Security Of Information Systems

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Database Security College of Alameda Copyright © 2007 Patrick McDermott Himeji Castle Hyogo, near Osaka Momoyama period c
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Security+ Guide to Network Security Fundamentals
SECURITY What does this word mean to you? The sum of all measures taken to prevent loss of any kind.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Database Integrity, Security and Recovery Database integrity Database integrity Database security Database security Database recovery Database recovery.
FIT3105 Security and Identity Management Lecture 1.
Chapter 12 Information Security Management © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Factors to be taken into account when designing ICT Security Policies
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Protecting ICT Systems
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
1.1 System Performance Security Module 1 Version 5.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
The Beneficent the MERCIFUL In the NAME of. “ASSURING RELIABLE AND SECURE IT SERVICES”
Security Training USAID Information Security.
MODULE 12 CONTROL AUDIT AND SECURITY OF INFORMATION SYSTEM 12.1 Controls in Information systems 12.2 Need and methods of auditing Information systems 12.3.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
Chapter 12  2000 by Prentice Hall Computer Security Uma Gupta Introduction to Information Systems.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Data Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Communication in Administration (Security)
CONTROLLING INFORMATION SYSTEMS
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
Electronic Commerce Semester 1 Term 1 Lecture 14.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
PRESENTED BY Raju. What is information security?  Information security is the process of protecting information. It protects its availability, privacy.
Information Security and Privacy in HRIS
Blackboard Security System
Design for Security Pepper.
Pre-Computer Skills Internet.
Lecture 14: Business Information Systems - ICT Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Tool Server Workstation Router Universal
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Pre-Computer Skills Internet.
Computer Ethics.
Planning and Security Policies
INFORMATION SYSTEMS SECURITY and CONTROL
Computers: Tools for an Information Age
Security of Data  
Database Security &Threats
Unit 4 IT Security Kerris Davies.
Security network management
Mohammad Alauthman Computer Security Mohammad Alauthman
Session 1 – Introduction to Information Security
Presentation transcript:

Security Of Information Systems Security means protection of data from accidental or intentional modification, destruction or disclosure to unauthorised persons POTENTIAL THREATS TO SECURITY Natural disasters such as fire, floods, earthquakes Accidents such as disk crashes, file erasure by inexperienced operators Theft/erasure of data by disgruntled employees Systems Analysis And Design © V. Rajaraman 12.4.1 22 of 27

Security Of Information Systems POTENTIAL THREATS TO SECURITY (CONTD) Frauds by changing programs, data by employees Industrial espionage Viruses/Worms Hackers who break into systems connected to the internet Denial of service attacks by flooding with mail Systems Analysis And Design © V. Rajaraman 12.4.2 23 of 27

How To Protect Data/programs Regular back up of data bases every day/or week depending on the time criticality and size Incremental back up at shorter intervals Backup copies kept in safe remote location -particularly necessary for disaster recovery Duplicate systems run and all transactions mirrored if it is a very critical system and cannot tolerate any disruption before storing in disk. Physical locks Password system Biometric authentication (Eg: Finger print) Systems Analysis And Design © V. Rajaraman 12.4.3 24 of 27

How To Protect Data/programs Encrypting sensitive data/programs Identification of all persons who read or modify data and logging it in a file Training employees on data care/handling and security Antivirus software Firewall protection when connected to internet Systems Analysis And Design © V. Rajaraman 12.4.4 25 of 27

Data Security, Privacy And Integrity Data security is concerned with protecting data from erasure,theft,unauthorized access and unauthorized modifications Data privacy is concerned with protecting data regarding individuals from being accessed and used without the permission/knowledge of concerned individuals Data integrity is concerned with the quality and reliability of raw as well as processed data Systems Analysis And Design © V. Rajaraman 12.4.5 26 of 27

Data Security, Privacy And Integrity Security does not imply privacy or integrity Privacy controls need specific law against disclosure of personal data Ultimately data and system integrity most important Systems Analysis And Design © V. Rajaraman 12.4.6 27 of 27