SlideShare a Scribd company logo
Chapter-9 : Information Systems Security and Control
MIS
MANAGING INFORMATION SYSTEMS IN BUSINESS,
GOVERNMENT AND SOCIETY
Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
LEARNING OBJECTIVES
• Get an overview of threats to the Organization
• Learn about technologies for handling Security
• Get an overview of wireless technology
• Understand managing security
2
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
MIND MAP OF CHAPTER TOPICS
3
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
THREATS TO THE ORGANIZATION
• Malware – various kinds of malicious software.
• Viruses – infiltrate and spread in organisational networks, infecting PCs and
destroying files and data.
• Worms – Much like a virus, but does not harm data, other than infiltrate and choke
the network.
• Trojans – Infiltrates computers and secretly allows external software and people to
invade the computer and use its resources.
• Denial-of-service Attack
4
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
THREATS TO THE ORGANIZATION
• Cracking and Espionage – The act of breaking into networks and computers illegally,
usually with intent to create mischief. It is also used for industrial and political
espionage – to steal information.
• Ethical Hacking – same as Cracking but the motivation is benign - not to harm but
expose weaknesses.
• Phishing and Identity Theft – use of fake websites to lure unsuspecting users to
reveal their private information.
5
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
MALWARE
• Damage caused by viruses, worms and Malware in the USA and worldwide (in USD).
6
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
DENIAL-OF-SERVICE ATTACK
• The requesting server sends a request for service, the responding server sends a
response; but the requesting server does not respond, thus, allowing the connection
to time out.
7
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
DISTRIBUTED DENIAL-OF-SERVICE ATTACK
• Many requesting servers send service requests to the responding server, which
responds, but requesting servers allow the connection request to time out.
8
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
TECHNOLOGIES FOR HANDLING SECURITY
• Encryption
• Public-key Cryptography
• Firewall
• Virtual Private Network
• Wireless Technology
• Wi-Fi Routers
• Bluetooth
• BlackBerry
• RFID
• Wireless Sensor Networks
9
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
ENCRYPTION
• Transformation of a message from plain text to a coded form (cipher text) that is not
easily readable.
• Symmetric Key – A key used to decrypt an encrypted message that is sent to the
receiver.
10
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
PUBLIC KEY CRYPTOGRAPHY
• Solves the problem of Symmetric Key cryptography in having to send across a secret
key.
• A pair of keys called the public key and the private key are used. The public key is
used to encrypt a message and is openly available. The private key is a secret key
used to decrypt the message encrypted with the public key
• RSA encryption is used to generate the key pairs from large prime numbers
• Digital certificates are used to authenticate the owners of public keys. Authentication
of senders is through the use of Digital Certificates
11
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
PUBLIC KEY CRYPTOGRAPHY
• Sending a message with Public key encryption
• The problem of impersonation with public-key encryption
12
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
AUTHENTICATION WITH PUBLIC-KEY CRYPTOGRAPHY
13
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
FIREWALL
• Firewalls are filtering and protection devices -usually a combination of hardware and
software
• Packet-level filtering
• Application-level filtering
• Firewalls slow down traffic at the perimeter – to overcome this firewalls are built into
hardware.
• Deep Packet Inspection
14
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
VIRTUAL PRIVATE NETWORK (VPN)
• A technology that enables clients or employees of an organisation, who are outside
the network, to connect securely to the organisation on the public Internet.
• It creates a 'tunnel' relying on authentication and encryption.
15
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
WIRELESS TECHNOLOGY
• Wi-Fi Routers
• Bluetooth – connects personal devices like mobile phones with other devices.
• BlackBerry – smart phone with 'push-email' service
• RFID (Radio Frequency Identification) – radio transmission through tiny transmitters
and receivers embedded in identifiable objects (tagging); maybe passive or active
(energy consuming)
• Wireless Sensor Networks – networks of sensors; used for monitoring and targeted
treatments in agriculture
16
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
WIRELESS MESH NETWORK
• Wireless hotpots or Access points act as routers to provide wireless Internet
connectivity.
• Unsecure Wi-Fi are source of security problems
17
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
MANAGING SECURITY
• Securing the Network
• Perimeter Security
• Two Factor Authentication
• Securing the Client
• Desktop Firewalls
• Password Policy
• Creating a Secure Environment
• Security Audit and Risk Assessment
• Disaster Recovery Planning
18
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
MANAGING SECURITY
The four features that need to be managed to enable a secure IS infrastructure in an
organisation -
• Confidentiality
• Authentication
• Message Integrity
• Access and Availability
19
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
SECURING THE NETWORK
• Perimeter Security – Demilitarised Zone
• Two-factor Authentication – Authentication by two independent methods
Typical layout for a demilitarised zone (DMZ)
20
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
SECURING THE CLIENT
• Desktop Firewalls
• Password Policy
• Creating a Secure Environment
• Security Audit and Risk Assessment
• Disaster Recovery Planning
21

More Related Content

PPTX
IDENTITY IN THE WORLD OF IOT
PPT
Identity-Defined Privacay & Security for Internet of Things
PDF
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
PPTX
9.35am robert humphrey
PDF
Blockchain and IAM for IOT Edge Authentication
PDF
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
PDF
SE-4111 Max Berman, User Authentication for Mobile Devices and Access
PDF
Encryption by Default BoF by Gihan Dias [APRICOT 2015]
IDENTITY IN THE WORLD OF IOT
Identity-Defined Privacay & Security for Internet of Things
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
9.35am robert humphrey
Blockchain and IAM for IOT Edge Authentication
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
SE-4111 Max Berman, User Authentication for Mobile Devices and Access
Encryption by Default BoF by Gihan Dias [APRICOT 2015]

What's hot (20)

PPTX
IoT Security
PDF
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
PDF
Okta Digital Enterprise Report
PDF
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
PDF
Security On The Edge - A New Way To Think About Securing the Internet of Things
PPTX
apidays LIVE New York 2021 - Securing access to high performing API in a regu...
PPTX
Onboarding in the IoT
PPT
Policies and Law in IT
PDF
Enhancing System Security Using PKI
PDF
Spellpoint - Securing Access for Microservices
PDF
Kantara - Digital Identity in 2018
PDF
Trends in IRM: Internet of Things
PDF
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
PDF
SecureMAG Volume 6 - 2014
PDF
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
PDF
Aditro - IAM as part of Cloud Business strategy
PDF
Open Identity Exchange - the Global Growth of Digital Identity
PDF
AI+Blockchain+IoT Integration Innovation Insights from Patents
PDF
PKI in Korea
PDF
Bhadale group of companies bfsi products catalogue
IoT Security
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
Okta Digital Enterprise Report
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
Security On The Edge - A New Way To Think About Securing the Internet of Things
apidays LIVE New York 2021 - Securing access to high performing API in a regu...
Onboarding in the IoT
Policies and Law in IT
Enhancing System Security Using PKI
Spellpoint - Securing Access for Microservices
Kantara - Digital Identity in 2018
Trends in IRM: Internet of Things
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
SecureMAG Volume 6 - 2014
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
Aditro - IAM as part of Cloud Business strategy
Open Identity Exchange - the Global Growth of Digital Identity
AI+Blockchain+IoT Integration Innovation Insights from Patents
PKI in Korea
Bhadale group of companies bfsi products catalogue
Ad

Similar to information control and Security system (20)

PDF
organisations and information systems
PDF
information technology and infrastructures choices
PDF
ethical issues,social issues
PDF
managing inforamation system
PDF
• E-commerce, e-business ,e-governance
PPTX
Session#7; securing information systems
PDF
IT stratergy and digital goods
PPTX
IS Unit II.pptx
PPT
Information Systems Security: Security Management, Metrics, Frameworks and Be...
PPTX
Information Security
PDF
CSI-ZG-513
PPTX
security and ethical challenges in information systems
PPT
Security and Control.ppt
PPTX
Management Information Systems ( Security and Control.pptx
DOCX
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
PDF
Mis 1
PPTX
Introduction to Information Systems Security
PPTX
Cyber security
DOCX
It seminar isr
PPTX
securing_information_systems_._lec6.pptx
organisations and information systems
information technology and infrastructures choices
ethical issues,social issues
managing inforamation system
• E-commerce, e-business ,e-governance
Session#7; securing information systems
IT stratergy and digital goods
IS Unit II.pptx
Information Systems Security: Security Management, Metrics, Frameworks and Be...
Information Security
CSI-ZG-513
security and ethical challenges in information systems
Security and Control.ppt
Management Information Systems ( Security and Control.pptx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
Mis 1
Introduction to Information Systems Security
Cyber security
It seminar isr
securing_information_systems_._lec6.pptx
Ad

More from bhavesh lande (16)

PDF
The Annual G20 Scorecard – Research Performance 2019
PDF
IT and innovations
PDF
Implement Mapreduce with suitable example using MongoDB.
PDF
aggregation and indexing with suitable example using MongoDB.
PDF
Unnamed PL/SQL code block: Use of Control structure and Exception handling i...
PDF
database application using SQL DML statements: all types of Join, Sub-Query ...
PDF
database application using SQL DML statements: Insert, Select, Update, Delet...
PDF
Design and Develop SQL DDL statements which demonstrate the use of SQL objec...
PDF
working with python
PDF
applications and advantages of python
PDF
introduction of python in data science
PDF
PDF
data scientists and their role
PDF
applications
PDF
statistics techniques to deal with data
PPTX
introduction to data science
The Annual G20 Scorecard – Research Performance 2019
IT and innovations
Implement Mapreduce with suitable example using MongoDB.
aggregation and indexing with suitable example using MongoDB.
Unnamed PL/SQL code block: Use of Control structure and Exception handling i...
database application using SQL DML statements: all types of Join, Sub-Query ...
database application using SQL DML statements: Insert, Select, Update, Delet...
Design and Develop SQL DDL statements which demonstrate the use of SQL objec...
working with python
applications and advantages of python
introduction of python in data science
data scientists and their role
applications
statistics techniques to deal with data
introduction to data science

Recently uploaded (20)

PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Open Quiz Monsoon Mind Game Final Set.pptx
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Insiders guide to clinical Medicine.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Open folder Downloads.pdf yes yes ges yes
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Business Ethics Teaching Materials for college
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
master seminar digital applications in india
PPTX
Cardiovascular Pharmacology for pharmacy students.pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
01-Introduction-to-Information-Management.pdf
Open Quiz Monsoon Mind Game Final Set.pptx
O7-L3 Supply Chain Operations - ICLT Program
Abdominal Access Techniques with Prof. Dr. R K Mishra
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Insiders guide to clinical Medicine.pdf
GDM (1) (1).pptx small presentation for students
Open folder Downloads.pdf yes yes ges yes
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Anesthesia in Laparoscopic Surgery in India
TR - Agricultural Crops Production NC III.pdf
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Renaissance Architecture: A Journey from Faith to Humanism
Week 4 Term 3 Study Techniques revisited.pptx
Business Ethics Teaching Materials for college
O5-L3 Freight Transport Ops (International) V1.pdf
master seminar digital applications in india
Cardiovascular Pharmacology for pharmacy students.pptx
Microbial diseases, their pathogenesis and prophylaxis

information control and Security system

  • 1. Chapter-9 : Information Systems Security and Control MIS MANAGING INFORMATION SYSTEMS IN BUSINESS, GOVERNMENT AND SOCIETY Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
  • 2. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 LEARNING OBJECTIVES • Get an overview of threats to the Organization • Learn about technologies for handling Security • Get an overview of wireless technology • Understand managing security 2
  • 3. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 MIND MAP OF CHAPTER TOPICS 3
  • 4. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 THREATS TO THE ORGANIZATION • Malware – various kinds of malicious software. • Viruses – infiltrate and spread in organisational networks, infecting PCs and destroying files and data. • Worms – Much like a virus, but does not harm data, other than infiltrate and choke the network. • Trojans – Infiltrates computers and secretly allows external software and people to invade the computer and use its resources. • Denial-of-service Attack 4
  • 5. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 THREATS TO THE ORGANIZATION • Cracking and Espionage – The act of breaking into networks and computers illegally, usually with intent to create mischief. It is also used for industrial and political espionage – to steal information. • Ethical Hacking – same as Cracking but the motivation is benign - not to harm but expose weaknesses. • Phishing and Identity Theft – use of fake websites to lure unsuspecting users to reveal their private information. 5
  • 6. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 MALWARE • Damage caused by viruses, worms and Malware in the USA and worldwide (in USD). 6
  • 7. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 DENIAL-OF-SERVICE ATTACK • The requesting server sends a request for service, the responding server sends a response; but the requesting server does not respond, thus, allowing the connection to time out. 7
  • 8. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 DISTRIBUTED DENIAL-OF-SERVICE ATTACK • Many requesting servers send service requests to the responding server, which responds, but requesting servers allow the connection request to time out. 8
  • 9. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 TECHNOLOGIES FOR HANDLING SECURITY • Encryption • Public-key Cryptography • Firewall • Virtual Private Network • Wireless Technology • Wi-Fi Routers • Bluetooth • BlackBerry • RFID • Wireless Sensor Networks 9
  • 10. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 ENCRYPTION • Transformation of a message from plain text to a coded form (cipher text) that is not easily readable. • Symmetric Key – A key used to decrypt an encrypted message that is sent to the receiver. 10
  • 11. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 PUBLIC KEY CRYPTOGRAPHY • Solves the problem of Symmetric Key cryptography in having to send across a secret key. • A pair of keys called the public key and the private key are used. The public key is used to encrypt a message and is openly available. The private key is a secret key used to decrypt the message encrypted with the public key • RSA encryption is used to generate the key pairs from large prime numbers • Digital certificates are used to authenticate the owners of public keys. Authentication of senders is through the use of Digital Certificates 11
  • 12. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 PUBLIC KEY CRYPTOGRAPHY • Sending a message with Public key encryption • The problem of impersonation with public-key encryption 12
  • 13. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 AUTHENTICATION WITH PUBLIC-KEY CRYPTOGRAPHY 13
  • 14. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 FIREWALL • Firewalls are filtering and protection devices -usually a combination of hardware and software • Packet-level filtering • Application-level filtering • Firewalls slow down traffic at the perimeter – to overcome this firewalls are built into hardware. • Deep Packet Inspection 14
  • 15. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 VIRTUAL PRIVATE NETWORK (VPN) • A technology that enables clients or employees of an organisation, who are outside the network, to connect securely to the organisation on the public Internet. • It creates a 'tunnel' relying on authentication and encryption. 15
  • 16. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 WIRELESS TECHNOLOGY • Wi-Fi Routers • Bluetooth – connects personal devices like mobile phones with other devices. • BlackBerry – smart phone with 'push-email' service • RFID (Radio Frequency Identification) – radio transmission through tiny transmitters and receivers embedded in identifiable objects (tagging); maybe passive or active (energy consuming) • Wireless Sensor Networks – networks of sensors; used for monitoring and targeted treatments in agriculture 16
  • 17. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 WIRELESS MESH NETWORK • Wireless hotpots or Access points act as routers to provide wireless Internet connectivity. • Unsecure Wi-Fi are source of security problems 17
  • 18. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 MANAGING SECURITY • Securing the Network • Perimeter Security • Two Factor Authentication • Securing the Client • Desktop Firewalls • Password Policy • Creating a Secure Environment • Security Audit and Risk Assessment • Disaster Recovery Planning 18
  • 19. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 MANAGING SECURITY The four features that need to be managed to enable a secure IS infrastructure in an organisation - • Confidentiality • Authentication • Message Integrity • Access and Availability 19
  • 20. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 SECURING THE NETWORK • Perimeter Security – Demilitarised Zone • Two-factor Authentication – Authentication by two independent methods Typical layout for a demilitarised zone (DMZ) 20
  • 21. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 SECURING THE CLIENT • Desktop Firewalls • Password Policy • Creating a Secure Environment • Security Audit and Risk Assessment • Disaster Recovery Planning 21