Download presentation
Presentation is loading. Please wait.
Published byJoseph Rolf Lang Modified over 9 years ago
1
Management Information Systems The Islamia University of Bahawalpur Delivered by: Tasawar Javed Lecture 19
2
Today’s talk Informal Controls Government and Industry Assistance Government Legislation Industry Standards Professional Certification Business Continuity Management Information Security
3
Informal Controls Includes Education Training programs Management development These controls are intended to ensure that the firm’s employees both understand and support the security program Information Security
4
Government and industry Assistance UK BS 7799 UK standards establish a set of the baseline controls. They were first published by the British Standards Institute in 1995, then published by the ISO BSI IT baseline protection Manual Baseline approach is also followed by the German Bundesamt Fur Sicherheit in der Informationstechnik. Intended to provide reasonable security Information Security
5
COBIT Focuses on the process that a firm can follow in developing standards, paying special attention to the writing and maintaining of the documentation GASSP Generally Accepted System Security Principles is a product of the US national research council; establish security policy ISF Standard of Good Practice Information Security Forum Standard of Good practice takes a base line approach, devoting considerable attention to the user behavior that is expected
6
Government Legislation US government Computer Security Standards The US Govt. responded with a program aimed at applying these known protections. A set of security standards that participating organizations should meet, plus the availability of a software program that grades users systems and assists them in configuring their systems to meet the standards The UK anti Terrorism, Crime and Security Act UK, parliament enacted the Anti Terrorism, Crime and Security act; provisions are on next slide Information Security
7
Provisions are: ISPs are required to maintain data about all communication events Government taxing authorities are empowered to disclose information about an individual’s or organization’s financial affairs to authorities investigating crime or terrorism The obligation of confidence is removed for public bodies even if there is only suspicion of an impending terrorist act
8
Information Security Professional certification Information Systems Audit and Control Association International Information System Security Certification Consortium SANS Institute
9
Information Security Business Continuity Management Disaster planning The Emergency Plan It specifies those measures that ensure the safety of employees when disaster strikes; it includes: alarm system, evacuation procedures, and fire-suppression systems
10
Information Security The Backup Plan Redundancy Hardware, software, and data are duplicated so that when one set is inoperable, the backup ser can continue the processing Diversity Information resources are not all installed at the same location. Large firm typically establish separate computing centers for different areas of their operations Mobility A hot side is complete computing facility that is made available by a supplier to its customers for use in the events of emergencies
11
Information Security Cold site Includes only the building facilities, but not the computing resources. The firm can obtain a cold site from a supplier or construct its own facilities. For either approach, the firm must provide the computing resources. The largest supplier of hot and cold sites are IBM and SunGard
12
Information Security The Vital Records Plan a firm’s vital records are those paper documents, microforms, and magnetic and optical storage media that are necessary for carrying on the firm’s business. The vital records plan specifies how the vital records will be protected. In addition to safeguarding the records at the computer site, backup copies should be stored at a remote location. All types of records can be physically transported to the remote location, but the computer records can be transmitted electronically.
13
Thank you!!! Q&A
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.