INFORMATION SYSTEMS SECURITY AND CONTROL.

Slides:



Advertisements
Similar presentations
Security and Control Soetam Rizky. Why Systems Are Vulnerable ?
Advertisements

Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
14.1 © 2004 by Prentice Hall INFORMATIONSYSTEMS SECURITY AND CONTROL.
Auditing Computer-Based Information Systems
Auditing Computer Systems
4/15: Security & Controls in IS Systems Vulnerabilities Controls: what to use to guard against vulnerabilities –General controls –Application controls.
Information System Security and Control Chapter 15 © 2005 by Prentice Hall Essentials of Management Information Systems, 6e Chapter 15 Information System.
Chapter 17 Controls and Security Measures
Lecture 10 Security and Control.
Lecture 10 Security and Control.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Risks, Controls and Security Measures
14.1 © 2004 by Prentice Hall Management Information Systems 8/e Chapter 14 Information Systems Security and Control 14 INFORMATIONSYSTEMS SECURITY AND.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Essentials of Management Information Systems, 6e Chapter 15 Information System Security and Control 15.1 © 2005 by Prentice Hall Information System Security.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
11.1 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality,
Chapter 8 Security and Control.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
Securing Information Systems
Overview of Systems Audit
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
1 I.Assets and Treats Information System Assets That Must Be Protected People People Hardware Hardware Software Software Operating systems Operating systems.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
C8- Securing Information Systems
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14.
11.1 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality,
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
SESSION 14 INFORMATION SYSTEMS SECURITY AND CONTROL.
Learning Objectives Demonstrate why info systems are vulnerable to destruction, error, abuse, quality control problemsDemonstrate why info systems are.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Chap1: Is there a Security Problem in Computing?.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
Information Systems Security and Control Chapter 14.
CPT 123 Internet Skills Class Notes Internet Security Session B.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Management Information Systems 8/e Chapter 14 Information Systems Security and Control BUILDING INFORMATION SYSTEMS SECURITY AND CONTROL.
14.1 © 2003 by Prentice Hall 14 INFORMATIONSYSTEMS SECURITY AND CONTROL Chapter.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
UNIT V Security Management of Information Technology.
Securing Information Systems
Information Systems Security
Securing Information Systems
Information Systems Development
Chapter 11 Designing Inputs, Outputs, and Controls.
Controlling Computer-Based Information Systems, Part II
INFORMATION SYSTEMS SECURITY & CONTROL
Chapter 17 Risks, Security and Disaster Recovery
FORMAL SYSTEM DEVELOPMENT METHODOLOGIES
Securing Information Systems
Computer-Based Processing: Developing an Audit Assessment Approach
Chapter 10 Security and Control.
Systems Design Chapter 6.
Control , Audit & Security of Information
INFORMATION SYSTEMS SECURITY and CONTROL
Faculty of Science IT Department By Raz Dara MA.
Introduction to Systems Analysis and Design Stefano Moshi Memorial University College System Analysis & Design BIT
PLANNING A SECURE BASELINE INSTALLATION
Computer Security By: Muhammed Anwar.
Information Systems Security and Control
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

INFORMATION SYSTEMS SECURITY AND CONTROL

What types of controls are available for information systems? Essentials of Management Information Systems Chapter 14 Information Systems Security and Control OBJECTIVES Why are information systems so vulnerable to destruction, error, abuse, and system quality problems? What types of controls are available for information systems? What special measures must be taken to ensure the reliability, availability and security of electronic commerce and digital business processes?

What are the most important software quality assurance techniques? Essentials of Management Information Systems Chapter 14 Information Systems Security and Control OBJECTIVES What are the most important software quality assurance techniques? Why are auditing information systems and safeguarding data quality so important?

Applying quality assurance standards in large systems projects Essentials of Management Information Systems Chapter 14 Information Systems Security and Control MANAGEMENT CHALLENGES Designing systems that are neither over-controlled nor under-controlled Applying quality assurance standards in large systems projects

Advances in telecommunications and computer software Essentials of Management Information Systems Chapter 14 Information Systems Security and Control SYSTEM VULNERABILITY AND ABUSE Why Systems are Vulnerable Advances in telecommunications and computer software Unauthorized access, abuse, or fraud Hackers Denial of service attack Computer virus

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control SYSTEM VULNERABILITY AND ABUSE Telecommunication Network Vulnerabilities Figure 14-1

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control SYSTEM VULNERABILITY AND ABUSE Concerns for System Builders and Users Disaster Destroys computer hardware, programs, data files, and other equipment Security Prevents unauthorized access, alteration, theft, or physical damage

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control SYSTEM VULNERABILITY AND ABUSE Concerns for System Builders and Users Errors Cause computers to disrupt or destroy organization’s record-keeping and operations

Maintenance Nightmare Essentials of Management Information Systems Chapter 14 Information Systems Security and Control SYSTEM VULNERABILITY AND ABUSE System Quality Problems: Software and Data Bugs Program code defects or errors Maintenance Nightmare Maintenance costs high due to organizational change, software complexity, and faulty system analysis and design

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control SYSTEM VULNERABILITY AND ABUSE Points in the Processing Cycle where Errors can Occur Figure 14-2

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control SYSTEM VULNERABILITY AND ABUSE System Quality Problems: Software and Data Data Quality Problems Caused due to errors during data input or faulty information system and database design

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control SYSTEM VULNERABILITY AND ABUSE The Cost of Errors over the Systems Development Cycle Figure 14-3

Controls Methods, policies, and procedures Essentials of Management Information Systems Chapter 14 Information Systems Security and Control CREATING A CONTROL ENVIRONMENT Overview Controls Methods, policies, and procedures Ensures protection of organization’s assets Ensures accuracy and reliability of records, and operational adherence to management standards

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control CREATING A CONTROL ENVIRONMENT General Controls and Application Controls General controls Establish framework for controlling design, security, and use of computer programs Include software, hardware, computer operations, data security, implementation, and administrative controls

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control CREATING A CONTROL ENVIRONMENT Security Profiles for a Personnel System Figure 14-4

Application controls Unique to each computerized application Essentials of Management Information Systems Chapter 14 Information Systems Security and Control CREATING A CONTROL ENVIRONMENT General Controls and Application Controls Application controls Unique to each computerized application Include input, processing, and output controls

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control CREATING A CONTROL ENVIRONMENT Protecting the Digital Firm On-line transaction processing: Transactions entered online are immediately processed by computer Fault-tolerant computer systems: Contain extra hardware, software, and power supply components

Disaster recovery plan: Runs business in event of computer outage Essentials of Management Information Systems Chapter 14 Information Systems Security and Control CREATING A CONTROL ENVIRONMENT Protecting the Digital Firm High-availability computing: Tools and technologies enabling system to recover from a crash Disaster recovery plan: Runs business in event of computer outage Load balancing: Distributes large number of requests for access among multiple servers

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control CREATING A CONTROL ENVIRONMENT Protecting the Digital Firm Mirroring: Duplicating all processes and transactions of server on backup server to prevent any interruption Clustering: Linking two computers together so that a second computer can act as a backup to the primary computer or speed up processing

Intrusion Detection System Essentials of Management Information Systems Chapter 14 Information Systems Security and Control CREATING A CONTROL ENVIRONMENT Internet Security Challenges Firewalls Prevent unauthorized users from accessing private networks Two types: proxies and stateful inspection Intrusion Detection System Monitors vulnerable points in network to detect and deter unauthorized intruders

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control CREATING A CONTROL ENVIRONMENT Internet Security Challenges Figure 14-5

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control CREATING A CONTROL ENVIRONMENT Security and Electronic Commerce Encryption: Coding and scrambling of messages to prevent their access without authorization Authentication: Ability of each party in a transaction to ascertain identity of other party Message integrity: Ability to ascertain that transmitted message has not been copied or altered

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control CREATING A CONTROL ENVIRONMENT Security and Electronic Commerce Digital signature: Digital code attached to electronically transmitted message to uniquely identify contents and sender Digital certificate: Attachment to electronic message to verify the sender and to provide receiver with means to encode reply

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control CREATING A CONTROL ENVIRONMENT Security and Electronic Commerce Secure Electronic Transaction (SET): Standard for securing credit card transactions over Internet and other networks

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control CREATING A CONTROL ENVIRONMENT Public Key Encryption Figure 14-6

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control CREATING A CONTROL ENVIRONMENT Digital Certificates Figure 14-7

Criteria for determining control structure Essentials of Management Information Systems Chapter 14 Information Systems Security and Control CREATING A CONTROL ENVIRONMENT Developing a Control Structure: Costs and Benefits Criteria for determining control structure Importance of data Efficiency, complexity, and expense of each control technique Level of risk if a specific activity or process is not properly controlled

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control CREATING A CONTROL ENVIRONMENT The Role of Auditing in the Control Process MIS audit Identifies all controls that govern individual information systems and assesses their effectiveness

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control ENSURING SYSTEM QUALITY Sample Auditor’s List of Control Weaknesses Figure 14-8

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control ENSURING SYSTEM QUALITY Software Quality Assurance Methodologies and Tools Development methodology: Collection of methods, for every activity within every phase of development project Structured: Refers to fact that techniques are carefully drawn up, step-by-step, with each step building on a previous one

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control ENSURING SYSTEM QUALITY Software Quality Assurance Methodologies and Tools Structured analysis: Method for defining system inputs, processes, and outputs, for partitioning systems into subsystems or modules Data Flow Diagram (DFD): Graphically illustrates system’s component processes and flow of data

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control ENSURING SYSTEM QUALITY Data Flow Diagram for Mail-in University Registration System Figure 14-9

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control ENSURING SYSTEM QUALITY Software Quality Assurance Methodologies and Tools Structured design: Encompasses set of design rules and techniques for designing systems Structured programming: Organizing and coding programs that simplify control paths System flowchart: Graphic design tool depicting physical media and sequence of processing steps

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control ENSURING SYSTEM QUALITY High-Level Structure Chart For a Payroll System Figure 14-10

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control ENSURING SYSTEM QUALITY Basic Program Control Constructs Figure 14-11

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control ENSURING SYSTEM QUALITY System Flow-Chart for a Payroll System Figure 14-12

Inflexible Time-consuming Essentials of Management Information Systems Chapter 14 Information Systems Security and Control ENSURING SYSTEM QUALITY Limitation of Traditional Methods Inflexible Time-consuming

Reduces repetitive work Essentials of Management Information Systems Chapter 14 Information Systems Security and Control ENSURING SYSTEM QUALITY Computer-Aided Software Engineering (CASE) Automation of step-by-step methodologies for software and systems development Reduces repetitive work Enforces standard development methodology and design discipline Improves communication between users and technical specialists

Organizes and correlates design components Essentials of Management Information Systems Chapter 14 Information Systems Security and Control ENSURING SYSTEM QUALITY Computer-Aided Software Engineering (CASE) Organizes and correlates design components Automates tedious and error-prone portion of analysis and design, code generation, testing, and control rollout

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control ENSURING SYSTEM QUALITY Resource Allocation During Systems Development Resource allocation Determines how costs, time, and personnel are assigned to different phases of systems development project

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control ENSURING SYSTEM QUALITY Software Metrics Objective assessment of software used in the system in form of quantified measurements

Essentials of Management Information Systems Chapter 14 Information Systems Security and Control ENSURING SYSTEM QUALITY Testing Walkthrough: Review of specification or design document by small group of people Debugging: Process of discovering and eliminating errors and defects in program code

Data quality audit Data cleansing Survey and/or sample of files Essentials of Management Information Systems Chapter 14 Information Systems Security and Control ENSURING SYSTEM QUALITY Data Quality Audit and Data Cleansing Data quality audit Survey and/or sample of files Determines accuracy and completeness of data Data cleansing Correcting errors and inconsistencies in data to increase accuracy

INFORMATION SYSTEMS SECURITY AND CONTROL Chapter 14 INFORMATION SYSTEMS SECURITY AND CONTROL