SlideShare a Scribd company logo
Presentation
On
Securing Information Systems
Submitted To Submitted By
Bushra Humyra Esha Masudur Rahman
Date: ID#2017-1-10-089
 An Information System (IS) is a combination of hardware, software,
infrastructure and trained personnel organized to facilitate planning,
control, coordination and decision making in an organization.
What is Information System
What is Information System for
Information System is A networks of hardware and software that people and organizations
use to collect, filter, process, create and also distribute data.
Collect Filter Process Create Distribute
DATA
Factors Increasing the Threats to
Information Security
• Today’s interconnected, interdependent, wirelessly networked business
environment
• Government legislation
• Smaller, faster, cheaper computers and storage devices
• Decreasing skills necessary to be a computer hacker
• International organized crime turning to cybercrime
• Downstream liability
• Increased employee use of unmanaged devices
• Lack of management support
Why systems are vulnerable
• Human errors.
• Hardware problems .
• Software problems.
• Use of networks/computers outside of firm’s control
• Loss and theft of portable devices
• Malware (malicious software)
• Disaster.
Human Errors
• Shoulder Surfing
Human Errors
• Human Resource & MIS Department Employees
These employee hold all the
confidential information of an
organization.
Hardware Problem
• Hardware problems occurs due to breakdowns, configuration errors,
damage from improper use or crime.
Software Problem
• Software problems may occur from programming errors, installation
errors, unauthorized changes)
Unauthorized access
• Accessing Organization's resource without permission from outside.
Loss of portable device
• If portable device containing organization information and lost then information may insecure.
Malware (malicious software)
Viruses  Rogue software program that attaches itself to other software programs or data files in
order to be executed.
Malware (malicious software)
Worms: Independent computer programs that copy themselves from one computer to other
computers over a network.
Malware (malicious software)
Trojan horses: Software program that appears to be benign but then does something other than
expected.
Malware (malicious software)
Spyware: Programs install themselves surreptitiously on computers to monitor user Web surfing
activity and serve up advertising.
Other issues which can affect information
Disaster: because of disaster information can lost too.
Objective of Securing Information System
• The goal of security management is the accuracy, integrity, and safety
of all information system processes and resources in organization.
Objective of Securing Information System
Integrity Models : keep data pure and trustworthy by
protecting system data from intentional or accidental
changes. Integrity models have three goals:
• Prevent unauthorized users from making modifications to data or
programs.
• Prevent authorized users from making improper or unauthorized
modifications.
• Maintain internal and external consistency of data and programs.
Objective of Securing Information System
Availability Models : keep data and resources available for authorized
use, especially during emergencies or disasters. Information security
professionals usually address three common challenges to availability:
• Denial of service (DoS) due to intentional attacks or because of undiscovered flaws in
implementation (for example, a program written by a programmer who is unaware of a flaw
that could crash the program if a certain unexpected input is encountered)
• Loss of information system capabilities because of natural disasters (fires, floods, storms, or
earthquakes) or human actions
• Equipment failures during normal use
Objective of Securing Information System
Confidentiality Models
Confidentiality model preserve confidentiality integrity and availability only for authorize
personal .
THANK YOU

More Related Content

PPTX
Securing information system
PPTX
System Security-Chapter 1
DOC
System Security Threats and Risks)
PPTX
Computer security concepts
PPTX
Information security threats
PPTX
Threats to Information Resources - MIS - Shimna
PPTX
Threats to information security
PPTX
System security
Securing information system
System Security-Chapter 1
System Security Threats and Risks)
Computer security concepts
Information security threats
Threats to Information Resources - MIS - Shimna
Threats to information security
System security

What's hot (20)

PPT
Security & control in management information system
PPT
Iss lecture 1
PPTX
Introduction to Information Security
PPTX
Security and control in Management Information System
PPTX
06. security concept
PPT
Chapter2 the need to security
PPTX
Data Security
PPTX
Threats to information security
PPT
Computer security overview
 
PPTX
Cyber Security # Lec 3
PPTX
Security and Control Issues in Information System
PPTX
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
PPT
22 need-for-security
PPT
Threats to an information system
PPTX
Introduction to information security
PPTX
Network Security Goals
PPT
MIS-CH08: Securing Information Systems
PPTX
Basic Security Concepts of Computer
PPTX
Introduction to information security
PPT
Information Technology Security A Brief Overview 2001
Security & control in management information system
Iss lecture 1
Introduction to Information Security
Security and control in Management Information System
06. security concept
Chapter2 the need to security
Data Security
Threats to information security
Computer security overview
 
Cyber Security # Lec 3
Security and Control Issues in Information System
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
22 need-for-security
Threats to an information system
Introduction to information security
Network Security Goals
MIS-CH08: Securing Information Systems
Basic Security Concepts of Computer
Introduction to information security
Information Technology Security A Brief Overview 2001
Ad

Similar to Securing information system (Management Information System) (20)

PDF
PPTX
Cyber Security Briefing
PPTX
sec.This includes policy settings that prevent unauthorized people
PPTX
Computer security
PPTX
What is Cyber & information security.pptx
PPTX
Chapter-2 (1).pptx
PDF
Introduction to cyber security i
DOCX
It seminar isr
PPTX
Unit 1.pptx
PPTX
Cyber Security awareness of cyber security
PPT
Security & ethical challenges
PPTX
Information-security and best pracrices tools for the enhanced security of s...
PPTX
Chapter 13
PDF
Mis 1
PPTX
Cyber Sequrity.pptx is life of cyber security
PPTX
Cyber security
PPTX
Cyber Security and data Security for all.pptx
PPT
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
PDF
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
PPTX
Introduction to Cyber-Security beginners.pptx
Cyber Security Briefing
sec.This includes policy settings that prevent unauthorized people
Computer security
What is Cyber & information security.pptx
Chapter-2 (1).pptx
Introduction to cyber security i
It seminar isr
Unit 1.pptx
Cyber Security awareness of cyber security
Security & ethical challenges
Information-security and best pracrices tools for the enhanced security of s...
Chapter 13
Mis 1
Cyber Sequrity.pptx is life of cyber security
Cyber security
Cyber Security and data Security for all.pptx
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Introduction to Cyber-Security beginners.pptx
Ad

Recently uploaded (20)

PDF
Empowerment Technology for Senior High School Guide
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
Introduction to Building Materials
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
RMMM.pdf make it easy to upload and study
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
Cell Types and Its function , kingdom of life
PPTX
Lesson notes of climatology university.
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Hazard Identification & Risk Assessment .pdf
PDF
IGGE1 Understanding the Self1234567891011
PDF
Classroom Observation Tools for Teachers
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Empowerment Technology for Senior High School Guide
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Introduction to Building Materials
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Digestion and Absorption of Carbohydrates, Proteina and Fats
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
RMMM.pdf make it easy to upload and study
Paper A Mock Exam 9_ Attempt review.pdf.
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Cell Types and Its function , kingdom of life
Lesson notes of climatology university.
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Hazard Identification & Risk Assessment .pdf
IGGE1 Understanding the Self1234567891011
Classroom Observation Tools for Teachers
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...

Securing information system (Management Information System)

  • 1. Presentation On Securing Information Systems Submitted To Submitted By Bushra Humyra Esha Masudur Rahman Date: ID#2017-1-10-089
  • 2.  An Information System (IS) is a combination of hardware, software, infrastructure and trained personnel organized to facilitate planning, control, coordination and decision making in an organization. What is Information System
  • 3. What is Information System for Information System is A networks of hardware and software that people and organizations use to collect, filter, process, create and also distribute data. Collect Filter Process Create Distribute DATA
  • 4. Factors Increasing the Threats to Information Security • Today’s interconnected, interdependent, wirelessly networked business environment • Government legislation • Smaller, faster, cheaper computers and storage devices • Decreasing skills necessary to be a computer hacker • International organized crime turning to cybercrime • Downstream liability • Increased employee use of unmanaged devices • Lack of management support
  • 5. Why systems are vulnerable • Human errors. • Hardware problems . • Software problems. • Use of networks/computers outside of firm’s control • Loss and theft of portable devices • Malware (malicious software) • Disaster.
  • 7. Human Errors • Human Resource & MIS Department Employees These employee hold all the confidential information of an organization.
  • 8. Hardware Problem • Hardware problems occurs due to breakdowns, configuration errors, damage from improper use or crime.
  • 9. Software Problem • Software problems may occur from programming errors, installation errors, unauthorized changes)
  • 10. Unauthorized access • Accessing Organization's resource without permission from outside.
  • 11. Loss of portable device • If portable device containing organization information and lost then information may insecure.
  • 12. Malware (malicious software) Viruses  Rogue software program that attaches itself to other software programs or data files in order to be executed.
  • 13. Malware (malicious software) Worms: Independent computer programs that copy themselves from one computer to other computers over a network.
  • 14. Malware (malicious software) Trojan horses: Software program that appears to be benign but then does something other than expected.
  • 15. Malware (malicious software) Spyware: Programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising.
  • 16. Other issues which can affect information Disaster: because of disaster information can lost too.
  • 17. Objective of Securing Information System • The goal of security management is the accuracy, integrity, and safety of all information system processes and resources in organization.
  • 18. Objective of Securing Information System Integrity Models : keep data pure and trustworthy by protecting system data from intentional or accidental changes. Integrity models have three goals: • Prevent unauthorized users from making modifications to data or programs. • Prevent authorized users from making improper or unauthorized modifications. • Maintain internal and external consistency of data and programs.
  • 19. Objective of Securing Information System Availability Models : keep data and resources available for authorized use, especially during emergencies or disasters. Information security professionals usually address three common challenges to availability: • Denial of service (DoS) due to intentional attacks or because of undiscovered flaws in implementation (for example, a program written by a programmer who is unaware of a flaw that could crash the program if a certain unexpected input is encountered) • Loss of information system capabilities because of natural disasters (fires, floods, storms, or earthquakes) or human actions • Equipment failures during normal use
  • 20. Objective of Securing Information System Confidentiality Models Confidentiality model preserve confidentiality integrity and availability only for authorize personal .