SlideShare uma empresa Scribd logo
1 de 13
INFORMATION
SECURITY

BY V.M.LEENA
REDDY
DEFINITION:
The protection of information and its elements including
systems, hardware that use, store and transmit the
information
PRIMARY GOALS
CIA triangle known as security triad tells the primary goals
of IS
Confidentiality
Making sure that those who should not see
information
Integrity
Making sure that the information has not been changed
from its original

Availability
Making sure that the information is available for use when
you need it
SYSTEM SECURITY
THREATS AND
CONTROLS
Viruses
A computer virus is a software code that can multiply and
propagate itself. A virus can spread into another computer via
e-mail, downloading files from the Internet, or opening a
contaminated file. It is almost impossible to completely protect
a network computer from virus attacks; the CSI/FBI survey
indicated that virus attacks were the most widespread attack
for six straight years since 2000.
Viruses are just one of several programmed threats or
malicious codes (malware) in today’s interconnected system
environment. Programmed threats are computer programs that
can create a nuisance, alter or damage data, steal information,
or cripple system functions. Programmed threats include,
computer viruses, Trojan horses, logic bombs, worms, spam,
spyware, and adware.
Insider Abuse of Internet Access
Unfortunately, IT tools can be abused. For example, e-mail and
Internet connections are available in almost all offices to improve
productivity, but employees may use them for personal reasons,
such as online shopping, playing games, and sending instant
messages to friends during work hours.
Laptop or Mobile Theft
Because they are relatively expensive, laptops and PDAs have
become the targets of thieves.
Besides being expensive, they often contain proprietary
corporate data, access codes
to company networks, and sensitive information.
Denial of Service
A denial of service (Do's) attack is specifically designed to
interrupt normal system functions and affect legitimate users’
access to the system.
Do's attacks can result in significant server downtime and
financial loss for many companies, but the controls to mitigate
the risk are very technical.
Unauthorized Access to Information
To control unauthorized access to information, access controls,
including passwords and a controlled environment, are
necessary. Computers installed in a public area, such as a
conference room or reception area, can create serious threats
and should be avoided if possible.
Employees should be allowed to access only the data
necessary for them to perform their jobs.
System Penetration

Hackers penetrate systems illegally to steal information, modify data, or
harm the system. The following factors are related to system
penetration:
System holes: the design deficiency of operating systems or application
systems that allow hijacking, security bypass, data manipulation,
privilege escalation, and system access.
Port scanning: a hacking technique used to check TCP/IP ports to
reveal the services that are available and to identify the weaknesses of
a computer or network system in order to exploit them.
Network sniffing: a hardware and software program to collect network
(traffic) data in order to decipher passwords with password-cracking
software, which may result in unauthorized access to a network
system.
IP spoofing: a technique used to gain unauthorized access to
computers, whereby hackers send messages to a computer with a
deceived IP address as if it were coming from a trusted host.
Back door/trap door: a hole in the security of a computer system
deliberately left in place by designers or maintainers.
Tunneling: a method for circumventing a firewall by hiding a message
that would be rejected by the firewall inside another, acceptable
Abuse of Wireless Networks

Wireless networks offer the advantage of convenience and
flexibility, but system security can be a big issue. Attackers do
not need to have physical access to the network. Attackers can
take their time cracking the passwords and reading the network
data without leaving a trace.
Telecom Fraud
In the past, telecom fraud involved fraudulent use of
telecommunication (telephone) facilities. Intruders often hacked
into a company’s private branch exchange (PBX) and
administration or maintenance port for personal gains, including
free long-distance calls, stealing (changing) information in
voicemail boxes, diverting calls illegally, wiretapping, and
eavesdropping.
Theft of Proprietary Information

Information is a commodity in the e-commerce era, and there are
always buyers for sensitive information, including customer data,
credit card information, and trade secrets. Data theft by an
insider is common when access controls are not implemented.
Outside hackers can also use “Trojan” viruses to steal
information from unprotected systems. Beyond installing firewall
and anti-virus software to secure systems, a company should
encrypt all of its important data.
Financial Fraud

The nature of financial fraud has changed over the years with
information technology. System-based financial fraud includes
scam e-mails, identity theft, and fraudulent transactions. With
spam, con artists can send scam e-mails to thousands of people
in hours.
Misuse of Public Web Applications

The nature of e-commerce—convenience and flexibility—makes
Web applications vulnerable and easily abused. Hackers can
circumvent traditional network firewalls and intrusion-prevention
systems and attack web applications directly. They can inject
commands into databases via the web application user
interfaces and surreptitiously steal data, such as customer and
credit card information.
Website Defacement
Website defacement is the sabotage of webpages by hackers
inserting or altering information. The altered webpages may
mislead unknowing users and represent negative publicity that
could affect a company’s image and credibility.
Company Awareness
Business operations can be disrupted by many factors, including
system security breaches. System downtime, system
penetrations, theft of computing resources, and lost productivity
have quickly become critical system security issues. The
financial loss of these security breaches can be significant. In
addition, system security breaches often taint a company’s
image and may compromise a company’s compliance with
applicable laws and regulations. The key to protecting a
company’s accounting information system against security
breaches is to be well prepared for all possible major threats. A
combination of preventive and detective controls can mitigate
security threats.
BIBLIOGRAPHY:
http://www.nysscpa.org/cpajournal/2006/706/essentials/p
58.htm
By P. Paul Lin, PhD, is an associate professor of
accounting at the Raj Soin College of Business of Wright
State University, Dayton, Ohio.

Mais conteúdo relacionado

Mais procurados

Managing and securing the enterprise
Managing and securing the enterpriseManaging and securing the enterprise
Managing and securing the enterpriseAbha Damani
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info SystemsHemant Nagwekar
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systemsOmid Aminzadeh Gohari
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protectiontumetr1
 
Computer related risks presentation
Computer related risks presentationComputer related risks presentation
Computer related risks presentationleodegras
 
Computer related risks presentation
Computer related risks presentationComputer related risks presentation
Computer related risks presentationleodegras
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challengesVishakha Joshi
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challengesVineet Dubey
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in misI P Abir
 
Securing information system
Securing information systemSecuring information system
Securing information systemTanjim Rasul
 
Cyber security
Cyber securityCyber security
Cyber securityAkdu095
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesAqib Syed
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e businessRahul Kumar
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMANAND MURALI
 

Mais procurados (20)

Managing and securing the enterprise
Managing and securing the enterpriseManaging and securing the enterprise
Managing and securing the enterprise
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Beekman5 std ppt_12
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protection
 
Computer related risks presentation
Computer related risks presentationComputer related risks presentation
Computer related risks presentation
 
Computer related risks presentation
Computer related risks presentationComputer related risks presentation
Computer related risks presentation
 
Security and ethical challenges
Security and ethical challengesSecurity and ethical challenges
Security and ethical challenges
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
 
E commerce Security
E commerce Security E commerce Security
E commerce Security
 
Securing information system
Securing information systemSecuring information system
Securing information system
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
Cyber security
Cyber securityCyber security
Cyber security
 
Electronic Security
Electronic SecurityElectronic Security
Electronic Security
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 
E business security
E business securityE business security
E business security
 

Destaque

ELECTRONIC DATA INTERCHANGE
ELECTRONIC DATA INTERCHANGE ELECTRONIC DATA INTERCHANGE
ELECTRONIC DATA INTERCHANGE alraee
 
Customer relationship management
Customer relationship managementCustomer relationship management
Customer relationship managementcharanreddy589
 
Basics of Supply Chain Managment
Basics of Supply Chain ManagmentBasics of Supply Chain Managment
Basics of Supply Chain ManagmentYoussef Serroukh
 
Customer Relationship Management (CRM)
Customer Relationship Management (CRM)Customer Relationship Management (CRM)
Customer Relationship Management (CRM)Jaiser Abbas
 

Destaque (6)

Business Process
Business ProcessBusiness Process
Business Process
 
ELECTRONIC DATA INTERCHANGE
ELECTRONIC DATA INTERCHANGE ELECTRONIC DATA INTERCHANGE
ELECTRONIC DATA INTERCHANGE
 
Customer relationship management
Customer relationship managementCustomer relationship management
Customer relationship management
 
Basics of Supply Chain Managment
Basics of Supply Chain ManagmentBasics of Supply Chain Managment
Basics of Supply Chain Managment
 
Customer Relationship Management (CRM)
Customer Relationship Management (CRM)Customer Relationship Management (CRM)
Customer Relationship Management (CRM)
 
Supply Chain Management
Supply Chain ManagementSupply Chain Management
Supply Chain Management
 

Semelhante a Mis security system threads

E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSrausdeen anfas
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4Anne ndolo
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Security communication
Security communicationSecurity communication
Security communicationSay Shyong
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaNew Horizons Bulgaria
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxarnoldmeredith47041
 
"Unveiling IT Security: Exploring Diverse Threat Types"
"Unveiling IT Security: Exploring Diverse Threat Types""Unveiling IT Security: Exploring Diverse Threat Types"
"Unveiling IT Security: Exploring Diverse Threat Types"arjunnegi34
 
"IT Security Threat Types" and what is IT security
"IT Security Threat Types" and what is IT security"IT Security Threat Types" and what is IT security
"IT Security Threat Types" and what is IT securityarjunnegi34
 

Semelhante a Mis security system threads (20)

E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
Security communication
Security communicationSecurity communication
Security communication
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
"Unveiling IT Security: Exploring Diverse Threat Types"
"Unveiling IT Security: Exploring Diverse Threat Types""Unveiling IT Security: Exploring Diverse Threat Types"
"Unveiling IT Security: Exploring Diverse Threat Types"
 
"IT Security Threat Types" and what is IT security
"IT Security Threat Types" and what is IT security"IT Security Threat Types" and what is IT security
"IT Security Threat Types" and what is IT security
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Último

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 

Último (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 

Mis security system threads

  • 2. DEFINITION: The protection of information and its elements including systems, hardware that use, store and transmit the information
  • 3. PRIMARY GOALS CIA triangle known as security triad tells the primary goals of IS Confidentiality Making sure that those who should not see information Integrity Making sure that the information has not been changed from its original Availability Making sure that the information is available for use when you need it
  • 4. SYSTEM SECURITY THREATS AND CONTROLS Viruses A computer virus is a software code that can multiply and propagate itself. A virus can spread into another computer via e-mail, downloading files from the Internet, or opening a contaminated file. It is almost impossible to completely protect a network computer from virus attacks; the CSI/FBI survey indicated that virus attacks were the most widespread attack for six straight years since 2000. Viruses are just one of several programmed threats or malicious codes (malware) in today’s interconnected system environment. Programmed threats are computer programs that can create a nuisance, alter or damage data, steal information, or cripple system functions. Programmed threats include, computer viruses, Trojan horses, logic bombs, worms, spam, spyware, and adware.
  • 5. Insider Abuse of Internet Access Unfortunately, IT tools can be abused. For example, e-mail and Internet connections are available in almost all offices to improve productivity, but employees may use them for personal reasons, such as online shopping, playing games, and sending instant messages to friends during work hours. Laptop or Mobile Theft Because they are relatively expensive, laptops and PDAs have become the targets of thieves. Besides being expensive, they often contain proprietary corporate data, access codes to company networks, and sensitive information.
  • 6. Denial of Service A denial of service (Do's) attack is specifically designed to interrupt normal system functions and affect legitimate users’ access to the system. Do's attacks can result in significant server downtime and financial loss for many companies, but the controls to mitigate the risk are very technical. Unauthorized Access to Information To control unauthorized access to information, access controls, including passwords and a controlled environment, are necessary. Computers installed in a public area, such as a conference room or reception area, can create serious threats and should be avoided if possible. Employees should be allowed to access only the data necessary for them to perform their jobs.
  • 7. System Penetration Hackers penetrate systems illegally to steal information, modify data, or harm the system. The following factors are related to system penetration: System holes: the design deficiency of operating systems or application systems that allow hijacking, security bypass, data manipulation, privilege escalation, and system access. Port scanning: a hacking technique used to check TCP/IP ports to reveal the services that are available and to identify the weaknesses of a computer or network system in order to exploit them. Network sniffing: a hardware and software program to collect network (traffic) data in order to decipher passwords with password-cracking software, which may result in unauthorized access to a network system. IP spoofing: a technique used to gain unauthorized access to computers, whereby hackers send messages to a computer with a deceived IP address as if it were coming from a trusted host. Back door/trap door: a hole in the security of a computer system deliberately left in place by designers or maintainers. Tunneling: a method for circumventing a firewall by hiding a message that would be rejected by the firewall inside another, acceptable
  • 8. Abuse of Wireless Networks Wireless networks offer the advantage of convenience and flexibility, but system security can be a big issue. Attackers do not need to have physical access to the network. Attackers can take their time cracking the passwords and reading the network data without leaving a trace. Telecom Fraud In the past, telecom fraud involved fraudulent use of telecommunication (telephone) facilities. Intruders often hacked into a company’s private branch exchange (PBX) and administration or maintenance port for personal gains, including free long-distance calls, stealing (changing) information in voicemail boxes, diverting calls illegally, wiretapping, and eavesdropping.
  • 9. Theft of Proprietary Information Information is a commodity in the e-commerce era, and there are always buyers for sensitive information, including customer data, credit card information, and trade secrets. Data theft by an insider is common when access controls are not implemented. Outside hackers can also use “Trojan” viruses to steal information from unprotected systems. Beyond installing firewall and anti-virus software to secure systems, a company should encrypt all of its important data. Financial Fraud The nature of financial fraud has changed over the years with information technology. System-based financial fraud includes scam e-mails, identity theft, and fraudulent transactions. With spam, con artists can send scam e-mails to thousands of people in hours.
  • 10. Misuse of Public Web Applications The nature of e-commerce—convenience and flexibility—makes Web applications vulnerable and easily abused. Hackers can circumvent traditional network firewalls and intrusion-prevention systems and attack web applications directly. They can inject commands into databases via the web application user interfaces and surreptitiously steal data, such as customer and credit card information. Website Defacement Website defacement is the sabotage of webpages by hackers inserting or altering information. The altered webpages may mislead unknowing users and represent negative publicity that could affect a company’s image and credibility.
  • 11. Company Awareness Business operations can be disrupted by many factors, including system security breaches. System downtime, system penetrations, theft of computing resources, and lost productivity have quickly become critical system security issues. The financial loss of these security breaches can be significant. In addition, system security breaches often taint a company’s image and may compromise a company’s compliance with applicable laws and regulations. The key to protecting a company’s accounting information system against security breaches is to be well prepared for all possible major threats. A combination of preventive and detective controls can mitigate security threats.
  • 12.
  • 13. BIBLIOGRAPHY: http://www.nysscpa.org/cpajournal/2006/706/essentials/p 58.htm By P. Paul Lin, PhD, is an associate professor of accounting at the Raj Soin College of Business of Wright State University, Dayton, Ohio.