Prepared by: Dinesh Bajracharya Nepal Security and Control.

Slides:



Advertisements
Similar presentations
Lecture 14 Securing Information Systems
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Managing Information Systems Information Systems Security and Control Part 1 Dr. Stephania Loizidou Himona ACSC 345.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Lecture 10 Security and Control.
1 An Overview of Computer Security computer security.
Lecture 10 Security and Control.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
CYBER CRIME AND SECURITY TRENDS
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Chapter 8 Security and Control.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for.
Securing Information Systems
7.1 © 2007 by Prentice Hall 10 Chapter Securing Information Systems.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Computer Crime and Information Technology Security
PART THREE E-commerce in Action Norton University E-commerce in Action.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
1 I.Assets and Treats Information System Assets That Must Be Protected People People Hardware Hardware Software Software Operating systems Operating systems.
Cyber crime & Security Prepared by : Rughani Zarana.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
C8- Securing Information Systems
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Management Information Systems Chapter Eight Securing Information Systems Md. Golam Kibria Lecturer, Southeast University.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
The Importance of Proper Controls. 5 Network Controls Developing a secure network means developing mechanisms that reduce or eliminate the threats.
CONTROLLING INFORMATION SYSTEMS
Information Systems Week 7 Securing Information Systems.
8.1 © 2010 by Prentice Hall 8 Chapter Securing Information Systems.
ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Cyber crime and security issues
7 Chapter Securing Information Systems 1. The Boston Celtics Score Big Points Against Spyware Problem: frequency of wireless usage exposed Celtics’ proprietary.
8.1 © 2010 by Prentice Hall 7 Chapter Securing Information Systems.
Securing Information Systems
Securing Information Systems
Securing Information Systems
Securing Information Systems
Cyber Crimes Chunlian QU 9/18/2018.
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Week 7 Securing Information Systems
Securing Information Systems
Securing Information Systems
Chapter 10 Security and Control.
INFORMATION SYSTEMS SECURITY and CONTROL
Securing Information Systems
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

Prepared by: Dinesh Bajracharya Nepal Security and Control

System Vulnerability and Abuse The main areas from which threats can arise are: technical, organizational and environmental, Threats result from poor management decisions There are several places where threat can arise In each layer of communications

Clients can harm information system by introducing errors or by accessing systems illegally Data can be accessed without authorization and stolen Intruders can launch denial of service attacks or malicious software Systems malfunction because of problems in computer hardware Errors in programming, improper installation Power failures, floods, fire or other natural disasters

Internet Vulnerabilities Internet is a huge network of networks, if something goes wrong in Internet, enormous widespread impact will result. As organizations become part of Internet, the information systems of the organizations are more exposed to the actions from outsiders can contain attachments which may contain malicious software Wireless Security Challenges Wireless networks using radio-based technology are even more vulnerable to penetration Malicious software: Virus, worms, Trojan Horses

Hackers and Cyber vandalism A hacker is an individual who gains unauthorized access to a computer system Cyber vandalism: The intentional disruption, or even destruction of a web site, information system Snoofing and sniffing Redirecting web site to an address different from the intended one. Hackers attempting to hide their true identity to spoof. Sniffing A sniffer is a type of eavesdropping program that monitors information travelling over a network Denial of service Employees as threat

Computer crime Is any violation of criminal law that invoke a knowledge of computer technology for their penetration, investigation. Computer can be instrument of crime or target of crime Identity theft:

Business value of Security and Control Computer system failure results in serious loss of business function Companies have valuable information: taxes, financial, medical records Control mechanisms Two controls mechanisms can be implemented to protect information system and computers General controls Application controls

General Controls Govern design, security, and use of computer programs, Security of data On the whole general controls apply to all computerized applications and consist of a combination of hardware, software, procedures

Application control Are specific controls unique to each computerized application Input control Processing control Output control

Anti Virus and Firewalls Software that protects computers from malicious programs Firewalls check all the incoming and outgoing data to and from the organization. If any kind of threat is sensed firewall will block those data from either going out or coming into the firms network.

Risk assessment Which assets need to be protected What is the importance of assets A risk assessment determines the level of risk to the firm if a specific activity or process is not properly controlled.

Ensuring business continuity Fault tolerant computer systems High availability computing Load balancing Mirroring Clustering: backup can take on service Disaster recovery plans.