Www.sims.monash.edu.au 1 IMS9043 - INFORMATION TECHNOLOGY IN ORGANISATIONS Week 9 Control, audit and security.

Slides:



Advertisements
Similar presentations
Computer Fraud Chapter 5.
Advertisements

Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Control and Accounting Information Systems
9 - 1 Computer-Based Information Systems Control.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
The Islamic University of Gaza
1 Telstra in Confidence Managing Security for our Mobile Technology.
Security Controls – What Works
Chapter 17 Controls and Security Measures
Security+ Guide to Network Security Fundamentals
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
1 Average: 85%, Median: 90%…Good Work!. 2 Chapter 15 Managing Information Resources & Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Risks, Controls and Security Measures
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology.
1 Chapter 15 Managing Information Resources & Security.
Computer Security: Principles and Practice
Factors to be taken into account when designing ICT Security Policies
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Chapter 151 Information Technology For Management 4 th Edition Turban, McLean, Wetherbe John Wiley & Sons, Inc. Managing Information Resources and Security.
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
Stephen S. Yau CSE , Fall Security Strategies.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Storage Security and Management: Security Framework
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Today’s Lecture Covers < Chapter 6 - IS Security
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Chapter 9: Introduction to Internal Control Systems
Introduction to Information Security
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Chapter 11 Management Control of Information Technology.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
UNIT V Security Management of Information Technology.
Risk Management Dr. Clive Vlieland-Boddy. Managements Responsibilities Strategy – Hopefully sustainable! Control – Hopefully maximising profits! Risk.
Securing Information Systems
Information Systems Security
Securing Information Systems
Chapter 17 Risks, Security and Disaster Recovery
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Securing Information Systems
INFORMATION SYSTEMS SECURITY and CONTROL
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

1 IMS INFORMATION TECHNOLOGY IN ORGANISATIONS Week 9 Control, audit and security

2 Learning Objectives Recognize the difficulties in managing information resources. Recognize information systems ’ vulnerability and the possible damage from malfunctions. Describe the major methods of defending information systems.

3 Learning Objectives (cont.) Describe the security issues of the Web and electronic commerce. Distinguish between security auditing and disaster recovery planning and understand the economics of security.

4 Case: Cyber Crime On Feb. 6, the biggest EC sites were hit by cyber crime. Yahoo!, eBay, Amazon.com, E*Trade The attacker(s) used a method called denial of service (DOS). –By hammering a Web site ’ s equipment with too many requests for information, an attacker can effectively clog a system. The total damage worldwide was estimated at $5-10 billion (U.S.). –The alleged attacker, from the Philippines, was not prosecuted because he did not break any law in the Philippines.

5 Lessons Learned from the Case Information resources that include computers, networks, programs, and data are vulnerable to unforeseen attacks. Many countries do not have sufficient laws to deal with computer criminals. Protection of networked systems can be a complex issue.

6 Lessons Learned from the Case Attackers can zero on a single company, or can attack many companies, without discrimination. Attackers use different attack methods. Although variations of the attack methods are known, the defence against them is difficult and/or expensive.

7 Information Resources Management  IRM encompasses all activities related to the planning, organizing, acquiring, maintaining, securing, and controlling of IT resources.  The management of information resources is divided among the information services department (ISD) and the end-users.

8 End-User Computing Establish policies and procedures to control end-user computing so that corporate risks are minimized. Create incentives to encourage certain end-user practices that reduce organizational risks. Offer support. Develop services to aid end- users in their computing activities.

9 Steering Committees The corporate steering committee is a group of managers and staff representing various organizational units. The committee’s major tasks are:  Direction setting  Staffing  Rationing  Communication  Structuring  Evaluating

10 Key Terminology Decryption Encryption Backup Exposure Integrity (of data) Risk Threats (or hazards) Vulnerability

11 Security Threats

12 Cyber Crime Crimes can be performed by outsiders who penetrate a computer system (hackers) or by insiders who are authorized to use the computer system but are misusing their authorization.. Two basic methods of attack are used in deliberate attacks on computer systems: –data tampering –programming fraud, e.g. Viruses

13 Defending Information Systems Hundreds of potential threats exist. Computing resources may be situated in many locations. Many individuals control information assets. Rapid technological changes make some controls obsolete as soon as they are installed. Many computer crimes are undetected for a long period of time. People tend to violate security procedures because they are inconvenient. Defending information systems is not a simple or inexpensive task for the following reasons:

14 Defense Strategies The following are the major objectives of defense strategies:  Prevention & deterrence  Detection  Limitation  Recovery  Correction

15 Types of Controls General Controls –Physical controls –Access controls –Biometric controls –Data security controls –Communications (networks) controls –Administrative controls Application Controls –Input controls – Processing controls –Output controls

16 Security Measures An access control system guards against unauthorized dial-in attempts. –The use of preassigned personal identification number (PIN). Modems. It is quite easy for attackers to penetrate them and for employees to leak secret corporate information to external networks. Encryption is used extensively in EC for protecting payments and privacy. Troubleshooting packages such as cable tester can find almost any fault that can occur with LAN cabling.

17 Security Measures (cont.) Payload security involves encryption or other manipulation of data being sent over networks. Commercial Products. Hundreds of commercial security products exist on the market. Intrusion Detecting. It is worthwhile to place an intrusion detecting device near the entrance point of the Internet to the intranet. A Firewall is commonly used as a barrier between the secure corporate intranet, or other internal networks, and the Internet.

18 IT Auditing In the information system environment, auditing can be viewed as an additional layer of controls or safeguards. –It involves a periodical examination and check of financial and accounting records and procedures. Two types of auditors (and audits): –Internal >An internal auditor is usually a corporate employee who is not a member of the ISD. –External >An external auditor is a corporate outsider.

19 IT Auditing (cont.) Auditors attempt to answer questions such as: 1.Are there sufficient controls in the system? 2.Which areas are not covered by controls? 3.Which controls are not necessary? 4.Are the controls implemented properly? 5.Are the controls effective; do they check the output of the system? 6.Is there a clear separation of duties of employees? 7.Are there procedures to ensure compliance with the controls? 8.Are there procedures to ensure reporting and corrective actions in case of violations of controls?

20 Disaster Recovery Plan  A disaster recovery plan is essential to any security system. –The purpose of a recovery plan is to keep the business running after a disaster occurs. –Recovery planning is part of asset protection. –Planning should focus first on recovery from a total loss of all capabilities. –Proof of capability usually involves some kind of what-if analysis that shows that the recovery plan is current. –All critical applications must be identified and their recovery procedures addressed in the plan.

21 Backup Location In the event of a major disaster, it is often necessary to move a centralized computing facility to a far-away backup location. External hot-site vendors provide access to a fully configured backup data center.

22 Risk Management

23 IT Security in the 21 st Century Increasing the Reliability of Systems. The objective relating to reliability is to use fault tolerance to keep the information systems working, even if some parts fail. Artificial Intelligence in Biometrics. Expert systems, neural computing, voice recognition, and fuzzy logic can be used to enhance the capabilities of several biometric systems.

24 IT Security in the 21 st Century (cont.) Smart Cards. Smart card technology can be used to protect PCs on LANs. Fighting Hackers. Several new products are available for fighting hackers.

25 Control What is controlled? assets physical access operational procedures financial transactions inventory related transactions personnel related transactions management procedures

26 Access controls to the computer centre equipment to the application software to offices to product warehouses control technologies

27 Operational controls rationale for operational (process) controls goals mechanisms a control framework

28 Control objectives operation of a business process achieves the goal set for it correct information is provided to a business process operation of the business process is available only to authorised personnel the business process only occurs in appropriate operational circumstances

29 Privacy — a security issue corporate information customer/client information liability and responsibility

30 References Chapter 16, Frenzel and Frenzel Chapter 8, Gelinas, Sutton & Fedorowicz(2004) "Business Processes & Information Technology“ Turban, Leidner, McLean & Wetherbe Chapter 15