Presentation is loading. Please wait.

Presentation is loading. Please wait.

Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.

Similar presentations


Presentation on theme: "Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345."— Presentation transcript:

1 Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345

2 Dr. S. Loizidou - ACSC3452 Objectives  Demonstrate that Information System vulnerabilities can be controlled  Demonstrate the ways in which Information Systems can be controlled in an organisation  Demonstrate some of the technologies that can be used to control Information Systems vulnerabilities

3 Dr. S. Loizidou - ACSC3453 Controlling Information Systems  Recall there are numerous threats to Information Systems –Hardware failures –Software failures –Upgrade issues –Disasters –Malicious intent

4 Dr. S. Loizidou - ACSC3454 Controlling Information Systems  To minimise likelihood of threats, must control the environment in which Information Systems are developed and deployed  Controls put in place to: –Manually control environment of Information Systems –Automatically add controls to Information Systems

5 Dr. S. Loizidou - ACSC3455 Controlling Information Systems  Implemented through –Policies –Procedures –Standards  Control must be thought about through all stages of Information Systems analysis, construction, deployment operations and maintenance

6 Dr. S. Loizidou - ACSC3456 Controlling Information Systems  What sort of controls can be put in place?

7 Dr. S. Loizidou - ACSC3457 Controls  General controls –Controls for design, security and use of Information Systems throughout the organisation  Application controls –Specific controls for each application –User functionality specific

8 Dr. S. Loizidou - ACSC3458 General Controls  Implementation controls –Audit system development –Ensure properly managed and controlled –Ensure user involvement –Ensure procedures and standards are in use  Software controls –Authorised access to systems

9 Dr. S. Loizidou - ACSC3459 General Controls  Hardware controls –Physically secure hardware –Monitor for and fix malfunction –Environmental systems and protection –Backup of disk-based data

10 Dr. S. Loizidou - ACSC34510 General Controls  Computer operations controls –Day-to-day operations of Information Systems –Procedures –System set-up –Job processing –Backup and recovery procedures

11 Dr. S. Loizidou - ACSC34511 General Controls  Data security controls –Prevent unauthorised access, change or destruction –When data is in use or being stored –Physical access to terminals –Password protection –Data level access controls

12 Dr. S. Loizidou - ACSC34512 General Controls  Administrative controls –Ensure organisational policies, procedures and standards and enforced –Segregation of functions to reduce errors and fraud –Supervision of personal to ensure policies and procedures are being adhered to

13 Dr. S. Loizidou - ACSC34513 Application Controls  Input controls –Data is accurate and consistent on entry –Direct keying of data, double entry or automated input –Data conversion, editing and error handling –Field validation on entry –Input authorisation and auditing –Checks on totals to catch errors

14 Dr. S. Loizidou - ACSC34514 Application Controls  Processing controls –Data is accurate and complete on processing –Checks on totals to catch errors –Compare to master records to catch errors –Field validation on update

15 Dr. S. Loizidou - ACSC34515 Application Controls  Output controls –Data is accurate, complete and properly distributed on output –Checks on totals to catch errors –Review processing logs –Track recipients of data

16 Dr. S. Loizidou - ACSC34516 Protecting Information Systems  What sorts of technology can we use to implement Information Systems controls?

17 Dr. S. Loizidou - ACSC34517 Protecting Information Systems  Information Systems, especially TPS, require high degrees of availability  Technology is available to ensure systems are available and contain accurate information

18 Dr. S. Loizidou - ACSC34518 High Availability Computing  Systems available for most of the time (some downtime allowed) –Recover quickly from crash / downtime –Redundant servers and clustering –Mirroring of data and networked storage –Load balancing –Scalable and robust infrastructure –Disaster recovery planning

19 Dr. S. Loizidou - ACSC34519 Fault Tolerant Computing  Systems available all the time (no downtime allowed) –Specialist hardware  HP NonStop (Tandem), Stratos –Detect and correct faults in hardware and software to keep processing

20 Dr. S. Loizidou - ACSC34520 Network Security  Permanent (open) network connectivity: Internet, Extranet, wireless –Firewall: proxy or stateful inspection –Firewalls must be managed and part of security policy –Encryption: public key, SSL of S-HTTP –Authentication and integrity –Digital signatures and certificates

21 Dr. S. Loizidou - ACSC34521 Developing Control  Lots of threats to Information Systems  Lots of controls required  Decision on which controls to use based upon likelihood of threat and cost  Risk assessment –Likely frequency of threat –Cost of damage –Cost of implementation

22 Dr. S. Loizidou - ACSC34522 HOMEWORK

23 Dr. S. Loizidou - ACSC34523 HOMEWORK


Download ppt "Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345."

Similar presentations


Ads by Google