SlideShare uma empresa Scribd logo
1 de 22
The Myth of Secure 
Computing 
Robert D. Austin and 
Christopher A.R. Darby
Presentation on 
The Myth of Secure 
Computing 
Group- 6 
Daliya Bhatta 
Hemant Raj Shrestha 
Magina Shrestha 
Pratima Kunwar
What affects 90% of all businesses and 
causes $17 billion of damage every year? 
• Computer Security Breach 
• E-mail floods 
• Insider Hackers 
• Viruses 
• Why is this a big problem? 
• Do not pay much attention to digital security
Why It happens? 
• Digital security is extraordinarily 
complicated 
• Careless or vindictive employees 
• Digital security is invisible
What should a Business Manager do? 
• Protective measures are expensive 
• Should focus on the risk management 
• View computer security as an operational rather than 
technical challenge 
• Reduce the business risk to an acceptable level
Threats to digital security 
Three types of threats to digital security: 
1. Network attacks 
• Without breaching the internal working of an 
IT system, causes heavy damage to network 
via internet 
• Denial of Service (DoS) attacks 
• DoS attacks are easy to mount and difficult to 
defend against
Threats cont… 
2. Intrusion 
• They penetrate organization’s internal IT system 
• They steal information, erase or alter data, deface websites etc. 
• Eavesdropping 
• Difficult to figure out what precisely was done
Threats cont… 
3. Malicious Code 
• Any code in any part of a software system or script that is intended to 
cause undesired effect to a system 
• It consists of viruses and worms, Trojan horses etc. 
• Faster than human hacker 
• Target is random
The 
operational 
approach
1. Identify digital assets and decide how 
much protection each deserves 
What your digital assets are? 
Assess how valuable each assets are 
Decide how much risk company can 
absorb for each asset 
Review people, process and technologies 
that support the assets
2. Define appropriate use of IT resources 
Managers should ask people questions about 
Authority for remote access to corporate 
network 
Safeguards to implement for remote location 
access 
Identify the normal behavior for jobs along with do’s and 
don'ts 
Companies should explain the rationale for the limitations 
implemented
3. Control access to your systems 
System should determine who access the specified 
information 
Use of firewalls, authentication and authorization systems, and 
encryption 
System should be configured to reflect choices of the critical 
assets 
Monitor the use of the IT systems to log network activities
4. Insist in secure software 
Demand reasonable levels of security from software vendors
Insist… 
In case of in-house software, developers should follow secure 
coding and test practices 
Companies should consider the issue of earnings vs. security
5. Know what software is running 
Must document every modification of system 
In case of breach, it provides current records along with digital 
forensics 
Allow IT people to make changes quickly 
Never procrastinate in updating patches
6. Test and benchmark 
Bad guys always gets in 
Focus should be on: 
How easy is to get in? 
What systems or programs were exposed? 
Do not rely heavily on audits 
Hire external auditors periodically to benchmark the security 
standards
7. Rehearse your response 
• Difficulty in making decisions in crisis mode 
• Helps to have procedures in place and specify who should be 
involved in problem-solving activities 
• Enables decision makers to act more confidently and 
effectively during real events 
• Always have a backup plan
8. Analyze the root causes of security 
problems 
• Detailed analysis of root cause is necessary 
• Quality assurance tools can be used: 
• Fish-bone diagram, 
• Eight step process, 
• Plan-do-check-act cycles, etc. 
• Toyota uses “The 5 Whys” approach
The Bottom Line 
• Complete computer security is a MYTH 
• New threats and new capabilities are always emerging 
• Complications in risk management 
• Managers attitude 
• Estimation of cost and probabilities 
• Well-defined management actions not applicable in all situations 
• Addressing serious risk are expensive
Recommendation 
• Focus on serious risks rather than just spending 
• Risk-management is all about business trade-off
Thank- You

Mais conteúdo relacionado

Mais procurados

Cybersecurity in the Workplace is Everyone's Business
 Cybersecurity in the Workplace is Everyone's Business  Cybersecurity in the Workplace is Everyone's Business
Cybersecurity in the Workplace is Everyone's Business Symantec
 
Introduction to QRadar
Introduction to QRadarIntroduction to QRadar
Introduction to QRadarPencilData
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
Threat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert HurlbutThreat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert HurlbutDevSecCon
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
Cyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapCyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapDavid Sweigert
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementasherad
 
Need of SIEM when You have SOAR
Need of SIEM when You have SOARNeed of SIEM when You have SOAR
Need of SIEM when You have SOARSiemplify
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskAlienVault
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYPriyanshu Ratnakar
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Comprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityComprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityJasonTrinhNguyenTruo
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesWAJAHAT IQBAL
 

Mais procurados (20)

Cybersecurity in the Workplace is Everyone's Business
 Cybersecurity in the Workplace is Everyone's Business  Cybersecurity in the Workplace is Everyone's Business
Cybersecurity in the Workplace is Everyone's Business
 
Introduction to QRadar
Introduction to QRadarIntroduction to QRadar
Introduction to QRadar
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
OWASP API Security TOP 10 - 2019
OWASP API Security TOP 10 - 2019OWASP API Security TOP 10 - 2019
OWASP API Security TOP 10 - 2019
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Threat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert HurlbutThreat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert Hurlbut
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Cyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapCyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model Roadmap
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Need of SIEM when You have SOAR
Need of SIEM when You have SOARNeed of SIEM when You have SOAR
Need of SIEM when You have SOAR
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Comprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber securityComprehensive plans are in place to improve our institutional cyber security
Comprehensive plans are in place to improve our institutional cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
 
Information security awareness, middle management
Information security awareness, middle managementInformation security awareness, middle management
Information security awareness, middle management
 

Destaque

rainwater harvesting, Nepal
rainwater harvesting, Nepalrainwater harvesting, Nepal
rainwater harvesting, NepalSaazan Shrestha
 
Rain water harvesting
Rain water harvestingRain water harvesting
Rain water harvestingmitesh patel
 
Management control system in service and multinational organization
Management control system in service and multinational organizationManagement control system in service and multinational organization
Management control system in service and multinational organizationjakiun johora mustafa
 
Rain Water Harvesting- its simple!!!
Rain Water Harvesting- its simple!!!Rain Water Harvesting- its simple!!!
Rain Water Harvesting- its simple!!!Francin Pinto
 
Rain water harvesting powerpoint
Rain water harvesting powerpointRain water harvesting powerpoint
Rain water harvesting powerpointraje20kaur
 
Business process reengineering
Business process reengineeringBusiness process reengineering
Business process reengineeringNeelkamal Sharma
 
Corporate governance ppt mba
Corporate governance ppt mbaCorporate governance ppt mba
Corporate governance ppt mbaBabasab Patil
 
Rain water harvesting (complete)
Rain water harvesting (complete)Rain water harvesting (complete)
Rain water harvesting (complete)Abhay Goyal
 

Destaque (11)

rainwater harvesting, Nepal
rainwater harvesting, Nepalrainwater harvesting, Nepal
rainwater harvesting, Nepal
 
Rain water harvesting
Rain water harvestingRain water harvesting
Rain water harvesting
 
Management control system in service and multinational organization
Management control system in service and multinational organizationManagement control system in service and multinational organization
Management control system in service and multinational organization
 
Rain Water Harvesting- its simple!!!
Rain Water Harvesting- its simple!!!Rain Water Harvesting- its simple!!!
Rain Water Harvesting- its simple!!!
 
Mis ppt
Mis pptMis ppt
Mis ppt
 
Rain water harvesting powerpoint
Rain water harvesting powerpointRain water harvesting powerpoint
Rain water harvesting powerpoint
 
Project planning and control
Project planning and controlProject planning and control
Project planning and control
 
Business process reengineering
Business process reengineeringBusiness process reengineering
Business process reengineering
 
Corporate governance ppt mba
Corporate governance ppt mbaCorporate governance ppt mba
Corporate governance ppt mba
 
Corporate governance
Corporate governanceCorporate governance
Corporate governance
 
Rain water harvesting (complete)
Rain water harvesting (complete)Rain water harvesting (complete)
Rain water harvesting (complete)
 

Semelhante a The myth of secure computing; management information system; MIS

Cyber Security vs.pdf
Cyber Security vs.pdfCyber Security vs.pdf
Cyber Security vs.pdfMing Man Chan
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientAccenture Operations
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Knoldus Inc.
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeAaron White
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis Belsis MPhil/MRes/BSc
 
Security metrics
Security metrics Security metrics
Security metrics PRAYAGRAJ11
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
 
Tictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security ServicesTictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security ServicesTicTac Data Recovery
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Scott Carlson
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 
GDPR | Cyber security process resilience
GDPR | Cyber security process resilienceGDPR | Cyber security process resilience
GDPR | Cyber security process resilienceRishi Kant
 

Semelhante a The myth of secure computing; management information system; MIS (20)

Cyber Security vs.pdf
Cyber Security vs.pdfCyber Security vs.pdf
Cyber Security vs.pdf
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Vulenerability Management.pptx
Vulenerability Management.pptxVulenerability Management.pptx
Vulenerability Management.pptx
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 
Security metrics
Security metrics Security metrics
Security metrics
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Grc tao.4
Grc tao.4Grc tao.4
Grc tao.4
 
Tictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security ServicesTictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security Services
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Topic11
Topic11Topic11
Topic11
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
GDPR | Cyber security process resilience
GDPR | Cyber security process resilienceGDPR | Cyber security process resilience
GDPR | Cyber security process resilience
 

Último

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 

Último (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

The myth of secure computing; management information system; MIS

  • 1. The Myth of Secure Computing Robert D. Austin and Christopher A.R. Darby
  • 2. Presentation on The Myth of Secure Computing Group- 6 Daliya Bhatta Hemant Raj Shrestha Magina Shrestha Pratima Kunwar
  • 3. What affects 90% of all businesses and causes $17 billion of damage every year? • Computer Security Breach • E-mail floods • Insider Hackers • Viruses • Why is this a big problem? • Do not pay much attention to digital security
  • 4.
  • 5. Why It happens? • Digital security is extraordinarily complicated • Careless or vindictive employees • Digital security is invisible
  • 6. What should a Business Manager do? • Protective measures are expensive • Should focus on the risk management • View computer security as an operational rather than technical challenge • Reduce the business risk to an acceptable level
  • 7. Threats to digital security Three types of threats to digital security: 1. Network attacks • Without breaching the internal working of an IT system, causes heavy damage to network via internet • Denial of Service (DoS) attacks • DoS attacks are easy to mount and difficult to defend against
  • 8. Threats cont… 2. Intrusion • They penetrate organization’s internal IT system • They steal information, erase or alter data, deface websites etc. • Eavesdropping • Difficult to figure out what precisely was done
  • 9. Threats cont… 3. Malicious Code • Any code in any part of a software system or script that is intended to cause undesired effect to a system • It consists of viruses and worms, Trojan horses etc. • Faster than human hacker • Target is random
  • 11. 1. Identify digital assets and decide how much protection each deserves What your digital assets are? Assess how valuable each assets are Decide how much risk company can absorb for each asset Review people, process and technologies that support the assets
  • 12. 2. Define appropriate use of IT resources Managers should ask people questions about Authority for remote access to corporate network Safeguards to implement for remote location access Identify the normal behavior for jobs along with do’s and don'ts Companies should explain the rationale for the limitations implemented
  • 13. 3. Control access to your systems System should determine who access the specified information Use of firewalls, authentication and authorization systems, and encryption System should be configured to reflect choices of the critical assets Monitor the use of the IT systems to log network activities
  • 14. 4. Insist in secure software Demand reasonable levels of security from software vendors
  • 15. Insist… In case of in-house software, developers should follow secure coding and test practices Companies should consider the issue of earnings vs. security
  • 16. 5. Know what software is running Must document every modification of system In case of breach, it provides current records along with digital forensics Allow IT people to make changes quickly Never procrastinate in updating patches
  • 17. 6. Test and benchmark Bad guys always gets in Focus should be on: How easy is to get in? What systems or programs were exposed? Do not rely heavily on audits Hire external auditors periodically to benchmark the security standards
  • 18. 7. Rehearse your response • Difficulty in making decisions in crisis mode • Helps to have procedures in place and specify who should be involved in problem-solving activities • Enables decision makers to act more confidently and effectively during real events • Always have a backup plan
  • 19. 8. Analyze the root causes of security problems • Detailed analysis of root cause is necessary • Quality assurance tools can be used: • Fish-bone diagram, • Eight step process, • Plan-do-check-act cycles, etc. • Toyota uses “The 5 Whys” approach
  • 20. The Bottom Line • Complete computer security is a MYTH • New threats and new capabilities are always emerging • Complications in risk management • Managers attitude • Estimation of cost and probabilities • Well-defined management actions not applicable in all situations • Addressing serious risk are expensive
  • 21. Recommendation • Focus on serious risks rather than just spending • Risk-management is all about business trade-off