SlideShare a Scribd company logo
How To Secure MIS
How To Secure MIS
MALIK TOUQEER
BBA(HONS) THE ISLAMIA
UNIVERSITY BAHAWALPUR
PAKISTAN
SECURING MANAGEMENT
INFORMATION
SYSTEM
Introduction to MIS
An MIS provides managers with information and support for effective decision
making, and provides feedback on daily operations.
MIS is a system, which makes available the Right Information to the Right
Person at the Right place at the Right Time in the Right Form and at
Right Cost.
 The quality or state of being secure to be free from danger
 Security is achieved using several strategies simultaneously or used in
combination with one another
 Security is recognized as essential to protect vital processes and the
systems that provide those processes
 Security is not something you buy, it is something you do
What is security?
Vulnerability, Threat and Attack
 A vulnerability:- is a weakness in security system
Can be in design, implementation, etc.
Can be hardware, or software
 A threat:- is a set of circumstances that has the potential to cause loss or
harm
Or it’s a potential violation of security
Threat can be:
Accidental (natural disasters, human error, …)
Malicious (attackers, insider fraud, …)
 An attack:- is the actual violation of security
Why Systems are Vulnerable?
 Hardware problems-
• Breakdowns, configuration errors, damage from
improper use or crime
 Software problems-
• Programming errors, installation errors, unauthorized
changes)
 Disasters-
• Power failures, flood, fires, etc.
 Use of networks and computers outside of firm’s control
-
• E.g. with domestic or offshore outsourcing vendors
SO HOW DO WE
OVERCOME THESE
PROBLEMS???
BUSINESS VALUE OF SECURITY AND
CONTROL
• Inadequate security and control may create serious legal liability.
• Businesses must protect not only their own information assets but also
those of customers, employees, and business partners. Failure to do so
can lead to costly litigation for data exposure or theft.
• A sound security and control framework that protects business information
assets can thus produce a high return on investment.
ESTABLISHING A MANAGEMENT FRAMEWORK
FOR SECURITY AND CONTROL
 General controls:
Establish framework for controlling design, security, and use of computer
programs
• Software controls
• Hardware controls
• Computer operations controls
• Data security controls
• Implementation controls
ESTABLISHING A MANAGEMENT FRAMEWORK FOR
SECURITY AND CONTROL
Application controls:
• Input
• Processing
• Output
Unique to each computerized
application
CREATING A CONTROL ENVIRONMENT
 Controls:-
• Methods, policies, and procedures
• Ensures protection of organization’s assets
• Ensures accuracy and reliability of records, and
operational adherence to management standards
Worldwide Damage from Digital Attacks
CREATING A CONTROL ENVIRONMENT
 Disaster recovery plan:
Runs business in event of computer outage
 Load balancing:
Distributes large number of requests for access among
multiple servers
CREATING A CONTROL ENVIRONMENT
• Mirroring:
Duplicating all processes and transactions of server on backup server to
prevent any interruption
• Clustering:
Linking two computers together so that a second computer can act as a
backup to the primary computer or speed up processing
CREATING A CONTROL ENVIRONMENT
Internet Security Challenges
 Firewalls:-
• Hardware and software controlling flow of incoming and outgoing network
traffic
• Prevent unauthorized users from accessing private networks
• Two types: proxies and stateful inspection
 Intrusion Detection System:-
• Monitors vulnerable points in network to detect and deter unauthorized
intruders
Figure 10-7
A Corporate Firewall
 Because they can
 A large fraction of hacker attacks have been pranks
 Financial Gain
 Espionage
 Venting anger at a company or organization
 Terrorism
Why do Hackers Attack?
Access Control - Physical
USER RESPONSIBILITIES
• Follow Security Procedures
• Wear Identity Cards
• Ask unauthorized visitor his credentials
• Attend visitors in Reception and Conference Room only
• Bring visitors in operations area without prior permission
• Bring hazardous and combustible material in secure area
• Practice “Piggybacking”
• Bring and use pen drives, zip drives, ipods, other storage devices
unless and otherwise authorized to do so
Password Guidelines
 Always use at least 8 character password with combination of
alphabets, numbers and special characters (*, %, @, #, $, ^)
 Use passwords that can be easily remembered by you
 Change password regularly as per policy
 Use password that is significantly different from earlier passwords
Use passwords which reveals your personal information or words found
in dictionary
Write down or Store passwords
Share passwords over phone or Email
Use passwords which do not match above complexity criteria
 Dictionary Attack
 Hacker tries all words in dictionary to crack password
 70% of the people use dictionary words as passwords
 Brute Force Attack
 Try all permutations of the letters & symbols in the alphabet
 Hybrid Attack
 Words from dictionary and their variations used in attack
 Shoulder Surfing
 Hackers slyly watch over peoples shoulders to steal passwords
 Dumpster Diving
 People dump their trash papers in garbage which may contain information to
crack passwords
Password Attacks - Types
Internet Usage
Use internet services for business purposes only
 Do not access internet through dial-up connectivity
 Do not use internet for accessing auction sites
 Do not use internet for hacking other computer systems
 Do not use internet to download / upload commercial software /
copyrighted material
 Technology Department is continuously monitoring Internet
Usage. Any illegal use of internet and other assets shall call for
Disciplinary Action.
CREATING A CONTROL ENVIRONMENT
Antivirus Software
 Antivirus software: -
Software that checks computer systems and drives for
the presence of computer viruses and can eliminate the
virus from the infected area
• Wi-Fi Protected Access specification
This NEC PC has a biometric fingerprint reader
for fast yet secure access to files and networks.
New models of PCs are starting to use
biometric identification to authenticate users
MANAGEMENT CHALLENGES
 Implementing an effective security policy
 Applying quality assurance standards in large systems projects
 What are the most important software quality assurance techniques?
 Why are auditing information systems and safeguarding data quality so
important?
Solution Guidelines
• Security and control must become a more visible and explicit
priority and area of information systems investment.
• Support and commitment from top management is required to
show that security is indeed a corporate priority and vital to all
aspects of the business.
• Security and control should be the responsibility of everyone in
the organization.
. . . LET US BUILD A HUMAN WALL ALONG WITH FIREWALL
Human Wall Is Always Better Than A
Firewall
How To Secure MIS
How To Secure MIS

More Related Content

PPTX
Lean basics
PPTX
3 employee discipline
PPTX
Ch # 5 brm
PPTX
Ch # 3 brm
PDF
Types of production processes
PPSX
PPTX
Work measurement
PPTX
Waste in production
Lean basics
3 employee discipline
Ch # 5 brm
Ch # 3 brm
Types of production processes
Work measurement
Waste in production

What's hot (20)

PPTX
Motion study on shopfloor and design of work
PPTX
Storage system
PPTX
Lean Manufacturing
PPTX
Lean ppt
PPTX
Chapter 4 hr
PPTX
Lean management
PDF
Recruitment, Selection & Onboarding
PPTX
Just in time (JIT).
PDF
Forecasting
PDF
1D - 8D Report A
PPTX
Production capacity – planning and control
PDF
Training And Development
PDF
Batch v Lean 1 piece flow training
PPT
Introduction to production planning and control
PDF
A3 Thinking Masterclass by John Kiff
PPT
Process mapping
PPTX
Lean Fundamentals Overview Webinar
PPTX
Theory of constraints
PPT
PIP Guide 2008_7April08.ppt
PPTX
Lean Management Basics
Motion study on shopfloor and design of work
Storage system
Lean Manufacturing
Lean ppt
Chapter 4 hr
Lean management
Recruitment, Selection & Onboarding
Just in time (JIT).
Forecasting
1D - 8D Report A
Production capacity – planning and control
Training And Development
Batch v Lean 1 piece flow training
Introduction to production planning and control
A3 Thinking Masterclass by John Kiff
Process mapping
Lean Fundamentals Overview Webinar
Theory of constraints
PIP Guide 2008_7April08.ppt
Lean Management Basics
Ad

Similar to How To Secure MIS (20)

PPTX
Management Information System Presentation
PPTX
Security & control in mis
PPT
IM Unit 4 Security and its a control.ppt
PPTX
Security and control in mis
PPTX
Management Information Systems ( Security and Control.pptx
PPTX
INFORMATION SECURITY SYSTEM
KEY
Mis
KEY
Chapter 10, part 1
PPTX
MIS_Session05.pptx
PPT
Security and Control.ppt
PPT
Information security management
PPT
Information security management v2010
PDF
Describe two methods for communicating the material in an Informatio.pdf
DOCX
Security and Ethical Challenges Contributors Kim Wanders.docx
DOCX
Security and Ethical Challenges Contributors Kim Wanders.docx
PPT
MIS chap # 9.....
PPTX
Date security introduction
PPT
IT-Security-20210426203847.ppt
PPT
IT-Security Assessment for IT assets.ppt
PPT
IT-Security-20210426203847.ppt
Management Information System Presentation
Security & control in mis
IM Unit 4 Security and its a control.ppt
Security and control in mis
Management Information Systems ( Security and Control.pptx
INFORMATION SECURITY SYSTEM
Mis
Chapter 10, part 1
MIS_Session05.pptx
Security and Control.ppt
Information security management
Information security management v2010
Describe two methods for communicating the material in an Informatio.pdf
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
MIS chap # 9.....
Date security introduction
IT-Security-20210426203847.ppt
IT-Security Assessment for IT assets.ppt
IT-Security-20210426203847.ppt
Ad

Recently uploaded (20)

PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
Lecture 3 - Risk Management and Compliance.pdf
PDF
Business model innovation report 2022.pdf
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PPTX
5 Stages of group development guide.pptx
PDF
A Brief Introduction About Julia Allison
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PPTX
DMT - Profile Brief About Business .pptx
PDF
Nidhal Samdaie CV - International Business Consultant
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PDF
Unit 1 Cost Accounting - Cost sheet
PPTX
Starting the business from scratch using well proven technique
PDF
Leading with Vision_ How Mohit Bansal Is Shaping Chandigarh’s Real Estate Ren...
PPTX
Amazon (Business Studies) management studies
PDF
Reconciliation AND MEMORANDUM RECONCILATION
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Lecture 3 - Risk Management and Compliance.pdf
Business model innovation report 2022.pdf
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
COST SHEET- Tender and Quotation unit 2.pdf
Ôn tập tiếng anh trong kinh doanh nâng cao
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
5 Stages of group development guide.pptx
A Brief Introduction About Julia Allison
Belch_12e_PPT_Ch18_Accessible_university.pptx
DMT - Profile Brief About Business .pptx
Nidhal Samdaie CV - International Business Consultant
Roadmap Map-digital Banking feature MB,IB,AB
340036916-American-Literature-Literary-Period-Overview.ppt
Unit 1 Cost Accounting - Cost sheet
Starting the business from scratch using well proven technique
Leading with Vision_ How Mohit Bansal Is Shaping Chandigarh’s Real Estate Ren...
Amazon (Business Studies) management studies
Reconciliation AND MEMORANDUM RECONCILATION

How To Secure MIS

  • 3. MALIK TOUQEER BBA(HONS) THE ISLAMIA UNIVERSITY BAHAWALPUR PAKISTAN
  • 5. Introduction to MIS An MIS provides managers with information and support for effective decision making, and provides feedback on daily operations. MIS is a system, which makes available the Right Information to the Right Person at the Right place at the Right Time in the Right Form and at Right Cost.
  • 6.  The quality or state of being secure to be free from danger  Security is achieved using several strategies simultaneously or used in combination with one another  Security is recognized as essential to protect vital processes and the systems that provide those processes  Security is not something you buy, it is something you do What is security?
  • 7. Vulnerability, Threat and Attack  A vulnerability:- is a weakness in security system Can be in design, implementation, etc. Can be hardware, or software  A threat:- is a set of circumstances that has the potential to cause loss or harm Or it’s a potential violation of security Threat can be: Accidental (natural disasters, human error, …) Malicious (attackers, insider fraud, …)  An attack:- is the actual violation of security
  • 8. Why Systems are Vulnerable?  Hardware problems- • Breakdowns, configuration errors, damage from improper use or crime  Software problems- • Programming errors, installation errors, unauthorized changes)  Disasters- • Power failures, flood, fires, etc.  Use of networks and computers outside of firm’s control - • E.g. with domestic or offshore outsourcing vendors
  • 9. SO HOW DO WE OVERCOME THESE PROBLEMS???
  • 10. BUSINESS VALUE OF SECURITY AND CONTROL • Inadequate security and control may create serious legal liability. • Businesses must protect not only their own information assets but also those of customers, employees, and business partners. Failure to do so can lead to costly litigation for data exposure or theft. • A sound security and control framework that protects business information assets can thus produce a high return on investment.
  • 11. ESTABLISHING A MANAGEMENT FRAMEWORK FOR SECURITY AND CONTROL  General controls: Establish framework for controlling design, security, and use of computer programs • Software controls • Hardware controls • Computer operations controls • Data security controls • Implementation controls
  • 12. ESTABLISHING A MANAGEMENT FRAMEWORK FOR SECURITY AND CONTROL Application controls: • Input • Processing • Output Unique to each computerized application
  • 13. CREATING A CONTROL ENVIRONMENT  Controls:- • Methods, policies, and procedures • Ensures protection of organization’s assets • Ensures accuracy and reliability of records, and operational adherence to management standards
  • 14. Worldwide Damage from Digital Attacks
  • 15. CREATING A CONTROL ENVIRONMENT  Disaster recovery plan: Runs business in event of computer outage  Load balancing: Distributes large number of requests for access among multiple servers
  • 16. CREATING A CONTROL ENVIRONMENT • Mirroring: Duplicating all processes and transactions of server on backup server to prevent any interruption • Clustering: Linking two computers together so that a second computer can act as a backup to the primary computer or speed up processing
  • 17. CREATING A CONTROL ENVIRONMENT Internet Security Challenges  Firewalls:- • Hardware and software controlling flow of incoming and outgoing network traffic • Prevent unauthorized users from accessing private networks • Two types: proxies and stateful inspection  Intrusion Detection System:- • Monitors vulnerable points in network to detect and deter unauthorized intruders
  • 19.  Because they can  A large fraction of hacker attacks have been pranks  Financial Gain  Espionage  Venting anger at a company or organization  Terrorism Why do Hackers Attack?
  • 20. Access Control - Physical USER RESPONSIBILITIES • Follow Security Procedures • Wear Identity Cards • Ask unauthorized visitor his credentials • Attend visitors in Reception and Conference Room only • Bring visitors in operations area without prior permission • Bring hazardous and combustible material in secure area • Practice “Piggybacking” • Bring and use pen drives, zip drives, ipods, other storage devices unless and otherwise authorized to do so
  • 21. Password Guidelines  Always use at least 8 character password with combination of alphabets, numbers and special characters (*, %, @, #, $, ^)  Use passwords that can be easily remembered by you  Change password regularly as per policy  Use password that is significantly different from earlier passwords Use passwords which reveals your personal information or words found in dictionary Write down or Store passwords Share passwords over phone or Email Use passwords which do not match above complexity criteria
  • 22.  Dictionary Attack  Hacker tries all words in dictionary to crack password  70% of the people use dictionary words as passwords  Brute Force Attack  Try all permutations of the letters & symbols in the alphabet  Hybrid Attack  Words from dictionary and their variations used in attack  Shoulder Surfing  Hackers slyly watch over peoples shoulders to steal passwords  Dumpster Diving  People dump their trash papers in garbage which may contain information to crack passwords Password Attacks - Types
  • 23. Internet Usage Use internet services for business purposes only  Do not access internet through dial-up connectivity  Do not use internet for accessing auction sites  Do not use internet for hacking other computer systems  Do not use internet to download / upload commercial software / copyrighted material  Technology Department is continuously monitoring Internet Usage. Any illegal use of internet and other assets shall call for Disciplinary Action.
  • 24. CREATING A CONTROL ENVIRONMENT Antivirus Software  Antivirus software: - Software that checks computer systems and drives for the presence of computer viruses and can eliminate the virus from the infected area • Wi-Fi Protected Access specification
  • 25. This NEC PC has a biometric fingerprint reader for fast yet secure access to files and networks. New models of PCs are starting to use biometric identification to authenticate users
  • 26. MANAGEMENT CHALLENGES  Implementing an effective security policy  Applying quality assurance standards in large systems projects  What are the most important software quality assurance techniques?  Why are auditing information systems and safeguarding data quality so important?
  • 27. Solution Guidelines • Security and control must become a more visible and explicit priority and area of information systems investment. • Support and commitment from top management is required to show that security is indeed a corporate priority and vital to all aspects of the business. • Security and control should be the responsibility of everyone in the organization.
  • 28. . . . LET US BUILD A HUMAN WALL ALONG WITH FIREWALL Human Wall Is Always Better Than A Firewall