SlideShare a Scribd company logo
Instructor: Timon Odhiambo Odingo
ICT, Crime and Security
∗ Operating systems
∗ An operating system or OS is a software program that enables
the computer hardware to communicate and operate with the
computer software. Without a computer operating system, a
computer and software programs would be useless. The picture
to the right is an example ofMicrosoft Windows XP, a popular
operating system and what the box may look like if you were to
purchase it from a local retail store.
∗ Operating system types
∗ As computers have progressed and developed so have the
operating systems. Below is a basic list of the different operating
systems and a few examples of operating systems that fall into
each of the categories. Many computer operating systems will
fall into more than one of the below categories.
∗ GUI - Short for Graphical User Interface, a GUI Operating System
contains graphics and icons and is commonly navigated by using
a computer mouse. See the GUIdefinition for a complete
definition. Below are some examples of GUI Operating Systems.
∗ Operating system types
∗ Windows 98
Windows CE
∗ Multi-user - A multi-user operating system allows for multiple
users to use the same computer at the same time and different
times. See the multi-user definition for a complete definition for
a complete definition. Below are some examples of multi-user
operating systems.
Linux and
Variants(Ubuntu, Fedora, Kubuntu, Debain,
UnixMac OSMS-DOS
IBM OS/2 Warp
Unix and Variants
Windows CEWindows 3.x
Windows 95Windows 98
Windows 98 SEWindows ME
Windows NTWindows 2000
Windows XPWindows Vista
Windows 7
Windows 8Windows 8.1
Applications:
∗Application software is all the computer software that causes a
computer to perform useful tasks beyond the running of the
computer itself. A specific instance of such software is called
a software application, application program, application orapp.[1]
∗The term is used to contrast such software with system software,
which manages and integrates a computer's capabilities but does
not directly perform tasks that benefit the user. The system
software serves the application, which in turn serves the user.
∗Examples include accounting software, enterprise software,
graphics software, media players, and office suites. Many
application programs deal principally with documents.
Applications:
∗. Many application programs deal principally with documents.
Applications may be bundled with the computer and its system
software or published separately, and can be coded as university
projects.[2]
∗Application software applies the power of a particular
computing platform or system software to a particular purpose.
∗Some applications are available in versions for several different
platforms; others have narrower requirements and are thus called,
for example, a Geography application for Windows, an Android
application for education, or Linux gaming. Sometimes a new and
popular application arises which only runs on one platform,
increasing the desirability of that platform. This is called a
killer application.
Applications:
∗An application suite consists of multiple applications bundled
together. They usually have related functions, features and user
interfaces, and may be able to interact with each other, e.g. open
each other's files. Business applications often come in suites, e.g.
Microsoft Office, LibreOffice and iWork, which bundle together a
word processor, a spreadsheet, etc.; but suites exist for other
purposes, e.g. graphics or music.
∗Enterprise software addresses the needs of an entire
organization's processes and data flow, across most all
departments, often in a large distributed environment. (Examples
include financial systems, customer relationship management
(CRM) systems and supply chain management software).
Departmental Software is a sub-type of enterprise software with a
focus on smaller organizations and/or groups within a large
organization. (Examples include travel expense management and
IT Helpdesk.)
Applications:
∗management and IT Helpdesk.)
∗Enterprise infrastructure software provides common capabilities
needed to support enterprise software systems. (Examples include
databases, email servers, and systems for managing networks and
security.)
∗Information worker software lets users create and manage
information, often for individual projects within a department, in
contrast to enterprise management. Examples include
time management, resource management, documentation tools,
analytical, and collaborative. Word processors, spreadsheets, email
and blog clients, personal information system, and individual media
editors may aid in multiple information worker tasks.
Applications:
∗Content access software is used primarily to access content
without editing, but may include software that allows for content
editing. Such software addresses the needs of individuals and
groups to consume digital entertainment and published digital
content. (Examples include media players, web browsers, and help
browsers.)
∗Educational software is related to content access software, but
has the content and/or features adapted for use in by educators or
students. For example, it may deliver evaluations (tests), track
progress through material, or include collaborative capabilities.
∗Simulation software simulates physical or abstract systems for
either research, training or entertainment purposes.
Applications:
∗Media development software generates print and electronic media
for others to consume, most often in a commercial or educational
setting. This includes graphic-art software, desktop publishing
software, multimedia development software, HTML editors, digital-
animation editors, digital audio and video composition, and many
others.[10]
∗Product engineering software is used in developing hardware and
software products. This includes computer-aided design (CAD),
computer-aided engineering (CAE), computer language editing and
compiling tools, integrated development environments, and
application programmer interfaces.
∗Applications can also be classified by computing platform such as
a particular operating system, delivery network such as in
cloud computing and Web 2.0 applications, or delivery devices such
as mobile apps for mobile devices.
Applications:
∗The operating system itself can be considered application
software when performing simple calculating, measuring,
rendering, and word processing tasks not used to control hardware
via command-line interface or graphical user interface. This does
not include application software bundled within operating systems
such as a software calculator or text editor.
∗Information worker software
Applications:
∗. Many application programs deal principally with documents.
Applications may be bundled with the computer and its system
software or published separately, and can be coded as university
projects.[2]
∗Application software applies the power of a particular
computing platform or system software to a particular purpose.
∗Some applications are available in versions for several different
platforms; others have narrower requirements and are thus called,
for example, a Geography application for Windows, an Android
application for education, or Linux gaming. Sometimes a new and
popular application arises which only runs on one platform,
increasing the desirability of that platform. This is called a
killer application.
∗ A database is an organized collection of data. The data are typically
organized to model relevant aspects of reality in a way that
supports processes requiring this information. For example,
modelling the availability of rooms in hotels in a way that supports
finding a hotel with vacancies.
∗ Database management systems (DBMSs) are specially designed
software applications that interact with the user, other applications,
and the database itself to capture and analyze data. A general-
purpose DBMS is a software system designed to allow the
definition, creation, querying, update, and administration of
databases. Well-known DBMSs include MySQL, MariaDB,
PostgreSQL, SQLite, Microsoft SQL Server, Microsoft Access, Oracle
, SAP HANA, dBASE, FoxPro, IBM DB2, LibreOffice Base, FileMaker
Pro andInterSystems Caché. A database is not
generally portable across different DBMSs, but different DBMSs can
interoperate by using standards such as SQL and ODBC or JDBC to
allow a single application to work with more than one database.
ICT Security Introduction
∗ Good security in an organization starts at the top, not
with firewalls, shielded cables or biometrics.
∗ Senior management has a much more significant role
to play in achieving security than they may think.
Security vs. Privacy
∗ Privacy deals with the degree of control that an
entity, whether a person or organization, has over
information about itself.
∗ Security deals with vulnerability to unauthorized
access to content.
What Should
Sr. Management Know?
∗ Security is not a technical issue; it is a
management issue
∗ Total security is a myth.
∗ Not all information is of equal value
∗ it is not technically possible to protect all
information assets
∗ Stakeholders will be increasingly less tolerant
of cyber-related vulnerabilities
Threats
∗ Numerous adversaries are aligned against any firm's
information, systems, and the critical infrastructures that
support them.
∗ disgruntled current or former employees
∗ Hackers
∗ virus writers
∗ criminal groups
∗ those engaged in corporate espionage
∗ Terrorists
∗ foreign intelligence services
∗ information warfare by foreign militaries and various other actors.
Barriers to Security
∗ The worldwide diffusion of the Internet opens up new
business opportunities (e.g., 3-R Framework)
∗ It also increases an organization's vulnerability since
so many more individuals of unknown origin and
intent now have access to its systems
Clue IT In!
∗ Organizations commonly look for technical
certification when hiring IT staff, but how often is any
effort made to educate new security workers on the
organization's strategic focus or to communicate to
them the criticality levels of their information assets?
Critical Infrastructures
∗ Critical Infrastructure Protection
∗ Government-Industry Collaboration
∗ Management's Role in Critical Infrastructure
Protection
∗ To recognize that critical infrastructure protection
is an essential component of corporate governance
as well as organizational security
Organization
∗ Structure leads to locus of ownership of data and processes
∗ Business Environment: threats are based on…
∗ Value of the firm's intellectual property
∗ The degree of change the firm is facing
∗ Its accessibility
∗ Its industry position
∗ Culture
∗ SOPs
∗ Education, Training, and Awareness
Technology
∗ Firewalls and Intrusion Detection
∗ Password Layering
∗ Public Key Infrastructure
∗ Secure Servers
∗ VPNs
Ok, So What?
Managerial Implications
∗ Asset Identification
∗ Risk Assessment
∗ The Control Environment
∗ Physical
∗ Data
∗ Implementation
∗ Operations
∗ Administrative
∗ Application System Controls
Balancing Risks and Costs
∗ Step 1: Identify information assets at an appropriate level of
aggregation
∗ Step 2: Identify the financial consequences of these information
assets being compromised, damaged, or lost
∗ Step 3: Identify the costs of implementing the control
mechanisms that are being proposed to enhance organizational
security
∗ Step 4: Estimate overall risk based on the likelihood of
compromise
∗ Step 5: Estimate the benefits expected by implementing the
proposed security mechanisms
∗ Step 6: Compare the expected benefits obtained in Step 5 with
the cost estimates obtained in Step 3

More Related Content

What's hot

Management Information System
Management Information SystemManagement Information System
Management Information System
Ch Irfan
 
Foundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John LadoFoundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John Lado
Mark John Lado, MIT
 
Basic IT knowledge
Basic IT knowledgeBasic IT knowledge
Basic IT knowledgeTechsailor
 
PPT on MS-CIT Unit 3 (slide share)
PPT on MS-CIT Unit 3 (slide share)PPT on MS-CIT Unit 3 (slide share)
PPT on MS-CIT Unit 3 (slide share)
SHRIBALAJIINFOTECH
 
TAMUC LO 1
TAMUC LO 1TAMUC LO 1
Discovering Computers: Chapter 01
Discovering Computers: Chapter 01Discovering Computers: Chapter 01
Discovering Computers: Chapter 01
Anna Stirling
 
Adeyinka Chap 03 Application Software
Adeyinka Chap 03 Application SoftwareAdeyinka Chap 03 Application Software
Adeyinka Chap 03 Application Softwaresharing notes123
 
DTCC Chapter 1 - Introduction to Computers
DTCC Chapter 1 - Introduction to ComputersDTCC Chapter 1 - Introduction to Computers
DTCC Chapter 1 - Introduction to Computers
Jan Fisher
 
XML and Societal Impacts Of IT
XML and Societal Impacts Of ITXML and Societal Impacts Of IT
XML and Societal Impacts Of ITSagar Kalra
 
Technology Terms & Requirements
Technology Terms & RequirementsTechnology Terms & Requirements
Technology Terms & Requirements
todddibrito
 
Chapter 8 operating systems and utility programs
Chapter 8   operating systems and utility programsChapter 8   operating systems and utility programs
Chapter 8 operating systems and utility programs
haider ali
 
Usage Of Application Software
Usage Of Application SoftwareUsage Of Application Software
Usage Of Application Software'Atikah Khalil
 
Systems Administration - MARK JOHN LADO
Systems Administration - MARK JOHN LADOSystems Administration - MARK JOHN LADO
Systems Administration - MARK JOHN LADO
Mark John Lado, MIT
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...adeel hamid
 
Chapter 01 Digital Literacy
Chapter 01 Digital LiteracyChapter 01 Digital Literacy
Chapter 01 Digital Literacyxtin101
 
Office automation system
Office automation systemOffice automation system
Office automation system
ARUNAYESUDAS
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
Vatsal Unadkat
 
MIU_Computer_Ch3
MIU_Computer_Ch3MIU_Computer_Ch3
MIU_Computer_Ch3
miuitprofessor
 

What's hot (20)

Management Information System
Management Information SystemManagement Information System
Management Information System
 
Foundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John LadoFoundations of Information System in Business - Mark John Lado
Foundations of Information System in Business - Mark John Lado
 
Basic IT knowledge
Basic IT knowledgeBasic IT knowledge
Basic IT knowledge
 
PPT on MS-CIT Unit 3 (slide share)
PPT on MS-CIT Unit 3 (slide share)PPT on MS-CIT Unit 3 (slide share)
PPT on MS-CIT Unit 3 (slide share)
 
TAMUC LO 1
TAMUC LO 1TAMUC LO 1
TAMUC LO 1
 
Discovering Computers: Chapter 01
Discovering Computers: Chapter 01Discovering Computers: Chapter 01
Discovering Computers: Chapter 01
 
Adeyinka Chap 03 Application Software
Adeyinka Chap 03 Application SoftwareAdeyinka Chap 03 Application Software
Adeyinka Chap 03 Application Software
 
DTCC Chapter 1 - Introduction to Computers
DTCC Chapter 1 - Introduction to ComputersDTCC Chapter 1 - Introduction to Computers
DTCC Chapter 1 - Introduction to Computers
 
Week 7 & 8
Week 7 & 8Week 7 & 8
Week 7 & 8
 
XML and Societal Impacts Of IT
XML and Societal Impacts Of ITXML and Societal Impacts Of IT
XML and Societal Impacts Of IT
 
Technology Terms & Requirements
Technology Terms & RequirementsTechnology Terms & Requirements
Technology Terms & Requirements
 
Chapter 8 operating systems and utility programs
Chapter 8   operating systems and utility programsChapter 8   operating systems and utility programs
Chapter 8 operating systems and utility programs
 
Usage Of Application Software
Usage Of Application SoftwareUsage Of Application Software
Usage Of Application Software
 
Systems Administration - MARK JOHN LADO
Systems Administration - MARK JOHN LADOSystems Administration - MARK JOHN LADO
Systems Administration - MARK JOHN LADO
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
 
Week7
Week7Week7
Week7
 
Chapter 01 Digital Literacy
Chapter 01 Digital LiteracyChapter 01 Digital Literacy
Chapter 01 Digital Literacy
 
Office automation system
Office automation systemOffice automation system
Office automation system
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
MIU_Computer_Ch3
MIU_Computer_Ch3MIU_Computer_Ch3
MIU_Computer_Ch3
 

Similar to ICT Intro, OS and Applications, Security

Application of computers
Application of computersApplication of computers
Application of computersDashvina
 
module_1-_5_computer_software.ppt
module_1-_5_computer_software.pptmodule_1-_5_computer_software.ppt
module_1-_5_computer_software.ppt
MufarowasheBingeping
 
Ch 01 s.e introduction
Ch 01 s.e introductionCh 01 s.e introduction
Ch 01 s.e introduction
Badar Waseer
 
EDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATION
EDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATIONEDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATION
EDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATION
catherineCerteza
 
Application software
Application softwareApplication software
Application software
Zaid Hameed
 
COM 115.pdf
COM 115.pdfCOM 115.pdf
BCS 100: Introduction to Computer Science Lesson 2
BCS 100: Introduction to Computer Science Lesson 2BCS 100: Introduction to Computer Science Lesson 2
BCS 100: Introduction to Computer Science Lesson 2
Ndubi Amos
 
Basic Software.pptx
 Basic Software.pptx Basic Software.pptx
Basic Software.pptx
NiloyHasan12
 
software engineering
software engineeringsoftware engineering
software engineering
SandhyaTatekalva
 
Introduction to it application
Introduction to it applicationIntroduction to it application
Introduction to it applicationKumar
 
Computer system soft ware
Computer system soft wareComputer system soft ware
Computer system soft ware
Samuel Igbanogu
 
Computer software
Computer softwareComputer software
Computer software
Ritu Jhalani
 
Hardware , software and filmware
Hardware , software and filmwareHardware , software and filmware
Hardware , software and filmware
MH Shihab
 
Unit IV with Answers
Unit IV with AnswersUnit IV with Answers
Unit IV with Answers
Dr. C.V. Suresh Babu
 
It in business(komal doua)
It in business(komal doua)It in business(komal doua)
It in business(komal doua)
Komal Khalid
 
ict act 1.pptx
ict act 1.pptxict act 1.pptx
ict act 1.pptx
sanjaniarun08
 
Types of software
Types of softwareTypes of software
Types of software
Shreya Vishwanath
 

Similar to ICT Intro, OS and Applications, Security (20)

Computer notes
Computer notesComputer notes
Computer notes
 
Application of computers
Application of computersApplication of computers
Application of computers
 
module_1-_5_computer_software.ppt
module_1-_5_computer_software.pptmodule_1-_5_computer_software.ppt
module_1-_5_computer_software.ppt
 
Ch 01 s.e introduction
Ch 01 s.e introductionCh 01 s.e introduction
Ch 01 s.e introduction
 
Application software
Application softwareApplication software
Application software
 
EDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATION
EDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATIONEDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATION
EDUC 611_SYSTEM SOFTWARE, TECHNOLOGY INTEGRATION
 
Application software
Application softwareApplication software
Application software
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
COM 115.pdf
COM 115.pdfCOM 115.pdf
COM 115.pdf
 
BCS 100: Introduction to Computer Science Lesson 2
BCS 100: Introduction to Computer Science Lesson 2BCS 100: Introduction to Computer Science Lesson 2
BCS 100: Introduction to Computer Science Lesson 2
 
Basic Software.pptx
 Basic Software.pptx Basic Software.pptx
Basic Software.pptx
 
software engineering
software engineeringsoftware engineering
software engineering
 
Introduction to it application
Introduction to it applicationIntroduction to it application
Introduction to it application
 
Computer system soft ware
Computer system soft wareComputer system soft ware
Computer system soft ware
 
Computer software
Computer softwareComputer software
Computer software
 
Hardware , software and filmware
Hardware , software and filmwareHardware , software and filmware
Hardware , software and filmware
 
Unit IV with Answers
Unit IV with AnswersUnit IV with Answers
Unit IV with Answers
 
It in business(komal doua)
It in business(komal doua)It in business(komal doua)
It in business(komal doua)
 
ict act 1.pptx
ict act 1.pptxict act 1.pptx
ict act 1.pptx
 
Types of software
Types of softwareTypes of software
Types of software
 

ICT Intro, OS and Applications, Security

  • 1. Instructor: Timon Odhiambo Odingo ICT, Crime and Security
  • 2. ∗ Operating systems ∗ An operating system or OS is a software program that enables the computer hardware to communicate and operate with the computer software. Without a computer operating system, a computer and software programs would be useless. The picture to the right is an example ofMicrosoft Windows XP, a popular operating system and what the box may look like if you were to purchase it from a local retail store.
  • 3. ∗ Operating system types ∗ As computers have progressed and developed so have the operating systems. Below is a basic list of the different operating systems and a few examples of operating systems that fall into each of the categories. Many computer operating systems will fall into more than one of the below categories. ∗ GUI - Short for Graphical User Interface, a GUI Operating System contains graphics and icons and is commonly navigated by using a computer mouse. See the GUIdefinition for a complete definition. Below are some examples of GUI Operating Systems.
  • 4. ∗ Operating system types ∗ Windows 98 Windows CE ∗ Multi-user - A multi-user operating system allows for multiple users to use the same computer at the same time and different times. See the multi-user definition for a complete definition for a complete definition. Below are some examples of multi-user operating systems.
  • 5. Linux and Variants(Ubuntu, Fedora, Kubuntu, Debain, UnixMac OSMS-DOS IBM OS/2 Warp Unix and Variants Windows CEWindows 3.x Windows 95Windows 98 Windows 98 SEWindows ME Windows NTWindows 2000 Windows XPWindows Vista Windows 7 Windows 8Windows 8.1
  • 6. Applications: ∗Application software is all the computer software that causes a computer to perform useful tasks beyond the running of the computer itself. A specific instance of such software is called a software application, application program, application orapp.[1] ∗The term is used to contrast such software with system software, which manages and integrates a computer's capabilities but does not directly perform tasks that benefit the user. The system software serves the application, which in turn serves the user. ∗Examples include accounting software, enterprise software, graphics software, media players, and office suites. Many application programs deal principally with documents.
  • 7. Applications: ∗. Many application programs deal principally with documents. Applications may be bundled with the computer and its system software or published separately, and can be coded as university projects.[2] ∗Application software applies the power of a particular computing platform or system software to a particular purpose. ∗Some applications are available in versions for several different platforms; others have narrower requirements and are thus called, for example, a Geography application for Windows, an Android application for education, or Linux gaming. Sometimes a new and popular application arises which only runs on one platform, increasing the desirability of that platform. This is called a killer application.
  • 8. Applications: ∗An application suite consists of multiple applications bundled together. They usually have related functions, features and user interfaces, and may be able to interact with each other, e.g. open each other's files. Business applications often come in suites, e.g. Microsoft Office, LibreOffice and iWork, which bundle together a word processor, a spreadsheet, etc.; but suites exist for other purposes, e.g. graphics or music. ∗Enterprise software addresses the needs of an entire organization's processes and data flow, across most all departments, often in a large distributed environment. (Examples include financial systems, customer relationship management (CRM) systems and supply chain management software). Departmental Software is a sub-type of enterprise software with a focus on smaller organizations and/or groups within a large organization. (Examples include travel expense management and IT Helpdesk.)
  • 9. Applications: ∗management and IT Helpdesk.) ∗Enterprise infrastructure software provides common capabilities needed to support enterprise software systems. (Examples include databases, email servers, and systems for managing networks and security.) ∗Information worker software lets users create and manage information, often for individual projects within a department, in contrast to enterprise management. Examples include time management, resource management, documentation tools, analytical, and collaborative. Word processors, spreadsheets, email and blog clients, personal information system, and individual media editors may aid in multiple information worker tasks.
  • 10. Applications: ∗Content access software is used primarily to access content without editing, but may include software that allows for content editing. Such software addresses the needs of individuals and groups to consume digital entertainment and published digital content. (Examples include media players, web browsers, and help browsers.) ∗Educational software is related to content access software, but has the content and/or features adapted for use in by educators or students. For example, it may deliver evaluations (tests), track progress through material, or include collaborative capabilities. ∗Simulation software simulates physical or abstract systems for either research, training or entertainment purposes.
  • 11. Applications: ∗Media development software generates print and electronic media for others to consume, most often in a commercial or educational setting. This includes graphic-art software, desktop publishing software, multimedia development software, HTML editors, digital- animation editors, digital audio and video composition, and many others.[10] ∗Product engineering software is used in developing hardware and software products. This includes computer-aided design (CAD), computer-aided engineering (CAE), computer language editing and compiling tools, integrated development environments, and application programmer interfaces. ∗Applications can also be classified by computing platform such as a particular operating system, delivery network such as in cloud computing and Web 2.0 applications, or delivery devices such as mobile apps for mobile devices.
  • 12. Applications: ∗The operating system itself can be considered application software when performing simple calculating, measuring, rendering, and word processing tasks not used to control hardware via command-line interface or graphical user interface. This does not include application software bundled within operating systems such as a software calculator or text editor. ∗Information worker software
  • 13. Applications: ∗. Many application programs deal principally with documents. Applications may be bundled with the computer and its system software or published separately, and can be coded as university projects.[2] ∗Application software applies the power of a particular computing platform or system software to a particular purpose. ∗Some applications are available in versions for several different platforms; others have narrower requirements and are thus called, for example, a Geography application for Windows, an Android application for education, or Linux gaming. Sometimes a new and popular application arises which only runs on one platform, increasing the desirability of that platform. This is called a killer application.
  • 14. ∗ A database is an organized collection of data. The data are typically organized to model relevant aspects of reality in a way that supports processes requiring this information. For example, modelling the availability of rooms in hotels in a way that supports finding a hotel with vacancies. ∗ Database management systems (DBMSs) are specially designed software applications that interact with the user, other applications, and the database itself to capture and analyze data. A general- purpose DBMS is a software system designed to allow the definition, creation, querying, update, and administration of databases. Well-known DBMSs include MySQL, MariaDB, PostgreSQL, SQLite, Microsoft SQL Server, Microsoft Access, Oracle , SAP HANA, dBASE, FoxPro, IBM DB2, LibreOffice Base, FileMaker Pro andInterSystems Caché. A database is not generally portable across different DBMSs, but different DBMSs can interoperate by using standards such as SQL and ODBC or JDBC to allow a single application to work with more than one database.
  • 15. ICT Security Introduction ∗ Good security in an organization starts at the top, not with firewalls, shielded cables or biometrics. ∗ Senior management has a much more significant role to play in achieving security than they may think.
  • 16. Security vs. Privacy ∗ Privacy deals with the degree of control that an entity, whether a person or organization, has over information about itself. ∗ Security deals with vulnerability to unauthorized access to content.
  • 17. What Should Sr. Management Know? ∗ Security is not a technical issue; it is a management issue ∗ Total security is a myth. ∗ Not all information is of equal value ∗ it is not technically possible to protect all information assets ∗ Stakeholders will be increasingly less tolerant of cyber-related vulnerabilities
  • 18. Threats ∗ Numerous adversaries are aligned against any firm's information, systems, and the critical infrastructures that support them. ∗ disgruntled current or former employees ∗ Hackers ∗ virus writers ∗ criminal groups ∗ those engaged in corporate espionage ∗ Terrorists ∗ foreign intelligence services ∗ information warfare by foreign militaries and various other actors.
  • 19. Barriers to Security ∗ The worldwide diffusion of the Internet opens up new business opportunities (e.g., 3-R Framework) ∗ It also increases an organization's vulnerability since so many more individuals of unknown origin and intent now have access to its systems
  • 20. Clue IT In! ∗ Organizations commonly look for technical certification when hiring IT staff, but how often is any effort made to educate new security workers on the organization's strategic focus or to communicate to them the criticality levels of their information assets?
  • 21. Critical Infrastructures ∗ Critical Infrastructure Protection ∗ Government-Industry Collaboration ∗ Management's Role in Critical Infrastructure Protection ∗ To recognize that critical infrastructure protection is an essential component of corporate governance as well as organizational security
  • 22. Organization ∗ Structure leads to locus of ownership of data and processes ∗ Business Environment: threats are based on… ∗ Value of the firm's intellectual property ∗ The degree of change the firm is facing ∗ Its accessibility ∗ Its industry position ∗ Culture ∗ SOPs ∗ Education, Training, and Awareness
  • 23. Technology ∗ Firewalls and Intrusion Detection ∗ Password Layering ∗ Public Key Infrastructure ∗ Secure Servers ∗ VPNs
  • 24. Ok, So What? Managerial Implications ∗ Asset Identification ∗ Risk Assessment ∗ The Control Environment ∗ Physical ∗ Data ∗ Implementation ∗ Operations ∗ Administrative ∗ Application System Controls
  • 25. Balancing Risks and Costs ∗ Step 1: Identify information assets at an appropriate level of aggregation ∗ Step 2: Identify the financial consequences of these information assets being compromised, damaged, or lost ∗ Step 3: Identify the costs of implementing the control mechanisms that are being proposed to enhance organizational security ∗ Step 4: Estimate overall risk based on the likelihood of compromise ∗ Step 5: Estimate the benefits expected by implementing the proposed security mechanisms ∗ Step 6: Compare the expected benefits obtained in Step 5 with the cost estimates obtained in Step 3