security and control in mis

32
MANAGEMENT INFORMATION SYSTEMS SECURITY AND CONTROL Submitted By: Gurjit Singh Shallu Thakur MBA 3 rd sem.

Upload: gurjit

Post on 15-Jul-2015

8.902 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Security and control in mis

MANAGEMENT INFORMATION

SYSTEMS SECURITY AND

CONTROL

Submitted By:

Gurjit Singh

Shallu Thakur

MBA 3rd sem.

Page 2: Security and control in mis

The quality or state of being secure to be free from danger

Security is achieved using several strategies simultaneously or used in combination with one another

Security is recognized as essential to protect vital processes and the systems that provide those processes

Security is not something you buy, it is something you do

What is security?

Page 3: Security and control in mis

OBJECTIVES

• Explain why information systems need

special protection from destruction,

error, and abuse

• Assess the business value of security

and control

• Evaluate elements of an organizational

and managerial framework for security

and control

Page 4: Security and control in mis

OBJECTIVES

Identify the challenges posed by information systems security and control and management solutions

Why are information systems so vulnerable to destruction, error, abuse, and system quality problems?

What types of controls are available for information systems?

Page 5: Security and control in mis

Vulnerability, Threat and Attack

A vulnerability:- is a weakness in security system

◦ Can be in design, implementation, etc.

◦ Can be hardware, or software

A threat:- is a set of circumstances that has the potential to cause loss or harm

◦ Or it’s a potential violation of security

◦ Threat can be:

Accidental (natural disasters, human error, …)

Malicious (attackers, insider fraud, …)

An attack:- is the actual violation of security

Page 6: Security and control in mis

Why Systems are Vulnerable?

Hardware problems-

• Breakdowns, configuration errors, damage

from improper use or crime

Software problems-

• Programming errors, installation errors,

unauthorized changes)

Disasters-

• Power failures, flood, fires, etc.

Use of networks and computers outside of

firm’s control -

• E.g. with domestic or offshore outsourcing

vendors

Page 7: Security and control in mis

SYSTEM VULNERABILITY

AND ABUSE

Concerns for System Builders and Users

Disaster

Destroys computer hardware, programs, data

files, and other equipment

Security

Prevents unauthorized access, alteration, theft,

or physical damage

Page 8: Security and control in mis

SYSTEM VULNERABILITY

AND ABUSE

Concerns for System Builders and Users

Errors-

Cause computers to disrupt or destroy

organization’s record-keeping and

operations

Bugs-

Program code defects or errors

Maintenance Nightmare-

Maintenance costs high due to

organizational change, software complexity,

and faulty system analysis and design

Page 9: Security and control in mis

RISKS & THREATS

High User Knowledge

of IT Systems

Theft, Sabotage,

Misuse

Virus Attacks Systems & Network Failure

Lack Of Documentation

Lapse in Physical SecurityNatural

Calamities & Fire

Page 10: Security and control in mis

SO HOW DO WE OVERCOME THESE PROBLEMS?

Page 11: Security and control in mis

BUSINESS VALUE OF

SECURITY AND CONTROL

• Inadequate security and control may create

serious legal liability.

• Businesses must protect not only their own

information assets but also those of

customers, employees, and business

partners. Failure to do so can lead to costly

litigation for data exposure or theft.

• A sound security and control framework that

protects business information assets can thus

produce a high return on investment.

Page 12: Security and control in mis

ESTABLISHING A MANAGEMENT

FRAMEWORK FOR SECURITY AND

CONTROL

General controls:Establish framework for controlling design, security, and use of computer programs • Software controls

• Hardware controls

• Computer operations controls

• Data security controls

• Implementation controls

Page 13: Security and control in mis

ESTABLISHING A MANAGEMENT

FRAMEWORK FOR SECURITY AND

CONTROL

Application controls:

• Input

• Processing

• Output

Unique to each computerized

application

Page 14: Security and control in mis

CREATING A CONTROL

ENVIRONMENT

Controls:-

• Methods, policies, and procedures

• Ensures protection of organization’s

assets

• Ensures accuracy and reliability of

records, and operational adherence to

management standards

Page 15: Security and control in mis

Worldwide Damage from

Digital Attacks

Page 16: Security and control in mis

CREATING A CONTROL

ENVIRONMENT

Disaster recovery plan:

Runs business in event of

computer outage

Load balancing:

Distributes large number of

requests for access among multiple

servers

Page 17: Security and control in mis

CREATING A CONTROL

ENVIRONMENT• Mirroring:

Duplicating all processes and transactions of

server on backup server to prevent any

interruption

• Clustering:

Linking two computers together so that a

second computer can act as a backup to the

primary computer or speed up processing

Page 18: Security and control in mis

CREATING A CONTROL

ENVIRONMENT

Internet Security ChallengesFirewalls:-• Hardware and software controlling flow of incoming

and outgoing network traffic

• Prevent unauthorized users from accessing private networks

• Two types: proxies and stateful inspection

Intrusion Detection System:-• Monitors vulnerable points in network to detect and

deter unauthorized intruders

Page 19: Security and control in mis

Figure 10-7

A Corporate Firewall

Page 20: Security and control in mis

CREATING A CONTROL

ENVIRONMENT

Internet Security

Challenges• Encryption: -

Coding and scrambling of messages to prevent

their access without authorization

• Authentication: -

Ability of each party in a transaction to

ascertain identity of other party

• Message integrity: -

Ability to ascertain that transmitted message has

not been copied or altered

Page 21: Security and control in mis

CREATING A CONTROL

ENVIRONMENTInternet Security Challenges

Digital signature: -Digital code attached to

electronically transmitted message to uniquely

identify contents and sender

Digital certificate: -Attachment to electronic

message to verify the sender and to provide

receiver with means to encode reply

Secure Electronic Transaction (SET): -

Standard for securing credit card transactions over

Internet and other networks

Page 22: Security and control in mis

Access Control - Physical

• Follow Security Procedures

• Wear Identity Cards

• Ask unauthorized visitor his credentials

• Attend visitors in Reception and Conference Room only

• Bring visitors in operations area without priorpermission

• Bring hazardous and combustible material insecure area

• Practice “Piggybacking”

• Bring and use pen drives, zip drives, ipods,other storage devices unless and otherwiseauthorized to do so

USER RESPONSIBILITIES

Page 23: Security and control in mis

Password Guidelines

Always use at least 8 character password withcombination of alphabets, numbers and specialcharacters (*, %, @, #, $, ^)

Use passwords that can be easily remembered byyou

Change password regularly as per policy

Use password that is significantly different fromearlier passwords

Use passwords which reveals your personal information or words found in dictionary

Write down or Store passwords

Share passwords over phone or Email

Use passwords which do not match above complexity criteria

USER RESPONSIBILITIES

Page 24: Security and control in mis

Internet UsageUse internet services for business purposes only

Do not access internet through dial-upconnectivity

Do not use internet for accessing auction sites

Do not use internet for hacking other computersystems

Do not use internet to download / uploadcommercial software / copyrighted material

Technology Department is continuouslymonitoring Internet Usage. Any illegal use ofinternet and other assets shall call forDisciplinary Action.

USER RESPONSIBILITIES

Page 25: Security and control in mis

CREATING A CONTROL

ENVIRONMENT

Antivirus Software

Antivirus software: -

Software that checks computer

systems and drives for the presence of

computer viruses and can eliminate the

virus from the infected area

• Wi-Fi Protected Access specification

Page 26: Security and control in mis

This NEC PC

has a biometric

fingerprint

reader for fast

yet secure

access to files

and networks.

New models of

PCs are starting

to use biometric

identification to

authenticate

users

Page 27: Security and control in mis

MANAGEMENT OPPORTUNITIES,

CHALLENGES AND SOLUTIONS

oManagement Opportunities: -Creation of secure, reliable Web sites and

systems that can support e-commerce and e-

business strategies

Page 28: Security and control in mis

MANAGEMENT

CHALLENGES

Designing systems that are neither over-controlled

nor under-controlled

provide network and infrastructure security to a

financial services firm in a Web-enabled high-threat

environment

Page 29: Security and control in mis

MANAGEMENT

CHALLENGES Implementing an effective security policy

Applying quality assurance standards in large

systems projects

What are the most important software quality

assurance techniques?

Why are auditing information systems and

safeguarding data quality so important?

Page 30: Security and control in mis

Solution Guidelines• Security and control must become a more visible and

explicit priority and area of information systems

investment.

• Support and commitment from top management is

required to show that security is indeed a corporate

priority and vital to all aspects of the business.

• Security and control should be the responsibility of

everyone in the organization.

Page 31: Security and control in mis

. . . LET US BUILD A HUMAN WALL ALONG WITH FIREWALL

Human Wall Is Always Better Than A Firewall

Page 32: Security and control in mis