CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.

Slides:



Advertisements
Similar presentations
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Advertisements

1 MIS 2000 Class 22 System Security Update: Winter 2015.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Managing Information Systems Information Systems Security and Control Part 1 Dr. Stephania Loizidou Himona ACSC 345.
4/15: Security & Controls in IS Systems Vulnerabilities Controls: what to use to guard against vulnerabilities –General controls –Application controls.
Lecture 10 Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
6.1 Copyright © 2014 Pearson Education, Inc. publishing as Prentice Hall Building Information Systems Chapter 13 VIDEO CASES Video Case 1: IBM: Business.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 18-1 Accounting Information Systems 9 th Edition Marshall.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Factors to be taken into account when designing ICT Security Policies
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
11.1 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality,
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Chapter 22 Systems Design, Implementation, and Operation Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 22-1.
Securing Information Systems
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
1 I.Assets and Treats Information System Assets That Must Be Protected People People Hardware Hardware Software Software Operating systems Operating systems.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Information Systems Security Computer System Life Cycle Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Security and backups GCSE ICT.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
C8- Securing Information Systems
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Types of Electronic Infection
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Security and Ethics Privacy Employment Health Crime Working
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
CPS ® and CAP ® Examination Review OFFICE ADMINISRATION, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper.
SESSION 14 INFORMATION SYSTEMS SECURITY AND CONTROL.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
System Implementation. © 2011 Pearson Education, Inc. Publishing as Prentice Hall 2 Chapter 13 FIGURE 13-1 Systems development life cycle with the implementation.
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
Information Systems Security and Control Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Securing Information Systems
Information Systems Security
Blackboard Security System
Securing Information Systems
INFORMATION SYSTEMS SECURITY AND CONTROL.
Information Systems Development
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Securing Information Systems
Systems Design Chapter 6.
INFORMATION SYSTEMS SECURITY and CONTROL
Presentation transcript:

CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Office Systems and Technology Chapter 5: System Security

2 CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Information Systems Personnel Programmers are technical specialists who write and maintain software code Systems analysts translate business requirements into IT problems Database administrators are responsible for logical database design, security, and use of the database Network engineers design and maintain the technology infrastructure Web specialists design and/or maintain Web pages and servers

3 CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ System Users End users must protect their hardware and software  Antivirus programs should be kept up-to-date and scans run often  Regularly backup important documents in case of emergency  Passwords should be applied to keep information secure  Permanently delete files that are unnecessary  Firewalls should be installed to protect the data

4 CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Systems Personnel and End-Users Technical and administrative support for users, training along with upgrades Information center to support users in using technology Information policy sets up the guidelines for safe use of a computer system Joint information systems/end-user teams are used in a team management system, collaborative Steering committee focuses on policies for the information system

5 CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Unintentional Threats to the System Errors at any point in the information processing cycle, check for accuracy Software defects and errors, check for patches regularly Inaccurate or inconsistent data crates operational and financial problems Environmental hazards... fire, floods, power outages, earthquakes, hurricanes, and storms

6 CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Intentional Threats to the System Hackers access a computer system for mischief, crackers are malicious Viruses are software programs that spread through a network disrupting operations A Trojan horse is a destructive program that impersonates an innocent application Spam is unsolicited junk mail Data tampering whether it is intentional or not Worm viruses Macro viruses File infecting viruses Script viruses

7 CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Hardware and Software Controls Lock all doors inside and out, use security personnel or cameras Have a disaster recovery plan Maintain and replace equipment on a rotating basis to avoid obsolescence Restrict unauthorized users with passwords, access cards, or biometric controls Be sure all software licenses are up-to-date and accurate

8 CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Implementation Controls Testing programs identify errors before they create problems for users Conversion is the process of changing from one system to another  Direct is all at once, risky, and costly  Parallel runs both at once, safe but costly  Pilot tests in one area first  Phased spreads out cost and training Training and end-user support is important for an effective system

9 CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Operations Controls Fault tolerant systems include a duplicate system as a backup during system failure A disaster recovery plan should be in place to run a business during a system failure Data security must be a part of the network and database systems, data backup and recovery Data use controls include rules, standards and disciplinary action, promote compliance

10 CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Application Controls Input controls check for authorization, data editing, and error handling Processing controls check for accuracy in the data and completeness during the processing phase Output controls ensure that the end results are complete and properly distributed

11 CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Network and Internet Security Controls Firewalls consist of software and hardware placed between the organization’s internal network and an external network (the Internet) Antivirus programs should be on all networks and computers to protect computers from viruses (both known and new), reduce vulnerability by keeping it current and training employees to be careful

12 CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ E-Commerce Security Secure channels like value-added networks and virtual private networks Encryption codes messages to restrict access A digital signature adds a code to a document to ID the sender and contents A digital certificate uses a third party to verify the sender A digital wallet is software that stores information for e-commerce Security protocol (S-HTTP) is used to transfer information securely over the Internet

13 CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Systems Life Cycle 1. Analysis is the problem solving stage where causes and solutions are identified 2. Design is the blueprint or model of the system 3. Development is the programming, testing, documenting, training, and converting to a new system 4. Operation and maintenance is continually assessing and making changes to the system

14 CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Troubleshooting—Systems Analysis Analyze current operations related to objectives and information flow Identify existing problems and/or inefficiencies Define alternatives for the user’s new objectives Evaluate the alternatives identified as they impact the organization Implementation and follow-up

15 CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Troubleshooting—Systems Audits External audit examines the input, process, output, internal audits, potential hazards Internal audit should be done regularly Internal and external should include  Output audits  Computer audits  Computer-assisted audits Data audits survey data files for accuracy and completeness