SlideShare ist ein Scribd-Unternehmen logo
1 von 51
7 Chapter   Securing Information Systems
STUDENT LEARNING OBJECTIVES Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Online Games Need Security, Too Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],Online Games Need Security, Too Essentials of Business Information Systems Chapter 7 Securing Information Systems
Online Games Need Security, Too Essentials of Business Information Systems Chapter 7 Securing Information Systems
System Vulnerability and Abuse ,[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Why Systems Are Vulnerable ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Contemporary Security Challenges and Vulnerabilities Figure 7-1 The architecture of a Web-based application typically includes a Web client, a server, and corporate information systems linked to databases. Each of these components presents security challenges and vulnerabilities. Floods, fires, power failures, and other electrical problems can cause disruptions at any point in the network. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Wi-Fi Security Challenges Figure 7-2 Many Wi-Fi networks can be penetrated easily by intruders using sniffer programs to obtain an address to access the resources of a network without authorization. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Malicious Software: Viruses, Worms, Trojan Horses, and Spyware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Malicious Software: Viruses, Worms, Trojan Horses, and Spyware ,[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems Malware is active throughout the globe. These three charts show the regional distribution of worms and computer viruses worldwide reported by Trend Micro over periods of 24 hours, 7 days, and 30 days. The virus count represents the number of infected files and the percentage shows the relative prevalence in each region compared to worldwide statistics for each measuring period.
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hackers and Computer Crime System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Interactive Session: Technology Bot Armies Launch a Digital Data Siege System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Internal Threats: Employees ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Software Vulnerability System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Business Value of Security and Control Essentials of Business Information Systems Chapter 7 Securing Information Systems
Legal and Regulatory Requirements for Electronic Records Management Business Value of Security and Control Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object]
Electronic Evidence and Computer Forensics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Business Value of Security and Control Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems EXPOSURE PROBABILITY LOSS RANGE EXPECTED ANNUAL LOSS Power failure 30% $5K - $200K $30,750 Embezzlement 5% $1K - $50K $1,275 User error 98% $200 - $40K $19,698
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control ,[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Security Profiles for a Personnel System Figure 7-3 These two examples represent two security profiles or data security patterns that might be found in a personnel system. Depending on the security profile, a user would have certain restrictions on access to various systems, locations, or data in an organization. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Establishing a Framework for Security and Control Essentials of Business Information Systems Chapter 7 Securing Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],Disaster Recovery Planning and Business Continuity Planning
Establishing a Framework for Security and Control Essentials of Business Information Systems Chapter 7 Securing Information Systems The Role of Auditing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Auditor’s List of Control Weaknesses Figure 7-4 This chart is a sample page from a list of control weaknesses that an auditor might find in a loan system in a local commercial bank. This form helps auditors record and evaluate control weaknesses and shows the results of discussing those weaknesses with management, as well as any corrective actions taken by management. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
Access Control Technologies and Tools for Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Essentials of Business Information Systems Chapter 7 Securing Information Systems
Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems This NEC PC has a biometric fingerprint reader for fast yet secure access to files and networks. New models of PCs are starting to use biometric identification to authenticate users.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Firewalls, Intrusion Detection Systems, and Antivirus Software Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
A Corporate Firewall Figure 7-5 The firewall is placed between the firm’s private network and the public Internet or another distrusted network to protect against unauthorized traffic. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Firewalls, Intrusion Detection Systems, and Antivirus Software Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Securing Wireless Networks Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],Encryption and Public Key Infrastructure Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Encryption and Public Key Infrastructure Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
Public Key Encryption Figure 7-6 A public key encryption system can be viewed as a series of public and private keys that lock data when they are transmitted and unlock the data when they are received. The sender locates the recipient’s public key in a directory and uses it to encrypt a message. The message is sent in encrypted form over the Internet or a private network. When the encrypted message arrives, the recipient uses his or her private key to decrypt the data and read the message. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Encryption and Public Key Infrastructure Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
Digital Certificates Figure 7-7 Digital certificates help establish the identity of people or electronic assets. They protect online transactions by providing secure, encrypted, online communication. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ensuring System Availability Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ensuring System Availability Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ensuring Software Quality Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
Interactive Session: Organizations Can Salesforce.com On-Demand Remain in Demand? ,[object Object],[object Object],[object Object],[object Object],[object Object],Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems

Weitere ähnliche Inhalte

Was ist angesagt?

MIS-CH15: Managing Global Systems
MIS-CH15: Managing Global SystemsMIS-CH15: Managing Global Systems
MIS-CH15: Managing Global SystemsSukanya Ben
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditingDamilola Mosaku
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
MIS-CH11: Managing Knowledge
MIS-CH11: Managing KnowledgeMIS-CH11: Managing Knowledge
MIS-CH11: Managing KnowledgeSukanya Ben
 
MIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationMIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationSukanya Ben
 
It infrastructure hardware and software
It infrastructure hardware and softwareIt infrastructure hardware and software
It infrastructure hardware and softwareProf. Othman Alsalloum
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practicesamiable_indian
 
1. security management practices
1. security management practices1. security management practices
1. security management practices7wounders
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Information risk management
Information risk managementInformation risk management
Information risk managementAkash Saraswat
 
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesMIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesSukanya Ben
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk ManagementSam Bowne
 
MIS-CH9: Achieving Operational Excellence and Customer Intimacy
MIS-CH9: Achieving Operational Excellence and Customer IntimacyMIS-CH9: Achieving Operational Excellence and Customer Intimacy
MIS-CH9: Achieving Operational Excellence and Customer IntimacySukanya Ben
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacyhaider ali
 
Chapter 10 ecommerce digital markets digital goods
Chapter 10 ecommerce digital markets digital goodsChapter 10 ecommerce digital markets digital goods
Chapter 10 ecommerce digital markets digital goodsVan Chau
 

Was ist angesagt? (20)

MIS-CH15: Managing Global Systems
MIS-CH15: Managing Global SystemsMIS-CH15: Managing Global Systems
MIS-CH15: Managing Global Systems
 
Laudon Ch13
Laudon Ch13Laudon Ch13
Laudon Ch13
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditing
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
MIS-CH11: Managing Knowledge
MIS-CH11: Managing KnowledgeMIS-CH11: Managing Knowledge
MIS-CH11: Managing Knowledge
 
MIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationMIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and Collaboration
 
It infrastructure hardware and software
It infrastructure hardware and softwareIt infrastructure hardware and software
It infrastructure hardware and software
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 
MIS Chapter 2
MIS Chapter 2MIS Chapter 2
MIS Chapter 2
 
MIS Chapter 1
MIS Chapter 1MIS Chapter 1
MIS Chapter 1
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Information risk management
Information risk managementInformation risk management
Information risk management
 
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesMIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging Technologies
 
CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
MIS-CH9: Achieving Operational Excellence and Customer Intimacy
MIS-CH9: Achieving Operational Excellence and Customer IntimacyMIS-CH9: Achieving Operational Excellence and Customer Intimacy
MIS-CH9: Achieving Operational Excellence and Customer Intimacy
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
 
Chapter 10 ecommerce digital markets digital goods
Chapter 10 ecommerce digital markets digital goodsChapter 10 ecommerce digital markets digital goods
Chapter 10 ecommerce digital markets digital goods
 

Andere mochten auch

E-commerce: Digital Markets, Digital Goods
E-commerce: Digital Markets, Digital GoodsE-commerce: Digital Markets, Digital Goods
E-commerce: Digital Markets, Digital Goodslinda_perangin
 
E-commerce, digital markets, and digital goods
E-commerce, digital markets, and digital goodsE-commerce, digital markets, and digital goods
E-commerce, digital markets, and digital goodsJose G. Lepervanche, PhD
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systemsOmid Aminzadeh Gohari
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and ControlAlbrecht Jones
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information SystemSatya P. Joshi
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyProf. Othman Alsalloum
 
Introduction to Data Management
Introduction to Data ManagementIntroduction to Data Management
Introduction to Data ManagementAmanda Whitmire
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security controlCheng Olayvar
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in misGurjit
 

Andere mochten auch (16)

E-commerce: Digital Markets, Digital Goods
E-commerce: Digital Markets, Digital GoodsE-commerce: Digital Markets, Digital Goods
E-commerce: Digital Markets, Digital Goods
 
E-commerce, digital markets, and digital goods
E-commerce, digital markets, and digital goodsE-commerce, digital markets, and digital goods
E-commerce, digital markets, and digital goods
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and Control
 
Case study 7
Case study 7Case study 7
Case study 7
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
 
Laudon mis14 ch02
Laudon mis14 ch02Laudon mis14 ch02
Laudon mis14 ch02
 
Introduction to Data Management
Introduction to Data ManagementIntroduction to Data Management
Introduction to Data Management
 
Data Management for Dummies
Data Management for DummiesData Management for Dummies
Data Management for Dummies
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security control
 
3c 2 Information Systems Audit
3c   2   Information Systems Audit3c   2   Information Systems Audit
3c 2 Information Systems Audit
 
Review questions
Review questionsReview questions
Review questions
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
E Business Systems
E Business SystemsE Business Systems
E Business Systems
 

Ähnlich wie Securing information systems

Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdfBelayet Hossain
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docxalinainglis
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxjoellemurphey
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxarnoldmeredith47041
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and securitySomesh Kumar
 

Ähnlich wie Securing information systems (20)

Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
386sum08ch8
386sum08ch8386sum08ch8
386sum08ch8
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and security
 

Mehr von Prof. Othman Alsalloum

Information systemsfromfunctionsprospective
Information systemsfromfunctionsprospectiveInformation systemsfromfunctionsprospective
Information systemsfromfunctionsprospectiveProf. Othman Alsalloum
 
Information systems, organizations, management, and strategy
Information systems, organizations, management, and strategyInformation systems, organizations, management, and strategy
Information systems, organizations, management, and strategyProf. Othman Alsalloum
 
Informational needs of organizations in an information society
Informational needs of organizations in an information societyInformational needs of organizations in an information society
Informational needs of organizations in an information societyProf. Othman Alsalloum
 
E strategy, internet communities, and global ec
E strategy, internet communities, and global ecE strategy, internet communities, and global ec
E strategy, internet communities, and global ecProf. Othman Alsalloum
 
Definitions of management information systems
Definitions of management information systemsDefinitions of management information systems
Definitions of management information systemsProf. Othman Alsalloum
 
Knowledge creation and knowledge architecture
Knowledge creation and knowledge architectureKnowledge creation and knowledge architecture
Knowledge creation and knowledge architectureProf. Othman Alsalloum
 

Mehr von Prof. Othman Alsalloum (20)

Information systemsfromfunctionsprospective
Information systemsfromfunctionsprospectiveInformation systemsfromfunctionsprospective
Information systemsfromfunctionsprospective
 
Types of information systems
Types of information systemsTypes of information systems
Types of information systems
 
Information systems organization
Information systems organizationInformation systems organization
Information systems organization
 
E business digitalgoods
E business digitalgoodsE business digitalgoods
E business digitalgoods
 
Digital firms admin
Digital firms adminDigital firms admin
Digital firms admin
 
Managing the digital firm
Managing the digital firmManaging the digital firm
Managing the digital firm
 
Information what is it
Information what is itInformation what is it
Information what is it
 
Information systems
Information systemsInformation systems
Information systems
 
Information systems, organizations, management, and strategy
Information systems, organizations, management, and strategyInformation systems, organizations, management, and strategy
Information systems, organizations, management, and strategy
 
Information systems in the enterprise
Information systems in the enterpriseInformation systems in the enterprise
Information systems in the enterprise
 
Understanding knowledge
Understanding knowledgeUnderstanding knowledge
Understanding knowledge
 
Strategic use of information systems
Strategic use of information systemsStrategic use of information systems
Strategic use of information systems
 
Overview of electronic commerce
Overview of  electronic commerceOverview of  electronic commerce
Overview of electronic commerce
 
Informational needs of organizations in an information society
Informational needs of organizations in an information societyInformational needs of organizations in an information society
Informational needs of organizations in an information society
 
E strategy, internet communities, and global ec
E strategy, internet communities, and global ecE strategy, internet communities, and global ec
E strategy, internet communities, and global ec
 
E commerce market mechanisms
E commerce market mechanismsE commerce market mechanisms
E commerce market mechanisms
 
Definitions of management information systems
Definitions of management information systemsDefinitions of management information systems
Definitions of management information systems
 
Data mining knowing the unknown
Data mining knowing the unknownData mining knowing the unknown
Data mining knowing the unknown
 
Knowledge creation and knowledge architecture
Knowledge creation and knowledge architectureKnowledge creation and knowledge architecture
Knowledge creation and knowledge architecture
 
Types of information systems
Types of information systemsTypes of information systems
Types of information systems
 

Kürzlich hochgeladen

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Kürzlich hochgeladen (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Securing information systems

  • 1. 7 Chapter Securing Information Systems
  • 2.
  • 3.
  • 4.
  • 5. Online Games Need Security, Too Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 6.
  • 7.
  • 8. Contemporary Security Challenges and Vulnerabilities Figure 7-1 The architecture of a Web-based application typically includes a Web client, a server, and corporate information systems linked to databases. Each of these components presents security challenges and vulnerabilities. Floods, fires, power failures, and other electrical problems can cause disruptions at any point in the network. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 9.
  • 10.
  • 11. Wi-Fi Security Challenges Figure 7-2 Many Wi-Fi networks can be penetrated easily by intruders using sniffer programs to obtain an address to access the resources of a network without authorization. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 12.
  • 13.
  • 14. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems Malware is active throughout the globe. These three charts show the regional distribution of worms and computer viruses worldwide reported by Trend Micro over periods of 24 hours, 7 days, and 30 days. The virus count represents the number of infected files and the percentage shows the relative prevalence in each region compared to worldwide statistics for each measuring period.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. Security Profiles for a Personnel System Figure 7-3 These two examples represent two security profiles or data security patterns that might be found in a personnel system. Depending on the security profile, a user would have certain restrictions on access to various systems, locations, or data in an organization. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 34.
  • 35.
  • 36. Sample Auditor’s List of Control Weaknesses Figure 7-4 This chart is a sample page from a list of control weaknesses that an auditor might find in a loan system in a local commercial bank. This form helps auditors record and evaluate control weaknesses and shows the results of discussing those weaknesses with management, as well as any corrective actions taken by management. System Vulnerability and Abuse Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 37.
  • 38. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems This NEC PC has a biometric fingerprint reader for fast yet secure access to files and networks. New models of PCs are starting to use biometric identification to authenticate users.
  • 39.
  • 40. A Corporate Firewall Figure 7-5 The firewall is placed between the firm’s private network and the public Internet or another distrusted network to protect against unauthorized traffic. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 41.
  • 42.
  • 43.
  • 44.
  • 45. Public Key Encryption Figure 7-6 A public key encryption system can be viewed as a series of public and private keys that lock data when they are transmitted and unlock the data when they are received. The sender locates the recipient’s public key in a directory and uses it to encrypt a message. The message is sent in encrypted form over the Internet or a private network. When the encrypted message arrives, the recipient uses his or her private key to decrypt the data and read the message. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 46.
  • 47. Digital Certificates Figure 7-7 Digital certificates help establish the identity of people or electronic assets. They protect online transactions by providing secure, encrypted, online communication. Technologies and Tools for Security Essentials of Business Information Systems Chapter 7 Securing Information Systems
  • 48.
  • 49.
  • 50.
  • 51.