SlideShare una empresa de Scribd logo
1 de 51
7 Chapter   Securing Information Systems
STUDENT LEARNING OBJECTIVES Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Online Games Need Security, Too Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],Online Games Need Security, Too Essentials of Business Information Systems Chapter 7 Securing Information Systems
Online Games Need Security, Too Essentials of Business Information Systems Chapter 7 Securing Information Systems
System Vulnerability and Abuse ,[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Why Systems Are Vulnerable ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Contemporary Security Challenges and Vulnerabilities Figure 7-1 The architecture of a Web-based application typically includes a Web client, a server, and corporate information systems linked to databases. Each of these components presents security challenges and vulnerabilities. Floods, fires, power failures, and other electrical problems can cause disruptions at any point in the network. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Wi-Fi Security Challenges Figure 7-2 Many Wi-Fi networks can be penetrated easily by intruders using sniffer programs to obtain an address to access the resources of a network without authorization. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Malicious Software: Viruses, Worms, Trojan Horses, and Spyware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Malicious Software: Viruses, Worms, Trojan Horses, and Spyware ,[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems Malware is active throughout the globe. These three charts show the regional distribution of worms and computer viruses worldwide reported by Trend Micro over periods of 24 hours, 7 days, and 30 days. The virus count represents the number of infected files and the percentage shows the relative prevalence in each region compared to worldwide statistics for each measuring period.
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Interactive Session: Technology Bot Armies Launch a Digital Data Siege System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Internal Threats: Employees ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Software Vulnerability System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Business Value of Security and Control Essentials of Business Information Systems Chapter 7 Securing Information Systems
Legal and Regulatory Requirements for Electronic Records Management Business Value of Security and Control Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object]
Electronic Evidence and Computer Forensics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Business Value of Security and Control Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems EXPOSURE PROBABILITY LOSS RANGE EXPECTED ANNUAL LOSS Power failure 30% $5K - $200K $30,750 Embezzlement 5% $1K - $50K $1,275 User error 98% $200 - $40K $19,698
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Security Profiles for a Personnel System Figure 7-3 These two examples represent two security profiles or data security patterns that might be found in a personnel system. Depending on the security profile, a user would have certain restrictions on access to various systems, locations, or data in an organization. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],Disaster Recovery Planning and Business Continuity Planning
Establishing a Framework for Security and Control Essentials of Business Information Systems Chapter 7 Securing Information Systems The Role of Auditing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Auditor’s List of Control Weaknesses Figure 7-4 This chart is a sample page from a list of control weaknesses that an auditor might find in a loan system in a local commercial bank. This form helps auditors record and evaluate control weaknesses and shows the results of discussing those weaknesses with management, as well as any corrective actions taken by management. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Access Control Technologies and Tools for Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems This NEC PC has a biometric fingerprint reader for fast yet secure access to files and networks. New models of PCs are starting to use biometric identification to authenticate users.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Firewalls, Intrusion Detection Systems, and Antivirus Software Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
A Corporate Firewall Figure 7-5 The firewall is placed between the firm’s private network and the public Internet or another distrusted network to protect against unauthorized traffic. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Firewalls, Intrusion Detection Systems, and Antivirus Software Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Securing Wireless Networks Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],Encryption and Public Key Infrastructure Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Encryption and Public Key Infrastructure Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
Public Key Encryption Figure 7-6 A public key encryption system can be viewed as a series of public and private keys that lock data when they are transmitted and unlock the data when they are received. The sender locates the recipient’s public key in a directory and uses it to encrypt a message. The message is sent in encrypted form over the Internet or a private network. When the encrypted message arrives, the recipient uses his or her private key to decrypt the data and read the message. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Encryption and Public Key Infrastructure Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
Digital Certificates Figure 7-7 Digital certificates help establish the identity of people or electronic assets. They protect online transactions by providing secure, encrypted, online communication. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ensuring System Availability Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ensuring System Availability Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ensuring Software Quality Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
Interactive Session: Organizations Can Salesforce.com On-Demand Remain in Demand? ,[object Object],[object Object],[object Object],[object Object],[object Object],Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems

Más contenido relacionado

La actualidad más candente

Laudon mis12 ppt03
Laudon mis12 ppt03Laudon mis12 ppt03
Laudon mis12 ppt03Faisal14H
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Chapter 8 securing information systems
Chapter 8 securing information systemsChapter 8 securing information systems
Chapter 8 securing information systemsVan Chau
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
MIS-CH9: Achieving Operational Excellence and Customer Intimacy
MIS-CH9: Achieving Operational Excellence and Customer IntimacyMIS-CH9: Achieving Operational Excellence and Customer Intimacy
MIS-CH9: Achieving Operational Excellence and Customer IntimacySukanya Ben
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info SystemsHemant Nagwekar
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information Systemarif prasetyo
 
03.2 application control
03.2 application control03.2 application control
03.2 application controlMulyadi Yusuf
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementNada G.Youssef
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
Chapter 3 information systems organizations and strategy
Chapter 3 information systems organizations and strategyChapter 3 information systems organizations and strategy
Chapter 3 information systems organizations and strategyVan Chau
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityCarl Ceder
 
Introduction to accounting information systems
Introduction to accounting information systemsIntroduction to accounting information systems
Introduction to accounting information systemsEmme Angelique Gametes
 
Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]mmuser2014
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsSukanya Ben
 
Foundation of Information Systems in Business
Foundation of Information Systems in Business Foundation of Information Systems in Business
Foundation of Information Systems in Business Aamir Gill
 
8. operations security
8. operations security8. operations security
8. operations security7wounders
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security controlCheng Olayvar
 

La actualidad más candente (20)

Laudon mis12 ppt03
Laudon mis12 ppt03Laudon mis12 ppt03
Laudon mis12 ppt03
 
Chapter 4 MIS
Chapter 4 MISChapter 4 MIS
Chapter 4 MIS
 
Information security management
Information security managementInformation security management
Information security management
 
Chapter 8 securing information systems
Chapter 8 securing information systemsChapter 8 securing information systems
Chapter 8 securing information systems
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
MIS-CH9: Achieving Operational Excellence and Customer Intimacy
MIS-CH9: Achieving Operational Excellence and Customer IntimacyMIS-CH9: Achieving Operational Excellence and Customer Intimacy
MIS-CH9: Achieving Operational Excellence and Customer Intimacy
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
 
Chapter 9 MIS
Chapter 9 MISChapter 9 MIS
Chapter 9 MIS
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information System
 
03.2 application control
03.2 application control03.2 application control
03.2 application control
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Chapter 3 information systems organizations and strategy
Chapter 3 information systems organizations and strategyChapter 3 information systems organizations and strategy
Chapter 3 information systems organizations and strategy
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
 
Introduction to accounting information systems
Introduction to accounting information systemsIntroduction to accounting information systems
Introduction to accounting information systems
 
Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]Management Information System [Kenneth Laudon]
Management Information System [Kenneth Laudon]
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation Systems
 
Foundation of Information Systems in Business
Foundation of Information Systems in Business Foundation of Information Systems in Business
Foundation of Information Systems in Business
 
8. operations security
8. operations security8. operations security
8. operations security
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security control
 

Destacado

E-commerce: Digital Markets, Digital Goods
E-commerce: Digital Markets, Digital GoodsE-commerce: Digital Markets, Digital Goods
E-commerce: Digital Markets, Digital Goodslinda_perangin
 
E-commerce, digital markets, and digital goods
E-commerce, digital markets, and digital goodsE-commerce, digital markets, and digital goods
E-commerce, digital markets, and digital goodsJose G. Lepervanche, PhD
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systemsOmid Aminzadeh Gohari
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and ControlAlbrecht Jones
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information SystemSatya P. Joshi
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyProf. Othman Alsalloum
 
Introduction to Data Management
Introduction to Data ManagementIntroduction to Data Management
Introduction to Data ManagementAmanda Whitmire
 

Destacado (14)

Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
E-commerce: Digital Markets, Digital Goods
E-commerce: Digital Markets, Digital GoodsE-commerce: Digital Markets, Digital Goods
E-commerce: Digital Markets, Digital Goods
 
E-commerce, digital markets, and digital goods
E-commerce, digital markets, and digital goodsE-commerce, digital markets, and digital goods
E-commerce, digital markets, and digital goods
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and Control
 
Case study 7
Case study 7Case study 7
Case study 7
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
 
Introduction to Data Management
Introduction to Data ManagementIntroduction to Data Management
Introduction to Data Management
 
Data Management for Dummies
Data Management for DummiesData Management for Dummies
Data Management for Dummies
 
3c 2 Information Systems Audit
3c   2   Information Systems Audit3c   2   Information Systems Audit
3c 2 Information Systems Audit
 
Review questions
Review questionsReview questions
Review questions
 
E Business Systems
E Business SystemsE Business Systems
E Business Systems
 

Similar a Securing information systems

Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdfBelayet Hossain
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docxalinainglis
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxjoellemurphey
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxarnoldmeredith47041
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and securitySomesh Kumar
 

Similar a Securing information systems (20)

Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
386sum08ch8
386sum08ch8386sum08ch8
386sum08ch8
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and security
 

Más de Prof. Othman Alsalloum

Information systemsfromfunctionsprospective
Information systemsfromfunctionsprospectiveInformation systemsfromfunctionsprospective
Information systemsfromfunctionsprospectiveProf. Othman Alsalloum
 
Information systems, organizations, management, and strategy
Information systems, organizations, management, and strategyInformation systems, organizations, management, and strategy
Information systems, organizations, management, and strategyProf. Othman Alsalloum
 
Informational needs of organizations in an information society
Informational needs of organizations in an information societyInformational needs of organizations in an information society
Informational needs of organizations in an information societyProf. Othman Alsalloum
 
E strategy, internet communities, and global ec
E strategy, internet communities, and global ecE strategy, internet communities, and global ec
E strategy, internet communities, and global ecProf. Othman Alsalloum
 
Definitions of management information systems
Definitions of management information systemsDefinitions of management information systems
Definitions of management information systemsProf. Othman Alsalloum
 
Knowledge creation and knowledge architecture
Knowledge creation and knowledge architectureKnowledge creation and knowledge architecture
Knowledge creation and knowledge architectureProf. Othman Alsalloum
 

Más de Prof. Othman Alsalloum (20)

Information systemsfromfunctionsprospective
Information systemsfromfunctionsprospectiveInformation systemsfromfunctionsprospective
Information systemsfromfunctionsprospective
 
Types of information systems
Types of information systemsTypes of information systems
Types of information systems
 
Information systems organization
Information systems organizationInformation systems organization
Information systems organization
 
E business digitalgoods
E business digitalgoodsE business digitalgoods
E business digitalgoods
 
Digital firms admin
Digital firms adminDigital firms admin
Digital firms admin
 
Managing the digital firm
Managing the digital firmManaging the digital firm
Managing the digital firm
 
Information what is it
Information what is itInformation what is it
Information what is it
 
Information systems
Information systemsInformation systems
Information systems
 
Information systems, organizations, management, and strategy
Information systems, organizations, management, and strategyInformation systems, organizations, management, and strategy
Information systems, organizations, management, and strategy
 
Information systems in the enterprise
Information systems in the enterpriseInformation systems in the enterprise
Information systems in the enterprise
 
Understanding knowledge
Understanding knowledgeUnderstanding knowledge
Understanding knowledge
 
Strategic use of information systems
Strategic use of information systemsStrategic use of information systems
Strategic use of information systems
 
Overview of electronic commerce
Overview of  electronic commerceOverview of  electronic commerce
Overview of electronic commerce
 
Informational needs of organizations in an information society
Informational needs of organizations in an information societyInformational needs of organizations in an information society
Informational needs of organizations in an information society
 
E strategy, internet communities, and global ec
E strategy, internet communities, and global ecE strategy, internet communities, and global ec
E strategy, internet communities, and global ec
 
E commerce market mechanisms
E commerce market mechanismsE commerce market mechanisms
E commerce market mechanisms
 
Definitions of management information systems
Definitions of management information systemsDefinitions of management information systems
Definitions of management information systems
 
Data mining knowing the unknown
Data mining knowing the unknownData mining knowing the unknown
Data mining knowing the unknown
 
Knowledge creation and knowledge architecture
Knowledge creation and knowledge architectureKnowledge creation and knowledge architecture
Knowledge creation and knowledge architecture
 
Types of information systems
Types of information systemsTypes of information systems
Types of information systems
 

Último

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Último (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Securing information systems

  • 1. 7 Chapter Securing Information Systems
  • 2.
  • 3.
  • 4.
  • 5. Online Games Need Security, Too Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 6.
  • 7.
  • 8. Contemporary Security Challenges and Vulnerabilities Figure 7-1 The architecture of a Web-based application typically includes a Web client, a server, and corporate information systems linked to databases. Each of these components presents security challenges and vulnerabilities. Floods, fires, power failures, and other electrical problems can cause disruptions at any point in the network. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 9.
  • 10.
  • 11. Wi-Fi Security Challenges Figure 7-2 Many Wi-Fi networks can be penetrated easily by intruders using sniffer programs to obtain an address to access the resources of a network without authorization. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 12.
  • 13.
  • 14. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems Malware is active throughout the globe. These three charts show the regional distribution of worms and computer viruses worldwide reported by Trend Micro over periods of 24 hours, 7 days, and 30 days. The virus count represents the number of infected files and the percentage shows the relative prevalence in each region compared to worldwide statistics for each measuring period.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. Security Profiles for a Personnel System Figure 7-3 These two examples represent two security profiles or data security patterns that might be found in a personnel system. Depending on the security profile, a user would have certain restrictions on access to various systems, locations, or data in an organization. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 34.
  • 35.
  • 36. Sample Auditor’s List of Control Weaknesses Figure 7-4 This chart is a sample page from a list of control weaknesses that an auditor might find in a loan system in a local commercial bank. This form helps auditors record and evaluate control weaknesses and shows the results of discussing those weaknesses with management, as well as any corrective actions taken by management. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 37.
  • 38. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems This NEC PC has a biometric fingerprint reader for fast yet secure access to files and networks. New models of PCs are starting to use biometric identification to authenticate users.
  • 39.
  • 40. A Corporate Firewall Figure 7-5 The firewall is placed between the firm’s private network and the public Internet or another distrusted network to protect against unauthorized traffic. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 41.
  • 42.
  • 43.
  • 44.
  • 45. Public Key Encryption Figure 7-6 A public key encryption system can be viewed as a series of public and private keys that lock data when they are transmitted and unlock the data when they are received. The sender locates the recipient’s public key in a directory and uses it to encrypt a message. The message is sent in encrypted form over the Internet or a private network. When the encrypted message arrives, the recipient uses his or her private key to decrypt the data and read the message. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 46.
  • 47. Digital Certificates Figure 7-7 Digital certificates help establish the identity of people or electronic assets. They protect online transactions by providing secure, encrypted, online communication. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 48.
  • 49.
  • 50.
  • 51.