SlideShare a Scribd company logo
1 of 14
SECURITY AND
CONTROL
BY SATYA PRAKASH JOSHI
SECURITY AND CONTROL
• Computer system play such a critical role in business, government
and daily life that firms need to make security and control a top
priority.
• Security refers to the policies procedures, and technical measures
used to prevent unauthorized access, alteration, theft, or physical
damage to information system.
• Control consist of all the methods, policies, accuracy and reliability
of its accounting records, and operational adherence to
management standards.
WHAT IS VULNERABILITY?
• a vulnerability is a weakness which allows an attacker to reduce a
system's information assurance.
• Vulnerability is the intersection of three elements: a system
susceptibility or flaw, attacker access to the flaw, and attacker
capability to exploit the flaw.
• Malware is a software which is specifically designed to disrupt or
damage a computer system.
WHAT SYSTEM VULNERABILITY?
• Telecommunication networks are highly vulnerable to natural failure of hardware
and software and to misuse by programmers, computer operators, maintenance
staff and end-users.
• It is possible to tap communications lines and illegally intercept data.
• High speed transformation over twisted wire communication channels causes
interfaces called crosstalk.
• Radiations can disrupt a network at various point as well.
• The potential for unauthorized access, abuse or fraud is not limited to a single
location but can occur at any access point in the network
WHY SYSTEMS ARE VULNERABLE?
• They can stem from technical, organization, and environmental factors
compounded by poor management decisions.
• In the multitier client server computing environment vulnerability exist at each layer
in the communications between the layers.
• Users at the client layer can cause harm by introducing errors or by accessing
systems without authorization .
• It is possible to access data flowing over network steal valuable data during
transmission or alter message without authorization.
• Radiation can disrupt a network at various points as well.
• Intruders can launch denial of service attacks or malicious software to disrupt the
operation of websites.
CONTI…
INTERNAL THREATS
We think the security threats to a business originate outside the organization but
the fact, the largest financial threats to business institutions come from insiders.
Lack of knowledge is the single greatest cause of network security breaches. Many
employees forget their passwords to access computer system or allow other co-
workers to use them.
• Hacker : A hacker is a person who gains unauthorized access to a computer
network for profits criminal, mischief or personal pleasure.
• Security: Policies, procedures and technical measures used to prevent
unauthorized access, attraction, theft or physical damage or information system.
CONTEMPORARY SECURITY CHALLENGES AND
VULNERABILITIES
• Architecture of a web based application typically includes a web client, a server,
and corporate information system linked to database.
• Each of these components presents security challenges and vulnerabilities.
Floods, fires, power failures, and other electrical problems can cause disruptions
at any point in the network.
• System malfunction if computer hardware breaks down, if not configured
properly or is damaged by improper use or criminal acts. i.e error in
programming, improper installation, or unauthorized changes causes computer
to fail.
INTERNET VULNERABILITIES
• Larger public network such as the Internet are most vulnerable than internal
networks because they are virtually open to anyone.
• When the Internet becomes part of the corporate network, the organization’s
information systems are even more vulnerable to action from outsiders.
• Most Voice Over IP (VoIP) traffic over the public Internet is not encrypted, so
anyone linked to a network can listen in a conversations.
• Hackers can intercept conversation to obtain credit card and other confidential
personal information or shut down voice service by flooding servers supporting
VoIP with bogus traffic.
WIRELESS SECURITY CHALLENGES
• Wireless network using radio-based technology are even more vulnerable to
penetration because radio frequency bands are easy to scan.
• WiFi – Wireless Fidelity only several hundred feed, it can be extended up to one-
fourth of a mile using external antennae's.
• Local area networks (LANs that use the 802.11b (WiFi) standard can be easily
penetrated by outsiders armed with laptops, wireless cards, external antennae
and freeware hacking software.
• Hackers use these tools to detect unprotected networks, monitor network traffic,
and in some cases, gain access to the Internet or to corporate networks.
SOFTWARE VULNERABILITY
• Software vulnerability cause huge lose of the company or any organization.
• Major problems with software is the presence of hidden bugs or program code
defects.
• Virtually impossible to eliminate all bugs from large programs.
• Even after rigorous testing, developers do not know for sure that a piece of
software is dependable until the product proves itself after much operational use.
CONT..
• To correct software flaws once they are identified, the software vendor creates
lines of code called patches to repair the flaw without disturbing proper
operation of the software.
• Best example is Firewall to protect against viruses and intruders, capabilities for
automatic security updates.
• It is up to users of the software to track these vulnerabilities, test, and apply all
patches. This process is called patch management.
BUSINESS VALUE OF SECURITY AND CONTROL
• Security and control have become a critical, although perhaps unappreciated,
area of information system investment.
• When computer system fail to run or work as required, first that depends heavily
on computer experience serious loss.
• Longer computer systems down serious loss.
• These days every organization depends on Internet and Networked system.
• 2003 corporate networks and home
computer systems were
overwhelmed by attacks from the
SoBig.F worm. SoBig.
• SoBig caused an estimated $50
million in damage in the United
States alone during that period,
temporarily disabling freight and
computer traffic
• Companies have very valuable
information assets to protect.
Systems often house confidential
information about individuals’ taxes,
financial assets, medical records, and
job performance reviews.
• Businesses must protect not only
their own information assets but also
those of customers, employees, and
business partners.

More Related Content

What's hot

Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in misI P Abir
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsSammer Qader
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abusePrakash Raval
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
Information security
Information securityInformation security
Information securityLJ PROJECTS
 
1. security management practices
1. security management practices1. security management practices
1. security management practices7wounders
 
Client server network threat
Client server network threatClient server network threat
Client server network threatRaj vardhan
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
History of Management Information System
History of Management Information SystemHistory of Management Information System
History of Management Information SystemEmil Mesina
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationKudzai Rerayi
 
MIS 02 foundations of information systems
MIS 02  foundations of information systemsMIS 02  foundations of information systems
MIS 02 foundations of information systemsTushar B Kute
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsSukanya Ben
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 

What's hot (20)

Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abuse
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Information security
Information securityInformation security
Information security
 
Executive Information System
Executive Information SystemExecutive Information System
Executive Information System
 
Information system
Information systemInformation system
Information system
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
History of Management Information System
History of Management Information SystemHistory of Management Information System
History of Management Information System
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
MIS 02 foundations of information systems
MIS 02  foundations of information systemsMIS 02  foundations of information systems
MIS 02 foundations of information systems
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information Systems
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 

Similar to Security and control in Management Information System

Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).pptGooglePay16
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxyasirkhokhar7
 
presentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptxpresentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptxAadityaRauniyar1
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security DefinitionPatten John
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityGeevarghese Titus
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)sayyed azam
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptxParthYadav89
 
презентация1
презентация1презентация1
презентация1sagidullaa01
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 

Similar to Security and control in Management Information System (20)

Cyber security
Cyber securityCyber security
Cyber security
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
 
presentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptxpresentation_security_1510578971_320573.pptx
presentation_security_1510578971_320573.pptx
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Computer security
Computer securityComputer security
Computer security
 
File000119
File000119File000119
File000119
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
презентация1
презентация1презентация1
презентация1
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 

More from Satya P. Joshi

Intergroup Conflict Management.pptx
Intergroup Conflict Management.pptxIntergroup Conflict Management.pptx
Intergroup Conflict Management.pptxSatya P. Joshi
 
Training methods in human resource managment
Training methods in human resource managmentTraining methods in human resource managment
Training methods in human resource managmentSatya P. Joshi
 
Selection tests in human resource management
Selection tests in human resource managementSelection tests in human resource management
Selection tests in human resource managementSatya P. Joshi
 
Interview and it’s types - human resource managmenet
Interview and it’s types - human resource managmenetInterview and it’s types - human resource managmenet
Interview and it’s types - human resource managmenetSatya P. Joshi
 
Motivation, achievement theory, goal setting theory
Motivation, achievement theory, goal setting theoryMotivation, achievement theory, goal setting theory
Motivation, achievement theory, goal setting theorySatya P. Joshi
 
Characteristics, objectives & challenges of human resource manager
Characteristics, objectives & challenges of human resource managerCharacteristics, objectives & challenges of human resource manager
Characteristics, objectives & challenges of human resource managerSatya P. Joshi
 
Human Resource Planning
Human Resource PlanningHuman Resource Planning
Human Resource PlanningSatya P. Joshi
 
Nested queries in database
Nested queries in databaseNested queries in database
Nested queries in databaseSatya P. Joshi
 
Technology and work design in Organizational Relation
Technology and work design in Organizational RelationTechnology and work design in Organizational Relation
Technology and work design in Organizational RelationSatya P. Joshi
 
Techniques of achieving google quality of service
Techniques of achieving google quality of serviceTechniques of achieving google quality of service
Techniques of achieving google quality of serviceSatya P. Joshi
 
Overview of digital communication in HSN and Multimedia
Overview of digital communication in HSN and MultimediaOverview of digital communication in HSN and Multimedia
Overview of digital communication in HSN and MultimediaSatya P. Joshi
 
Introduction to human resource management
Introduction to human resource managementIntroduction to human resource management
Introduction to human resource managementSatya P. Joshi
 
Designing the supply chain network
Designing the supply chain networkDesigning the supply chain network
Designing the supply chain networkSatya P. Joshi
 
Introduction to Organizational Behavior and Organizational Relation
Introduction to Organizational Behavior and Organizational RelationIntroduction to Organizational Behavior and Organizational Relation
Introduction to Organizational Behavior and Organizational RelationSatya P. Joshi
 
Selection tests and Reliability and Validity in HRM
Selection tests and Reliability and Validity in HRMSelection tests and Reliability and Validity in HRM
Selection tests and Reliability and Validity in HRMSatya P. Joshi
 
Analog and digital signal system : digital logic
Analog and digital signal system : digital logicAnalog and digital signal system : digital logic
Analog and digital signal system : digital logicSatya P. Joshi
 
Transmission media on Client server and high speed network
Transmission media on Client server and high speed networkTransmission media on Client server and high speed network
Transmission media on Client server and high speed networkSatya P. Joshi
 
Remote procedure call on client server computing
Remote procedure call on client server computingRemote procedure call on client server computing
Remote procedure call on client server computingSatya P. Joshi
 
Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client serverSatya P. Joshi
 
Performance tuning and optimization on client server
Performance tuning and optimization on client serverPerformance tuning and optimization on client server
Performance tuning and optimization on client serverSatya P. Joshi
 

More from Satya P. Joshi (20)

Intergroup Conflict Management.pptx
Intergroup Conflict Management.pptxIntergroup Conflict Management.pptx
Intergroup Conflict Management.pptx
 
Training methods in human resource managment
Training methods in human resource managmentTraining methods in human resource managment
Training methods in human resource managment
 
Selection tests in human resource management
Selection tests in human resource managementSelection tests in human resource management
Selection tests in human resource management
 
Interview and it’s types - human resource managmenet
Interview and it’s types - human resource managmenetInterview and it’s types - human resource managmenet
Interview and it’s types - human resource managmenet
 
Motivation, achievement theory, goal setting theory
Motivation, achievement theory, goal setting theoryMotivation, achievement theory, goal setting theory
Motivation, achievement theory, goal setting theory
 
Characteristics, objectives & challenges of human resource manager
Characteristics, objectives & challenges of human resource managerCharacteristics, objectives & challenges of human resource manager
Characteristics, objectives & challenges of human resource manager
 
Human Resource Planning
Human Resource PlanningHuman Resource Planning
Human Resource Planning
 
Nested queries in database
Nested queries in databaseNested queries in database
Nested queries in database
 
Technology and work design in Organizational Relation
Technology and work design in Organizational RelationTechnology and work design in Organizational Relation
Technology and work design in Organizational Relation
 
Techniques of achieving google quality of service
Techniques of achieving google quality of serviceTechniques of achieving google quality of service
Techniques of achieving google quality of service
 
Overview of digital communication in HSN and Multimedia
Overview of digital communication in HSN and MultimediaOverview of digital communication in HSN and Multimedia
Overview of digital communication in HSN and Multimedia
 
Introduction to human resource management
Introduction to human resource managementIntroduction to human resource management
Introduction to human resource management
 
Designing the supply chain network
Designing the supply chain networkDesigning the supply chain network
Designing the supply chain network
 
Introduction to Organizational Behavior and Organizational Relation
Introduction to Organizational Behavior and Organizational RelationIntroduction to Organizational Behavior and Organizational Relation
Introduction to Organizational Behavior and Organizational Relation
 
Selection tests and Reliability and Validity in HRM
Selection tests and Reliability and Validity in HRMSelection tests and Reliability and Validity in HRM
Selection tests and Reliability and Validity in HRM
 
Analog and digital signal system : digital logic
Analog and digital signal system : digital logicAnalog and digital signal system : digital logic
Analog and digital signal system : digital logic
 
Transmission media on Client server and high speed network
Transmission media on Client server and high speed networkTransmission media on Client server and high speed network
Transmission media on Client server and high speed network
 
Remote procedure call on client server computing
Remote procedure call on client server computingRemote procedure call on client server computing
Remote procedure call on client server computing
 
Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client server
 
Performance tuning and optimization on client server
Performance tuning and optimization on client serverPerformance tuning and optimization on client server
Performance tuning and optimization on client server
 

Recently uploaded

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...Suhani Kapoor
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 

Recently uploaded (20)

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 

Security and control in Management Information System

  • 2. SECURITY AND CONTROL • Computer system play such a critical role in business, government and daily life that firms need to make security and control a top priority. • Security refers to the policies procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information system. • Control consist of all the methods, policies, accuracy and reliability of its accounting records, and operational adherence to management standards.
  • 3. WHAT IS VULNERABILITY? • a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. • Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. • Malware is a software which is specifically designed to disrupt or damage a computer system.
  • 4. WHAT SYSTEM VULNERABILITY? • Telecommunication networks are highly vulnerable to natural failure of hardware and software and to misuse by programmers, computer operators, maintenance staff and end-users. • It is possible to tap communications lines and illegally intercept data. • High speed transformation over twisted wire communication channels causes interfaces called crosstalk. • Radiations can disrupt a network at various point as well. • The potential for unauthorized access, abuse or fraud is not limited to a single location but can occur at any access point in the network
  • 5. WHY SYSTEMS ARE VULNERABLE? • They can stem from technical, organization, and environmental factors compounded by poor management decisions. • In the multitier client server computing environment vulnerability exist at each layer in the communications between the layers. • Users at the client layer can cause harm by introducing errors or by accessing systems without authorization . • It is possible to access data flowing over network steal valuable data during transmission or alter message without authorization. • Radiation can disrupt a network at various points as well. • Intruders can launch denial of service attacks or malicious software to disrupt the operation of websites.
  • 7. INTERNAL THREATS We think the security threats to a business originate outside the organization but the fact, the largest financial threats to business institutions come from insiders. Lack of knowledge is the single greatest cause of network security breaches. Many employees forget their passwords to access computer system or allow other co- workers to use them. • Hacker : A hacker is a person who gains unauthorized access to a computer network for profits criminal, mischief or personal pleasure. • Security: Policies, procedures and technical measures used to prevent unauthorized access, attraction, theft or physical damage or information system.
  • 8. CONTEMPORARY SECURITY CHALLENGES AND VULNERABILITIES • Architecture of a web based application typically includes a web client, a server, and corporate information system linked to database. • Each of these components presents security challenges and vulnerabilities. Floods, fires, power failures, and other electrical problems can cause disruptions at any point in the network. • System malfunction if computer hardware breaks down, if not configured properly or is damaged by improper use or criminal acts. i.e error in programming, improper installation, or unauthorized changes causes computer to fail.
  • 9. INTERNET VULNERABILITIES • Larger public network such as the Internet are most vulnerable than internal networks because they are virtually open to anyone. • When the Internet becomes part of the corporate network, the organization’s information systems are even more vulnerable to action from outsiders. • Most Voice Over IP (VoIP) traffic over the public Internet is not encrypted, so anyone linked to a network can listen in a conversations. • Hackers can intercept conversation to obtain credit card and other confidential personal information or shut down voice service by flooding servers supporting VoIP with bogus traffic.
  • 10. WIRELESS SECURITY CHALLENGES • Wireless network using radio-based technology are even more vulnerable to penetration because radio frequency bands are easy to scan. • WiFi – Wireless Fidelity only several hundred feed, it can be extended up to one- fourth of a mile using external antennae's. • Local area networks (LANs that use the 802.11b (WiFi) standard can be easily penetrated by outsiders armed with laptops, wireless cards, external antennae and freeware hacking software. • Hackers use these tools to detect unprotected networks, monitor network traffic, and in some cases, gain access to the Internet or to corporate networks.
  • 11. SOFTWARE VULNERABILITY • Software vulnerability cause huge lose of the company or any organization. • Major problems with software is the presence of hidden bugs or program code defects. • Virtually impossible to eliminate all bugs from large programs. • Even after rigorous testing, developers do not know for sure that a piece of software is dependable until the product proves itself after much operational use.
  • 12. CONT.. • To correct software flaws once they are identified, the software vendor creates lines of code called patches to repair the flaw without disturbing proper operation of the software. • Best example is Firewall to protect against viruses and intruders, capabilities for automatic security updates. • It is up to users of the software to track these vulnerabilities, test, and apply all patches. This process is called patch management.
  • 13. BUSINESS VALUE OF SECURITY AND CONTROL • Security and control have become a critical, although perhaps unappreciated, area of information system investment. • When computer system fail to run or work as required, first that depends heavily on computer experience serious loss. • Longer computer systems down serious loss. • These days every organization depends on Internet and Networked system.
  • 14. • 2003 corporate networks and home computer systems were overwhelmed by attacks from the SoBig.F worm. SoBig. • SoBig caused an estimated $50 million in damage in the United States alone during that period, temporarily disabling freight and computer traffic • Companies have very valuable information assets to protect. Systems often house confidential information about individuals’ taxes, financial assets, medical records, and job performance reviews. • Businesses must protect not only their own information assets but also those of customers, employees, and business partners.