SlideShare a Scribd company logo
MANAGEMENT INFORMATION
SYSTEMS SECURITY AND
CONTROL
Prepared By:
Vishal Patyal
The quality or state of being secure to be
free from danger
Security is achieved using several strategies
simultaneously or used in combination with
one another
Security is recognized as essential to protect
vital processes and the systems that provide
those processes
Security is not something you buy, it is
something you do
What is security?
OBJECTIVES
• Explain why information systems need
special protection from destruction,
error, and abuse
• Assess the business value of security
and control
• Evaluate elements of an organizational
and managerial framework for security
and control
OBJECTIVES
 Identify the challenges posed by
information systems security and control
and management solutions
 Why are information systems so
vulnerable to destruction, error, abuse,
and system quality problems?
 What types of controls are available for
information systems?
Vulnerability, Threat and Attack
A vulnerability:- is a weakness in security
system
◦ Can be in design, implementation, etc.
◦ Can be hardware, or software
A threat:- is a set of circumstances that has the
potential to cause loss or harm
◦ Or it’s a potential violation of security
◦ Threat can be:
Accidental (natural disasters, human error,
…)
Malicious (attackers, insider fraud, …)
An attack:- is the actual violation of security
Why Systems are Vulnerable?
 Hardware problems-
• Breakdowns, configuration errors, damage
from improper use or crime
 Software problems-
• Programming errors, installation errors,
unauthorized changes)
 Disasters-
• Power failures, flood, fires, etc.
 Use of networks and computers outside of
firm’s control -
• E.g. with domestic or offshore outsourcing
vendors
SYSTEM VULNERABILITY
AND ABUSE
Concerns for System Builders and Users
Disaster
Destroys computer hardware, programs, data
files, and other equipment
Security
Prevents unauthorized access, alteration, theft,
or physical damage
SYSTEM VULNERABILITY
AND ABUSE
Concerns for System Builders and Users
Errors-
Cause computers to disrupt or destroy
organization’s record-keeping and
operations
Bugs-
Program code defects or errors
Maintenance Nightmare-
Maintenance costs high due to
organizational change, software complexity,
and faulty system analysis and design
RISKS & THREATS
High User
Knowledge
of IT
Systems
Theft,
Sabotage,
Misuse
Virus Attacks Systems &
Network
Failure
Lack Of
Documentation
Lapse in Physical Security
Natural
Calamities & Fire
SO HOW DO
WE
OVERCOME
THESE
PROBLEMS?
BUSINESS VALUE OF
SECURITY AND CONTROL
• Inadequate security and control may create
serious legal liability.
• Businesses must protect not only their own
information assets but also those of
customers, employees, and business
partners. Failure to do so can lead to costly
litigation for data exposure or theft.
• A sound security and control framework that
protects business information assets can thus
produce a high return on investment.
ESTABLISHING A MANAGEMENT
FRAMEWORK FOR SECURITY AND
CONTROL
 General controls:
Establish framework for controlling
design, security, and use of computer
programs
• Software controls
• Hardware controls
• Computer operations controls
• Data security controls
• Implementation controls
ESTABLISHING A MANAGEMENT
FRAMEWORK FOR SECURITY AND
CONTROL
Application controls:
Unique to each computerized
application
• Input
• Processing
• Output
CREATING A CONTROL
ENVIRONMENT
Controls:-
• Methods, policies, and procedures
• Ensures protection of organization’s
assets
• Ensures accuracy and reliability of
records, and operational adherence to
management standards
Worldwide Damage from
Digital Attacks
CREATING A CONTROL
ENVIRONMENT
Disaster recovery plan:
Runs business in event of
computer outage
Load balancing:
Distributes large number of
requests for access among multiple
servers
CREATING ACONTROL
ENVIRONMENT
• Mirroring:
Duplicating all processes and transactions of
server on backup server to prevent any
interruption
• Clustering:
Linking two computers together so that a
second
primary
computer can act as a backup to the
computer or speed up processing
CREATING ACONTROL
ENVIRONMENT
Internet Security Challenges
Firewalls:-
• Hardware and software controlling flow of incoming
and outgoing network traffic
• Prevent unauthorized users from accessing private
networks
• Two types: proxies and stateful inspection
Intrusion Detection System:-
• Monitors vulnerable points in network to detect and
deter unauthorized intruders
Figure 10-7
A Corporate Firewall
CREATING ACONTROL
ENVIRONMENT
Internet Security
• EncryCpthioan:ll-enges
Coding and scrambling of messages to prevent
their access without authorization
• Authentication: -
Ability of each party in a transaction to
ascertain identity of other party
• Message integrity: -
Ability to ascertain that transmitted message has
not been copied or altered
CREATING ACONTROL
ENVIRONMENT
Internet Security Challenges
Digital signature: -Digital code attached to
electronically transmitted message to uniquely
identify contents and sender
Digital certificate: -Attachment to electronic
message to verify the sender and to provide
receiver with means to encode reply
Secure Electronic Transaction (SET): -
Standard for securing credit card transactions over
Internet and other networks
• Follow Security Procedures
• Wear Identity Cards
• Ask unauthorized visitor his
credentials
• Attend visitors in Reception and
Conference Room only
• Bring visitors in operations area without prior
permission
• Bring hazardous and combustible material in
secure area
• Practice “Piggybacking”
• Bring and use pen drives, zip drives, ipods,
other storage devices unless and otherwise
authorized to do so
USER RESPONSIBILITIES
Access Control - Physical
 Always use at least 8 character password with
combination of alphabets, numbers and special
characters (*, %, @, #, $, ^)
 Use passwords that can be easily remembered by
you
 Change password regularly as per policy
 Use password that is significantly different from
earlier passwords
Use passwords which reveals your personal
information or words found in dictionary
Write down or Store passwords
Share passwords over phone or Email
Use passwords which do not match above complexity
criteria
USER RESPONSIBILITIES
Password Guidelines
Internet Usage
Use internet services for business purposes only
 Do not access internet through dial-up
connectivity
 Do not use internet for accessing auction sites
 Do not use internet for hacking other computer
systems
 Do not use internet to download / upload
commercial software / copyrighted material
Technology Department is continuously
monitoring Internet Usage. Any illegal use of
internet and other assets shall call for
Disciplinary Action.
USER RESPONSIBILITIES
CREATING ACONTROL
ENVIRONMENT
Antivirus Software
Antivirus software: -
Software that checks computer
systems and drives for the presence of
computer viruses and can eliminate the
virus from the infected area
• Wi-Fi Protected Access specification
This NEC PC
has a biometric
fingerprint
reader for fast
yet secure
access to files
and networks.
New models of
PCs are starting
to use biometric
identification to
authenticate
MANAGEMENT OPPORTUNITIES,
CHALLENGES AND SOLUTIONS
oManagement Opportunities: -
Creation of secure, reliable Web sites and
systems that can support e-commerce and e-
business strategies
MANAGEMENT
CHALLENGES
Designing systems that are neither over-controlled
nor under-controlled
provide network and infrastructure security to a
financial services firm in a Web-enabled high-threat
environment
MANAGEMENT
CHALLENGES
 Implementing an effective security policy
 Applying quality assurance standards in large
systems projects
 What are the most important software quality
assurance techniques?
 Why are auditing information systems and
safeguarding data quality so important?
Solution Guidelines
• Security and control must become a more visible and
explicit priority and area of information systems
investment.
• Support and commitment from top management is
required to show that security is indeed a corporate
priority and vital to all aspects of the business.
• Security and control should be the responsibility of
everyone in the organization.
. . . LET US BUILD A HUMAN WALL ALONG WITH FIREWALL
Human Wall Is Always
Better Than A Firewall
Security  & control in mis

More Related Content

What's hot

Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101Jerod Brennen
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
Adetula Bunmi
 
06. security concept
06. security concept06. security concept
06. security concept
Muhammad Ahad
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
Meletis Belsis MPhil/MRes/BSc
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
Gary Bahadur
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Daniel P Wallace
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
Faheem Ul Hasan
 
Information systems security(1)
Information systems security(1)Information systems security(1)
Information systems security(1)Sandeep Agarwal
 
1. security management practices
1. security management practices1. security management practices
1. security management practices7wounders
 
Security technologies
Security technologiesSecurity technologies
Security technologies
Dhani Ahmad
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
Kabul Education University
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
Alfred Ouyang
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
KATHEESKUMAR S
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
Daryl Conson
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
Kumawat Dharmpal
 
Data Security
Data SecurityData Security
Data Security
AkNirojan
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 

What's hot (19)

Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
06. security concept
06. security concept06. security concept
06. security concept
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Information systems security(1)
Information systems security(1)Information systems security(1)
Information systems security(1)
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Data Security
Data SecurityData Security
Data Security
 
Data security
Data securityData security
Data security
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 

Similar to Security & control in mis

IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
RAJESH S
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
Gurjit
 
Security and Control.ppt
Security and Control.pptSecurity and Control.ppt
Security and Control.ppt
AfricaRealInformatic
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdf
dhanywahyudi17
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
Cognic Systems Pvt Ltd
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
Leif Davidsen
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
Robert Parker
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hackingDesmond Devendran
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Knoldus Inc.
 
Computer Security.pptx
Computer Security.pptxComputer Security.pptx
Computer Security.pptx
KENNEDYDONATO1
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
Muhammad Asim
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
TikdiPatel
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
Kabul Education University
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentali
Jürgen Ambrosi
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
aizazhussain234
 
Presentation topic Software Security.pptx
Presentation topic Software Security.pptxPresentation topic Software Security.pptx
Presentation topic Software Security.pptx
rehanmughal18
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdf
ssuser8717cc
 
Chapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptxChapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptx
ToxicHawk
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNicholas Davis
 

Similar to Security & control in mis (20)

IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Security and Control.ppt
Security and Control.pptSecurity and Control.ppt
Security and Control.ppt
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdf
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
 
Computer Security.pptx
Computer Security.pptxComputer Security.pptx
Computer Security.pptx
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentali
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Presentation topic Software Security.pptx
Presentation topic Software Security.pptxPresentation topic Software Security.pptx
Presentation topic Software Security.pptx
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdf
 
Chapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptxChapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptx
 
Unit v
Unit vUnit v
Unit v
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 

More from Vishal Patyal

Indian navy 04 dec hp singh
Indian navy 04 dec hp singhIndian navy 04 dec hp singh
Indian navy 04 dec hp singh
Vishal Patyal
 
Indian naval orientation
Indian naval orientationIndian naval orientation
Indian naval orientation
Vishal Patyal
 
Mau
MauMau
Microsoft office introduction
Microsoft office introductionMicrosoft office introduction
Microsoft office introduction
Vishal Patyal
 
Lesson 5 computer software
Lesson 5 computer softwareLesson 5 computer software
Lesson 5 computer software
Vishal Patyal
 
Lesson 1 introduction to computers
Lesson 1 introduction to computersLesson 1 introduction to computers
Lesson 1 introduction to computers
Vishal Patyal
 
IIU Presentaion by Vice Chancellor
IIU Presentaion by Vice ChancellorIIU Presentaion by Vice Chancellor
IIU Presentaion by Vice Chancellor
Vishal Patyal
 

More from Vishal Patyal (7)

Indian navy 04 dec hp singh
Indian navy 04 dec hp singhIndian navy 04 dec hp singh
Indian navy 04 dec hp singh
 
Indian naval orientation
Indian naval orientationIndian naval orientation
Indian naval orientation
 
Mau
MauMau
Mau
 
Microsoft office introduction
Microsoft office introductionMicrosoft office introduction
Microsoft office introduction
 
Lesson 5 computer software
Lesson 5 computer softwareLesson 5 computer software
Lesson 5 computer software
 
Lesson 1 introduction to computers
Lesson 1 introduction to computersLesson 1 introduction to computers
Lesson 1 introduction to computers
 
IIU Presentaion by Vice Chancellor
IIU Presentaion by Vice ChancellorIIU Presentaion by Vice Chancellor
IIU Presentaion by Vice Chancellor
 

Recently uploaded

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

Security & control in mis

  • 1. MANAGEMENT INFORMATION SYSTEMS SECURITY AND CONTROL Prepared By: Vishal Patyal
  • 2. The quality or state of being secure to be free from danger Security is achieved using several strategies simultaneously or used in combination with one another Security is recognized as essential to protect vital processes and the systems that provide those processes Security is not something you buy, it is something you do What is security?
  • 3. OBJECTIVES • Explain why information systems need special protection from destruction, error, and abuse • Assess the business value of security and control • Evaluate elements of an organizational and managerial framework for security and control
  • 4. OBJECTIVES  Identify the challenges posed by information systems security and control and management solutions  Why are information systems so vulnerable to destruction, error, abuse, and system quality problems?  What types of controls are available for information systems?
  • 5. Vulnerability, Threat and Attack A vulnerability:- is a weakness in security system ◦ Can be in design, implementation, etc. ◦ Can be hardware, or software A threat:- is a set of circumstances that has the potential to cause loss or harm ◦ Or it’s a potential violation of security ◦ Threat can be: Accidental (natural disasters, human error, …) Malicious (attackers, insider fraud, …) An attack:- is the actual violation of security
  • 6. Why Systems are Vulnerable?  Hardware problems- • Breakdowns, configuration errors, damage from improper use or crime  Software problems- • Programming errors, installation errors, unauthorized changes)  Disasters- • Power failures, flood, fires, etc.  Use of networks and computers outside of firm’s control - • E.g. with domestic or offshore outsourcing vendors
  • 7. SYSTEM VULNERABILITY AND ABUSE Concerns for System Builders and Users Disaster Destroys computer hardware, programs, data files, and other equipment Security Prevents unauthorized access, alteration, theft, or physical damage
  • 8. SYSTEM VULNERABILITY AND ABUSE Concerns for System Builders and Users Errors- Cause computers to disrupt or destroy organization’s record-keeping and operations Bugs- Program code defects or errors Maintenance Nightmare- Maintenance costs high due to organizational change, software complexity, and faulty system analysis and design
  • 9. RISKS & THREATS High User Knowledge of IT Systems Theft, Sabotage, Misuse Virus Attacks Systems & Network Failure Lack Of Documentation Lapse in Physical Security Natural Calamities & Fire
  • 11. BUSINESS VALUE OF SECURITY AND CONTROL • Inadequate security and control may create serious legal liability. • Businesses must protect not only their own information assets but also those of customers, employees, and business partners. Failure to do so can lead to costly litigation for data exposure or theft. • A sound security and control framework that protects business information assets can thus produce a high return on investment.
  • 12. ESTABLISHING A MANAGEMENT FRAMEWORK FOR SECURITY AND CONTROL  General controls: Establish framework for controlling design, security, and use of computer programs • Software controls • Hardware controls • Computer operations controls • Data security controls • Implementation controls
  • 13. ESTABLISHING A MANAGEMENT FRAMEWORK FOR SECURITY AND CONTROL Application controls: Unique to each computerized application • Input • Processing • Output
  • 14. CREATING A CONTROL ENVIRONMENT Controls:- • Methods, policies, and procedures • Ensures protection of organization’s assets • Ensures accuracy and reliability of records, and operational adherence to management standards
  • 16. CREATING A CONTROL ENVIRONMENT Disaster recovery plan: Runs business in event of computer outage Load balancing: Distributes large number of requests for access among multiple servers
  • 17. CREATING ACONTROL ENVIRONMENT • Mirroring: Duplicating all processes and transactions of server on backup server to prevent any interruption • Clustering: Linking two computers together so that a second primary computer can act as a backup to the computer or speed up processing
  • 18. CREATING ACONTROL ENVIRONMENT Internet Security Challenges Firewalls:- • Hardware and software controlling flow of incoming and outgoing network traffic • Prevent unauthorized users from accessing private networks • Two types: proxies and stateful inspection Intrusion Detection System:- • Monitors vulnerable points in network to detect and deter unauthorized intruders
  • 20. CREATING ACONTROL ENVIRONMENT Internet Security • EncryCpthioan:ll-enges Coding and scrambling of messages to prevent their access without authorization • Authentication: - Ability of each party in a transaction to ascertain identity of other party • Message integrity: - Ability to ascertain that transmitted message has not been copied or altered
  • 21. CREATING ACONTROL ENVIRONMENT Internet Security Challenges Digital signature: -Digital code attached to electronically transmitted message to uniquely identify contents and sender Digital certificate: -Attachment to electronic message to verify the sender and to provide receiver with means to encode reply Secure Electronic Transaction (SET): - Standard for securing credit card transactions over Internet and other networks
  • 22. • Follow Security Procedures • Wear Identity Cards • Ask unauthorized visitor his credentials • Attend visitors in Reception and Conference Room only • Bring visitors in operations area without prior permission • Bring hazardous and combustible material in secure area • Practice “Piggybacking” • Bring and use pen drives, zip drives, ipods, other storage devices unless and otherwise authorized to do so USER RESPONSIBILITIES Access Control - Physical
  • 23.  Always use at least 8 character password with combination of alphabets, numbers and special characters (*, %, @, #, $, ^)  Use passwords that can be easily remembered by you  Change password regularly as per policy  Use password that is significantly different from earlier passwords Use passwords which reveals your personal information or words found in dictionary Write down or Store passwords Share passwords over phone or Email Use passwords which do not match above complexity criteria USER RESPONSIBILITIES Password Guidelines
  • 24. Internet Usage Use internet services for business purposes only  Do not access internet through dial-up connectivity  Do not use internet for accessing auction sites  Do not use internet for hacking other computer systems  Do not use internet to download / upload commercial software / copyrighted material Technology Department is continuously monitoring Internet Usage. Any illegal use of internet and other assets shall call for Disciplinary Action. USER RESPONSIBILITIES
  • 25. CREATING ACONTROL ENVIRONMENT Antivirus Software Antivirus software: - Software that checks computer systems and drives for the presence of computer viruses and can eliminate the virus from the infected area • Wi-Fi Protected Access specification
  • 26. This NEC PC has a biometric fingerprint reader for fast yet secure access to files and networks. New models of PCs are starting to use biometric identification to authenticate
  • 27. MANAGEMENT OPPORTUNITIES, CHALLENGES AND SOLUTIONS oManagement Opportunities: - Creation of secure, reliable Web sites and systems that can support e-commerce and e- business strategies
  • 28. MANAGEMENT CHALLENGES Designing systems that are neither over-controlled nor under-controlled provide network and infrastructure security to a financial services firm in a Web-enabled high-threat environment
  • 29. MANAGEMENT CHALLENGES  Implementing an effective security policy  Applying quality assurance standards in large systems projects  What are the most important software quality assurance techniques?  Why are auditing information systems and safeguarding data quality so important?
  • 30. Solution Guidelines • Security and control must become a more visible and explicit priority and area of information systems investment. • Support and commitment from top management is required to show that security is indeed a corporate priority and vital to all aspects of the business. • Security and control should be the responsibility of everyone in the organization.
  • 31. . . . LET US BUILD A HUMAN WALL ALONG WITH FIREWALL Human Wall Is Always Better Than A Firewall