SlideShare a Scribd company logo
Security and Control Issues in information Systems
Security and Control Issues in information Systems
Demonstrate that Information
Systems vulnerabilities
can be controlled.
Demonstrate some of the technologies
that can be used to control Information
Systems vulnerabilities
Information Systems
Security
is a function whose mission is
to establish security policies
and their associated procedures
Security and Control Issues in information Systems
allows trustful operations
by guaranteeing that the
handler of information is
whoever she or he claims
to be.
Security and Control Issues in information Systems
Security and Control Issues in information Systems
Security and Control Issues in information Systems
Security and Control Issues in information Systems
Security and Control Issues in information Systems
Security and Control Issues in information Systems
Security and Control Issues in information Systems
Security and Control Issues in information Systems
Security and Control Issues in information Systems
Security and Control Issues in information Systems
Hardware failures
Software failures
Upgrade issues
Disasters
Malicious intent
Manually control
environment of
Information Systems
Automatically add
controls to Information
Systems
Security and Control Issues in information Systems
Security and Control Issues in information Systems
Security and Control Issues in information Systems
The most important general
controls are the measures that control
access to computer systems and the
information stored there or
transmitted over telecommunications
networks.
Specific controls for each
application;
User functionality specific;
Security and Control Issues in information Systems
Security and Control Issues in information Systems
Authorized access
to systems
Secure from any
kind of attacks
Security and Control Issues in information Systems
Day-to-day operations of
Information Systems
Procedures
System set-up
Job processing
Backup and recovery
procedures
Prevent unauthorized access,
change or destruction
When data is in use or being
stored
Physical access to terminals
Password protection
Data level access controls
Security and Control Issues in information Systems
Security and Control Issues in information Systems

More Related Content

PPTX
Information security management system
PPTX
Lecture 10 intruders
PPT
Data warehouse and User interface
PPTX
Business information system with explaination
PPTX
2 approaches to system development
PPTX
Decision support system & Management Information System
PPTX
Information Security Governance and Strategy
PPT
Lesson 5: Information Systems Presentation
Information security management system
Lecture 10 intruders
Data warehouse and User interface
Business information system with explaination
2 approaches to system development
Decision support system & Management Information System
Information Security Governance and Strategy
Lesson 5: Information Systems Presentation

What's hot (20)

PDF
It Security Audit Process
PPTX
introduction to system administration
PPTX
Importance Of A Security Policy
PPT
Module 10 Physical Security
PPT
Security & control in management information system
PPT
Information security
PPT
Policy formation and enforcement.ppt
PPTX
Development and Implementation of MIS and Information requirement
PPT
Management information system
PPTX
System analysis ITM3(1).pptx
PPTX
PPT
Information security management
PPTX
Chapter 1 Personal security
PPT
Information Assurance And Security - Chapter 2 - Lesson 2
PPTX
Management Information Systems (MIS)
PPTX
Rehasoft MeMotiva Flex
PPTX
Troubleshooting complex layer 2 issues ppt 16 bsit098
PPTX
CISA Training - Chapter 5 - 2016
PPTX
Introduction to information system
It Security Audit Process
introduction to system administration
Importance Of A Security Policy
Module 10 Physical Security
Security & control in management information system
Information security
Policy formation and enforcement.ppt
Development and Implementation of MIS and Information requirement
Management information system
System analysis ITM3(1).pptx
Information security management
Chapter 1 Personal security
Information Assurance And Security - Chapter 2 - Lesson 2
Management Information Systems (MIS)
Rehasoft MeMotiva Flex
Troubleshooting complex layer 2 issues ppt 16 bsit098
CISA Training - Chapter 5 - 2016
Introduction to information system
Ad

Similar to Security and Control Issues in information Systems (20)

PPTX
Security and Control Issues in Information System
PPTX
Provide Network System Administrationa.pptx
PPTX
Advanced Operating System Principles.pptx
PDF
Introduction to Network security
PPTX
CyberSecurity Assignment.pptx
PPT
Introduction to Information System Security
PPT
Security & ethical challenges
PPT
PPTX
Introduction-to-Operating-System-Security.pptx
PDF
28. Fundamentals of Computer Security (Inglés) (Presentación) autor Philippin...
PDF
Security Education and Training1111.pdf
PPTX
Critical Controls Of Cyber Defense
PPTX
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
PDF
Fundamentals of Securing Devices in Networking.pptx.pdf
PDF
The Multifaceted Applications of Houston Access Control Systems.pdf
DOCX
Access system.docx
PDF
Mis presentation by suraj vaidya
PPT
Bis Chapter15
PDF
Module 3.Infrastructure and Network Security:
Security and Control Issues in Information System
Provide Network System Administrationa.pptx
Advanced Operating System Principles.pptx
Introduction to Network security
CyberSecurity Assignment.pptx
Introduction to Information System Security
Security & ethical challenges
Introduction-to-Operating-System-Security.pptx
28. Fundamentals of Computer Security (Inglés) (Presentación) autor Philippin...
Security Education and Training1111.pdf
Critical Controls Of Cyber Defense
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
Fundamentals of Securing Devices in Networking.pptx.pdf
The Multifaceted Applications of Houston Access Control Systems.pdf
Access system.docx
Mis presentation by suraj vaidya
Bis Chapter15
Module 3.Infrastructure and Network Security:
Ad

More from Dr. Rosemarie Sibbaluca-Guirre (20)

PPTX
Korean Language: Culture 한국어 개요
PPTX
Korean Language Overview 한국어 개요
PPTX
Conjunction 접속사
PPTX
PPTX
Usage of Particles 입자의 사용
PPTX
Usage of Particles 입자의 사용
PPTX
Korean Word Order 한국어 단어 순서
PPTX
Korean Number 한국 번호
PPTX
ISAD 313-3_ TOOLS OF THE SYSTEM ANALYSIS.pptx
PPTX
ISAD 313-1_INTRODUCTION TO SYSTEMS.pptx
PPTX
ISAD 313-2_ SYSTEM ANALYSIS.pptx
PPTX
ISAD 313-4_ RESEARCH PROJECT.pptx
PPTX
ISAD 313-3_ SYSTEM FLOW.pptx
PPTX
ISAD 313-3_ MODELS.pptx
PPTX
ACCT11_9_Financial Position.pptx
PPTX
ACCT11_8_Equity.pptx
PPTX
ACCT11_7_Performance.pptx
PPTX
ACCT11_6_Worksheet.pptx
PPTX
ACCT11_5_Adjusting Entries.pptx
PPTX
ACCT11_4_Trial Balance.pptx
Korean Language: Culture 한국어 개요
Korean Language Overview 한국어 개요
Conjunction 접속사
Usage of Particles 입자의 사용
Usage of Particles 입자의 사용
Korean Word Order 한국어 단어 순서
Korean Number 한국 번호
ISAD 313-3_ TOOLS OF THE SYSTEM ANALYSIS.pptx
ISAD 313-1_INTRODUCTION TO SYSTEMS.pptx
ISAD 313-2_ SYSTEM ANALYSIS.pptx
ISAD 313-4_ RESEARCH PROJECT.pptx
ISAD 313-3_ SYSTEM FLOW.pptx
ISAD 313-3_ MODELS.pptx
ACCT11_9_Financial Position.pptx
ACCT11_8_Equity.pptx
ACCT11_7_Performance.pptx
ACCT11_6_Worksheet.pptx
ACCT11_5_Adjusting Entries.pptx
ACCT11_4_Trial Balance.pptx

Recently uploaded (20)

PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
GDM (1) (1).pptx small presentation for students
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
master seminar digital applications in india
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
GDM (1) (1).pptx small presentation for students
102 student loan defaulters named and shamed – Is someone you know on the list?
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Final Presentation General Medicine 03-08-2024.pptx
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
master seminar digital applications in india
STATICS OF THE RIGID BODIES Hibbelers.pdf
O7-L3 Supply Chain Operations - ICLT Program
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Microbial disease of the cardiovascular and lymphatic systems
TR - Agricultural Crops Production NC III.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Supply Chain Operations Speaking Notes -ICLT Program

Security and Control Issues in information Systems

Editor's Notes

  • #3: Information system is an integrated set of components for collecting, storing, and processing data and for delivering information, knowledge, and digital products. Information Systems therefore undoubtedly play an important role in today's society and are ever-increasingly at the heart of critical infrastructures, and this is widely accepted in security research literature 2. The potential losses that are confronted by businesses and organizations that rely on all these hardware and software systems have therefore led to a situation in which it is crucial for information systems to be properly secured from the outset.