SlideShare a Scribd company logo
INFORMATION
SECURITY

BY V.M.LEENA
REDDY
DEFINITION:
The protection of information and its elements including
systems, hardware that use, store and transmit the
information
PRIMARY GOALS
CIA triangle known as security triad tells the primary goals
of IS
Confidentiality
Making sure that those who should not see
information
Integrity
Making sure that the information has not been changed
from its original

Availability
Making sure that the information is available for use when
you need it
SYSTEM SECURITY
THREATS AND
CONTROLS
Viruses
A computer virus is a software code that can multiply and
propagate itself. A virus can spread into another computer via
e-mail, downloading files from the Internet, or opening a
contaminated file. It is almost impossible to completely protect
a network computer from virus attacks; the CSI/FBI survey
indicated that virus attacks were the most widespread attack
for six straight years since 2000.
Viruses are just one of several programmed threats or
malicious codes (malware) in today’s interconnected system
environment. Programmed threats are computer programs that
can create a nuisance, alter or damage data, steal information,
or cripple system functions. Programmed threats include,
computer viruses, Trojan horses, logic bombs, worms, spam,
spyware, and adware.
Insider Abuse of Internet Access
Unfortunately, IT tools can be abused. For example, e-mail and
Internet connections are available in almost all offices to improve
productivity, but employees may use them for personal reasons,
such as online shopping, playing games, and sending instant
messages to friends during work hours.
Laptop or Mobile Theft
Because they are relatively expensive, laptops and PDAs have
become the targets of thieves.
Besides being expensive, they often contain proprietary
corporate data, access codes
to company networks, and sensitive information.
Denial of Service
A denial of service (Do's) attack is specifically designed to
interrupt normal system functions and affect legitimate users’
access to the system.
Do's attacks can result in significant server downtime and
financial loss for many companies, but the controls to mitigate
the risk are very technical.
Unauthorized Access to Information
To control unauthorized access to information, access controls,
including passwords and a controlled environment, are
necessary. Computers installed in a public area, such as a
conference room or reception area, can create serious threats
and should be avoided if possible.
Employees should be allowed to access only the data
necessary for them to perform their jobs.
System Penetration

Hackers penetrate systems illegally to steal information, modify data, or
harm the system. The following factors are related to system
penetration:
System holes: the design deficiency of operating systems or application
systems that allow hijacking, security bypass, data manipulation,
privilege escalation, and system access.
Port scanning: a hacking technique used to check TCP/IP ports to
reveal the services that are available and to identify the weaknesses of
a computer or network system in order to exploit them.
Network sniffing: a hardware and software program to collect network
(traffic) data in order to decipher passwords with password-cracking
software, which may result in unauthorized access to a network
system.
IP spoofing: a technique used to gain unauthorized access to
computers, whereby hackers send messages to a computer with a
deceived IP address as if it were coming from a trusted host.
Back door/trap door: a hole in the security of a computer system
deliberately left in place by designers or maintainers.
Tunneling: a method for circumventing a firewall by hiding a message
that would be rejected by the firewall inside another, acceptable
Abuse of Wireless Networks

Wireless networks offer the advantage of convenience and
flexibility, but system security can be a big issue. Attackers do
not need to have physical access to the network. Attackers can
take their time cracking the passwords and reading the network
data without leaving a trace.
Telecom Fraud
In the past, telecom fraud involved fraudulent use of
telecommunication (telephone) facilities. Intruders often hacked
into a company’s private branch exchange (PBX) and
administration or maintenance port for personal gains, including
free long-distance calls, stealing (changing) information in
voicemail boxes, diverting calls illegally, wiretapping, and
eavesdropping.
Theft of Proprietary Information

Information is a commodity in the e-commerce era, and there are
always buyers for sensitive information, including customer data,
credit card information, and trade secrets. Data theft by an
insider is common when access controls are not implemented.
Outside hackers can also use “Trojan” viruses to steal
information from unprotected systems. Beyond installing firewall
and anti-virus software to secure systems, a company should
encrypt all of its important data.
Financial Fraud

The nature of financial fraud has changed over the years with
information technology. System-based financial fraud includes
scam e-mails, identity theft, and fraudulent transactions. With
spam, con artists can send scam e-mails to thousands of people
in hours.
Misuse of Public Web Applications

The nature of e-commerce—convenience and flexibility—makes
Web applications vulnerable and easily abused. Hackers can
circumvent traditional network firewalls and intrusion-prevention
systems and attack web applications directly. They can inject
commands into databases via the web application user
interfaces and surreptitiously steal data, such as customer and
credit card information.
Website Defacement
Website defacement is the sabotage of webpages by hackers
inserting or altering information. The altered webpages may
mislead unknowing users and represent negative publicity that
could affect a company’s image and credibility.
Company Awareness
Business operations can be disrupted by many factors, including
system security breaches. System downtime, system
penetrations, theft of computing resources, and lost productivity
have quickly become critical system security issues. The
financial loss of these security breaches can be significant. In
addition, system security breaches often taint a company’s
image and may compromise a company’s compliance with
applicable laws and regulations. The key to protecting a
company’s accounting information system against security
breaches is to be well prepared for all possible major threats. A
combination of preventive and detective controls can mitigate
security threats.
Mis security system threads
BIBLIOGRAPHY:
http://www.nysscpa.org/cpajournal/2006/706/essentials/p
58.htm
By P. Paul Lin, PhD, is an associate professor of
accounting at the Raj Soin College of Business of Wright
State University, Dayton, Ohio.

More Related Content

DOC
Computer Secutity.
PPT
Phishing, Pharming, and the latest potholes on the Information Highway
PPT
Securing information systems
PPT
Computer Security
PPTX
Business Value of Security and Control
PPT
Threats of E-Commerce in Database
PPTX
Security Threats to Electronic Commerce
Computer Secutity.
Phishing, Pharming, and the latest potholes on the Information Highway
Securing information systems
Computer Security
Business Value of Security and Control
Threats of E-Commerce in Database
Security Threats to Electronic Commerce

What's hot (20)

PPTX
Managing and securing the enterprise
PDF
8 - Securing Info Systems
PPTX
Session#7; securing information systems
PPT
Security & control in management information system
PDF
e commerce security and fraud protection
ODP
Computer related risks presentation
ODP
Computer related risks presentation
PPTX
Security and ethical challenges
PPT
security and ethical challenges
PPT
Security and ethical challenges in mis
PDF
E commerce Security
PPTX
Securing information system
PPTX
Information security threats
PPTX
Cyber security
PPT
Chap13 Security and Ethical Challenges
PPTX
Security issues in e business
PPTX
INFORMATION SECURITY SYSTEM
PPT
E business security
Managing and securing the enterprise
8 - Securing Info Systems
Session#7; securing information systems
Security & control in management information system
e commerce security and fraud protection
Computer related risks presentation
Computer related risks presentation
Security and ethical challenges
security and ethical challenges
Security and ethical challenges in mis
E commerce Security
Securing information system
Information security threats
Cyber security
Chap13 Security and Ethical Challenges
Security issues in e business
INFORMATION SECURITY SYSTEM
E business security
Ad

Viewers also liked (6)

PPT
Business Process
PPT
ELECTRONIC DATA INTERCHANGE
PPTX
Customer relationship management
PDF
Basics of Supply Chain Managment
PPT
Customer Relationship Management (CRM)
PPT
Supply Chain Management
Business Process
ELECTRONIC DATA INTERCHANGE
Customer relationship management
Basics of Supply Chain Managment
Customer Relationship Management (CRM)
Supply Chain Management
Ad

Similar to Mis security system threads (20)

PPTX
Management Information Systems ( Security and Control.pptx
PPT
Information security and other issues
PPTX
Information security ist lecture
PPTX
information security (network security methods)
DOCX
Ethical and security issues on MIS inte 322 assignment.docx
PPTX
InformationSecurity
PPTX
Information Security
PPTX
unit -ii security1.pptx for Information system management
PPTX
Basics of System Security and Tools
PDF
Sec0001 .pdf
PPTX
Information Security Fundamentals - New Horizons Bulgaria
PPT
MIS part 4_CH 11.ppt
PDF
Implications of Misuse and Cyber Security.pdf
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
PDF
Accounting Information Systems 11th Edition Bodnar Solutions Manual
PPTX
Computer security
DOCX
Cyber Security.docx
PPT
Ch01 Introduction to Security
PPTX
Chapter-2 (1).pptx
Management Information Systems ( Security and Control.pptx
Information security and other issues
Information security ist lecture
information security (network security methods)
Ethical and security issues on MIS inte 322 assignment.docx
InformationSecurity
Information Security
unit -ii security1.pptx for Information system management
Basics of System Security and Tools
Sec0001 .pdf
Information Security Fundamentals - New Horizons Bulgaria
MIS part 4_CH 11.ppt
Implications of Misuse and Cyber Security.pdf
Accounting Information Systems 11th Edition Bodnar Solutions Manual
Accounting Information Systems 11th Edition Bodnar Solutions Manual
Accounting Information Systems 11th Edition Bodnar Solutions Manual
Computer security
Cyber Security.docx
Ch01 Introduction to Security
Chapter-2 (1).pptx

Recently uploaded (20)

PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Pre independence Education in Inndia.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Classroom Observation Tools for Teachers
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Lesson notes of climatology university.
PDF
Basic Mud Logging Guide for educational purpose
PPTX
master seminar digital applications in india
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Institutional Correction lecture only . . .
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Sports Quiz easy sports quiz sports quiz
Insiders guide to clinical Medicine.pdf
Microbial diseases, their pathogenesis and prophylaxis
Pre independence Education in Inndia.pdf
GDM (1) (1).pptx small presentation for students
O5-L3 Freight Transport Ops (International) V1.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Classroom Observation Tools for Teachers
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Lesson notes of climatology university.
Basic Mud Logging Guide for educational purpose
master seminar digital applications in india
human mycosis Human fungal infections are called human mycosis..pptx
Institutional Correction lecture only . . .
Microbial disease of the cardiovascular and lymphatic systems
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPH.pptx obstetrics and gynecology in nursing
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx

Mis security system threads

  • 2. DEFINITION: The protection of information and its elements including systems, hardware that use, store and transmit the information
  • 3. PRIMARY GOALS CIA triangle known as security triad tells the primary goals of IS Confidentiality Making sure that those who should not see information Integrity Making sure that the information has not been changed from its original Availability Making sure that the information is available for use when you need it
  • 4. SYSTEM SECURITY THREATS AND CONTROLS Viruses A computer virus is a software code that can multiply and propagate itself. A virus can spread into another computer via e-mail, downloading files from the Internet, or opening a contaminated file. It is almost impossible to completely protect a network computer from virus attacks; the CSI/FBI survey indicated that virus attacks were the most widespread attack for six straight years since 2000. Viruses are just one of several programmed threats or malicious codes (malware) in today’s interconnected system environment. Programmed threats are computer programs that can create a nuisance, alter or damage data, steal information, or cripple system functions. Programmed threats include, computer viruses, Trojan horses, logic bombs, worms, spam, spyware, and adware.
  • 5. Insider Abuse of Internet Access Unfortunately, IT tools can be abused. For example, e-mail and Internet connections are available in almost all offices to improve productivity, but employees may use them for personal reasons, such as online shopping, playing games, and sending instant messages to friends during work hours. Laptop or Mobile Theft Because they are relatively expensive, laptops and PDAs have become the targets of thieves. Besides being expensive, they often contain proprietary corporate data, access codes to company networks, and sensitive information.
  • 6. Denial of Service A denial of service (Do's) attack is specifically designed to interrupt normal system functions and affect legitimate users’ access to the system. Do's attacks can result in significant server downtime and financial loss for many companies, but the controls to mitigate the risk are very technical. Unauthorized Access to Information To control unauthorized access to information, access controls, including passwords and a controlled environment, are necessary. Computers installed in a public area, such as a conference room or reception area, can create serious threats and should be avoided if possible. Employees should be allowed to access only the data necessary for them to perform their jobs.
  • 7. System Penetration Hackers penetrate systems illegally to steal information, modify data, or harm the system. The following factors are related to system penetration: System holes: the design deficiency of operating systems or application systems that allow hijacking, security bypass, data manipulation, privilege escalation, and system access. Port scanning: a hacking technique used to check TCP/IP ports to reveal the services that are available and to identify the weaknesses of a computer or network system in order to exploit them. Network sniffing: a hardware and software program to collect network (traffic) data in order to decipher passwords with password-cracking software, which may result in unauthorized access to a network system. IP spoofing: a technique used to gain unauthorized access to computers, whereby hackers send messages to a computer with a deceived IP address as if it were coming from a trusted host. Back door/trap door: a hole in the security of a computer system deliberately left in place by designers or maintainers. Tunneling: a method for circumventing a firewall by hiding a message that would be rejected by the firewall inside another, acceptable
  • 8. Abuse of Wireless Networks Wireless networks offer the advantage of convenience and flexibility, but system security can be a big issue. Attackers do not need to have physical access to the network. Attackers can take their time cracking the passwords and reading the network data without leaving a trace. Telecom Fraud In the past, telecom fraud involved fraudulent use of telecommunication (telephone) facilities. Intruders often hacked into a company’s private branch exchange (PBX) and administration or maintenance port for personal gains, including free long-distance calls, stealing (changing) information in voicemail boxes, diverting calls illegally, wiretapping, and eavesdropping.
  • 9. Theft of Proprietary Information Information is a commodity in the e-commerce era, and there are always buyers for sensitive information, including customer data, credit card information, and trade secrets. Data theft by an insider is common when access controls are not implemented. Outside hackers can also use “Trojan” viruses to steal information from unprotected systems. Beyond installing firewall and anti-virus software to secure systems, a company should encrypt all of its important data. Financial Fraud The nature of financial fraud has changed over the years with information technology. System-based financial fraud includes scam e-mails, identity theft, and fraudulent transactions. With spam, con artists can send scam e-mails to thousands of people in hours.
  • 10. Misuse of Public Web Applications The nature of e-commerce—convenience and flexibility—makes Web applications vulnerable and easily abused. Hackers can circumvent traditional network firewalls and intrusion-prevention systems and attack web applications directly. They can inject commands into databases via the web application user interfaces and surreptitiously steal data, such as customer and credit card information. Website Defacement Website defacement is the sabotage of webpages by hackers inserting or altering information. The altered webpages may mislead unknowing users and represent negative publicity that could affect a company’s image and credibility.
  • 11. Company Awareness Business operations can be disrupted by many factors, including system security breaches. System downtime, system penetrations, theft of computing resources, and lost productivity have quickly become critical system security issues. The financial loss of these security breaches can be significant. In addition, system security breaches often taint a company’s image and may compromise a company’s compliance with applicable laws and regulations. The key to protecting a company’s accounting information system against security breaches is to be well prepared for all possible major threats. A combination of preventive and detective controls can mitigate security threats.
  • 13. BIBLIOGRAPHY: http://www.nysscpa.org/cpajournal/2006/706/essentials/p 58.htm By P. Paul Lin, PhD, is an associate professor of accounting at the Raj Soin College of Business of Wright State University, Dayton, Ohio.