to extract passwords or steal network files, or to plant data that will cause a system to welcome intruders. • Use remote services that allow one computer on a network to execute programs on another computer to gain privileged access within a network.
  • 5. RISK TO IS : 1. Risk to Application and Data c) Cyber-Theft - Many computer crimes involve the theft of money. - Involve unauthorized network entry and fraudulent alternation of computer databases to cover the tracks of the employees involved. d) Unauthorized Use at Work - This may range from doing private consulting or personal finances, or playing video games to unauthorized use of the Internet on company networks. e) Software Piracy - Unauthorized copying of software or software piracy is a major form of software theft because software is intellectual property, which is protected by copyright law and user licensing agreements.
  • 6. RISK TO IS : 1. Risk to Application and Data f) Piracy of Intellectual Property • Software is not the only intellectual property subject to computer-based piracy. Other forms of copyrighted material, such as music, videos, images, articles, books, and other written works. g) Computer Viruses and Worms • Virus - is a program code that cannot work without being inserted into another program. Worm - is a distinct program that can run unaided. They typically enter a computer system through illegal or borrowed copies of software or through network links to other computer systems.
  • 7. RISK TO IS : 1. Risk to Hardware a) Natural Disaster • Disasters that pose a risk to IS include fires, floods, hurricanes, which can destroy hardware, software and can causing total @ partial paralysis of systems @ communications lines. b) Blackout & Brownout • Blackout – loses of electrical power. • Brownout – the voltage of power decreases @ short interruptions in the flow of power. • Vandalism - occur when human beings deliberately destroy computer systems.
  • 8. Major Types of Defense Strategies 1. Encryption Encryption characteristics include: • Passwords, messages, files, and other data can be transmitted in scrambled form and unscrambled by computer systems for authorized users only. • Encryption involves using special mathematical algorithms, or keys, to transform digital data into a scrambled code before they are transmitted, and to decode the data when they are received. 2. Authentication • Authentication is a critical part of a security system. It is part of the process referred to as Identification and authentication (I&A). Identification process starts when a user ID or Logon name is typed into a sign on screen. Authentication methods are based on one or more of three factors. 1) password or PIN. 2) smart card or an identification device. 3) fingerprints or retinal pattern.
  • 9. Major Types of Defense Strategies 3. Firewalls • Firewall computers and software is another important method for control and security on the Internet and other networks. A network firewall can be a communications processor, typically a router, or a dedicated server, along with firewall software. 4. E-Mail Monitoring • Internet and other online e-mail systems are one of the favourite avenues of attack by hackers for spreading computer viruses or breaking into networked computers. 5. Virus Defenses (Antivirus Software) • Antivirus software scan’s the computers memory, disks and all email. It uses a virus definition file that is updated regularly.
  • 10. 5 Major Characteristics of Firewall • A firewall serves as a “gatekeeper” computer system • A firewall computer screens all network traffic for proper passwords and other security. • only allows authorized transmissions in and out of the network. • Firewalls have become an essential component of organizations connecting to the Internet. • Firewalls can deter, but not completely prevent, unauthorized access (hacking) into computer networks.
  • 11. Major Types of Defense Strategies 6. Backup Files • Backup files, which are duplicate files of data or programs, are another important security measure. • Files can be protected by file retention measures that involve storing copies of files from previous periods. • Several generations of files can be kept for control purposes. 7. Security Monitors • System security monitors are programs that monitor the use of computer systems and networks and protect them from unauthorized use, fraud, and destruction.
  • 12. Major Types of Defense Strategies 8. Biometric Controls Uses physical characteristics to identify the user. • Voice verification • Fingerprints • Hand geometry • Signature dynamics • Retina scanning • Face recognition • Genetic pattern analysis 5. Disaster Recovery • Hurricanes, earthquakes, fires, floods, criminal and terrorist acts, and human error can all severely damage an organization's computing resources. Many organizations, like airlines and banks can be crippled by losing even a few hours of computing power.
  • 13. Business Recovery Plan • Business recovery plan – concern on the disaster recovery has spread beyond banks, insurance companies and data centers. It the traditional recovery fanatics.
  • 14. 9 Steps of the Development a Business Recovery Plan 1. Obtain management’s commitment to the plan Top management must be convinced of the potential damages that paralysis of information systems may cause. 2. Establish a planning committee Coordinator establishes a planning committee comprising representative from all business unit that are dependent on computer-based ISs. 3. Perform risk assessment and impact analysis The committee assesses which operations would be hurt by disasters and how long the organization could continue to operate without damaged resources. 4. Prioritize recovery needs The disaster recovery coordinator ranks each IS application according to its effect on an organization’s ability to achieve its mission.
  • 15. 9 Steps of the Development a Business Recovery Plan 5. Select a recovery plan Recovery plan alternatives are evaluated by considering advantages and disadvantages in terms of risk reduction, cost and the speed. 6. Select vendors Vendor’s ability to provide telecommunications alternatives, experience and capacity to support current applications. 7. Develop and implement the plan The plan includes organizational and vendor responsibilities and the sequence of events that will take place. 8. Test the plan Walk through with each business unit, simulations as if a real disaster had occurred and deliberate interruption of the system and implementation of the plan. 9. Continually test and evaluate Must be aware of the plan al the times.
  • 16. General Controls to Minimize Errors and Disasters of Information Systems – Software controls—monitors the use of system software and prevents unauthorized access of software programs, system software, and computer programs. – Hardware controls—ensure that computer hardware is physically secure and functioning properly. – Computer operations controls—oversee the work of the computer department to ensure that programmed procedures are consistently and correctly applied. – Data security controls—ensures that valuable business data files are not subjected to unauthorized access, change, or destruction. – Implementation controls—audit the systems development process at various points to ensure that the process is properly controlled and managed. – Administrative controls—formalized standards, rules, procedures, and control disciplines to ensure that the organization’s controls are properly executed and enforced.
  • 17. Security Management Steps to Protect Computer System Resources