Information System Security and Control Chapter 15 © 2005 by Prentice Hall Essentials of Management Information Systems, 6e Chapter 15 Information System.

Slides:



Advertisements
Similar presentations
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Advertisements

14.1 © 2004 by Prentice Hall INFORMATIONSYSTEMS SECURITY AND CONTROL.
Auditing Computer-Based Information Systems
Auditing Computer Systems
Managing Information Systems Information Systems Security and Control Part 1 Dr. Stephania Loizidou Himona ACSC 345.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
4/15: Security & Controls in IS Systems Vulnerabilities Controls: what to use to guard against vulnerabilities –General controls –Application controls.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Security Controls – What Works
Security+ Guide to Network Security Fundamentals
Lecture 10 Security and Control.
Lecture 10 Security and Control.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Risks, Controls and Security Measures
Chapter 1 Assuming the Role of the Systems Analyst
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
14.1 © 2004 by Prentice Hall Management Information Systems 8/e Chapter 14 Information Systems Security and Control 14 INFORMATIONSYSTEMS SECURITY AND.
Chapter 1 Assuming the Role of the Systems Analyst
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Essentials of Management Information Systems, 6e Chapter 15 Information System Security and Control 15.1 © 2005 by Prentice Hall Information System Security.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
11.1 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality,
Misbahuddin Azzuhri SE. MM. CPHR.
Chapter 8 Security and Control.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
Securing Information Systems
SEC835 Database and Web application security Information Security Architecture.
7.1 © 2007 by Prentice Hall 10 Chapter Securing Information Systems.
5.1 © 2007 by Prentice Hall 5 Chapter Foundations of Business Intelligence: Databases and Information Management.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Information Systems Analysis and Design
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
C8- Securing Information Systems
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Today’s Lecture Covers < Chapter 6 - IS Security
Pertemuan-14.1 © 2008 by Abdul Hayat Information Systems Security and Control INFORMATIONSYSTEMS SECURITY AND CONTROL Pertemuan 14.
11.1 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality,
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
SESSION 14 INFORMATION SYSTEMS SECURITY AND CONTROL.
Learning Objectives Demonstrate why info systems are vulnerable to destruction, error, abuse, quality control problemsDemonstrate why info systems are.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
Chapter 4 Automated Tools for Systems Development Modern Systems Analysis and Design Third Edition 4.1.
Information Systems Security and Control Chapter 14.
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Management Information Systems 8/e Chapter 14 Information Systems Security and Control BUILDING INFORMATION SYSTEMS SECURITY AND CONTROL.
8.1 © 2010 by Prentice Hall 8 Chapter Securing Information Systems.
ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.
14.1 © 2003 by Prentice Hall 14 INFORMATIONSYSTEMS SECURITY AND CONTROL Chapter.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
Chapter 1 Assuming the Role of the Systems Analyst.
Securing Information Systems
Information Systems Security
Securing Information Systems
INFORMATION SYSTEMS SECURITY AND CONTROL.
INFORMATION SYSTEMS SECURITY & CONTROL
Securing Information Systems
Chapter 10 Security and Control.
Control , Audit & Security of Information
INFORMATION SYSTEMS SECURITY and CONTROL
Information Systems Security and Control
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

Information System Security and Control Chapter 15 © 2005 by Prentice Hall Essentials of Management Information Systems, 6e Chapter 15 Information System Security and Control

Management Challenges 1.Achieving a sensible balance between too little control and too much.. 2.Applying quality assurance standards in large systems projects.

Accessibility to electronic data Increasingly complex software, hardware Network access points Wireless vulnerability Internet System Vulnerability and Abuse Why Systems Are Vulnerable

System Vulnerability and Abuse Hardware failure Software failure Personnel actions Terminal access penetration Theft of data, services, equipment Fire Electrical problems User errors Unauthorized program changes Telecommunication problems Threats to Computerized Information Systems

System Vulnerability and Abuse Telecommunications networks vulnerabilities Figure 15-1

Credit Card Fraud: Still on the Rise To what extent are Internet credit card thefts management and organizational problems, and to what extent are they technical problems? Address the technology and management issues for both the credit card issuers and the retail companies. Suggest possible ways to address the problem. System Vulnerability and Abuse Window on Organizations

Hacker Trojan horse Denial of service (DoS) attacks Computer viruses Worms Antivirus software System Vulnerability and Abuse Why Systems Are Vulnerable

Smarter Worms and Viruses: The Worst Is Yet to Come Why are worms so harmful? Describe their business and organizational impact. System Vulnerability and Abuse Window on Technology

Disaster Security Administrative error Cyberterrorism and Cyberwarfare System Vulnerability and Abuse Concerns for System Builders and Users

System Vulnerability and Abuse Points in the processing cycle where errors can occur Figure 15-2

Bugs and Defects Complete testing not possible The Maintenance Nightmare Maintenance costs high due to organizational change, software complexity, and faulty system analysis and design System Vulnerability and Abuse System Quality Problems: Software and Data

System Vulnerability and Abuse The cost of errors over the systems development cycle Figure 15-3

Data Quality Problems Caused by errors during data input or faulty information system and database design System Vulnerability and Abuse System Quality Problems: Software and Data

Controls Methods, policies, and procedures Protection of organization’s assets Accuracy and reliability of records Operational adherence to management standards Creating a Control Environment

General Controls Govern design, security, use of computer programs throughout organization Apply to all computerized applications Combination of hardware, software, manual procedures to create overall control environment Creating a Control Environment General Controls and Application Controls

General Controls Software controls Hardware controls Computer operations controls Data security controls Implementation Administrative controls Creating a Control Environment General Controls and Application Controls

Creating a Control Environment Security profiles for a personnel system Figure 15-4

Application Controls Automated and manual procedures that ensure only authorized data are processed by application Unique to each computerized application Classified as (1) input controls, (2) processing controls, and (3) output controls. Creating a Control Environment General Controls and Application Controls

Application Controls Control totals:Input, processing Edit checks:Input Computer matching:Input, processing Run control totals:Processing, output Report distribution logs:Output Creating a Control Environment General Controls and Application Controls

High-availability computing Fault-tolerant computer systems Disaster recovery planning Business continuity planning Load balancing; mirroring; clustering Recovery-oriented computing Managed security service providers (MSSPs) Creating a Control Environment Protecting the Digital Firm

Internet Security Challenges Public, accessible network Abuses have widespread effect Fixed Internet addresses Corporate systems extended outside organization Creating a Control Environment Protecting the Digital Firm

Creating a Control Environment Internet security challenges Figure 15-5

Firewall screening technologies Static packet filtering Stateful inspection Network address translation Application proxy filtering Intrusion detection systems Scanning software Monitoring software Creating a Control Environment Protecting the Digital Firm

Security and Electronic Commerce Encryption Authentication Message integrity Digital signatures Digital certificates Public key infrastructure (PKI) Creating a Control Environment Protecting the Digital Firm

Creating a Control Environment Public key encryption Figure 15-6

Creating a Control Environment Digital certificates Figure 15-7

Security for Wireless Internet Access Service set identifiers (SSID) –Identify access points in network –Form of password for user’s radio network interface card –Broadcast multiple time per second –Easily picked up by sniffer programs, war driving Creating a Control Environment Protecting the Digital Firm

Creating a Control Environment Wi-Fi security challenges Figure 15-8

Wired Equivalent Privacy (WEP): –Initial security standard –Call for access point and all users to share the same 40- bit encrypted password Wi-Fi Protected Access (WPA) specification –128-bit, non-static encryption key –Data-packet checking Creating a Control Environment Protecting the Digital Firm

Criteria for Determining Control Structure Importance of data Cost effectiveness of control technique –Efficiency –Complexity –Expense Risk assessment: Level of risk if not properly controlled –Potential frequency of problem –Potential damage Creating a Control Environment Developing a Control Structure: Costs and Benefits

MIS Audit Identifies all controls that govern individual information systems and assesses their effectiveness Lists and ranks all control weaknesses and estimates the probability of their occurrence Creating a Control Environment The Role of Auditing in the Control Process

Creating a Control Environment Sample auditor’s list of control weaknesses Figure 15-9

Development Methodology Collection of methods One or more method for every activity in every phase of development project Ensuring System Quality: Software and Data Software Quality Assurance Methodologies and Tools

Structured Methodologies Used to document, analyze, design information systems Top-down Process-oriented Linear Includes: –Structured analysis –Structured design –Structured programming Ensuring System Quality: Software and Data Software Quality Assurance Methodologies and Tools

Structured Analysis Defines system inputs, processes, outputs Logical graphic model of information flow Data flow diagram Data dictionary Process specifications Ensuring System Quality: Software and Data Software Quality Assurance Methodologies and Tools

Ensuring System Quality: Software and Data Data flow diagram for mail-in university registration system Figure 15-10

Structured Design Set of design rules and techniques Promotes program clarity and simplicity Design from top-down; main functions and subfunctions Structure chart Ensuring System Quality: Software and Data Software Quality Assurance Methodologies and Tools

Ensuring System Quality: Software and Data High-level structure chart for a payroll system Figure 15-11

Structured Programming Organizes and codes programs to simplify control paths for easy use and modification Independent modules with one entry and exit point Three basic control constructs: –Simple sequence –Selection –Iteration Ensuring System Quality: Software and Data Software Quality Assurance Methodologies and Tools

Ensuring System Quality: Software and Data Basic program control constructs Figure 15-12

Limitations of Traditional Methods Can be inflexible and time-consuming Programming depends on completion of analysis and design phases Specification changes require changes in analysis and design documents first Function-oriented Ensuring System Quality: Software and Data Software Quality Assurance Methodologies and Tools

Unified Modeling Language (UML) Industry standard for analysis and design of object-oriented systems Represents different views using graphical diagrams Underlying model integrates views for consistency during analysis, design, and implementation Ensuring System Quality: Software and Data Software Quality Assurance Methodologies and Tools

UML Components Things: –Structural thingsClasses, interfaces, collaborations, use cases, active classes, components, nodes –Behavioral thingsInteractions, state machines –Grouping thingsPackages –Annotational thingsNotes Ensuring System Quality: Software and Data Software Quality Assurance Methodologies and Tools

UML Components Relationships –Structural Dependencies, aggregations, associations, generalizations –BehavioralCommunicates, includes, extends, generalizes Diagrams –StructuralClass, object, component, and deployment diagrams –BehavioralUse case, sequence, collaboration, stateschart, and activity diagrams Ensuring System Quality: Software and Data Software Quality Assurance Methodologies and Tools

Ensuring System Quality: Software and Data A UML use-case diagram Figure 15-13

Ensuring System Quality: Software and Data A UML sequence diagram Figure 15-14

Computer-Aided Software Engineering (CASE) Automation of step-by-step methodologies Reduce repetitive development work Support documentation creation and revisions Organize design components; design repository Support code generation Require organizational discipline Ensuring System Quality: Software and Data Software Quality Assurance Methodologies and Tools

Resource Allocation: Assigning costs, time, personnel to different development phases Software Metrics: Quantified measurements of systems performance Testing: Walkthroughs, debugging Ensuring System Quality: Software and Data Software Quality Assurance Methodologies and Tools

Data Quality Audit –Survey end users for perceptions of data quality –Survey entire data files –Survey samples from data files Data Cleansing –Correcting errors and inconsistencies in data between business units Ensuring System Quality: Software and Data Data Quality Audits and Data Cleansing

1.Summarize the ISM security problem and its impact on ISM and its clients. 2.Describe the control weaknesses of ISM and those of its clients that made it possible for this problem to occur. What management, organization, and technology factors contributed to those weaknesses? Chapter 15 Case Study Could a Missing Hard Drive Create Canada’s Biggest Identity Theft?

3.Was the disappearance of the hard drive a management problem, an organization problem, or a technical problem? Explain your answer. 4.If you were responsible for designing security at ISM and its client companies, what would you have done differently? How would you have solved their control problems? Chapter 15 Case Study Could a Missing Hard Drive Create Canada’s Biggest Identity Theft?