SlideShare a Scribd company logo
USABILITY
VS
SAFETY
Control of Computer Systems
• General controls
• Application controls
General controls
• Systems development – before implementing or
converting a system, the security manager should
have input, along with users as to
feasibility, cost, benefit, testing and quality
assurance procedures
• system software – all system software should
come with security software that ensures
unauthorized changes cannot be made to system
software
• hardware – besides physical security, validity and
echo checks should be run to detect equipment
malfunctions
General controls (contd)
• operations – storage and processing equipment
should be consistent and work properly. IT
employees as well as users should know their
roles, follow back up and recovery instructions in
the manual
• data security – check terminal entry points, on
line access,. Inputs and outputs, set user
privileges, via password assignment
• administration – segregate IT job functions so no
overlap will happen. Supervise employees, write
policies and procedures
Application Controls
• input – check data for accuracy before
entering
• edit – check data for reasonableness before
entering it to the system
• format – check data for alphanumeric
consistency before entering it to the system
• dependency – check for logical relationships
of session data
Application Controls (contd)
• processing – session runtimes for accessing
data are convenient and short
• updating – newly entered data refreshes
conveniently and totals match what would be
obtained manually
• matching – computer files match what is
recorded on master or suspense files
• output – sensitive printout is shredded
EXHAUSTION BECAUSE OF
IMPORTANCE OF DATA
MIS – Management Information
Systems
CONTROL MODEL TERMINOLOGIES
• implementation – any activity that
adopts, manages and routinizes a new
technology
• prototype – any experimental part, version, or
build of a system or software
• request for permission (RFP) – the list of
questions you ask to find a software maker who
can make something for you, its cost, user
friendliness, maintenance, documentation, and
requirements
• project management – working with a software
representative on requirements and deliverables
CONTROL MODEL TERMINOLOGIES
(contd)
• deliverables – when the software company
actually gives you a working product
• walkthrough – the testing/debugging process of
going back over specifications after a computer
run
• outsourcing – turning over your computer center
operations to an external organization
• metrics – preset quantitative indicators (like the
number of calls to help desk) to measure system
quality
SURVIVABILITY AND THE CONCEPT OF
MISSION-CRITICAL
• Survivability is the capability of a system to
fulfill its mission in the presence of
attacks, failures and accidents.
• TIMELINESS AND REASONABLENESS
SURVIVABILITY
• ATTACK – is defined as any damaging or potentially
damaging event orchestrated by an intelligent adversary
• FAILURE – is any damaging or potentially damaging events
caused by deficiencies in the system or deficiencies in an
external element on which the system depends. It may be
caused by software design errors, hardware
degradation, human errors, or corrupted data.
• ACCIDENT – is a randomly occurring event which is
damaging or potentially damaging. Something beyond
control of the system administrator.

More Related Content

PPTX
Website's functional and non functional requirements
PPTX
Functional and non functional
PPTX
Introduction to Computer Programming
PPTX
Software maintenance
PPTX
CIE AS Level Applied ICT Unit 4 - Systems Life Cycle
PPT
Se lect9 btech
PPT
Software Engineering Lec 4-requirments
PPTX
Himanshu
Website's functional and non functional requirements
Functional and non functional
Introduction to Computer Programming
Software maintenance
CIE AS Level Applied ICT Unit 4 - Systems Life Cycle
Se lect9 btech
Software Engineering Lec 4-requirments
Himanshu

What's hot (20)

PDF
3. 1 req elicitation
PPT
Non Functional Testing
PPT
Capturing Measurable Non Functional Requirements
PPTX
2 software requirements-02
PPTX
Security Baselines and Risk Assessments
PDF
Non-Functional Requirements
PPT
Validating Non Functional Requirements
PPTX
Non-Functional Requirements Are Important (with Explanatory Notes)
PPT
Managing software project, software engineering
PPTX
IT General Controls
PPTX
Software engineering 1 software concepts
PPTX
PPTX
03.1 general control
PDF
Requirement Engineering
PPTX
SOFTWARE MAINTENANCE- 5
PPT
The information systems life cycle
PPTX
Requirement and Specification
PPTX
Systems Development Lifecycle Walkthrough (Cambridge Technical Level 3 IT)
PPTX
1 software requirements engineering-01
DOCX
Software maintenance service strategies
3. 1 req elicitation
Non Functional Testing
Capturing Measurable Non Functional Requirements
2 software requirements-02
Security Baselines and Risk Assessments
Non-Functional Requirements
Validating Non Functional Requirements
Non-Functional Requirements Are Important (with Explanatory Notes)
Managing software project, software engineering
IT General Controls
Software engineering 1 software concepts
03.1 general control
Requirement Engineering
SOFTWARE MAINTENANCE- 5
The information systems life cycle
Requirement and Specification
Systems Development Lifecycle Walkthrough (Cambridge Technical Level 3 IT)
1 software requirements engineering-01
Software maintenance service strategies
Ad

Viewers also liked (20)

PPTX
Lecture 07 networking
PPTX
Lecture about network and host security to NII students
PPT
Information systems 365 lecture eight
PDF
TUD CS4105 | 2015 | Lecture 1
PDF
Lecture12
PDF
Network Security Lecture
PPT
E-Mail - Technical Overview
PPT
Introduction to Computer Networks
PPT
Introduction to Peer-to-Peer Networks
PDF
GÜVENLİ YAZILIM GELİŞTİRME EĞİTİMİ İÇERİĞİ
PDF
SOC Ekiplerinin Problemlerine Güncel Yaklaşımlar - NETSEC
PPT
Introduction to Algorithms
PDF
SWIFT Altyapısına Yönelik Saldırıların Teknik Analizi - NETSEC
PPT
Network Security Primer
PPTX
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 4, 5, 6
PDF
Network Security Fundamentals
PPTX
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 7, 8, 9
PDF
Sosyal Medyada Anonim Hesaplar Nasıl Tespit Edilir? - NETSEC
PPTX
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 1, 2, 3
Lecture 07 networking
Lecture about network and host security to NII students
Information systems 365 lecture eight
TUD CS4105 | 2015 | Lecture 1
Lecture12
Network Security Lecture
E-Mail - Technical Overview
Introduction to Computer Networks
Introduction to Peer-to-Peer Networks
GÜVENLİ YAZILIM GELİŞTİRME EĞİTİMİ İÇERİĞİ
SOC Ekiplerinin Problemlerine Güncel Yaklaşımlar - NETSEC
Introduction to Algorithms
SWIFT Altyapısına Yönelik Saldırıların Teknik Analizi - NETSEC
Network Security Primer
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 4, 5, 6
Network Security Fundamentals
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 7, 8, 9
Sosyal Medyada Anonim Hesaplar Nasıl Tespit Edilir? - NETSEC
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 1, 2, 3
Ad

Similar to IT ELECT 4 NETWORK SECURITY LECTURE 6-5-13 (20)

PPTX
Software Engineering Introduction
PPTX
CISA_WK_4.pptx
PPT
22-REQUIREMENT.ppt
PPTX
ICAB - ITA Chapter 5 class 9-10 - Controls and Standards
PDF
Monotype IS Policy Supplement for Information Technology, DevOps, Production ...
PPTX
Controls in Audit.pptx
PPTX
Chapter-2-Control-Audit-Security-ioenotes.pptx
PPT
The Importance of Security within the Computer Environment
PDF
Operations Security Presentation
PPTX
Software development
PPTX
Chapter 7
DOC
Knowedge Skills Ability
PPTX
Non Functional Requirement.
PPTX
Chapter 12 Managing Systems Support and Security .pptx
PPTX
Security management concepts and principles
PPTX
UNIT-1-INTRO.pptxsqa assurance testing sqa
PDF
chapter12-120827115424-phpapp01.pdf
PPT
Se lect11 btech
PPTX
MES systems
Software Engineering Introduction
CISA_WK_4.pptx
22-REQUIREMENT.ppt
ICAB - ITA Chapter 5 class 9-10 - Controls and Standards
Monotype IS Policy Supplement for Information Technology, DevOps, Production ...
Controls in Audit.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptx
The Importance of Security within the Computer Environment
Operations Security Presentation
Software development
Chapter 7
Knowedge Skills Ability
Non Functional Requirement.
Chapter 12 Managing Systems Support and Security .pptx
Security management concepts and principles
UNIT-1-INTRO.pptxsqa assurance testing sqa
chapter12-120827115424-phpapp01.pdf
Se lect11 btech
MES systems

More from Jd Mercado (6)

PPTX
Network Security July 1
PPTX
Array
PPTX
For...next loop structure
PPTX
Do...until loop structure
PPTX
Do...while loop structure
PPTX
Looping statement
Network Security July 1
Array
For...next loop structure
Do...until loop structure
Do...while loop structure
Looping statement

Recently uploaded (20)

PPTX
Machine Learning_overview_presentation.pptx
PDF
Approach and Philosophy of On baking technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
Teaching material agriculture food technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Spectroscopy.pptx food analysis technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Electronic commerce courselecture one. Pdf
PPTX
A Presentation on Artificial Intelligence
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Machine Learning_overview_presentation.pptx
Approach and Philosophy of On baking technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation theory and applications.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Dropbox Q2 2025 Financial Results & Investor Presentation
Digital-Transformation-Roadmap-for-Companies.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Teaching material agriculture food technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
A comparative analysis of optical character recognition models for extracting...
Review of recent advances in non-invasive hemoglobin estimation
Spectroscopy.pptx food analysis technology
Chapter 3 Spatial Domain Image Processing.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Building Integrated photovoltaic BIPV_UPV.pdf
Electronic commerce courselecture one. Pdf
A Presentation on Artificial Intelligence
gpt5_lecture_notes_comprehensive_20250812015547.pdf

IT ELECT 4 NETWORK SECURITY LECTURE 6-5-13

  • 2. Control of Computer Systems • General controls • Application controls
  • 3. General controls • Systems development – before implementing or converting a system, the security manager should have input, along with users as to feasibility, cost, benefit, testing and quality assurance procedures • system software – all system software should come with security software that ensures unauthorized changes cannot be made to system software • hardware – besides physical security, validity and echo checks should be run to detect equipment malfunctions
  • 4. General controls (contd) • operations – storage and processing equipment should be consistent and work properly. IT employees as well as users should know their roles, follow back up and recovery instructions in the manual • data security – check terminal entry points, on line access,. Inputs and outputs, set user privileges, via password assignment • administration – segregate IT job functions so no overlap will happen. Supervise employees, write policies and procedures
  • 5. Application Controls • input – check data for accuracy before entering • edit – check data for reasonableness before entering it to the system • format – check data for alphanumeric consistency before entering it to the system • dependency – check for logical relationships of session data
  • 6. Application Controls (contd) • processing – session runtimes for accessing data are convenient and short • updating – newly entered data refreshes conveniently and totals match what would be obtained manually • matching – computer files match what is recorded on master or suspense files • output – sensitive printout is shredded
  • 7. EXHAUSTION BECAUSE OF IMPORTANCE OF DATA MIS – Management Information Systems
  • 8. CONTROL MODEL TERMINOLOGIES • implementation – any activity that adopts, manages and routinizes a new technology • prototype – any experimental part, version, or build of a system or software • request for permission (RFP) – the list of questions you ask to find a software maker who can make something for you, its cost, user friendliness, maintenance, documentation, and requirements • project management – working with a software representative on requirements and deliverables
  • 9. CONTROL MODEL TERMINOLOGIES (contd) • deliverables – when the software company actually gives you a working product • walkthrough – the testing/debugging process of going back over specifications after a computer run • outsourcing – turning over your computer center operations to an external organization • metrics – preset quantitative indicators (like the number of calls to help desk) to measure system quality
  • 10. SURVIVABILITY AND THE CONCEPT OF MISSION-CRITICAL • Survivability is the capability of a system to fulfill its mission in the presence of attacks, failures and accidents. • TIMELINESS AND REASONABLENESS
  • 11. SURVIVABILITY • ATTACK – is defined as any damaging or potentially damaging event orchestrated by an intelligent adversary • FAILURE – is any damaging or potentially damaging events caused by deficiencies in the system or deficiencies in an external element on which the system depends. It may be caused by software design errors, hardware degradation, human errors, or corrupted data. • ACCIDENT – is a randomly occurring event which is damaging or potentially damaging. Something beyond control of the system administrator.