SlideShare una empresa de Scribd logo
1 de 19
Descargar para leer sin conexión
ISINFORMATION SYSTEMS
BY: JAN WONG
HELLO AND
WELCOME TO
Chapter Seven:
SECURITY, ETHICS
AND PRIVACY
“How to ensure it is safe & secure?”
ISSecurity Risks
ISIs it possible to protect against all
types of risks?
It is not possible to protect against all
types of risks!
Costly
There is no one solution to
address all the risks.
High Complexity
All resource, data, software,
processes can be at risk.
Unpredictability
Hundreds of potential threats
exists.
Too Many Users
Many individuals have access to
different parts of the system.
Rapid Tech Change
Constant innovation and upgrades
cause systems to be obsolete.
Lack of Control
Systems may span outside the
organisation (e.g. 3rd party).
People Factor
People tend to violate security
measures for convenience.
Difficult to Detect
Due to so many different
components involved.
Distributed Systems
Making it difficult to track and
pinpoint security flaws.
#3:
System
Failures
#2:
Environmental
Hazards
#4:
Cybercrime
#1:
Human
Factors
Hardware, software & information
Let’s talk about
risks
• Design of hardware or systems

• Negligence or oversight during SDLC

• Lack of knowledge or experience

• Inadequate specifications given

• Greed

• Convenience 

• Unauthorised access: use of system
without permission

• Unauthorised use: use of system for
unapproved activities
#1:
Human
Factors
Let’s talk about
risks
• External factors that is outside the
control of the system or users.

• Natural disasters such as earthquake,
floods, fire, lightning strikes, etc.

• Micro environment such as defective
aircond, smoke, heat and water
damage. 

• Macro environment such as
radioactive fallout, riots and etc.
#2:
Environmental
Hazards
Let’s talk about
risks
• Poor design (both hardware or
software).

• Use of defective materials.

• Noise (unwanted electrical signals).

• Undervoltage (drop in electrical
supply).

• Power surge (significant increase of
electrical supply).
#3:
System
Failures
Let’s talk about
risks
• Hackers consists of outsiders that
penetrates the system without
permission, or insiders that misuse
their authorisation. 

• Data tampering: inserts false data.

• DOS attack: hammering a website will
more requests that it can handle.

• Backdoor: allows users to bypass
security controls.

• Phishing & spoofing: a fake website
that looks legitimate.

• Programming Fraud:
#4:
Cybercrime
Adware
Displays advertisements on any
software.
Ransomware
Blocks access to a system until
the user pays a ransom.
Spyware
Secretly collects information
about the user.
Virus
Affects & infects a system
without permission.
Worm
Copies repetitively, using up
resources to shutdown system.
Trojanhorse
Looks legitimate but contains
malicious codes.
ISSecurity Measures
How to protect against them?
Minimise the risk
potentials of systems,
not eliminate them.
We can only
Because there is no 100% guaranteed protection.
Anti Virus
Scans programs or systems for
virus signatures to detect, remove
or quarantine infected files.
Firewall
A hardware / software that
protects a network from external
intrusion and informs you of
unusual behaviour.
SSL Certificate
Encrypts data between client and
the server.The certificate is usually
issued by a trusted Certificate
Authority (CA).
Access Control
A set of rules to define who can
access the system and what are
their usage limitations, usually via a
login credential.
Acceptable Use Policy
Outlines the activities for what can
be used (and not) within the
system, like a terms of usage.
Encryption
Converts plaintext / readable text
into encoded / unreadable
characters.
Verification Device
A device that generates a random
code to be used to verify your
identity when accessing a system.
Biometrics
Authenticates a user’s identity
using personal characteristics like
thumbprint, facial patterns or iris.
2-Step Verification
A second level of verification to
further protect account access.
Alarm System
Notifies users if there are any
abnormalities to the environment,
facility or system e.g. smoke or
movement detector.
Possessed Objects
An item that you must carry with
you in order to gain access to a
computer or facility e.g. access
card, RFID tag, etc.
Product Activation
Uses a unique identification code
to grant access to the product’s
usage.
License Agreement
Requires acceptance of terms
before via a digital sign-off using
the system.
Surge Protector
Protects computer & equipment
from electrical disturbances.
UPS
Like a battery, provides stored
power during power loss.
Backup
A duplicate copy of files or
program that can be used as a
restoration point.
Disaster Recovery Plan
A written plan that describes what
to do should a disaster occurs - to
evacuate, recover and test systems.
Backup
A duplicate copy of files or program that can be used as a restoration point.
Full
Fastest recovery
method, takes a
complete copy of all the
files to be saved - but
has the longest backup
and restoration time.
Differential
A full backup, but only
for files that were not
included in the first full
backup version - can be
time consuming during
restoration.
Mirror
Real-time backup that is
most reliable and
quickest to restore
from - but most
expensive and requires
the most storage to
make this happen.
Onsite / Offsite / Cloud
Determines how the backup files will be stored - physically within the same
premise of the original, outside the premise from the original, or on the cloud
that requires internet connectivity to access.
Full: Selective
Only backs up selected
files in full - but will be
difficult to be keep
tracked of over time.
Incremental
Requires minimal space
to store the backup as
it only saves the most
recent changes - but
extremely time
consuming to restore.
ISEthics & Privacy
“If it is on social
media, it has to
be true.”
We live in a generation where news are not verified.
The big problem:
Not Verifying Accuracy
Consumers do not check the facts.
No Regulations
There is no strict law government
digital code of conduct.
No Privacy Standards
Apart from GDPR (Europe), most
countries don’t have.
Privacy on the internet?
That’s oxymoron.
The citizens will decide
between convenience or
privacy.
Our data has become a currency for convenience.
Your data is collected:
Electronic Profile Cookies Visual Monitoring Geolocation
Purchase Behaviour Ads Interaction Search Terms App Downloads
ISImpact to Health
To prevent:
Do not purchase unneeded electronic devices,
reduce electricity consumption, recycle your
devices.
To prevent:
Have furnitures with good ergonomic that
provides comfort, efficiency and safety in your
workplace.
To prevent:
Don’t apply constant pressure on your wrists,
spread fingers apart during breaks, do light
stretches whenever possible.
To prevent:
Have constant breaks, display should be at least
arms’ length, have good lighting conditions, use
larger fonts, etc.
Computer Vision Syndrome
Eye & vision problems e.g. short sightedness, lazy
eye, ocular hypertension, astigmatism, etc.
Repetitive Strain Injury (RSI)
e.g. Carpal Tunnel Syndrome where the nerve
connecting forearm to palm is inflamed.
Tendonitis
Inflammation of tendon due to repeated motion
e.g. backaches, neck strains, etc.
Environmental Deterioration
Consumption of electricity, material production
and electronic waste.
To prevent:
Have consistent ‘time off’ and choose to
consume content in different mediums instead.
Addiction
Dependency towards devices where users are
not able to put it away for a prolonged period.

Más contenido relacionado

La actualidad más candente

Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersJoel Cardella
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Isa Prog Need L
Isa Prog Need LIsa Prog Need L
Isa Prog Need LR_Yanus
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Michael Kaishar, MSIA | CISSP
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaChinnu Shimna
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees OPSWAT
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 

La actualidad más candente (20)

Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of users
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Computer security
Computer securityComputer security
Computer security
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Information security policy
Information security policyInformation security policy
Information security policy
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Security tools
Security toolsSecurity tools
Security tools
 
Isa Prog Need L
Isa Prog Need LIsa Prog Need L
Isa Prog Need L
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 

Similar a IS L07 - Security, Ethics and Privacy

Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsKimarie Brown
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer CrimeMISY
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And PrivacyMISY
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxfathwaitewalter
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
14 - Computer Security.pdf
14 - Computer Security.pdf14 - Computer Security.pdf
14 - Computer Security.pdfLakshyaKhowala
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyChristoanSmit
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitysuperb11b
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptxmuskaangoel15
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)Patrick Garrett
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11mrmwood
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT SecurityAjay Jassi
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfanandanand521251
 

Similar a IS L07 - Security, Ethics and Privacy (20)

Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
14 - Computer Security.pdf
14 - Computer Security.pdf14 - Computer Security.pdf
14 - Computer Security.pdf
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and security
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 

Más de Jan Wong

IS L06 Communications and Networks
IS L06 Communications and NetworksIS L06 Communications and Networks
IS L06 Communications and NetworksJan Wong
 
IS L05 Multimedia
IS L05 MultimediaIS L05 Multimedia
IS L05 MultimediaJan Wong
 
IS L04 Programming Language
IS L04 Programming LanguageIS L04 Programming Language
IS L04 Programming LanguageJan Wong
 
IS L03 - Database Management
IS L03 - Database ManagementIS L03 - Database Management
IS L03 - Database ManagementJan Wong
 
IS L02 - Development of Information Systems
IS L02 - Development of Information SystemsIS L02 - Development of Information Systems
IS L02 - Development of Information SystemsJan Wong
 
IS L01 - Introduction to Information Systems (2019)
IS L01 - Introduction to Information Systems (2019)IS L01 - Introduction to Information Systems (2019)
IS L01 - Introduction to Information Systems (2019)Jan Wong
 
Decision Making for Entrepreneurs
Decision Making for EntrepreneursDecision Making for Entrepreneurs
Decision Making for EntrepreneursJan Wong
 
L008 Disaster Recovery Plan (2016)
L008 Disaster Recovery Plan (2016)L008 Disaster Recovery Plan (2016)
L008 Disaster Recovery Plan (2016)Jan Wong
 
L007 Managing System Security (2016)
L007 Managing System Security (2016)L007 Managing System Security (2016)
L007 Managing System Security (2016)Jan Wong
 
L006 IT Strategy (2016)
L006 IT Strategy (2016)L006 IT Strategy (2016)
L006 IT Strategy (2016)Jan Wong
 
L004 E-Commerce (2016)
L004 E-Commerce (2016)L004 E-Commerce (2016)
L004 E-Commerce (2016)Jan Wong
 
L003 Network Computing (2016)
L003 Network Computing (2016)L003 Network Computing (2016)
L003 Network Computing (2016)Jan Wong
 
MISO L001 Digital Economy (2016)
MISO L001 Digital Economy (2016)MISO L001 Digital Economy (2016)
MISO L001 Digital Economy (2016)Jan Wong
 
L002 IT Concepts & Management (2016)
L002 IT Concepts & Management (2016)L002 IT Concepts & Management (2016)
L002 IT Concepts & Management (2016)Jan Wong
 
Social Media for Entrepreneurs
Social Media for EntrepreneursSocial Media for Entrepreneurs
Social Media for EntrepreneursJan Wong
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system securityJan Wong
 
MISO L008 Disaster Recovery Plan
MISO L008 Disaster Recovery PlanMISO L008 Disaster Recovery Plan
MISO L008 Disaster Recovery PlanJan Wong
 
MISO L006 IT Strategy
MISO L006 IT StrategyMISO L006 IT Strategy
MISO L006 IT StrategyJan Wong
 
MISO L005 Understanding ERP
MISO L005 Understanding ERPMISO L005 Understanding ERP
MISO L005 Understanding ERPJan Wong
 

Más de Jan Wong (20)

IS L06 Communications and Networks
IS L06 Communications and NetworksIS L06 Communications and Networks
IS L06 Communications and Networks
 
IS L05 Multimedia
IS L05 MultimediaIS L05 Multimedia
IS L05 Multimedia
 
IS L04 Programming Language
IS L04 Programming LanguageIS L04 Programming Language
IS L04 Programming Language
 
IS L03 - Database Management
IS L03 - Database ManagementIS L03 - Database Management
IS L03 - Database Management
 
IS L02 - Development of Information Systems
IS L02 - Development of Information SystemsIS L02 - Development of Information Systems
IS L02 - Development of Information Systems
 
IS L01 - Introduction to Information Systems (2019)
IS L01 - Introduction to Information Systems (2019)IS L01 - Introduction to Information Systems (2019)
IS L01 - Introduction to Information Systems (2019)
 
Decision Making for Entrepreneurs
Decision Making for EntrepreneursDecision Making for Entrepreneurs
Decision Making for Entrepreneurs
 
L008 Disaster Recovery Plan (2016)
L008 Disaster Recovery Plan (2016)L008 Disaster Recovery Plan (2016)
L008 Disaster Recovery Plan (2016)
 
L007 Managing System Security (2016)
L007 Managing System Security (2016)L007 Managing System Security (2016)
L007 Managing System Security (2016)
 
L006 IT Strategy (2016)
L006 IT Strategy (2016)L006 IT Strategy (2016)
L006 IT Strategy (2016)
 
L004 E-Commerce (2016)
L004 E-Commerce (2016)L004 E-Commerce (2016)
L004 E-Commerce (2016)
 
L003 Network Computing (2016)
L003 Network Computing (2016)L003 Network Computing (2016)
L003 Network Computing (2016)
 
MISO L001 Digital Economy (2016)
MISO L001 Digital Economy (2016)MISO L001 Digital Economy (2016)
MISO L001 Digital Economy (2016)
 
L002 IT Concepts & Management (2016)
L002 IT Concepts & Management (2016)L002 IT Concepts & Management (2016)
L002 IT Concepts & Management (2016)
 
Social Media for Entrepreneurs
Social Media for EntrepreneursSocial Media for Entrepreneurs
Social Media for Entrepreneurs
 
MISO L010
MISO L010MISO L010
MISO L010
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system security
 
MISO L008 Disaster Recovery Plan
MISO L008 Disaster Recovery PlanMISO L008 Disaster Recovery Plan
MISO L008 Disaster Recovery Plan
 
MISO L006 IT Strategy
MISO L006 IT StrategyMISO L006 IT Strategy
MISO L006 IT Strategy
 
MISO L005 Understanding ERP
MISO L005 Understanding ERPMISO L005 Understanding ERP
MISO L005 Understanding ERP
 

Último

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

IS L07 - Security, Ethics and Privacy

  • 1. ISINFORMATION SYSTEMS BY: JAN WONG HELLO AND WELCOME TO Chapter Seven: SECURITY, ETHICS AND PRIVACY “How to ensure it is safe & secure?”
  • 3. ISIs it possible to protect against all types of risks?
  • 4. It is not possible to protect against all types of risks! Costly There is no one solution to address all the risks. High Complexity All resource, data, software, processes can be at risk. Unpredictability Hundreds of potential threats exists. Too Many Users Many individuals have access to different parts of the system. Rapid Tech Change Constant innovation and upgrades cause systems to be obsolete. Lack of Control Systems may span outside the organisation (e.g. 3rd party). People Factor People tend to violate security measures for convenience. Difficult to Detect Due to so many different components involved. Distributed Systems Making it difficult to track and pinpoint security flaws. #3: System Failures #2: Environmental Hazards #4: Cybercrime #1: Human Factors Hardware, software & information
  • 5. Let’s talk about risks • Design of hardware or systems • Negligence or oversight during SDLC • Lack of knowledge or experience • Inadequate specifications given • Greed • Convenience • Unauthorised access: use of system without permission • Unauthorised use: use of system for unapproved activities #1: Human Factors
  • 6. Let’s talk about risks • External factors that is outside the control of the system or users. • Natural disasters such as earthquake, floods, fire, lightning strikes, etc. • Micro environment such as defective aircond, smoke, heat and water damage. • Macro environment such as radioactive fallout, riots and etc. #2: Environmental Hazards
  • 7. Let’s talk about risks • Poor design (both hardware or software). • Use of defective materials. • Noise (unwanted electrical signals). • Undervoltage (drop in electrical supply). • Power surge (significant increase of electrical supply). #3: System Failures
  • 8. Let’s talk about risks • Hackers consists of outsiders that penetrates the system without permission, or insiders that misuse their authorisation. • Data tampering: inserts false data. • DOS attack: hammering a website will more requests that it can handle. • Backdoor: allows users to bypass security controls. • Phishing & spoofing: a fake website that looks legitimate. • Programming Fraud: #4: Cybercrime Adware Displays advertisements on any software. Ransomware Blocks access to a system until the user pays a ransom. Spyware Secretly collects information about the user. Virus Affects & infects a system without permission. Worm Copies repetitively, using up resources to shutdown system. Trojanhorse Looks legitimate but contains malicious codes.
  • 9. ISSecurity Measures How to protect against them?
  • 10. Minimise the risk potentials of systems, not eliminate them. We can only Because there is no 100% guaranteed protection.
  • 11. Anti Virus Scans programs or systems for virus signatures to detect, remove or quarantine infected files. Firewall A hardware / software that protects a network from external intrusion and informs you of unusual behaviour. SSL Certificate Encrypts data between client and the server.The certificate is usually issued by a trusted Certificate Authority (CA). Access Control A set of rules to define who can access the system and what are their usage limitations, usually via a login credential. Acceptable Use Policy Outlines the activities for what can be used (and not) within the system, like a terms of usage. Encryption Converts plaintext / readable text into encoded / unreadable characters. Verification Device A device that generates a random code to be used to verify your identity when accessing a system. Biometrics Authenticates a user’s identity using personal characteristics like thumbprint, facial patterns or iris. 2-Step Verification A second level of verification to further protect account access. Alarm System Notifies users if there are any abnormalities to the environment, facility or system e.g. smoke or movement detector. Possessed Objects An item that you must carry with you in order to gain access to a computer or facility e.g. access card, RFID tag, etc. Product Activation Uses a unique identification code to grant access to the product’s usage. License Agreement Requires acceptance of terms before via a digital sign-off using the system. Surge Protector Protects computer & equipment from electrical disturbances. UPS Like a battery, provides stored power during power loss. Backup A duplicate copy of files or program that can be used as a restoration point. Disaster Recovery Plan A written plan that describes what to do should a disaster occurs - to evacuate, recover and test systems.
  • 12. Backup A duplicate copy of files or program that can be used as a restoration point. Full Fastest recovery method, takes a complete copy of all the files to be saved - but has the longest backup and restoration time. Differential A full backup, but only for files that were not included in the first full backup version - can be time consuming during restoration. Mirror Real-time backup that is most reliable and quickest to restore from - but most expensive and requires the most storage to make this happen. Onsite / Offsite / Cloud Determines how the backup files will be stored - physically within the same premise of the original, outside the premise from the original, or on the cloud that requires internet connectivity to access. Full: Selective Only backs up selected files in full - but will be difficult to be keep tracked of over time. Incremental Requires minimal space to store the backup as it only saves the most recent changes - but extremely time consuming to restore.
  • 14. “If it is on social media, it has to be true.” We live in a generation where news are not verified.
  • 15. The big problem: Not Verifying Accuracy Consumers do not check the facts. No Regulations There is no strict law government digital code of conduct. No Privacy Standards Apart from GDPR (Europe), most countries don’t have.
  • 16. Privacy on the internet? That’s oxymoron. The citizens will decide between convenience or privacy. Our data has become a currency for convenience.
  • 17. Your data is collected: Electronic Profile Cookies Visual Monitoring Geolocation Purchase Behaviour Ads Interaction Search Terms App Downloads
  • 19. To prevent: Do not purchase unneeded electronic devices, reduce electricity consumption, recycle your devices. To prevent: Have furnitures with good ergonomic that provides comfort, efficiency and safety in your workplace. To prevent: Don’t apply constant pressure on your wrists, spread fingers apart during breaks, do light stretches whenever possible. To prevent: Have constant breaks, display should be at least arms’ length, have good lighting conditions, use larger fonts, etc. Computer Vision Syndrome Eye & vision problems e.g. short sightedness, lazy eye, ocular hypertension, astigmatism, etc. Repetitive Strain Injury (RSI) e.g. Carpal Tunnel Syndrome where the nerve connecting forearm to palm is inflamed. Tendonitis Inflammation of tendon due to repeated motion e.g. backaches, neck strains, etc. Environmental Deterioration Consumption of electricity, material production and electronic waste. To prevent: Have consistent ‘time off’ and choose to consume content in different mediums instead. Addiction Dependency towards devices where users are not able to put it away for a prolonged period.