11.1 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control INFORMATION SYSTEMS SECURITY, QUALITY, AND CONTROL
11.2 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control Why are information systems so vulnerable ?Why are information systems so vulnerable ? What special measures must be taken to ensure the reliability, availability, and security of electronic commerce ?What special measures must be taken to ensure the reliability, availability, and security of electronic commerce ? Why are auditing information systems and safeguarding data quality so important?Why are auditing information systems and safeguarding data quality so important? OBJECTIVES
11.3 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control 11.1 SYSTEM VULNERABILITY AND ABUSE Why Systems are Vulnerable Unauthorized accessUnauthorized access –by Hackers or Employees –to destroy, steal or alter data, hardware or software Denial of Service (DOS) AttackDenial of Service (DOS) Attack –Flooding a server with bogus requests in order to crash the network Computer VirusesComputer Viruses –self-replicating, malicious code DisastersDisasters –flood, fire, power loss etc. ErrorsErrors –in Data Entry, Hardware or Software
11.4 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control 11.1 SYSTEM VULNERABILITY AND ABUSE Why Systems are Vulnerable
11.5 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control Concerns for System Builders and Users 11.1 SYSTEM VULNERABILITY AND ABUSE
11.6 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control Why are information systems so vulnerable ?Why are information systems so vulnerable ? What special measures must be taken to ensure the reliability, availability, and security of electronic commerce ?What special measures must be taken to ensure the reliability, availability, and security of electronic commerce ? Why are auditing information systems and safeguarding data quality so important?Why are auditing information systems and safeguarding data quality so important? OBJECTIVES
11.7 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control General Controls and Application Controls CREATING A CONTROL ENVIRONMENT
11.8 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control General Controls and Application Controls CREATING A CONTROL ENVIRONMENT
11.9 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control General Controls and Application Controls CREATING A CONTROL ENVIRONMENT
11.10 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control Fault-Tolerant Computer Systems:Fault-Tolerant Computer Systems: Contain extra hardware, power supply etc. to ensure uninterrupted service Disaster Recovery Plan:Disaster Recovery Plan: Data backup, recovery procedures etc. to keep business running in event of computer outage Mirroring:Mirroring: Duplicating data on backup server to prevent any interruption in service Clustering:Clustering: Linking two computers together so one can backup the other or speed up processing Protecting the Digital Firm CREATING A CONTROL ENVIRONMENT
11.11 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control Internet Security FirewallsFirewalls – –Prevent unauthorized users from accessing private networks Intrusion Detection SystemIntrusion Detection System – –Monitors vulnerable points in network to detect and deter unauthorized intruders CREATING A CONTROL ENVIRONMENT Protecting the Digital Firm
11.12 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control CREATING A CONTROL ENVIRONMENT Protecting the Digital Firm
11.13 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control Security and E-Commerce Encryption :Encryption : Coding messages to prevent unauthorized access Digital Signature:Digital Signature: Digital code attached to message to uniquely identify sender Digital Certificate:Digital Certificate: Attachment to electronic message to verify the sender and to provide receiver with means to encode reply CREATING A CONTROL ENVIRONMENT
11.14 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control CREATING A CONTROL ENVIRONMENT Protecting the Digital Firm Figure 11.8: Digital Certificates
11.15 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control Criteria for Determining Control Structure Importance of dataImportance of data Efficiency and expense of each control techniqueEfficiency and expense of each control technique Level of risk if a specific activity or process is not properly controlledLevel of risk if a specific activity or process is not properly controlled Developing a Control Structure: Costs and Benefits CREATING A CONTROL ENVIRONMENT
11.16 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control Developing a Control Structure: Costs and Benefits CREATING A CONTROL ENVIRONMENT
11.17 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control Why are information systems so vulnerable ?Why are information systems so vulnerable ? What special measures must be taken to ensure the reliability, availability, and security of electronic commerce ?What special measures must be taken to ensure the reliability, availability, and security of electronic commerce ? Why are auditing information systems and safeguarding data quality so important?Why are auditing information systems and safeguarding data quality so important? OBJECTIVES
11.18 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control MIS Audit Identifies all controls that govern individual information systems and assesses their effectivenessIdentifies all controls that govern individual information systems and assesses their effectiveness The Role of Auditing in the Control Process CREATING A CONTROL ENVIRONMENT
11.19 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control The Role of Auditing in the Control Process CREATING A CONTROL ENVIRONMENT
11.20 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control Software Walkthrough:Software Walkthrough: Review of software design by small group of people Software Debugging:Software Debugging: Process of discovering and eliminating defects (bugs) Data Quality Audit:Data Quality Audit: Determines accuracy of data via survey of end users for their perceptions of data quality or survey of samples from data files Data Cleansing:Data Cleansing: Correcting errors in data to increase accuracy 11.3 ENSURING SYSTEM QUALITY
11.21 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control INFORMATION SYSTEMS SECURITY, QUALITY, AND CONTROL