SlideShare une entreprise Scribd logo
1  sur  17
SECURITY AND CONTROL IN
 INFORMATION SYSTEMS
• Security concepts covers a wide array of activities,
   includes products and processes to prevent
   unauthorized access, modification and deletion of
   information knowledge, data and facts.
• Information Systems Concerns:
1. Unintentional threats
      • Human error – in design or use of system
      • Environmental hazards – acts of God and other
      • Computer system failures – faulty products

2. Intentional threats
      • Systems are subject to a wide variety of hazards from criminal
        attacks
GOALS OF INFORMATION SECURITY
1) Prevention
• Prevent computer or information violations from occurring.
   - Simple incidents are losing a password, or leaving a terminal
   logged on overnight
2) Detection
• Detection includes identifying the assets under attack, how it
   occurred and by whom.
3) Response
• Refers to developing strategies and techniques to deal with
   an attack or loss.
RISK TO IS : 1. Risk to Application and Data
a) Computer crime
• The unauthorized use, access, modification, and destruction of hardware,
    software, data, or network resources.
• The unauthorized release of information
• The unauthorized copying of software
• Denying an end user access to his or her own hardware, software, data, or
    network resources

b) Hacking
• Hacking is the obsessive use of computers, or the unauthorized access and use
    of networked computer systems.
• Illegal hackers (also called crackers) frequently assault the Internet and other
    networks to steal or damage data and programs.
• Hackers can monitor e-mail, web server access, or file transfers to extract
    passwords or steal network files, or to plant data that will cause a system to
    welcome intruders.
• Use remote services that allow one computer on a network to execute programs
    on another computer to gain privileged access within a network.
RISK TO IS : 1. Risk to Application and Data

c) Cyber-Theft
- Many computer crimes involve the theft of money.
- Involve unauthorized network entry and fraudulent alternation of
    computer databases to cover the tracks of the employees involved.

d) Unauthorized Use at Work
- This may range from doing private consulting or personal finances, or
   playing video games to unauthorized use of the Internet on company
   networks.

e) Software Piracy
- Unauthorized copying of software or software piracy is a major form of
    software theft because software is intellectual property, which is
    protected by copyright law and user licensing agreements.
RISK TO IS : 1. Risk to Application and Data

f) Piracy of Intellectual Property
• Software is not the only intellectual property subject to
    computer-based piracy. Other forms of copyrighted material,
    such as music, videos, images, articles, books, and other
    written works.

g) Computer Viruses and Worms
• Virus - is a program code that cannot work without being
   inserted into another program. Worm - is a distinct program
   that can run unaided. They typically enter a computer system
   through illegal or borrowed copies of software or through
   network links to other computer systems.
RISK TO IS : 1. Risk to Hardware
a) Natural Disaster
• Disasters that pose a risk to IS include fires, floods,
   hurricanes, which can destroy hardware, software and can
   causing total @ partial paralysis of systems @
   communications lines.

b) Blackout & Brownout
• Blackout – loses of electrical power.
• Brownout – the voltage of power decreases @ short
   interruptions in the flow of power.
• Vandalism - occur when human beings deliberately destroy
   computer systems.
Major Types of Defense Strategies
1. Encryption
       Encryption characteristics include:
•      Passwords, messages, files, and other data can be transmitted in scrambled form and
       unscrambled by computer systems for authorized users only.
•      Encryption involves using special mathematical algorithms, or keys, to transform digital
       data into a scrambled code before they are transmitted, and to decode the data when they
       are received.

2. Authentication
•     Authentication is a critical part of a security system. It is part of the process referred to as
      Identification and authentication (I&A). Identification process starts when a user ID or
      Logon name is typed into a sign on screen. Authentication methods are based on one or
      more of three factors.
      1) password or PIN.
      2) smart card or an identification device.
      3) fingerprints or retinal pattern.
Major Types of Defense Strategies
3. Firewalls
• Firewall computers and software is another important method for control
    and security on the Internet and other networks. A network firewall can
    be a communications processor, typically a router, or a dedicated server,
    along with firewall software.

4. E-Mail Monitoring
• Internet and other online e-mail systems are one of the favourite avenues
    of attack by hackers for spreading computer viruses or breaking into
    networked computers.

5. Virus Defenses (Antivirus Software)
• Antivirus software scan’s the computers memory, disks and all email. It
    uses a virus definition file that is updated regularly.
5 Major Characteristics of Firewall
• A firewall serves as a “gatekeeper” computer system
• A firewall computer screens all network traffic for proper
  passwords and other security.
• only allows authorized transmissions in and out of the
  network.
• Firewalls have become an essential component of
  organizations connecting to the Internet.
• Firewalls can deter, but not completely prevent, unauthorized
  access (hacking) into computer networks.
Major Types of Defense Strategies
6. Backup Files
• Backup files, which are duplicate files of data or programs, are another
    important security measure.
• Files can be protected by file retention measures that involve storing
    copies of files from previous periods.
• Several generations of files can be kept for control purposes.

7. Security Monitors
• System security monitors are programs that monitor the use of computer
    systems and networks and protect them from unauthorized use, fraud,
    and destruction.
Major Types of Defense Strategies
8. Biometric Controls
Uses physical characteristics to identify the user.
• Voice verification
• Fingerprints
• Hand geometry
• Signature dynamics
• Retina scanning
• Face recognition
• Genetic pattern analysis

5. Disaster Recovery
• Hurricanes, earthquakes, fires, floods, criminal and terrorist acts, and human error
    can all severely damage an organization's computing resources. Many
    organizations, like airlines and banks can be crippled by losing even a few hours of
    computing power.
Business Recovery Plan
• Business recovery plan – concern on the
  disaster recovery has spread beyond banks,
  insurance companies and data centers. It the
  traditional recovery fanatics.
9 Steps of the Development a Business
                      Recovery Plan
1. Obtain management’s commitment to the plan
   Top management must be convinced of the potential damages that paralysis of information
   systems may cause.

2. Establish a planning committee
   Coordinator establishes a planning committee comprising representative from all business
   unit that are dependent on computer-based ISs.

3. Perform risk assessment and impact analysis
   The committee assesses which operations would be hurt by disasters and how long the
   organization could continue to operate without damaged resources.

4. Prioritize recovery needs
   The disaster recovery coordinator ranks each IS application according to its effect on an
   organization’s ability to achieve its mission.
9 Steps of the Development a
                     Business Recovery Plan
5. Select a recovery plan
   Recovery plan alternatives are evaluated by considering advantages and disadvantages in
   terms of risk reduction, cost and the speed.

6. Select vendors
   Vendor’s ability to provide telecommunications alternatives, experience and capacity to
   support current applications.

7. Develop and implement the plan
   The plan includes organizational and vendor responsibilities and the sequence of events that
   will take place.

8. Test the plan
   Walk through with each business unit, simulations as if a real disaster had occurred and
   deliberate interruption of the system and implementation of the plan.

9. Continually test and evaluate
   Must be aware of the plan al the times.
General Controls to Minimize Errors and
      Disasters of Information Systems
–    Software controls—monitors the use of system software and prevents
     unauthorized access of software programs, system software, and computer
     programs.
–    Hardware controls—ensure that computer hardware is physically secure
     and functioning properly.
–    Computer operations controls—oversee the work of the computer
     department to ensure that programmed procedures are consistently and
     correctly applied.
–    Data security controls—ensures that valuable business data files are not
     subjected to unauthorized access, change, or destruction.
–    Implementation controls—audit the systems development process at
     various points to ensure that the process is properly controlled and
     managed.
–    Administrative controls—formalized standards, rules, procedures, and
     control disciplines to ensure that the organization’s controls are properly
     executed and enforced.
Security Management Steps to Protect
 Computer System Resources

Contenu connexe

Tendances

Decision Support System in MIS.pptx
Decision Support System in MIS.pptxDecision Support System in MIS.pptx
Decision Support System in MIS.pptxrajalakshmi5921
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemFaHaD .H. NooR
 
Implementation of MIS and its methods
Implementation of MIS and its methodsImplementation of MIS and its methods
Implementation of MIS and its methodsPoojith Chowdhary
 
Functional information system
Functional  information systemFunctional  information system
Functional information systemamazing19
 
Management information system ( MIS )
Management information system ( MIS )Management information system ( MIS )
Management information system ( MIS )QualitativeIn
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abusePrakash Raval
 
Information system for strategic advantage
Information system for strategic advantageInformation system for strategic advantage
Information system for strategic advantageHarmanjeet Kaur
 
MIS and Digital Firms
MIS and Digital FirmsMIS and Digital Firms
MIS and Digital FirmsPulkit Sharma
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information SystemDaryl Conson
 
Role impact and importance of MIS
Role impact and importance of MISRole impact and importance of MIS
Role impact and importance of MISWajahat bhat
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systemsBimbashree K.G
 
Management Information System: Manufacturing Information System
Management Information System: Manufacturing Information SystemManagement Information System: Manufacturing Information System
Management Information System: Manufacturing Information SystemMuhammad Hashaam Shinystar
 

Tendances (20)

Decision Support System in MIS.pptx
Decision Support System in MIS.pptxDecision Support System in MIS.pptx
Decision Support System in MIS.pptx
 
MIS concepts
MIS conceptsMIS concepts
MIS concepts
 
System concept in MIS
System concept in MISSystem concept in MIS
System concept in MIS
 
Ethical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information SystemEthical And Social Issues in MIS - Management Information System
Ethical And Social Issues in MIS - Management Information System
 
Implementation of MIS and its methods
Implementation of MIS and its methodsImplementation of MIS and its methods
Implementation of MIS and its methods
 
Functional information system
Functional  information systemFunctional  information system
Functional information system
 
Mis model
Mis modelMis model
Mis model
 
Management information system ( MIS )
Management information system ( MIS )Management information system ( MIS )
Management information system ( MIS )
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abuse
 
Information system for strategic advantage
Information system for strategic advantageInformation system for strategic advantage
Information system for strategic advantage
 
Expert system (mis)
Expert system (mis)Expert system (mis)
Expert system (mis)
 
Mis notes
Mis notesMis notes
Mis notes
 
Strategic use of information systems
Strategic use of information systemsStrategic use of information systems
Strategic use of information systems
 
MIS and Digital Firms
MIS and Digital FirmsMIS and Digital Firms
MIS and Digital Firms
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 
Role impact and importance of MIS
Role impact and importance of MISRole impact and importance of MIS
Role impact and importance of MIS
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systems
 
Management Information System: Manufacturing Information System
Management Information System: Manufacturing Information SystemManagement Information System: Manufacturing Information System
Management Information System: Manufacturing Information System
 
Structure of mis
Structure of misStructure of mis
Structure of mis
 
Executive Information System
Executive Information SystemExecutive Information System
Executive Information System
 

En vedette

Mis of hero honda
Mis of hero hondaMis of hero honda
Mis of hero hondaneelnmanju
 
Management Information Systems in Maruti Suzuki
Management Information Systems in Maruti SuzukiManagement Information Systems in Maruti Suzuki
Management Information Systems in Maruti SuzukiMohammad Mohtashim
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security controlCheng Olayvar
 

En vedette (6)

Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
Mis of hero honda
Mis of hero hondaMis of hero honda
Mis of hero honda
 
Management Information Systems in Maruti Suzuki
Management Information Systems in Maruti SuzukiManagement Information Systems in Maruti Suzuki
Management Information Systems in Maruti Suzuki
 
McDonald's information systems
McDonald's information systemsMcDonald's information systems
McDonald's information systems
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security control
 
MIS in walmart
MIS in walmartMIS in walmart
MIS in walmart
 

Similaire à Security & control in management information system

Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).pptGooglePay16
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for businessDaniel Thomas
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkataamiyadutta
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
Computer Security
Computer SecurityComputer Security
Computer SecurityAkNirojan
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityGeevarghese Titus
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
Chapter 13
Chapter 13Chapter 13
Chapter 13bodo-con
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1misecho
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 

Similaire à Security & control in management information system (20)

Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
Unit v
Unit vUnit v
Unit v
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
Chapter-2 (1).pptx
Chapter-2 (1).pptxChapter-2 (1).pptx
Chapter-2 (1).pptx
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Linux Security best Practices with Fedora
Linux Security best Practices with FedoraLinux Security best Practices with Fedora
Linux Security best Practices with Fedora
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Mis
MisMis
Mis
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 

Plus de Online

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3Online
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2Online
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1Online
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4Online
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++Online
 
Functions
FunctionsFunctions
FunctionsOnline
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and outputOnline
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selectionOnline
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetitionOnline
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++Online
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission techniqueOnline
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Online
 
Lan technologies
Lan technologiesLan technologies
Lan technologiesOnline
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technologyOnline
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocolsOnline
 
Internet protocol
Internet protocolInternet protocol
Internet protocolOnline
 
Application protocols
Application protocolsApplication protocols
Application protocolsOnline
 
Addressing
AddressingAddressing
AddressingOnline
 
Transport protocols
Transport protocolsTransport protocols
Transport protocolsOnline
 
Leadership
LeadershipLeadership
LeadershipOnline
 

Plus de Online (20)

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++
 
Functions
FunctionsFunctions
Functions
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and output
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selection
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetition
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission technique
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technology
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocols
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Application protocols
Application protocolsApplication protocols
Application protocols
 
Addressing
AddressingAddressing
Addressing
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Leadership
LeadershipLeadership
Leadership
 

Dernier

How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Celine George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptxAneriPatwari
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 

Dernier (20)

How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 

Security & control in management information system

  • 1. SECURITY AND CONTROL IN INFORMATION SYSTEMS
  • 2. • Security concepts covers a wide array of activities, includes products and processes to prevent unauthorized access, modification and deletion of information knowledge, data and facts. • Information Systems Concerns: 1. Unintentional threats • Human error – in design or use of system • Environmental hazards – acts of God and other • Computer system failures – faulty products 2. Intentional threats • Systems are subject to a wide variety of hazards from criminal attacks
  • 3. GOALS OF INFORMATION SECURITY 1) Prevention • Prevent computer or information violations from occurring. - Simple incidents are losing a password, or leaving a terminal logged on overnight 2) Detection • Detection includes identifying the assets under attack, how it occurred and by whom. 3) Response • Refers to developing strategies and techniques to deal with an attack or loss.
  • 4. RISK TO IS : 1. Risk to Application and Data a) Computer crime • The unauthorized use, access, modification, and destruction of hardware, software, data, or network resources. • The unauthorized release of information • The unauthorized copying of software • Denying an end user access to his or her own hardware, software, data, or network resources b) Hacking • Hacking is the obsessive use of computers, or the unauthorized access and use of networked computer systems. • Illegal hackers (also called crackers) frequently assault the Internet and other networks to steal or damage data and programs. • Hackers can monitor e-mail, web server access, or file transfers to extract passwords or steal network files, or to plant data that will cause a system to welcome intruders. • Use remote services that allow one computer on a network to execute programs on another computer to gain privileged access within a network.
  • 5. RISK TO IS : 1. Risk to Application and Data c) Cyber-Theft - Many computer crimes involve the theft of money. - Involve unauthorized network entry and fraudulent alternation of computer databases to cover the tracks of the employees involved. d) Unauthorized Use at Work - This may range from doing private consulting or personal finances, or playing video games to unauthorized use of the Internet on company networks. e) Software Piracy - Unauthorized copying of software or software piracy is a major form of software theft because software is intellectual property, which is protected by copyright law and user licensing agreements.
  • 6. RISK TO IS : 1. Risk to Application and Data f) Piracy of Intellectual Property • Software is not the only intellectual property subject to computer-based piracy. Other forms of copyrighted material, such as music, videos, images, articles, books, and other written works. g) Computer Viruses and Worms • Virus - is a program code that cannot work without being inserted into another program. Worm - is a distinct program that can run unaided. They typically enter a computer system through illegal or borrowed copies of software or through network links to other computer systems.
  • 7. RISK TO IS : 1. Risk to Hardware a) Natural Disaster • Disasters that pose a risk to IS include fires, floods, hurricanes, which can destroy hardware, software and can causing total @ partial paralysis of systems @ communications lines. b) Blackout & Brownout • Blackout – loses of electrical power. • Brownout – the voltage of power decreases @ short interruptions in the flow of power. • Vandalism - occur when human beings deliberately destroy computer systems.
  • 8. Major Types of Defense Strategies 1. Encryption Encryption characteristics include: • Passwords, messages, files, and other data can be transmitted in scrambled form and unscrambled by computer systems for authorized users only. • Encryption involves using special mathematical algorithms, or keys, to transform digital data into a scrambled code before they are transmitted, and to decode the data when they are received. 2. Authentication • Authentication is a critical part of a security system. It is part of the process referred to as Identification and authentication (I&A). Identification process starts when a user ID or Logon name is typed into a sign on screen. Authentication methods are based on one or more of three factors. 1) password or PIN. 2) smart card or an identification device. 3) fingerprints or retinal pattern.
  • 9. Major Types of Defense Strategies 3. Firewalls • Firewall computers and software is another important method for control and security on the Internet and other networks. A network firewall can be a communications processor, typically a router, or a dedicated server, along with firewall software. 4. E-Mail Monitoring • Internet and other online e-mail systems are one of the favourite avenues of attack by hackers for spreading computer viruses or breaking into networked computers. 5. Virus Defenses (Antivirus Software) • Antivirus software scan’s the computers memory, disks and all email. It uses a virus definition file that is updated regularly.
  • 10. 5 Major Characteristics of Firewall • A firewall serves as a “gatekeeper” computer system • A firewall computer screens all network traffic for proper passwords and other security. • only allows authorized transmissions in and out of the network. • Firewalls have become an essential component of organizations connecting to the Internet. • Firewalls can deter, but not completely prevent, unauthorized access (hacking) into computer networks.
  • 11. Major Types of Defense Strategies 6. Backup Files • Backup files, which are duplicate files of data or programs, are another important security measure. • Files can be protected by file retention measures that involve storing copies of files from previous periods. • Several generations of files can be kept for control purposes. 7. Security Monitors • System security monitors are programs that monitor the use of computer systems and networks and protect them from unauthorized use, fraud, and destruction.
  • 12. Major Types of Defense Strategies 8. Biometric Controls Uses physical characteristics to identify the user. • Voice verification • Fingerprints • Hand geometry • Signature dynamics • Retina scanning • Face recognition • Genetic pattern analysis 5. Disaster Recovery • Hurricanes, earthquakes, fires, floods, criminal and terrorist acts, and human error can all severely damage an organization's computing resources. Many organizations, like airlines and banks can be crippled by losing even a few hours of computing power.
  • 13. Business Recovery Plan • Business recovery plan – concern on the disaster recovery has spread beyond banks, insurance companies and data centers. It the traditional recovery fanatics.
  • 14. 9 Steps of the Development a Business Recovery Plan 1. Obtain management’s commitment to the plan Top management must be convinced of the potential damages that paralysis of information systems may cause. 2. Establish a planning committee Coordinator establishes a planning committee comprising representative from all business unit that are dependent on computer-based ISs. 3. Perform risk assessment and impact analysis The committee assesses which operations would be hurt by disasters and how long the organization could continue to operate without damaged resources. 4. Prioritize recovery needs The disaster recovery coordinator ranks each IS application according to its effect on an organization’s ability to achieve its mission.
  • 15. 9 Steps of the Development a Business Recovery Plan 5. Select a recovery plan Recovery plan alternatives are evaluated by considering advantages and disadvantages in terms of risk reduction, cost and the speed. 6. Select vendors Vendor’s ability to provide telecommunications alternatives, experience and capacity to support current applications. 7. Develop and implement the plan The plan includes organizational and vendor responsibilities and the sequence of events that will take place. 8. Test the plan Walk through with each business unit, simulations as if a real disaster had occurred and deliberate interruption of the system and implementation of the plan. 9. Continually test and evaluate Must be aware of the plan al the times.
  • 16. General Controls to Minimize Errors and Disasters of Information Systems – Software controls—monitors the use of system software and prevents unauthorized access of software programs, system software, and computer programs. – Hardware controls—ensure that computer hardware is physically secure and functioning properly. – Computer operations controls—oversee the work of the computer department to ensure that programmed procedures are consistently and correctly applied. – Data security controls—ensures that valuable business data files are not subjected to unauthorized access, change, or destruction. – Implementation controls—audit the systems development process at various points to ensure that the process is properly controlled and managed. – Administrative controls—formalized standards, rules, procedures, and control disciplines to ensure that the organization’s controls are properly executed and enforced.
  • 17. Security Management Steps to Protect Computer System Resources