Presentation is loading. Please wait.

Presentation is loading. Please wait.

Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14.

Similar presentations


Presentation on theme: "Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14."— Presentation transcript:

1 Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14

2 Pertemuan-14.2 © 2008 by Abdul Hayat Information Systems Security and Control Why are information systems so vulnerable to destruction, error, abuse, and system quality problems?Why are information systems so vulnerable to destruction, error, abuse, and system quality problems? What types of controls are available for information systems?What types of controls are available for information systems? What special measures must be taken to ensure the reliability, availability and security of electronic commerce and digital business processes?What special measures must be taken to ensure the reliability, availability and security of electronic commerce and digital business processes? OBJECTIVES

3 Pertemuan-14.3 © 2008 by Abdul Hayat Information Systems Security and Control What are the most important software quality assurance techniques?What are the most important software quality assurance techniques? Why are auditing information systems and safeguarding data quality so important?Why are auditing information systems and safeguarding data quality so important? OBJECTIVES

4 Pertemuan-14.4 © 2008 by Abdul Hayat Information Systems Security and Control Designing systems that are neither over- controlled nor under-controlledDesigning systems that are neither over- controlled nor under-controlled Applying quality assurance standards in large systems projectsApplying quality assurance standards in large systems projects MANAGEMENT CHALLENGES

5 Pertemuan-14.5 © 2008 by Abdul Hayat Information Systems Security and Control Advances in telecommunications and computer softwareAdvances in telecommunications and computer software Unauthorized access, abuse, or fraudUnauthorized access, abuse, or fraud HackersHackers Denial of service attackDenial of service attack Computer virusesComputer viruses SYSTEM VULNERABILITY AND ABUSE Why Systems are Vulnerable

6 Pertemuan-14.6 © 2008 by Abdul Hayat Information Systems Security and Control SYSTEM VULNERABILITY AND ABUSE Telecommunication Network Vulnerabilities Figure 14-1

7 Pertemuan-14.7 © 2008 by Abdul Hayat Information Systems Security and Control Disaster Destroys computer hardware, programs, data files, and other equipmentDestroys computer hardware, programs, data files, and other equipmentSecurity Prevents unauthorized access, alteration, theft, or physical damagePrevents unauthorized access, alteration, theft, or physical damage SYSTEM VULNERABILITY AND ABUSE Concerns for System Builders and Users

8 Pertemuan-14.8 © 2008 by Abdul Hayat Information Systems Security and Control Errors Cause computers to disrupt or destroy organization’s record-keeping and operationsCause computers to disrupt or destroy organization’s record-keeping and operations SYSTEM VULNERABILITY AND ABUSE Concerns for System Builders and Users

9 Pertemuan-14.9 © 2008 by Abdul Hayat Information Systems Security and Control Bugs Program code defects or errorsProgram code defects or errors Maintenance Nightmare Maintenance costs high due to organizational change, software complexity, and faulty system analysis and designMaintenance costs high due to organizational change, software complexity, and faulty system analysis and design SYSTEM VULNERABILITY AND ABUSE System Quality Problems: Software and Data

10 Pertemuan-14.10 © 2008 by Abdul Hayat Information Systems Security and Control SYSTEM VULNERABILITY AND ABUSE Points in the Processing Cycle where Errors Can Occur Figure 14-2

11 Pertemuan-14.11 © 2008 by Abdul Hayat Information Systems Security and Control Data Quality Problems Caused due to errors during data input or faulty information system and database designCaused due to errors during data input or faulty information system and database design SYSTEM VULNERABILITY AND ABUSE System Quality Problems: Software and Data

12 Pertemuan-14.12 © 2008 by Abdul Hayat Information Systems Security and Control SYSTEM VULNERABILITY AND ABUSE The Cost of Errors over the Systems Development Cycle Figure 14-3

13 Pertemuan-14.13 © 2008 by Abdul Hayat Information Systems Security and Control Controls Methods, policies, and procedures that ensure protection of organization’s assetsMethods, policies, and procedures that ensure protection of organization’s assets Ensure accuracy and reliability of records, and operational adherence to management standardsEnsure accuracy and reliability of records, and operational adherence to management standards CREATING A CONTROL ENVIRONMENT Overview

14 Pertemuan-14.14 © 2008 by Abdul Hayat Information Systems Security and Control General controls Establish framework for controlling design, security, and use of computer programsEstablish framework for controlling design, security, and use of computer programs Include software, hardware, computer operations, data security, implementation, and administrative controlsInclude software, hardware, computer operations, data security, implementation, and administrative controls CREATING A CONTROL ENVIRONMENT General Controls and Application Controls

15 Pertemuan-14.15 © 2008 by Abdul Hayat Information Systems Security and Control Security Profiles for a Personnel System CREATING A CONTROL ENVIRONMENT Figure 14-4

16 Pertemuan-14.16 © 2008 by Abdul Hayat Information Systems Security and Control Application controls Unique to each computerized applicationUnique to each computerized application Include input, processing, and output controlsInclude input, processing, and output controls CREATING A CONTROL ENVIRONMENT General Controls and Application Controls

17 Pertemuan-14.17 © 2008 by Abdul Hayat Information Systems Security and Control On-line transaction processing: Transactions entered online are immediately processed by computerOn-line transaction processing: Transactions entered online are immediately processed by computer Fault-tolerant computer systems: Contain extra hardware, software, and power supply components to provide continuous uninterrupted serviceFault-tolerant computer systems: Contain extra hardware, software, and power supply components to provide continuous uninterrupted service CREATING A CONTROL ENVIRONMENT Protecting the Digital Firm

18 Pertemuan-14.18 © 2008 by Abdul Hayat Information Systems Security and Control High-availability computing: Tools and technologies enabling system to recover quickly from a crashHigh-availability computing: Tools and technologies enabling system to recover quickly from a crash Disaster recovery plan: Runs business in event of computer outageDisaster recovery plan: Runs business in event of computer outage Load balancing: Distributes large number of requests for access among multiple serversLoad balancing: Distributes large number of requests for access among multiple servers CREATING A CONTROL ENVIRONMENT Protecting the Digital Firm

19 Pertemuan-14.19 © 2008 by Abdul Hayat Information Systems Security and Control Mirroring: Duplicating all processes and transactions of server on backup server to prevent any interruption in serviceMirroring: Duplicating all processes and transactions of server on backup server to prevent any interruption in service Clustering: Linking two computers together so that a second computer can act as a backup to the primary computer or speed up processingClustering: Linking two computers together so that a second computer can act as a backup to the primary computer or speed up processing CREATING A CONTROL ENVIRONMENT Protecting the Digital Firm

20 Pertemuan-14.20 © 2008 by Abdul Hayat Information Systems Security and Control Firewalls Prevent unauthorized users from accessing private networksPrevent unauthorized users from accessing private networks Two types: proxies and stateful inspectionTwo types: proxies and stateful inspection Intrusion Detection System Monitors vulnerable points in network to detect and deter unauthorized intrudersMonitors vulnerable points in network to detect and deter unauthorized intruders CREATING A CONTROL ENVIRONMENT Internet Security Challenges

21 Pertemuan-14.21 © 2008 by Abdul Hayat Information Systems Security and Control Figure 14-5 CREATING A CONTROL ENVIRONMENT Internet Security Challenges

22 Pertemuan-14.22 © 2008 by Abdul Hayat Information Systems Security and Control Encryption: Coding and scrambling of messages to prevent their access without authorizationEncryption: Coding and scrambling of messages to prevent their access without authorization Authentication: Ability of each party in a transaction to ascertain identity of other partyAuthentication: Ability of each party in a transaction to ascertain identity of other party Message integrity: Ability to ascertain that transmitted message has not been copied or alteredMessage integrity: Ability to ascertain that transmitted message has not been copied or altered CREATING A CONTROL ENVIRONMENT Security and Electronic Commerce

23 Pertemuan-14.23 © 2008 by Abdul Hayat Information Systems Security and Control Digital signature: Digital code attached to electronically transmitted message to uniquely identify contents and senderDigital signature: Digital code attached to electronically transmitted message to uniquely identify contents and sender Digital certificate: Attachment to electronic message to verify the sender and to provide receiver with means to encode replyDigital certificate: Attachment to electronic message to verify the sender and to provide receiver with means to encode reply CREATING A CONTROL ENVIRONMENT Security and Electronic Commerce

24 Pertemuan-14.24 © 2008 by Abdul Hayat Information Systems Security and Control Public Key Encryption CREATING A CONTROL ENVIRONMENT Figure 14-6

25 Pertemuan-14.25 © 2008 by Abdul Hayat Information Systems Security and Control Digital Certificates CREATING A CONTROL ENVIRONMENT Figure 14-7

26 Pertemuan-14.26 © 2008 by Abdul Hayat Information Systems Security and Control Criteria for determining control structure Importance of dataImportance of data Efficiency, complexity, and expense of each control techniqueEfficiency, complexity, and expense of each control technique Level of risk if a specific activity or process is not properly controlledLevel of risk if a specific activity or process is not properly controlled CREATING A CONTROL ENVIRONMENT Developing a Control Structure: Costs and Benefits

27 Pertemuan-14.27 © 2008 by Abdul Hayat Information Systems Security and Control MIS audit Identifies all controls that govern individual information systems and assesses their effectivenessIdentifies all controls that govern individual information systems and assesses their effectiveness CREATING A CONTROL ENVIRONMENT The Role of Auditing in the Control Process

28 Pertemuan-14.28 © 2008 by Abdul Hayat Information Systems Security and Control CREATING A CONTROL ENVIRONMENT Sample Auditor’s List of Control Weaknesses Figure 14-8

29 Pertemuan-14.29 © 2008 by Abdul Hayat Information Systems Security and Control Development methodology: Collection of methods, for every activity within every phase of development projectDevelopment methodology: Collection of methods, for every activity within every phase of development project Structured: Refers to fact that techniques are carefully drawn up, step- by-step, with each step building on a previous oneStructured: Refers to fact that techniques are carefully drawn up, step- by-step, with each step building on a previous one ENSURING SYSTEM QUALITY Software Quality Assurance Methodologies and Tools

30 Pertemuan-14.30 © 2008 by Abdul Hayat Information Systems Security and Control Structured analysis: Method for defining system inputs, processes, and outputs, for partitioning systems into subsystems or modulesStructured analysis: Method for defining system inputs, processes, and outputs, for partitioning systems into subsystems or modules Data Flow Diagram (DFD): Graphically illustrates system’s component processes and flow of dataData Flow Diagram (DFD): Graphically illustrates system’s component processes and flow of data ENSURING SYSTEM QUALITY Software Quality Assurance Methodologies and Tools

31 Pertemuan-14.31 © 2008 by Abdul Hayat Information Systems Security and Control ENSURING SYSTEM QUALITY Data Flow Diagram for Mail-in University Registration System Figure 14-9

32 Pertemuan-14.32 © 2008 by Abdul Hayat Information Systems Security and Control Structured design: Encompasses set of design rules and techniques for designing systems from top downStructured design: Encompasses set of design rules and techniques for designing systems from top down Structured programming: Organizing and coding programs that simplify control pathsStructured programming: Organizing and coding programs that simplify control paths ENSURING SYSTEM QUALITY Software Quality Assurance Methodologies and Tools

33 Pertemuan-14.33 © 2008 by Abdul Hayat Information Systems Security and Control ENSURING SYSTEM QUALITY High-Level Structure Chart For a Payroll System Figure 14-10

34 Pertemuan-14.34 © 2008 by Abdul Hayat Information Systems Security and Control InflexibleInflexible Time-consumingTime-consuming ENSURING SYSTEM QUALITY Limitation of Traditional Methods

35 Pertemuan-14.35 © 2008 by Abdul Hayat Information Systems Security and Control ENSURING SYSTEM QUALITY Tools and Methodologies for Object-Oriented Development Unified Modeling Language (UML) has become industry standard for analyzing and designing object-oriented systems.Unified Modeling Language (UML) has become industry standard for analyzing and designing object-oriented systems. Structural diagrams describe the relation between classes.Structural diagrams describe the relation between classes. Behavioral diagrams describe interactions in an object-oriented system.Behavioral diagrams describe interactions in an object-oriented system.

36 Pertemuan-14.36 © 2008 by Abdul Hayat Information Systems Security and Control ENSURING SYSTEM QUALITY Basic Program Control Constructs Figure 14-11

37 Pertemuan-14.37 © 2008 by Abdul Hayat Information Systems Security and Control Automation of step-by-step methodologies for software and systems developmentAutomation of step-by-step methodologies for software and systems development Reduces repetitive workReduces repetitive work Enforces standard development methodology and design disciplineEnforces standard development methodology and design discipline Improves communication between users and technical specialistsImproves communication between users and technical specialists ENSURING SYSTEM QUALITY Computer-Aided Software Engineering (CASE)

38 Pertemuan-14.38 © 2008 by Abdul Hayat Information Systems Security and Control Organizes and correlates design componentsOrganizes and correlates design components Automates tedious and error-prone portion of analysis and design, code generation, testing, and control rolloutAutomates tedious and error-prone portion of analysis and design, code generation, testing, and control rollout ENSURING SYSTEM QUALITY Computer-Aided Software Engineering (CASE)

39 Pertemuan-14.39 © 2008 by Abdul Hayat Information Systems Security and Control ENSURING SYSTEM QUALITY Figure 14-12 Visible Analyst: A Tool to Automate Object-Oriented Analysis and Design

40 Pertemuan-14.40 © 2008 by Abdul Hayat Information Systems Security and Control Resource allocation Determines how costs, time, and personnel are assigned to different phases of systems development projectDetermines how costs, time, and personnel are assigned to different phases of systems development project ENSURING SYSTEM QUALITY Resource Allocation During Systems Development

41 Pertemuan-14.41 © 2008 by Abdul Hayat Information Systems Security and Control Objective assessment of software used in the system in form of quantified measurementsObjective assessment of software used in the system in form of quantified measurements ENSURING SYSTEM QUALITY Software Metrics

42 Pertemuan-14.42 © 2008 by Abdul Hayat Information Systems Security and Control Walkthrough: Review of specification or design document by small group of peopleWalkthrough: Review of specification or design document by small group of people Debugging: Process of discovering and eliminating errors and defects in program codeDebugging: Process of discovering and eliminating errors and defects in program code ENSURING SYSTEM QUALITY Testing

43 Pertemuan-14.43 © 2008 by Abdul Hayat Information Systems Security and Control Data quality audit Survey and/or sample of filesSurvey and/or sample of files Determines accuracy and completeness of dataDetermines accuracy and completeness of data Data cleansing Correcting errors and inconsistencies in data to increase accuracyCorrecting errors and inconsistencies in data to increase accuracy ENSURING SYSTEM QUALITY Data Quality Audit and Data Cleansing


Download ppt "Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14."

Similar presentations


Ads by Google