SlideShare a Scribd company logo
25-09-2012




                                                                    IS Security
                                                • The protection of IS against unauthorised access to or
                                                  modification of information,
                                                • whether it is being stored, processed or transmitted,
   Information Systems Security                 • and against the denial of service to authorised users or
                                                  providing the service to unauthorized users,
                                                • including the steps necessary to find out, document
                                                  and counter such threats.
                                                • It covers not just information but all infrastructures,
                                                  which facilitate its use such as processes, systems,
                                                  services and technology, etc.




   SYSTEM VULNERABILITY AND ABUSE                    Telecommunication Network Vulnerabilities
Why Systems are Vulnerable?
• Advances in telecommunications and computer
  software
• Unauthorized access, abuse, or fraud
• Piracy
• Hackers
• Denial of service attack
• Harassment
• Computer viruses
• And many more…




                                                                                                              1
25-09-2012




          Internet Security Challenges                        Tools of Security Management




    Internetworked Security Defenses

• Encryption                                            • Firewalls
  – Passwords, messages, files, and other data is         – Serves as a “gatekeeper” system that protects a
    transmitted in scrambled form and unscrambled           company’s intranets and other computer
    for authorized users                                    networks from intrusion
  – Involves using special mathematical algorithms to        • Provides a filter and safe transfer point
    transform digital data in scrambled code                 • Screens all network traffic for proper passwords or
                                                               other security codes
  – Most widely used method uses a pair of public
    and private keys unique to each individual




                                                                                                                             2
25-09-2012




• Denial of Service Defenses                                     • E-mail Monitoring
  – These assaults depend on three layers of                       – “Spot checks just aren’t good enough anymore.
    networked computer systems                                       The tide is turning toward systematic monitoring
     • Victim’s website                                              of corporate e-mail traffic using content-
     • Victim’s ISP                                                  monitoring software that scans for troublesome
     • Sites of “zombie” or slave computers                          words that might compromise corporate security.”
  – Defensive measures and security precautions
    must be taken at all three levels




                                                                         Other Security Measures

• Virus Defenses                                                 • Security codes
  – Protection may accomplished through                            – Multilevel password system
     • Centralized distribution and updating of antivirus             • Log onto the computer system
       software                                                       • Gain access into the system
     • Outsourcing the virus protection responsibility to ISPs        • Access individual files
       or to telecommunications or security management
       companies




                                                                                                                         3
25-09-2012




 • Backup Files                                             • Security Monitors
    – Duplicate files of data or programs                     – Programs that monitor the use of computer
    – File retention measures                                   systems and networks and protect them from
    – Sometimes several generations of files are kept for       unauthorized use, fraud, and destruction
      control purposes




• Biometric Security                                        • Computer Failure Controls
   – Measure physical traits that make each individual
     unique                                                   – Preventive maintenance of hardware and
                                                                management of software updates
      • Voice
      • Fingerprints                                          – Backup computer system
      • Hand geometry                                         – Carefully scheduled hardware or software changes
      • Signature dynamics                                    – Highly trained data center personnel
      • Keystroke analysis
      • Retina scanning
      • Face recognition and Genetic pattern analysis




                                                                                                                     4
25-09-2012




• Fault Tolerant Systems                                    • Disaster Recovery
  – Computer systems that have redundant                      – Disaster recovery plan
    processors, peripherals, and software                        • Which employees will participate and their duties
                                                                 • What hardware, software, and facilities will be used
                                                                 • Priority of applications that will be processed




      System Controls and Audits

• Information System Controls                               • Auditing Business Systems
  – Methods and devices that attempt to ensure the            – Review and evaluate whether proper and
    accuracy, validity, and propriety of information            adequate security measures and management
    system activities                                           policies have been developed and implemented
  – Designed to monitor and maintain the quality and          – Testing the integrity of an application’s audit trail
    security of input, processing, and storage activities




                                                                                                                              5

More Related Content

PPTX
Security Awareness and Training
PPT
Security & control in management information system
PDF
PPT
8. operations security
PPT
Chap5 2007 C I S A Review Course
PPSX
6 Physical Security
PPTX
Security and control in Management Information System
PPTX
Basic Security Concepts of Computer
Security Awareness and Training
Security & control in management information system
8. operations security
Chap5 2007 C I S A Review Course
6 Physical Security
Security and control in Management Information System
Basic Security Concepts of Computer

What's hot (20)

PPTX
MIS: Information Security Management
PPTX
06. security concept
PPTX
Security & control in mis
PPTX
Computer security concepts
PPTX
Security and Control Issues in Information System
PDF
Chapter 1 introduction(web security)
PPT
Information security management
PPTX
Introduction to Network Security
PDF
Operations Security Presentation
PPT
Development of security architecture
PDF
Information system and security control
PPTX
Information Security Overview
PPT
Isys20261 lecture 02
PDF
I0516064
PPTX
It security
PPTX
Coud discovery chap 5
PPT
Ch1 cse
PPSX
3 Telecom+Network Part1
PPT
The Perimeter Protection Issues, Technique and Operation
PPTX
Security and control in mis
MIS: Information Security Management
06. security concept
Security & control in mis
Computer security concepts
Security and Control Issues in Information System
Chapter 1 introduction(web security)
Information security management
Introduction to Network Security
Operations Security Presentation
Development of security architecture
Information system and security control
Information Security Overview
Isys20261 lecture 02
I0516064
It security
Coud discovery chap 5
Ch1 cse
3 Telecom+Network Part1
The Perimeter Protection Issues, Technique and Operation
Security and control in mis
Ad

Viewers also liked (13)

PPTX
DOCX
Swot analysis
PPTX
Grade 3 scientists
PDF
Basic it
PPTX
Improve your vlog
PPTX
Mouth & Foot Painters Association of India presentation
DOCX
Securities anaysis and valuation
PDF
Net303 a.2 rye
PPTX
오픽하라2012
PPTX
[Olc]오픽하라2012
PPTX
Expert Finding System in Pet Domain
PPS
Tech mocha talentbricks intelligent ejobfair
Swot analysis
Grade 3 scientists
Basic it
Improve your vlog
Mouth & Foot Painters Association of India presentation
Securities anaysis and valuation
Net303 a.2 rye
오픽하라2012
[Olc]오픽하라2012
Expert Finding System in Pet Domain
Tech mocha talentbricks intelligent ejobfair
Ad

Similar to Information systems security(1) (20)

KEY
Mis
KEY
Mis
KEY
Chapter 10, part 1
PPT
Security management(new) (1)
PDF
Unit 08: Security for Web Applications
PPTX
Mis05
PPTX
2013 PMA Business Security Insights
PPTX
Security Procedures
PPTX
Bettyboop
PDF
A6704d01
PPT
Cybersecurity exchange briefing oct 2012 v2
PPTX
LIS3353 SP12 Week 9
PDF
ACS Computer Forum
PPTX
Discovering Computers: Chapter 11
ODP
Network security Topic 2 overview continued
PPTX
Data Network Security
PPTX
CH11-Managing Computing Securely, Safely and Ethically
PPT
Security audit
PPT
Security Audit
PPTX
[DSBW Spring 2009] Unit 08: WebApp Security
Mis
Mis
Chapter 10, part 1
Security management(new) (1)
Unit 08: Security for Web Applications
Mis05
2013 PMA Business Security Insights
Security Procedures
Bettyboop
A6704d01
Cybersecurity exchange briefing oct 2012 v2
LIS3353 SP12 Week 9
ACS Computer Forum
Discovering Computers: Chapter 11
Network security Topic 2 overview continued
Data Network Security
CH11-Managing Computing Securely, Safely and Ethically
Security audit
Security Audit
[DSBW Spring 2009] Unit 08: WebApp Security

Information systems security(1)

  • 1. 25-09-2012 IS Security • The protection of IS against unauthorised access to or modification of information, • whether it is being stored, processed or transmitted, Information Systems Security • and against the denial of service to authorised users or providing the service to unauthorized users, • including the steps necessary to find out, document and counter such threats. • It covers not just information but all infrastructures, which facilitate its use such as processes, systems, services and technology, etc. SYSTEM VULNERABILITY AND ABUSE Telecommunication Network Vulnerabilities Why Systems are Vulnerable? • Advances in telecommunications and computer software • Unauthorized access, abuse, or fraud • Piracy • Hackers • Denial of service attack • Harassment • Computer viruses • And many more… 1
  • 2. 25-09-2012 Internet Security Challenges Tools of Security Management Internetworked Security Defenses • Encryption • Firewalls – Passwords, messages, files, and other data is – Serves as a “gatekeeper” system that protects a transmitted in scrambled form and unscrambled company’s intranets and other computer for authorized users networks from intrusion – Involves using special mathematical algorithms to • Provides a filter and safe transfer point transform digital data in scrambled code • Screens all network traffic for proper passwords or other security codes – Most widely used method uses a pair of public and private keys unique to each individual 2
  • 3. 25-09-2012 • Denial of Service Defenses • E-mail Monitoring – These assaults depend on three layers of – “Spot checks just aren’t good enough anymore. networked computer systems The tide is turning toward systematic monitoring • Victim’s website of corporate e-mail traffic using content- • Victim’s ISP monitoring software that scans for troublesome • Sites of “zombie” or slave computers words that might compromise corporate security.” – Defensive measures and security precautions must be taken at all three levels Other Security Measures • Virus Defenses • Security codes – Protection may accomplished through – Multilevel password system • Centralized distribution and updating of antivirus • Log onto the computer system software • Gain access into the system • Outsourcing the virus protection responsibility to ISPs • Access individual files or to telecommunications or security management companies 3
  • 4. 25-09-2012 • Backup Files • Security Monitors – Duplicate files of data or programs – Programs that monitor the use of computer – File retention measures systems and networks and protect them from – Sometimes several generations of files are kept for unauthorized use, fraud, and destruction control purposes • Biometric Security • Computer Failure Controls – Measure physical traits that make each individual unique – Preventive maintenance of hardware and management of software updates • Voice • Fingerprints – Backup computer system • Hand geometry – Carefully scheduled hardware or software changes • Signature dynamics – Highly trained data center personnel • Keystroke analysis • Retina scanning • Face recognition and Genetic pattern analysis 4
  • 5. 25-09-2012 • Fault Tolerant Systems • Disaster Recovery – Computer systems that have redundant – Disaster recovery plan processors, peripherals, and software • Which employees will participate and their duties • What hardware, software, and facilities will be used • Priority of applications that will be processed System Controls and Audits • Information System Controls • Auditing Business Systems – Methods and devices that attempt to ensure the – Review and evaluate whether proper and accuracy, validity, and propriety of information adequate security measures and management system activities policies have been developed and implemented – Designed to monitor and maintain the quality and – Testing the integrity of an application’s audit trail security of input, processing, and storage activities 5