SlideShare une entreprise Scribd logo
1  sur  51
7 Chapter   Securing Information Systems
STUDENT LEARNING OBJECTIVES Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Online Games Need Security, Too Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],Online Games Need Security, Too Essentials of Business Information Systems Chapter 7 Securing Information Systems
Online Games Need Security, Too Essentials of Business Information Systems Chapter 7 Securing Information Systems
System Vulnerability and Abuse ,[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Why Systems Are Vulnerable ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Contemporary Security Challenges and Vulnerabilities Figure 7-1 The architecture of a Web-based application typically includes a Web client, a server, and corporate information systems linked to databases. Each of these components presents security challenges and vulnerabilities. Floods, fires, power failures, and other electrical problems can cause disruptions at any point in the network. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Wi-Fi Security Challenges Figure 7-2 Many Wi-Fi networks can be penetrated easily by intruders using sniffer programs to obtain an address to access the resources of a network without authorization. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Malicious Software: Viruses, Worms, Trojan Horses, and Spyware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Malicious Software: Viruses, Worms, Trojan Horses, and Spyware ,[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems Malware is active throughout the globe. These three charts show the regional distribution of worms and computer viruses worldwide reported by Trend Micro over periods of 24 hours, 7 days, and 30 days. The virus count represents the number of infected files and the percentage shows the relative prevalence in each region compared to worldwide statistics for each measuring period.
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Interactive Session: Technology Bot Armies Launch a Digital Data Siege System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Internal Threats: Employees ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Software Vulnerability System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Business Value of Security and Control Essentials of Business Information Systems Chapter 7 Securing Information Systems
Legal and Regulatory Requirements for Electronic Records Management Business Value of Security and Control Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object]
Electronic Evidence and Computer Forensics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Business Value of Security and Control Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems EXPOSURE PROBABILITY LOSS RANGE EXPECTED ANNUAL LOSS Power failure 30% $5K - $200K $30,750 Embezzlement 5% $1K - $50K $1,275 User error 98% $200 - $40K $19,698
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Security Profiles for a Personnel System Figure 7-3 These two examples represent two security profiles or data security patterns that might be found in a personnel system. Depending on the security profile, a user would have certain restrictions on access to various systems, locations, or data in an organization. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],Disaster Recovery Planning and Business Continuity Planning
Establishing a Framework for Security and Control Essentials of Business Information Systems Chapter 7 Securing Information Systems The Role of Auditing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Auditor’s List of Control Weaknesses Figure 7-4 This chart is a sample page from a list of control weaknesses that an auditor might find in a loan system in a local commercial bank. This form helps auditors record and evaluate control weaknesses and shows the results of discussing those weaknesses with management, as well as any corrective actions taken by management. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Access Control Technologies and Tools for Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems This NEC PC has a biometric fingerprint reader for fast yet secure access to files and networks. New models of PCs are starting to use biometric identification to authenticate users.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Firewalls, Intrusion Detection Systems, and Antivirus Software Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
A Corporate Firewall Figure 7-5 The firewall is placed between the firm’s private network and the public Internet or another distrusted network to protect against unauthorized traffic. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Firewalls, Intrusion Detection Systems, and Antivirus Software Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Securing Wireless Networks Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],Encryption and Public Key Infrastructure Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Encryption and Public Key Infrastructure Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
Public Key Encryption Figure 7-6 A public key encryption system can be viewed as a series of public and private keys that lock data when they are transmitted and unlock the data when they are received. The sender locates the recipient’s public key in a directory and uses it to encrypt a message. The message is sent in encrypted form over the Internet or a private network. When the encrypted message arrives, the recipient uses his or her private key to decrypt the data and read the message. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Encryption and Public Key Infrastructure Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
Digital Certificates Figure 7-7 Digital certificates help establish the identity of people or electronic assets. They protect online transactions by providing secure, encrypted, online communication. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ensuring System Availability Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ensuring System Availability Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ensuring Software Quality Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
Interactive Session: Organizations Can Salesforce.com On-Demand Remain in Demand? ,[object Object],[object Object],[object Object],[object Object],[object Object],Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems

Contenu connexe

Tendances

8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
Hemant Nagwekar
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
Biswajit Bhattacharjee
 
Laudon mis12 ppt01
Laudon mis12 ppt01Laudon mis12 ppt01
Laudon mis12 ppt01
Norazila Mat
 
8. operations security
8. operations security8. operations security
8. operations security
7wounders
 
Information security management
Information security managementInformation security management
Information security management
UMaine
 

Tendances (20)

MIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationMIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and Collaboration
 
E-commerce Security and Payment
E-commerce Security and PaymentE-commerce Security and Payment
E-commerce Security and Payment
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
 
Chap09 Electronic Commerce Systems
Chap09 Electronic Commerce SystemsChap09 Electronic Commerce Systems
Chap09 Electronic Commerce Systems
 
MIS-CH10: e-Commerce: Digital Markets, Digital Goods
MIS-CH10: e-Commerce: Digital Markets, Digital GoodsMIS-CH10: e-Commerce: Digital Markets, Digital Goods
MIS-CH10: e-Commerce: Digital Markets, Digital Goods
 
The need for security
The need for securityThe need for security
The need for security
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
 
Information security
Information securityInformation security
Information security
 
Managing the digital firm
Managing the digital firmManaging the digital firm
Managing the digital firm
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
5 enterprise applications
5 enterprise applications5 enterprise applications
5 enterprise applications
 
Laudon mis12 ppt01
Laudon mis12 ppt01Laudon mis12 ppt01
Laudon mis12 ppt01
 
MIS Chapter 3
MIS Chapter 3MIS Chapter 3
MIS Chapter 3
 
8. operations security
8. operations security8. operations security
8. operations security
 
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesMIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging Technologies
 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)
 
Chapter 7 e business systems
Chapter 7  e business systemsChapter 7  e business systems
Chapter 7 e business systems
 
Chapter 5 MIS
Chapter 5 MISChapter 5 MIS
Chapter 5 MIS
 
Information security management
Information security managementInformation security management
Information security management
 

En vedette

E-commerce: Digital Markets, Digital Goods
E-commerce: Digital Markets, Digital GoodsE-commerce: Digital Markets, Digital Goods
E-commerce: Digital Markets, Digital Goods
linda_perangin
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
Prof. Othman Alsalloum
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
Omid Aminzadeh Gohari
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and Control
Albrecht Jones
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
Prof. Othman Alsalloum
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security control
Cheng Olayvar
 

En vedette (16)

E-commerce: Digital Markets, Digital Goods
E-commerce: Digital Markets, Digital GoodsE-commerce: Digital Markets, Digital Goods
E-commerce: Digital Markets, Digital Goods
 
E-commerce, digital markets, and digital goods
E-commerce, digital markets, and digital goodsE-commerce, digital markets, and digital goods
E-commerce, digital markets, and digital goods
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and Control
 
Case study 7
Case study 7Case study 7
Case study 7
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
 
Laudon mis14 ch02
Laudon mis14 ch02Laudon mis14 ch02
Laudon mis14 ch02
 
Introduction to Data Management
Introduction to Data ManagementIntroduction to Data Management
Introduction to Data Management
 
Data Management for Dummies
Data Management for DummiesData Management for Dummies
Data Management for Dummies
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security control
 
3c 2 Information Systems Audit
3c   2   Information Systems Audit3c   2   Information Systems Audit
3c 2 Information Systems Audit
 
Review questions
Review questionsReview questions
Review questions
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
E Business Systems
E Business SystemsE Business Systems
E Business Systems
 

Similaire à Securing information systems

Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
alinainglis
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
joellemurphey
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
arnoldmeredith47041
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
angelaag98
 

Similaire à Securing information systems (20)

Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
386sum08ch8
386sum08ch8386sum08ch8
386sum08ch8
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and security
 

Plus de Prof. Othman Alsalloum

Information systemsfromfunctionsprospective
Information systemsfromfunctionsprospectiveInformation systemsfromfunctionsprospective
Information systemsfromfunctionsprospective
Prof. Othman Alsalloum
 
Information systems, organizations, management, and strategy
Information systems, organizations, management, and strategyInformation systems, organizations, management, and strategy
Information systems, organizations, management, and strategy
Prof. Othman Alsalloum
 
Informational needs of organizations in an information society
Informational needs of organizations in an information societyInformational needs of organizations in an information society
Informational needs of organizations in an information society
Prof. Othman Alsalloum
 
E strategy, internet communities, and global ec
E strategy, internet communities, and global ecE strategy, internet communities, and global ec
E strategy, internet communities, and global ec
Prof. Othman Alsalloum
 
Definitions of management information systems
Definitions of management information systemsDefinitions of management information systems
Definitions of management information systems
Prof. Othman Alsalloum
 
Knowledge creation and knowledge architecture
Knowledge creation and knowledge architectureKnowledge creation and knowledge architecture
Knowledge creation and knowledge architecture
Prof. Othman Alsalloum
 

Plus de Prof. Othman Alsalloum (20)

Information systemsfromfunctionsprospective
Information systemsfromfunctionsprospectiveInformation systemsfromfunctionsprospective
Information systemsfromfunctionsprospective
 
Types of information systems
Types of information systemsTypes of information systems
Types of information systems
 
Information systems organization
Information systems organizationInformation systems organization
Information systems organization
 
E business digitalgoods
E business digitalgoodsE business digitalgoods
E business digitalgoods
 
Digital firms admin
Digital firms adminDigital firms admin
Digital firms admin
 
Managing the digital firm
Managing the digital firmManaging the digital firm
Managing the digital firm
 
Information what is it
Information what is itInformation what is it
Information what is it
 
Information systems
Information systemsInformation systems
Information systems
 
Information systems, organizations, management, and strategy
Information systems, organizations, management, and strategyInformation systems, organizations, management, and strategy
Information systems, organizations, management, and strategy
 
Information systems in the enterprise
Information systems in the enterpriseInformation systems in the enterprise
Information systems in the enterprise
 
Understanding knowledge
Understanding knowledgeUnderstanding knowledge
Understanding knowledge
 
Strategic use of information systems
Strategic use of information systemsStrategic use of information systems
Strategic use of information systems
 
Overview of electronic commerce
Overview of  electronic commerceOverview of  electronic commerce
Overview of electronic commerce
 
Informational needs of organizations in an information society
Informational needs of organizations in an information societyInformational needs of organizations in an information society
Informational needs of organizations in an information society
 
E strategy, internet communities, and global ec
E strategy, internet communities, and global ecE strategy, internet communities, and global ec
E strategy, internet communities, and global ec
 
E commerce market mechanisms
E commerce market mechanismsE commerce market mechanisms
E commerce market mechanisms
 
Definitions of management information systems
Definitions of management information systemsDefinitions of management information systems
Definitions of management information systems
 
Data mining knowing the unknown
Data mining knowing the unknownData mining knowing the unknown
Data mining knowing the unknown
 
Knowledge creation and knowledge architecture
Knowledge creation and knowledge architectureKnowledge creation and knowledge architecture
Knowledge creation and knowledge architecture
 
Types of information systems
Types of information systemsTypes of information systems
Types of information systems
 

Dernier

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Securing information systems

  • 1. 7 Chapter Securing Information Systems
  • 2.
  • 3.
  • 4.
  • 5. Online Games Need Security, Too Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 6.
  • 7.
  • 8. Contemporary Security Challenges and Vulnerabilities Figure 7-1 The architecture of a Web-based application typically includes a Web client, a server, and corporate information systems linked to databases. Each of these components presents security challenges and vulnerabilities. Floods, fires, power failures, and other electrical problems can cause disruptions at any point in the network. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 9.
  • 10.
  • 11. Wi-Fi Security Challenges Figure 7-2 Many Wi-Fi networks can be penetrated easily by intruders using sniffer programs to obtain an address to access the resources of a network without authorization. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 12.
  • 13.
  • 14. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems Malware is active throughout the globe. These three charts show the regional distribution of worms and computer viruses worldwide reported by Trend Micro over periods of 24 hours, 7 days, and 30 days. The virus count represents the number of infected files and the percentage shows the relative prevalence in each region compared to worldwide statistics for each measuring period.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. Security Profiles for a Personnel System Figure 7-3 These two examples represent two security profiles or data security patterns that might be found in a personnel system. Depending on the security profile, a user would have certain restrictions on access to various systems, locations, or data in an organization. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 34.
  • 35.
  • 36. Sample Auditor’s List of Control Weaknesses Figure 7-4 This chart is a sample page from a list of control weaknesses that an auditor might find in a loan system in a local commercial bank. This form helps auditors record and evaluate control weaknesses and shows the results of discussing those weaknesses with management, as well as any corrective actions taken by management. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 37.
  • 38. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems This NEC PC has a biometric fingerprint reader for fast yet secure access to files and networks. New models of PCs are starting to use biometric identification to authenticate users.
  • 39.
  • 40. A Corporate Firewall Figure 7-5 The firewall is placed between the firm’s private network and the public Internet or another distrusted network to protect against unauthorized traffic. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 41.
  • 42.
  • 43.
  • 44.
  • 45. Public Key Encryption Figure 7-6 A public key encryption system can be viewed as a series of public and private keys that lock data when they are transmitted and unlock the data when they are received. The sender locates the recipient’s public key in a directory and uses it to encrypt a message. The message is sent in encrypted form over the Internet or a private network. When the encrypted message arrives, the recipient uses his or her private key to decrypt the data and read the message. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 46.
  • 47. Digital Certificates Figure 7-7 Digital certificates help establish the identity of people or electronic assets. They protect online transactions by providing secure, encrypted, online communication. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 48.
  • 49.
  • 50.
  • 51.