Presentation is loading. Please wait.

Presentation is loading. Please wait.

11.1 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality,

Similar presentations


Presentation on theme: "11.1 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality,"— Presentation transcript:

1 11.1 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control INFORMATION SYSTEMS SECURITY, QUALITY, AND CONTROL

2 11.2 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control Why are information systems so vulnerable ?Why are information systems so vulnerable ? What special measures must be taken to ensure the reliability, availability, and security of electronic commerce ?What special measures must be taken to ensure the reliability, availability, and security of electronic commerce ? Why are auditing information systems and safeguarding data quality so important?Why are auditing information systems and safeguarding data quality so important? OBJECTIVES

3 11.3 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control 11.1 SYSTEM VULNERABILITY AND ABUSE Why Systems are Vulnerable Unauthorized accessUnauthorized access –by Hackers or Employees –to destroy, steal or alter data, hardware or software Denial of Service (DOS) AttackDenial of Service (DOS) Attack –Flooding a server with bogus requests in order to crash the network Computer VirusesComputer Viruses –self-replicating, malicious code DisastersDisasters –flood, fire, power loss etc. ErrorsErrors –in Data Entry, Hardware or Software

4 11.4 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control 11.1 SYSTEM VULNERABILITY AND ABUSE Why Systems are Vulnerable

5 11.5 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control Concerns for System Builders and Users 11.1 SYSTEM VULNERABILITY AND ABUSE

6 11.6 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control Why are information systems so vulnerable ?Why are information systems so vulnerable ? What special measures must be taken to ensure the reliability, availability, and security of electronic commerce ?What special measures must be taken to ensure the reliability, availability, and security of electronic commerce ? Why are auditing information systems and safeguarding data quality so important?Why are auditing information systems and safeguarding data quality so important? OBJECTIVES

7 11.7 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control General Controls and Application Controls 11. 2 CREATING A CONTROL ENVIRONMENT

8 11.8 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control General Controls and Application Controls 11. 2 CREATING A CONTROL ENVIRONMENT

9 11.9 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control General Controls and Application Controls 11. 2 CREATING A CONTROL ENVIRONMENT

10 11.10 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control Fault-Tolerant Computer Systems:Fault-Tolerant Computer Systems: Contain extra hardware, power supply etc. to ensure uninterrupted service Disaster Recovery Plan:Disaster Recovery Plan: Data backup, recovery procedures etc. to keep business running in event of computer outage Mirroring:Mirroring: Duplicating data on backup server to prevent any interruption in service Clustering:Clustering: Linking two computers together so one can backup the other or speed up processing Protecting the Digital Firm 11. 2 CREATING A CONTROL ENVIRONMENT

11 11.11 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control Internet Security FirewallsFirewalls – –Prevent unauthorized users from accessing private networks Intrusion Detection SystemIntrusion Detection System – –Monitors vulnerable points in network to detect and deter unauthorized intruders 11. 2 CREATING A CONTROL ENVIRONMENT Protecting the Digital Firm

12 11.12 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control 11. 2 CREATING A CONTROL ENVIRONMENT Protecting the Digital Firm

13 11.13 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control Security and E-Commerce Encryption :Encryption : Coding messages to prevent unauthorized access Digital Signature:Digital Signature: Digital code attached to message to uniquely identify sender Digital Certificate:Digital Certificate: Attachment to electronic message to verify the sender and to provide receiver with means to encode reply 11. 2 CREATING A CONTROL ENVIRONMENT

14 11.14 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control 11. 2 CREATING A CONTROL ENVIRONMENT Protecting the Digital Firm Figure 11.8: Digital Certificates

15 11.15 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control Criteria for Determining Control Structure Importance of dataImportance of data Efficiency and expense of each control techniqueEfficiency and expense of each control technique Level of risk if a specific activity or process is not properly controlledLevel of risk if a specific activity or process is not properly controlled Developing a Control Structure: Costs and Benefits 11. 2 CREATING A CONTROL ENVIRONMENT

16 11.16 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control Developing a Control Structure: Costs and Benefits 11. 2 CREATING A CONTROL ENVIRONMENT

17 11.17 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control Why are information systems so vulnerable ?Why are information systems so vulnerable ? What special measures must be taken to ensure the reliability, availability, and security of electronic commerce ?What special measures must be taken to ensure the reliability, availability, and security of electronic commerce ? Why are auditing information systems and safeguarding data quality so important?Why are auditing information systems and safeguarding data quality so important? OBJECTIVES

18 11.18 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control MIS Audit Identifies all controls that govern individual information systems and assesses their effectivenessIdentifies all controls that govern individual information systems and assesses their effectiveness The Role of Auditing in the Control Process 11. 2 CREATING A CONTROL ENVIRONMENT

19 11.19 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control The Role of Auditing in the Control Process 11. 2 CREATING A CONTROL ENVIRONMENT

20 11.20 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control Software Walkthrough:Software Walkthrough: Review of software design by small group of people Software Debugging:Software Debugging: Process of discovering and eliminating defects (bugs) Data Quality Audit:Data Quality Audit: Determines accuracy of data via survey of end users for their perceptions of data quality or survey of samples from data files Data Cleansing:Data Cleansing: Correcting errors in data to increase accuracy 11.3 ENSURING SYSTEM QUALITY

21 11.21 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality, and Control INFORMATION SYSTEMS SECURITY, QUALITY, AND CONTROL


Download ppt "11.1 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality,"

Similar presentations


Ads by Google