SlideShare ist ein Scribd-Unternehmen logo
1 von 31
16. INFORMATION SYSTEMS SECURITY & CONTROL
LEARNING OBJECTIVES ,[object Object],[object Object],[object Object],[object Object]
CONTENTS ,[object Object],[object Object],[object Object]
SYSTEM VULNERABILITY & ABUSE ,[object Object],[object Object],[object Object],[object Object],[object Object]
THREATS TO INFORMATION    SYSTEMS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WHY SYSTEMS ARE VULNERABLE ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],VULNERABILITIES
VULNERABILITIES ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],HACKERS & COMPUTER VIRUSES
COMMON COMPUTER VIRUSES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ANTIVIRUS SOFTWARE ,[object Object],[object Object],[object Object]
CONCERNS FOR  BUILDERS & USERS ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],DISASTER
SECURITY ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],WHERE ERRORS OCCUR DURING PROCESSING
WHERE ERRORS OCCUR DURING PROCESSING ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SYSTEM QUALITY PROBLEMS ,[object Object],[object Object],[object Object],[object Object]
COST OF ERRORS DURING SYSTEMS DEVELOPMENT CYCLE COSTS ANALYSIS  PROGRAMMING  POSTIMPLEMENTATION  & DESIGN  CONVERSION
CREATING A CONTROL ENVIRONMENT ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],GENERAL CONTROLS
[object Object],[object Object],[object Object],[object Object],[object Object],GENERAL CONTROLS
APPLICATION CONTROLS ,[object Object],[object Object],[object Object],[object Object]
INPUT CONTROLS ,[object Object],[object Object],[object Object],[object Object]
EDIT CHECKS ,[object Object],[object Object],[object Object],[object Object],[object Object]
PROCESSING CONTROLS ,[object Object],[object Object],[object Object],[object Object]
OUTPUT  CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AND THE INTERNET ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AND THE INTERNET ,[object Object],[object Object],[object Object]
DEVELOPING A CONTROL  STRUCTURE ,[object Object],[object Object],[object Object],[object Object]
MIS AUDIT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
16. INFORMATION SYSTEMS SECURITY & CONTROL

Weitere ähnliche Inhalte

Was ist angesagt?

Role of Information Security Manager
Role of Information Security ManagerRole of Information Security Manager
Role of Information Security Manager
Centextech
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 
Security
SecuritySecurity
Security
nil65
 
legalworkspace-infographic 0116
legalworkspace-infographic 0116legalworkspace-infographic 0116
legalworkspace-infographic 0116
Melissa Ek
 
Winston Grant Resume
Winston Grant ResumeWinston Grant Resume
Winston Grant Resume
Winston Grant
 
Sophos products - Health CheckPlus
Sophos products - Health CheckPlusSophos products - Health CheckPlus
Sophos products - Health CheckPlus
Lee Dalton
 

Was ist angesagt? (20)

Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Andrey Bogdanov, Dmitry Khovratovich, and Christian RechbergerAndrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
 
Role of Information Security Manager
Role of Information Security ManagerRole of Information Security Manager
Role of Information Security Manager
 
Security and Control Issues in information Systems
Security and Control Issues in information SystemsSecurity and Control Issues in information Systems
Security and Control Issues in information Systems
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Network Security
Network SecurityNetwork Security
Network Security
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Safety and security in distributed systems
Safety and security in distributed systemsSafety and security in distributed systems
Safety and security in distributed systems
 
Software Security
Software SecuritySoftware Security
Software Security
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Network
NetworkNetwork
Network
 
Security
SecuritySecurity
Security
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
legalworkspace-infographic 0116
legalworkspace-infographic 0116legalworkspace-infographic 0116
legalworkspace-infographic 0116
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
 
Winston Grant Resume
Winston Grant ResumeWinston Grant Resume
Winston Grant Resume
 
Sophos products - Health CheckPlus
Sophos products - Health CheckPlusSophos products - Health CheckPlus
Sophos products - Health CheckPlus
 
Auditing information System
Auditing information SystemAuditing information System
Auditing information System
 

Ähnlich wie Information systems

IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
RAJESH S
 
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management ToolsFederal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
SolarWinds
 
The internet & the new information technology infrastructure
The internet & the new information technology infrastructureThe internet & the new information technology infrastructure
The internet & the new information technology infrastructure
Prof. Othman Alsalloum
 

Ähnlich wie Information systems (20)

Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Ch14
Ch14Ch14
Ch14
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
 
28. Fundamentals of Computer Security (Inglés) (Presentación) autor Philippin...
28. Fundamentals of Computer Security (Inglés) (Presentación) autor Philippin...28. Fundamentals of Computer Security (Inglés) (Presentación) autor Philippin...
28. Fundamentals of Computer Security (Inglés) (Presentación) autor Philippin...
 
Safend Solution Set
Safend Solution SetSafend Solution Set
Safend Solution Set
 
Safend Solution Set
Safend Solution SetSafend Solution Set
Safend Solution Set
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
SCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioSCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web Studio
 
Network security
Network securityNetwork security
Network security
 
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management ToolsFederal Webinar: Security Compliance with SolarWinds Network Management Tools
Federal Webinar: Security Compliance with SolarWinds Network Management Tools
 
System failure
System failureSystem failure
System failure
 
The internet & the new information technology infrastructure
The internet & the new information technology infrastructureThe internet & the new information technology infrastructure
The internet & the new information technology infrastructure
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
 
It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
 
AXENT-Everything-IDS
AXENT-Everything-IDSAXENT-Everything-IDS
AXENT-Everything-IDS
 
Increasing reliability and safety
Increasing reliability and safetyIncreasing reliability and safety
Increasing reliability and safety
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform Service
 

Mehr von Prof. Othman Alsalloum

Information systemsfromfunctionsprospective
Information systemsfromfunctionsprospectiveInformation systemsfromfunctionsprospective
Information systemsfromfunctionsprospective
Prof. Othman Alsalloum
 
Information systems, organizations, management, and strategy
Information systems, organizations, management, and strategyInformation systems, organizations, management, and strategy
Information systems, organizations, management, and strategy
Prof. Othman Alsalloum
 
Informational needs of organizations in an information society
Informational needs of organizations in an information societyInformational needs of organizations in an information society
Informational needs of organizations in an information society
Prof. Othman Alsalloum
 
E strategy, internet communities, and global ec
E strategy, internet communities, and global ecE strategy, internet communities, and global ec
E strategy, internet communities, and global ec
Prof. Othman Alsalloum
 
Definitions of management information systems
Definitions of management information systemsDefinitions of management information systems
Definitions of management information systems
Prof. Othman Alsalloum
 
Knowledge creation and knowledge architecture
Knowledge creation and knowledge architectureKnowledge creation and knowledge architecture
Knowledge creation and knowledge architecture
Prof. Othman Alsalloum
 

Mehr von Prof. Othman Alsalloum (20)

Information systemsfromfunctionsprospective
Information systemsfromfunctionsprospectiveInformation systemsfromfunctionsprospective
Information systemsfromfunctionsprospective
 
Types of information systems
Types of information systemsTypes of information systems
Types of information systems
 
Information systems organization
Information systems organizationInformation systems organization
Information systems organization
 
E business digitalgoods
E business digitalgoodsE business digitalgoods
E business digitalgoods
 
Digital firms admin
Digital firms adminDigital firms admin
Digital firms admin
 
Managing the digital firm
Managing the digital firmManaging the digital firm
Managing the digital firm
 
Information what is it
Information what is itInformation what is it
Information what is it
 
Information systems
Information systemsInformation systems
Information systems
 
Information systems, organizations, management, and strategy
Information systems, organizations, management, and strategyInformation systems, organizations, management, and strategy
Information systems, organizations, management, and strategy
 
Information systems in the enterprise
Information systems in the enterpriseInformation systems in the enterprise
Information systems in the enterprise
 
Understanding knowledge
Understanding knowledgeUnderstanding knowledge
Understanding knowledge
 
Strategic use of information systems
Strategic use of information systemsStrategic use of information systems
Strategic use of information systems
 
Overview of electronic commerce
Overview of  electronic commerceOverview of  electronic commerce
Overview of electronic commerce
 
Informational needs of organizations in an information society
Informational needs of organizations in an information societyInformational needs of organizations in an information society
Informational needs of organizations in an information society
 
E strategy, internet communities, and global ec
E strategy, internet communities, and global ecE strategy, internet communities, and global ec
E strategy, internet communities, and global ec
 
E commerce market mechanisms
E commerce market mechanismsE commerce market mechanisms
E commerce market mechanisms
 
Definitions of management information systems
Definitions of management information systemsDefinitions of management information systems
Definitions of management information systems
 
Data mining knowing the unknown
Data mining knowing the unknownData mining knowing the unknown
Data mining knowing the unknown
 
Knowledge creation and knowledge architecture
Knowledge creation and knowledge architectureKnowledge creation and knowledge architecture
Knowledge creation and knowledge architecture
 
Types of information systems
Types of information systemsTypes of information systems
Types of information systems
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Information systems

  • 1. 16. INFORMATION SYSTEMS SECURITY & CONTROL
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. COST OF ERRORS DURING SYSTEMS DEVELOPMENT CYCLE COSTS ANALYSIS PROGRAMMING POSTIMPLEMENTATION & DESIGN CONVERSION
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. 16. INFORMATION SYSTEMS SECURITY & CONTROL