SlideShare uma empresa Scribd logo
1 de 11
USABILITY
VS
SAFETY
Control of Computer Systems
• General controls
• Application controls
General controls
• Systems development – before implementing or
converting a system, the security manager should
have input, along with users as to
feasibility, cost, benefit, testing and quality
assurance procedures
• system software – all system software should
come with security software that ensures
unauthorized changes cannot be made to system
software
• hardware – besides physical security, validity and
echo checks should be run to detect equipment
malfunctions
General controls (contd)
• operations – storage and processing equipment
should be consistent and work properly. IT
employees as well as users should know their
roles, follow back up and recovery instructions in
the manual
• data security – check terminal entry points, on
line access,. Inputs and outputs, set user
privileges, via password assignment
• administration – segregate IT job functions so no
overlap will happen. Supervise employees, write
policies and procedures
Application Controls
• input – check data for accuracy before
entering
• edit – check data for reasonableness before
entering it to the system
• format – check data for alphanumeric
consistency before entering it to the system
• dependency – check for logical relationships
of session data
Application Controls (contd)
• processing – session runtimes for accessing
data are convenient and short
• updating – newly entered data refreshes
conveniently and totals match what would be
obtained manually
• matching – computer files match what is
recorded on master or suspense files
• output – sensitive printout is shredded
EXHAUSTION BECAUSE OF
IMPORTANCE OF DATA
MIS – Management Information
Systems
CONTROL MODEL TERMINOLOGIES
• implementation – any activity that
adopts, manages and routinizes a new
technology
• prototype – any experimental part, version, or
build of a system or software
• request for permission (RFP) – the list of
questions you ask to find a software maker who
can make something for you, its cost, user
friendliness, maintenance, documentation, and
requirements
• project management – working with a software
representative on requirements and deliverables
CONTROL MODEL TERMINOLOGIES
(contd)
• deliverables – when the software company
actually gives you a working product
• walkthrough – the testing/debugging process of
going back over specifications after a computer
run
• outsourcing – turning over your computer center
operations to an external organization
• metrics – preset quantitative indicators (like the
number of calls to help desk) to measure system
quality
SURVIVABILITY AND THE CONCEPT OF
MISSION-CRITICAL
• Survivability is the capability of a system to
fulfill its mission in the presence of
attacks, failures and accidents.
• TIMELINESS AND REASONABLENESS
SURVIVABILITY
• ATTACK – is defined as any damaging or potentially
damaging event orchestrated by an intelligent adversary
• FAILURE – is any damaging or potentially damaging events
caused by deficiencies in the system or deficiencies in an
external element on which the system depends. It may be
caused by software design errors, hardware
degradation, human errors, or corrupted data.
• ACCIDENT – is a randomly occurring event which is
damaging or potentially damaging. Something beyond
control of the system administrator.

Mais conteúdo relacionado

Mais procurados

Non Functional Testing
Non Functional TestingNon Functional Testing
Non Functional Testing
Nishant Worah
 
2 software requirements-02
2 software requirements-022 software requirements-02
2 software requirements-02
Zaman Khan
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk Assessments
Priyank Hada
 
Validating Non Functional Requirements
Validating Non Functional RequirementsValidating Non Functional Requirements
Validating Non Functional Requirements
Reuben Korngold
 
03.1 general control
03.1 general control03.1 general control
03.1 general control
Mulyadi Yusuf
 
1 software requirements engineering-01
1 software requirements engineering-011 software requirements engineering-01
1 software requirements engineering-01
Zaman Khan
 

Mais procurados (20)

3. 1 req elicitation
3. 1 req elicitation3. 1 req elicitation
3. 1 req elicitation
 
Non Functional Testing
Non Functional TestingNon Functional Testing
Non Functional Testing
 
Capturing Measurable Non Functional Requirements
Capturing Measurable Non Functional RequirementsCapturing Measurable Non Functional Requirements
Capturing Measurable Non Functional Requirements
 
2 software requirements-02
2 software requirements-022 software requirements-02
2 software requirements-02
 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk Assessments
 
Non-Functional Requirements
Non-Functional RequirementsNon-Functional Requirements
Non-Functional Requirements
 
Validating Non Functional Requirements
Validating Non Functional RequirementsValidating Non Functional Requirements
Validating Non Functional Requirements
 
Non-Functional Requirements Are Important (with Explanatory Notes)
Non-Functional Requirements Are Important (with Explanatory Notes)Non-Functional Requirements Are Important (with Explanatory Notes)
Non-Functional Requirements Are Important (with Explanatory Notes)
 
Managing software project, software engineering
Managing software project, software engineeringManaging software project, software engineering
Managing software project, software engineering
 
IT General Controls
IT General ControlsIT General Controls
IT General Controls
 
Software engineering 1 software concepts
Software engineering 1 software conceptsSoftware engineering 1 software concepts
Software engineering 1 software concepts
 
Tqm
TqmTqm
Tqm
 
03.1 general control
03.1 general control03.1 general control
03.1 general control
 
Requirement Engineering
Requirement EngineeringRequirement Engineering
Requirement Engineering
 
SOFTWARE MAINTENANCE- 5
SOFTWARE MAINTENANCE- 5SOFTWARE MAINTENANCE- 5
SOFTWARE MAINTENANCE- 5
 
The information systems life cycle
The information systems life cycleThe information systems life cycle
The information systems life cycle
 
Requirement and Specification
Requirement and SpecificationRequirement and Specification
Requirement and Specification
 
Systems Development Lifecycle Walkthrough (Cambridge Technical Level 3 IT)
Systems Development Lifecycle Walkthrough (Cambridge Technical Level 3 IT)Systems Development Lifecycle Walkthrough (Cambridge Technical Level 3 IT)
Systems Development Lifecycle Walkthrough (Cambridge Technical Level 3 IT)
 
1 software requirements engineering-01
1 software requirements engineering-011 software requirements engineering-01
1 software requirements engineering-01
 
Software maintenance service strategies
Software maintenance service strategiesSoftware maintenance service strategies
Software maintenance service strategies
 

Destaque

E-Mail - Technical Overview
E-Mail - Technical OverviewE-Mail - Technical Overview
E-Mail - Technical Overview
Venkatesh Iyer
 
Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks
Venkatesh Iyer
 

Destaque (20)

Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
Information systems 365 lecture eight
Information systems 365 lecture eightInformation systems 365 lecture eight
Information systems 365 lecture eight
 
TUD CS4105 | 2015 | Lecture 1
TUD CS4105 | 2015 | Lecture 1TUD CS4105 | 2015 | Lecture 1
TUD CS4105 | 2015 | Lecture 1
 
Lecture12
Lecture12Lecture12
Lecture12
 
Ch16
Ch16Ch16
Ch16
 
Network Security Lecture
Network Security LectureNetwork Security Lecture
Network Security Lecture
 
E-Mail - Technical Overview
E-Mail - Technical OverviewE-Mail - Technical Overview
E-Mail - Technical Overview
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
 
Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks
 
GÜVENLİ YAZILIM GELİŞTİRME EĞİTİMİ İÇERİĞİ
GÜVENLİ YAZILIM GELİŞTİRME EĞİTİMİ İÇERİĞİGÜVENLİ YAZILIM GELİŞTİRME EĞİTİMİ İÇERİĞİ
GÜVENLİ YAZILIM GELİŞTİRME EĞİTİMİ İÇERİĞİ
 
SOC Ekiplerinin Problemlerine Güncel Yaklaşımlar - NETSEC
SOC Ekiplerinin Problemlerine Güncel Yaklaşımlar - NETSECSOC Ekiplerinin Problemlerine Güncel Yaklaşımlar - NETSEC
SOC Ekiplerinin Problemlerine Güncel Yaklaşımlar - NETSEC
 
Introduction to Algorithms
Introduction to AlgorithmsIntroduction to Algorithms
Introduction to Algorithms
 
SWIFT Altyapısına Yönelik Saldırıların Teknik Analizi - NETSEC
SWIFT Altyapısına Yönelik Saldırıların Teknik Analizi -  NETSECSWIFT Altyapısına Yönelik Saldırıların Teknik Analizi -  NETSEC
SWIFT Altyapısına Yönelik Saldırıların Teknik Analizi - NETSEC
 
Network Security Primer
Network Security PrimerNetwork Security Primer
Network Security Primer
 
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 4, 5, 6
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 4, 5, 6Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 4, 5, 6
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 4, 5, 6
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 7, 8, 9
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 7, 8, 9Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 7, 8, 9
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 7, 8, 9
 
Sosyal Medyada Anonim Hesaplar Nasıl Tespit Edilir? - NETSEC
Sosyal Medyada Anonim Hesaplar Nasıl Tespit Edilir? - NETSECSosyal Medyada Anonim Hesaplar Nasıl Tespit Edilir? - NETSEC
Sosyal Medyada Anonim Hesaplar Nasıl Tespit Edilir? - NETSEC
 
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 1, 2, 3
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 1, 2, 3Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 1, 2, 3
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 1, 2, 3
 

Semelhante a IT ELECT 4 NETWORK SECURITY LECTURE 6-5-13

Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security Presentation
Wajahat Rajab
 
Knowedge Skills Ability
Knowedge Skills AbilityKnowedge Skills Ability
Knowedge Skills Ability
Joseph Lynn
 
chapter12-120827115424-phpapp01.pdf
chapter12-120827115424-phpapp01.pdfchapter12-120827115424-phpapp01.pdf
chapter12-120827115424-phpapp01.pdf
AxmedMaxamuud6
 
Se lect11 btech
Se lect11 btechSe lect11 btech
Se lect11 btech
IIITA
 

Semelhante a IT ELECT 4 NETWORK SECURITY LECTURE 6-5-13 (20)

Software Engineering Introduction
Software Engineering IntroductionSoftware Engineering Introduction
Software Engineering Introduction
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
 
22-REQUIREMENT.ppt
22-REQUIREMENT.ppt22-REQUIREMENT.ppt
22-REQUIREMENT.ppt
 
ICAB - ITA Chapter 5 class 9-10 - Controls and Standards
ICAB - ITA Chapter 5 class 9-10 - Controls and StandardsICAB - ITA Chapter 5 class 9-10 - Controls and Standards
ICAB - ITA Chapter 5 class 9-10 - Controls and Standards
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
 
Tqm
TqmTqm
Tqm
 
Chapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptxChapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptx
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security Presentation
 
Software development
Software developmentSoftware development
Software development
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Knowedge Skills Ability
Knowedge Skills AbilityKnowedge Skills Ability
Knowedge Skills Ability
 
Non Functional Requirement.
Non Functional Requirement.Non Functional Requirement.
Non Functional Requirement.
 
Chapter 12 Managing Systems Support and Security .pptx
Chapter 12 Managing Systems Support and Security .pptxChapter 12 Managing Systems Support and Security .pptx
Chapter 12 Managing Systems Support and Security .pptx
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
chapter12-120827115424-phpapp01.pdf
chapter12-120827115424-phpapp01.pdfchapter12-120827115424-phpapp01.pdf
chapter12-120827115424-phpapp01.pdf
 
Se lect11 btech
Se lect11 btechSe lect11 btech
Se lect11 btech
 
MES systems
MES systemsMES systems
MES systems
 
Mti ims presentation-converted-converted
Mti   ims presentation-converted-convertedMti   ims presentation-converted-converted
Mti ims presentation-converted-converted
 
fsp_22Sep15
fsp_22Sep15fsp_22Sep15
fsp_22Sep15
 

Mais de Jd Mercado

Mais de Jd Mercado (6)

Network Security July 1
Network Security July 1Network Security July 1
Network Security July 1
 
Array
ArrayArray
Array
 
For...next loop structure
For...next loop structureFor...next loop structure
For...next loop structure
 
Do...until loop structure
Do...until loop structureDo...until loop structure
Do...until loop structure
 
Do...while loop structure
Do...while loop structureDo...while loop structure
Do...while loop structure
 
Looping statement
Looping statementLooping statement
Looping statement
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

IT ELECT 4 NETWORK SECURITY LECTURE 6-5-13

  • 2. Control of Computer Systems • General controls • Application controls
  • 3. General controls • Systems development – before implementing or converting a system, the security manager should have input, along with users as to feasibility, cost, benefit, testing and quality assurance procedures • system software – all system software should come with security software that ensures unauthorized changes cannot be made to system software • hardware – besides physical security, validity and echo checks should be run to detect equipment malfunctions
  • 4. General controls (contd) • operations – storage and processing equipment should be consistent and work properly. IT employees as well as users should know their roles, follow back up and recovery instructions in the manual • data security – check terminal entry points, on line access,. Inputs and outputs, set user privileges, via password assignment • administration – segregate IT job functions so no overlap will happen. Supervise employees, write policies and procedures
  • 5. Application Controls • input – check data for accuracy before entering • edit – check data for reasonableness before entering it to the system • format – check data for alphanumeric consistency before entering it to the system • dependency – check for logical relationships of session data
  • 6. Application Controls (contd) • processing – session runtimes for accessing data are convenient and short • updating – newly entered data refreshes conveniently and totals match what would be obtained manually • matching – computer files match what is recorded on master or suspense files • output – sensitive printout is shredded
  • 7. EXHAUSTION BECAUSE OF IMPORTANCE OF DATA MIS – Management Information Systems
  • 8. CONTROL MODEL TERMINOLOGIES • implementation – any activity that adopts, manages and routinizes a new technology • prototype – any experimental part, version, or build of a system or software • request for permission (RFP) – the list of questions you ask to find a software maker who can make something for you, its cost, user friendliness, maintenance, documentation, and requirements • project management – working with a software representative on requirements and deliverables
  • 9. CONTROL MODEL TERMINOLOGIES (contd) • deliverables – when the software company actually gives you a working product • walkthrough – the testing/debugging process of going back over specifications after a computer run • outsourcing – turning over your computer center operations to an external organization • metrics – preset quantitative indicators (like the number of calls to help desk) to measure system quality
  • 10. SURVIVABILITY AND THE CONCEPT OF MISSION-CRITICAL • Survivability is the capability of a system to fulfill its mission in the presence of attacks, failures and accidents. • TIMELINESS AND REASONABLENESS
  • 11. SURVIVABILITY • ATTACK – is defined as any damaging or potentially damaging event orchestrated by an intelligent adversary • FAILURE – is any damaging or potentially damaging events caused by deficiencies in the system or deficiencies in an external element on which the system depends. It may be caused by software design errors, hardware degradation, human errors, or corrupted data. • ACCIDENT – is a randomly occurring event which is damaging or potentially damaging. Something beyond control of the system administrator.