CONTROLLING INFORMATION SYSTEMS

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Created by: Robert McAndrews Career & Technology Education Humble Independent School District.
Crime and Security in the Networked Economy Part 4.
Using Your Knowledge – Security Threats
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Security, Privacy, and Ethics Online Computer Crimes.
Security+ Guide to Network Security Fundamentals
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Threats and Attacks Principles of Information Security, 2nd Edition
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Overview of IS Auditing n Need for control and Audit of Computers –Org cost of data loss –cost of incorrect decision –Value of hardware, software, personnel.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
L o g o Types of Computer Crime Zhuravlev Alexander 326 MSLU.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
INTRODUCTION TO COMPUTER TECHNOLOGY
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Security of systems Security risks come from two areas: employees (who introduce accidental and intentional risks) and external computer crime. Unfortunately.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Cyber crime & Security Prepared by : Rughani Zarana.
Your Interactive Guide to the Digital World Discovering Computers 2012.
1.1 System Performance Security Module 1 Version 5.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Information Systems Security Operational Control for Information Security.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Topic 5: Basic Security.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
11-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Information Security and Privacy in HRIS
Chapter 17 Risks, Security and Disaster Recovery
Lecture 14: Business Information Systems - ICT Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
INFORMATION SYSTEMS SECURITY and CONTROL
Security of Data  
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
Mohammad Alauthman Computer Security Mohammad Alauthman
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

CONTROLLING INFORMATION SYSTEMS

Reasons Errors do occur in computer-based systems Computers have been used for fraudulent purpose Computer systems and their software and data resources have been accidentally or maliciously destroyed

Effective Controls make: To ensure information system security that is the accuracy, integrity, and safety of information systems activities and resources Minimize errors, fraud, and destruction in an information services organization Provide quality assurance for information systems Reduce the potential negative impact

Categories of Control Information system controls Procedural controls Physical facility controls

Information System Controls Ensure proper methods data entry, processing techniques, storage, and information output. Identify incorrect, invalid, or improper input data as it enters the computer system Processing controls are developed to identify errors in arithmetic calculations and logical operations

Procedural Controls: Help an organization maintain the accuracy and integrity of operations and systems Sketch out the duties of systems development, computer operations, and control of data and program files Standard procedures promotes uniformity and minimizes the chances of errors and fraud.

Physical Facility Controls: Protect physical facilities and their contents from loss or destruction. Computer centers are subject to such hazards as accidents, natural disasters, sabotage, vandalism, unauthorized use Protect the hardware, software, and vital data resources of computer using organizations. Formal backup and recovery procedures. Training at least two people in the operation and maintenance of any critical system

INFORMATION SECURITY

Meaning Means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction Incorporate a range of policies, security products, technologies and procedures. A set of procedures and systems needs to be applied to effectively deter access to information.

Role of Hackers: Hackers are the people who break through information security systems. They use their technological skills to break into computer systems and access private information They bypass firewall with the right hardware. This makes loss of vital information, or a virus could be planted and erase all information They gain access to a network if a firewall is shut down for only a minute.

Role of an organization related to information security issues: Must protect their information from loss Protecting valuable asset, such as tangible property, equipment, money, or staff by developing SOPs. Protect against accidental or malicious unauthorized disclosure, modification, or destruction or inability.

Basic Principle of Information Security: Confidentiality Integrity Availability Trust Ethicality

COMPUTER CRIME

DEFINITION Criminal activities which involve the use of information technology To gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data Activities such as electronic frauds, misuse of devices, identity theft and data

Types of Computer Crimes: Hacking: The activity of breaking into a computer system to gain an unauthorized access is known as hacking Phishing: Phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit card details. Computer Viruses: Viruses spread to other computers through network file system, USB drives and CDs

Crimes (Continued…) Cyber-stalking: Torture individuals through Internet by means of chat rooms, on-line forums and social networking websites, obscene emails, abusive phone calls. Identity Theft: Involves stealing money and obtaining other benefits through the use of a false identity. Illegal migration, terrorism and blackmail