Security and control in mis

12,866 views
12,494 views

Published on

enjoy friends.....

Published in: Education
0 Comments
9 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
12,866
On SlideShare
0
From Embeds
0
Number of Embeds
7
Actions
Shares
0
Downloads
610
Comments
0
Likes
9
Embeds 0
No embeds

No notes for slide

Security and control in mis

  1. 1. MANAGEMENT INFORMATIONSYSTEMS SECURITY ANDCONTROLSubmitted By: Gurjit Singh Shallu Thakur MBA 3rd sem.
  2. 2. What is security? The quality or state of being secure to be free from danger Security is achieved using several strategies simultaneously or used in combination with one another Security is recognized as essential to protect vital processes and the systems that provide those processes Security is not something you buy, it is something you do
  3. 3. OBJECTIVES• Explain why information systems need special protection from destruction, error, and abuse• Assess the business value of security and control• Evaluate elements of an organizational and managerial framework for security and control
  4. 4. OBJECTIVES Identify the challenges posed by information systems security and control and management solutions Why are information systems so vulnerable to destruction, error, abuse, and system quality problems? What types of controls are available for information systems?
  5. 5. Vulnerability, Threat and Attack A vulnerability:- is a weakness in security system ◦ Can be in design, implementation, etc. ◦ Can be hardware, or software A threat:- is a set of circumstances that has the potential to cause loss or harm ◦ Or it’s a potential violation of security ◦ Threat can be:  Accidental (natural disasters, human error, …)  Malicious (attackers, insider fraud, …) An attack:- is the actual violation of security
  6. 6. Why Systems are Vulnerable? Hardware problems- • Breakdowns, configuration errors, damage from improper use or crime Software problems- • Programming errors, installation errors, unauthorized changes) Disasters- • Power failures, flood, fires, etc. Use of networks and computers outside of firm’s control - • E.g. with domestic or offshore outsourcing vendors
  7. 7. SYSTEM VULNERABILITYAND ABUSE Concerns for System Builders and Users Disaster Destroys computer hardware, programs, data files, and other equipment Security Prevents unauthorized access, alteration, theft, or physical damage
  8. 8. SYSTEM VULNERABILITYAND ABUSE Concerns for System Builders and Users Errors- Cause computers to disrupt or destroy organization’s record-keeping and operations Bugs- Program code defects or errors Maintenance Nightmare- Maintenance costs high due to organizational change, software complexity, and faulty system analysis and design
  9. 9. RISKS & THREATS Theft, Virus Attacks Systems & High User Network Knowledge Sabotage, Misuse Failure of IT Systems Natural Lack Of Lapse in Physical Security Calamities & FireDocumentation
  10. 10. SO HOW DOWEOVERCOMETHESEPROBLEMS?
  11. 11. BUSINESS VALUE OFSECURITY AND CONTROL• Inadequate security and control may create serious legal liability.• Businesses must protect not only their own information assets but also those of customers, employees, and business partners. Failure to do so can lead to costly litigation for data exposure or theft.• A sound security and control framework that protects business information assets can thus produce a high return on investment.
  12. 12. ESTABLISHING A MANAGEMENTFRAMEWORK FOR SECURITY ANDCONTROL General controls: Establish framework for controlling design, security, and use of computer programs • Software controls • Hardware controls • Computer operations controls • Data security controls • Implementation controls
  13. 13. ESTABLISHING A MANAGEMENTFRAMEWORK FOR SECURITY ANDCONTROLApplication controls: Unique to each computerized application• Input• Processing• Output
  14. 14. CREATING A CONTROLENVIRONMENT Controls:- • Methods, policies, and procedures • Ensures protection of organization’s assets • Ensures accuracy and reliability of records, and operational adherence to management standards
  15. 15. Worldwide Damage fromDigital Attacks
  16. 16. CREATING A CONTROL ENVIRONMENTDisaster recovery plan: Runs business in event of computer outageLoad balancing: Distributes large number of requests for access among multiple servers
  17. 17. CREATING A CONTROLENVIRONMENT• Mirroring: Duplicating all processes and transactions of server on backup server to prevent any interruption• Clustering: Linking two computers together so that a second computer can act as a backup to the primary computer or speed up processing
  18. 18. CREATING A CONTROLENVIRONMENT Internet Security ChallengesFirewalls:-• Hardware and software controlling flow of incoming and outgoing network traffic• Prevent unauthorized users from accessing private networks• Two types: proxies and stateful inspectionIntrusion Detection System:-• Monitors vulnerable points in network to detect and deter unauthorized intruders
  19. 19. Figure 10-7A Corporate Firewall
  20. 20. CREATING A CONTROL ENVIRONMENT Internet Security• Challenges Encryption: - Coding and scrambling of messages to prevent their access without authorization• Authentication: - Ability of each party in a transaction to ascertain identity of other party• Message integrity: - Ability to ascertain that transmitted message has not been copied or altered
  21. 21. CREATING A CONTROLENVIRONMENT Internet Security Challenges Digital signature: -Digital code attached to electronically transmitted message to uniquely identify contents and sender Digital certificate: -Attachment to electronic message to verify the sender and to provide receiver with means to encode reply Secure Electronic Transaction (SET): - Standard for securing credit card transactions over Internet and other networks
  22. 22. USER RESPONSIBILITIES Access Control - Physical • Follow Security Procedures • Wear Identity Cards • Ask unauthorized visitor his credentials • Attend visitors in Reception and Conference Room only• Bring visitors in operations area without prior permission• Bring hazardous and combustible material in secure area• Practice “Piggybacking”• Bring and use pen drives, zip drives, ipods, other storage devices unless and otherwise authorized to do so
  23. 23. USER RESPONSIBILITIES Password Guidelines  Always use at least 8 character password with combination of alphabets, numbers and special characters (*, %, @, #, $, ^)  Use passwords that can be easily remembered by you  Change password regularly as per policy  Use password that is significantly different from earlier passwordsUse passwords which reveals your personal information or words found in dictionaryWrite down or Store passwordsShare passwords over phone or EmailUse passwords which do not match above complexity criteria
  24. 24. USER RESPONSIBILITIES Internet Usage  Use internet services for business purposes only Do not access internet through dial-up connectivity Do not use internet for accessing auction sites Do not use internet for hacking other computer systems Do not use internet to download / upload commercial software / copyrighted materialTechnology Department is continuouslymonitoring Internet Usage. Any illegal use ofinternet and other assets shall call forDisciplinary Action.
  25. 25. CREATING A CONTROLENVIRONMENT Antivirus SoftwareAntivirus software: - Software that checks computer systems and drives for the presence of computer viruses and can eliminate the virus from the infected area• Wi-Fi Protected Access specification
  26. 26. This NEC PChas a biometricfingerprintreader for fastyet secureaccess to filesand networks.New models ofPCs are startingto use biometricidentification toauthenticate
  27. 27. MANAGEMENT OPPORTUNITIES,CHALLENGES AND SOLUTIONSoManagement Opportunities: -Creation of secure, reliable Web sites andsystems that can support e-commerce and e-business strategies
  28. 28. MANAGEMENTCHALLENGESDesigning systems that are neither over-controllednor under-controlledprovide network and infrastructure security to afinancial services firm in a Web-enabled high-threatenvironment
  29. 29. MANAGEMENTCHALLENGES Implementing an effective security policy Applying quality assurance standards in large systems projects What are the most important software quality assurance techniques? Why are auditing information systems and safeguarding data quality so important?
  30. 30. Solution Guidelines• Security and control must become a more visible and explicit priority and area of information systems investment.• Support and commitment from top management is required to show that security is indeed a corporate priority and vital to all aspects of the business.• Security and control should be the responsibility of everyone in the organization.
  31. 31. Human Wall Is AlwaysBetter Than A Firewall . . . LET US BUILD A HUMAN WALL ALONG WITH FIREWALL

×