SlideShare ist ein Scribd-Unternehmen logo
1 von 43
Amity School of Business




    Module- VI
System Security &
    Auditing


                                        1
Topics         Amity School of Business

• System Security: Data Security
  • Backup
  • Recovery during System
  • Database failure
• Ethical Issues in System Development
• Threat and Risk Analysis
• Audit
  • System Audit
  •     System Audit Standards (Planning,
  Implantation and Reporting Standards)
•       System Analysis and Programming
(Overview, Role & Duties of System Experts as
Analyst and Programmer).                                  2
Amity School of Business

           System Security
• The Protection of data or hardware against
  accidental or intentional damage from a
  defined threat.
• The system security problem can be divided
  into four related issues :
  –   Security
  –   Integrity
  –   Privacy
  –   confidentiality

                                                          3
Amity School of Business
• System Security refers to the technical innovation
  and procedures applied to the hardware and operating
  systems to protect against deliberate or accidental
  damage from a defined threat.
• System Integrity refers to the proper functioning of
  hardware and programs without any improper
  modification, appropriate physical security, and safety
  against external threats.
• Privacy defines the rights of the users or
  organizations to determine what information they are
  willing to share with or accept from others and how
  the organization can be protected against unwelcome,
  unfair excessive dissemination of information about it.
• Confidentially is a special status given to sensitive
  information in a database to minimize the possible               4
  invasion of privacy.
Basic Components of Security       Amity School of Business




• Confidentiality
  – Keeping data and resources hidden from
    unauthorized disclosure.
• Integrity(Data integrity and origin integrity )
  – It refers to the requirement that information be
    protected from improper modification.
• Availability
  – Enabling access to data and resources to
    users who have legitimate right.
                                                               5
Goals of Security         Amity School of Business




• Prevention
  – Prevent attackers from violating security
    policy
• Detection
  – Detect attackers’ violation of security policy
• Recovery
  – Stop attack, assess and repair damage
  – Continue to function correctly even if attack
    succeeds

                                                                6
Threat & Risk Analysis
                           Amity School of Business




• Natural Threat
• Physical threat
• Malicious attack
  (virus, worm , trojan)
• Attack by hackers




                                                      7
Data Security, Backup &
                                               Amity School of Business

•
                 Recovery data from loss,
    Data Security :- Protection of
  disclosure, modification, or destruction.
• Backup & Recovery :- Restoring a damage database
  is generally done by rollforward or rollback
  procedure.
    – The rollforward approach involves updating a prior valid copy
      of the data base with the necessary changes to produce a
      current version of database.
    – The rollback approach starts current invalid state and
      removes the record of activity to produce the prior valid
      state of the database. Either approach depends largely on
      the software to bring the backup copy up to date and
      determine the cause of failure.
• Backup can be extremely important in a recovery
  procedure. If database is physically damage, one
  could not rollback because of the damage database –
  only roll forward.                                                      8
Amity School of Business

        Database Failure
• In a database environment, there are three types of
  failures : Catastrophic, logical, and structural
• Catastrophic failure is one where part of a database
  is unreadable. It is restoring using rollforward
  method of recovery.
• A logical failure occurs when activity to the database
  is interrupted with no chance of completing the
  currently executing transaction.
• Structural damage is that when a pointer incorrectly
  stored in a record that points to unrelated or
  nonexistent data.                                               9
Ethical Issues In System                  Amity School of Business

         Development
• Ethical behavior of the analysts and computer
  professionals has led to the development of standards and
  codes of behavior by a number of professional
  associations. Three association are worth mentioning :
   – Association for Computing Machinery (ACM)
   – Data Processing Management Association (DPMA)
   – Institute for Certificate of Computer Professional (ICCP)
• Ethics can be described as Fairness, Justice, Equity,
  Honesty, Trustworthiness, and equality.
• Stealing, cheating, lying or backing out of one’s words all
  describe lack of Ethics.
• Code of Ethics: is a declaration of the principles and
  beliefs that govern how employees of an organization are
  expected to behave.                                                10
Amity School of Business

          What is Audit ?
• Evaluation of a person, organization, system,
  process, project or product.
• An audit provides a baseline of the existing
  system from which new investment can be
  accurately planned, avoiding excessive or
  inappropriate expenditure.
• The goal of an audit is to express an opinion on
  the person/organization/system in question,
  under evaluation based on work done.
                                                          11
Amity School of Business




• Audit is performed by an AUDITOR

• There are two types of auditors –
  – Internal Auditor
  – External Auditor




                                                    12
Amity School of Business


•   Internal Auditors – Employees of the company hired
    to assess and evaluate its system of internal control.
    To maintain independence, they present their
    reports directly to the top level management.
•   External Auditors – Independent staff assigned by
    an auditing firm to assess and evaluate financial
    statements of their clients or to perform other
    agreed upon evaluations. They are called on from
    outside the company.



                                                               13
Amity School of Business


             System Audit
• It is also called Process Audit: can be conducted for
  any activity. Usually made against a specific document
  such as operating procedure, work instruction,
  training manual, etc.
• A series of activities in which a system auditor, an
  impartial position independent of the object of audit,
  performs overall inspection and evaluation of an
  information      system,     issues    advice     and
  recommendations, and provides any necessary follow-
  up.

                                                              14
Amity School of Business

• System audits will help spot any errors in
configuration which can leave vulnerabilities in
the most secure products.
•   Audits can help overcome 'rule-creep' as
small system changes over time cumulatively
produce a significant shift in overall system
security.
• A policy audit will check that the security
policies which management has communicated
are being adhered to.

                                                        15
Amity School of Business


        System Auditor
A person who engages in system audits with the
  following knowledge and abilities:
• Basic knowledge of information systems
• Knowledge of system audits
• Ability to perform system audits
• Related knowledge for the performance of
  system audits


                                                        16
Amity School of Business


    System Audit Standard
• Purpose
• Definitions of Terms
• Composition of the Standards
• Philosophy behind the Implementation
  Standards
• General Standards
• Implementation Standards

                                                   17
Amity School of Business



  System Audit Standard
• Purpose - The purpose of the Standards is to
  improve the reliability, security, and
  efficiency of information systems and thus
  contribute to the realization of a healthy
  information society by enumerating the
  matters necessary for system audits.


                                                       18
Amity School of Business

•       Definitions of Terms
These are the principal terms used in the Standards
  – System Audit : A series of activities in which a
           system auditor, an impartial position independent of the
           object of audit, performs overall inspection and
           evaluation of an information system, issues advice and
           recommendations, and provides any necessary follow-up.
    –      System Auditor : A person who engages in system
           audits with the following knowledge and abilities:
        a. Basic knowledge of information systems.
        b. Knowledge of system audits.
        c. Ability to perform system audits.
        d. Related knowledge for the performance of system
        audits.                                                        19
Amity School of Business


–   Improvement of reliability: To improve the
    quality of information systems, prevent failure,
    minimize the effects of failure, and speed up
    recovery.
–   Improvement of security: To make an
    information system more secure from natural
    disasters, unauthorized access, and destructive
    actions.
–    Improvement of efficiency: To improve the cost
    performance of an information system by making
    the most of its resources.
–   Basic plan: A general plan of system audits to be
    performed during any given year.
                                                           20
Amity School of Business

•   Individual plan: A plan for any of the individual system
    audit operations based on a basic plan.
•   Risk analysis: To identify the risks that may arise from
    or in connection with the use of an information system
    and analyze the degrees of their effects.
•   Audited division: A division that is an object of a system
    audit
•   Matter noted: A problem pointed out by a system
    auditor according to his or her criteria and noted on a
    system audit report.
•   Recommendation of improvement: A matter noted that
    is judged by a system auditor as requiring improvement
    and noted as such on a system audit report
•   Follow-up: The measure or measures taken by a system
    auditor to ensure the audited division carries out any
    recommendations of improvement                                21
Amity School of Business


    Composition of the
       Standards
The Standards are composed of -
• General Standards
• Implementation Standards
• Reporting Standards



                                                22
Amity School of Business

     General Standards
   General Standards outline the principles of an audit
   plan that provides a basis for a system audit, the
   qualifications of a system auditor, and so forth.
2. System
   The organization shall prepare a system for proper
   implementation of system audit
4. Audit Plan
   Preparation of a basic plan and individual plan for
   system audit.

                                                             23
Amity School of Business

1. Responsibility and Authority of a system auditor
   • The system auditor shall make the grounds for
       each of his or her judgments clear.
   • The system auditor may demand data and
       materials from the audited division.
   • The system auditor may demand a report on the
       implementation of improvement be issued by the
       head of an organization to an audited division.
2. Professional Ethics
    The system auditor shall firmly maintain his or her
    position as an impartial evaluator.
    The system auditor shall be aware of the ethical
    demands on himself or herself and meet the internal
    and external trust by performing an accurate and
    sincere system audit.
                                                             24
Amity School of Business

1. Confidentiality
   The system auditor must not divulge any secret he or
   she may come to know in the course of performing his
   or her job or use such secret for any undue purpose.




                                                             25
Amity School of Business


         Implementation
1.   Planning Standards
        Information Strategy
        Formulation of a General Plan
        Formulation of a Development Plan
        System Analysis and Definitions of Requirements
•    Development
        Development Procedures
        System Design
        Program Design
        Programming
        System Tests
        Conversion
                                                              26
Amity School of Business


1. Operation
     Operation Control
     Input Management
     Data Management
     Output Management
     Software Management
     Hardware Management
     Network Management
     Configuration Management
     Management of Buildings and Related Facilities




                                                            27
Amity School of Business


1. Maintenance
     Maintenance Procedures
     Maintenance Plan
     Implementation of Maintenance
     Confirmation of Maintenance
     System Conversion
     Disposal of Old Systems




                                                         28
Amity School of Business

1. Common Work
   Document Management
       Preparation
       Management
   Progress Management
       Implementation
       Evaluation
   Personnel Management
       Responsibility and Authority
       Implementation of Work
       Education and Training
       Health Management


                                                          29
Amity School of Business



 Outsourcing
     Outsourcing plan
     Selection of service providers
     Service agreements
     Contents of services
 Measures against Disasters
     Risk Analysis
     Anti-Disaster Plan
     Backup
     Alternative Processing and Recovery



                                                        30
Amity School of Business


 Reporting Standards
• Preparation of Reports
   • The system auditor must prepare a system audit report.
   • The system audit report must state the results of evaluation
     of the reliability, security, and efficiency of an information
     system.
   • The system audit report must state, as matters noted, the
     problems based on the results of the audit.
   • The system audit report must state, as recommendations of
     improvement, the important matters that need to be
     improved.
   • The system audit report must state improvements that can
     be proposed for the matters that need to be improved.
   • The system auditor must state on his or her system audit
     report any other matters he or she considers necessary.
                                                                     31
Amity School of Business


1.   Reporting -    The system audit report must be
     submitted to the head of the organization.
2.   Follow-up - The system auditor must try to grasp
     the progress of improvement made based on
     recommendations of improvement and promote that
     improvement.




                                                            32
Amity School of Business


        System Analyst
The   System   Analyst   designs   and    implements
systems to suit the organization’s needs. He plays a
major role in seeking business benefits from
computer technology. His job is not just confined to
data processing, but also deals heavily with people,
procedures and technology.



                                                           33
Amity School of Business



Skills of System Analyst
Interpersonal       Skills      –     Communication,
Understanding,     Foresightedness      and     Vision,
Adaptability, Flexibility, Teaching, Selling, Patience
and Rationality, Sound Temperament, Managerial
Skills,   Leadership       Skills,   Training      and
Documentation Capability.
Technical Skills – Creativity, Problem Solving,
Project    Management,    Dynamic     Interface,
Questioning   Attitude  and    Inquiring   mind,
Knowledge.                                       34
Amity School of Business


     7 Roles of a System
          Analyst
 Change Agent
 Investigator and Monitor
 Architect
 Psychologist
 Salesperson
 Motivator
 Politician

                                                    35
Amity School of Business


           Change Agent
The system analyst may select various styles to
  introduce change to the user organization –
• Persuader (mildest form of intervention)
• Catalyst (helper)
• Confronter (severe)
• Imposer (the most severe form of intervention)




                                                             36
Amity School of Business


 Investigator and Monitor
• To investigate why the present system does not work
  well and what changes will correct the problem.
• To undertake and successfully complete a project,
  the analyst must monitor programs in relation to time,
  cost, and quality. Time is the most important
  resource. If time is wasted, the project suffers from
  increased costs and wasted human resources.



                                                              37
Amity School of Business


                  Architect
• The architect’s primary function as liaison between the
  client’s abstract design requirements and the
  contractor's detailed building plan may be compared to
  the analyst's role as liaison between the user's logical
  design requirements and the detailed physical system
  design. As architect, the analyst also creates a detailed
  physical design of candidate systems. He aids users in
  formalizing abstract ideas and provides details to build
  the end product- the candidate system.


                                                                38
Amity School of Business


             Psychologist
• The analyst plays the role of a psychologist in the way
  he reaches people, interprets their thoughts,
  assesses their behavior, and draws conclusions from
  these interactions. In other words, understanding
  inter-functional relationships is important.




                                                               39
Amity School of Business



             Salesperson
• Selling change can be as crucial as initiating change.
  Selling the system actually takes place at each step in
  the system life cycle. However, Sales skills and
  persuasiveness are crucial to the success of the
  system.




                                                               40
Amity School of Business



               Motivator
• A candidate system must be well designed and
  acceptable to the user. System acceptance is achieved
  through user participation in its development,
  effective user training, and proper motivation to use
  the system. The analyst's role as a motivator is
  obvious during the first few weeks after
  implementation and during time when turnover results
  in new people being trained to work with the candidate
  system.


                                                              41
Amity School of Business



                Politician
• Related to the role of motivator is that of politician.
  In implementing a candidate system, the analyst tries
  to appease all parties involved. Diplomacy and finesse
  in dealing with people can improve acceptance of the
  system. As much as a politician must have the support
  of his/her constituency, so is the analyst's goal to
  have the support of the users' staff. He represents
  their thinking and tries to achieve their goals through
  computerization.

                                                               42
Amity School of Business




 Thank You
      &
All the best !



                                   43

Weitere ähnliche Inhalte

Was ist angesagt?

MIS managing digital firms companies
MIS managing digital firms companies MIS managing digital firms companies
MIS managing digital firms companies gufranresearcher
 
Information Systems in Global Business Today
Information Systems in Global Business TodayInformation Systems in Global Business Today
Information Systems in Global Business Todaytvto1381
 
Chap01
Chap01Chap01
Chap01rpvgb
 
Information systems in global business today in Management information system...
Information systems in global business today in Management information system...Information systems in global business today in Management information system...
Information systems in global business today in Management information system...Tonmoy zahid Rishad
 
Chapter 01 Information systems in global business today
Chapter 01 Information systems in global business todayChapter 01 Information systems in global business today
Chapter 01 Information systems in global business todayVan Chau
 
Developments in IT and business strategy a humble attempt
Developments in IT and business strategy   a humble attemptDevelopments in IT and business strategy   a humble attempt
Developments in IT and business strategy a humble attemptRajesh Kumar Iyer.A
 
Management Information Technology - Chapter 1
Management Information Technology - Chapter 1Management Information Technology - Chapter 1
Management Information Technology - Chapter 1Joel Briza
 
MIS (Belize Presentation)
MIS (Belize Presentation)MIS (Belize Presentation)
MIS (Belize Presentation)Hans Gillett
 
Information system in global business uwsb
Information system in global business   uwsbInformation system in global business   uwsb
Information system in global business uwsbArnab Roy Chowdhury
 
Laudon mis12 ppt01
Laudon mis12 ppt01Laudon mis12 ppt01
Laudon mis12 ppt01Norazila Mat
 
Week 1 and 2
Week 1 and 2Week 1 and 2
Week 1 and 2adrenal
 
Management Information System James O Brien Study Notes
Management Information System James O Brien Study NotesManagement Information System James O Brien Study Notes
Management Information System James O Brien Study Notessau275
 
Managers & global information technology
Managers & global information technologyManagers & global information technology
Managers & global information technologyOnline
 

Was ist angesagt? (18)

MIS managing digital firms companies
MIS managing digital firms companies MIS managing digital firms companies
MIS managing digital firms companies
 
Information Systems in Global Business Today
Information Systems in Global Business TodayInformation Systems in Global Business Today
Information Systems in Global Business Today
 
Chap01
Chap01Chap01
Chap01
 
Information system in global business
Information system in global business  Information system in global business
Information system in global business
 
Laudon12e ppt ch1
Laudon12e ppt ch1Laudon12e ppt ch1
Laudon12e ppt ch1
 
Information systems, organizations, and strategy
Information systems,  organizations, and strategyInformation systems,  organizations, and strategy
Information systems, organizations, and strategy
 
Information systems in global business today in Management information system...
Information systems in global business today in Management information system...Information systems in global business today in Management information system...
Information systems in global business today in Management information system...
 
Chapter 01 Information systems in global business today
Chapter 01 Information systems in global business todayChapter 01 Information systems in global business today
Chapter 01 Information systems in global business today
 
Developments in IT and business strategy a humble attempt
Developments in IT and business strategy   a humble attemptDevelopments in IT and business strategy   a humble attempt
Developments in IT and business strategy a humble attempt
 
MIS Chapter 3
MIS Chapter 3MIS Chapter 3
MIS Chapter 3
 
Management Information Technology - Chapter 1
Management Information Technology - Chapter 1Management Information Technology - Chapter 1
Management Information Technology - Chapter 1
 
MIS (Belize Presentation)
MIS (Belize Presentation)MIS (Belize Presentation)
MIS (Belize Presentation)
 
Information system in global business uwsb
Information system in global business   uwsbInformation system in global business   uwsb
Information system in global business uwsb
 
Laudon mis12 ppt01
Laudon mis12 ppt01Laudon mis12 ppt01
Laudon mis12 ppt01
 
Week 1 and 2
Week 1 and 2Week 1 and 2
Week 1 and 2
 
Management Information System James O Brien Study Notes
Management Information System James O Brien Study NotesManagement Information System James O Brien Study Notes
Management Information System James O Brien Study Notes
 
Chapter 9 MIS
Chapter 9 MISChapter 9 MIS
Chapter 9 MIS
 
Managers & global information technology
Managers & global information technologyManagers & global information technology
Managers & global information technology
 

Andere mochten auch

5. E-Commerce & Business Applications
5. E-Commerce & Business Applications5. E-Commerce & Business Applications
5. E-Commerce & Business ApplicationsJitendra Tomar
 
Module 6 e business strategy
Module 6 e business strategyModule 6 e business strategy
Module 6 e business strategyJitendra Tomar
 
4. E-Commerce & Payment System
4. E-Commerce & Payment System4. E-Commerce & Payment System
4. E-Commerce & Payment SystemJitendra Tomar
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-CommerceJitendra Tomar
 
DBMS - Normalization
DBMS - NormalizationDBMS - Normalization
DBMS - NormalizationJitendra Tomar
 
3. Web Presence: E-Strategies and Tactics
3. Web Presence: E-Strategies and Tactics3. Web Presence: E-Strategies and Tactics
3. Web Presence: E-Strategies and TacticsJitendra Tomar
 
Management Information System 5
Management Information System 5Management Information System 5
Management Information System 5Jitendra Tomar
 
Analysis & Design of Business Systems-2
Analysis & Design of Business Systems-2Analysis & Design of Business Systems-2
Analysis & Design of Business Systems-2Jitendra Tomar
 
2: Technology - The driving force behind E-Commerce:
2: Technology - The driving force behind E-Commerce:2: Technology - The driving force behind E-Commerce:
2: Technology - The driving force behind E-Commerce:Jitendra Tomar
 
Analysis & Design of Business Systems - 1
Analysis & Design of Business Systems - 1Analysis & Design of Business Systems - 1
Analysis & Design of Business Systems - 1Jitendra Tomar
 

Andere mochten auch (10)

5. E-Commerce & Business Applications
5. E-Commerce & Business Applications5. E-Commerce & Business Applications
5. E-Commerce & Business Applications
 
Module 6 e business strategy
Module 6 e business strategyModule 6 e business strategy
Module 6 e business strategy
 
4. E-Commerce & Payment System
4. E-Commerce & Payment System4. E-Commerce & Payment System
4. E-Commerce & Payment System
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
 
DBMS - Normalization
DBMS - NormalizationDBMS - Normalization
DBMS - Normalization
 
3. Web Presence: E-Strategies and Tactics
3. Web Presence: E-Strategies and Tactics3. Web Presence: E-Strategies and Tactics
3. Web Presence: E-Strategies and Tactics
 
Management Information System 5
Management Information System 5Management Information System 5
Management Information System 5
 
Analysis & Design of Business Systems-2
Analysis & Design of Business Systems-2Analysis & Design of Business Systems-2
Analysis & Design of Business Systems-2
 
2: Technology - The driving force behind E-Commerce:
2: Technology - The driving force behind E-Commerce:2: Technology - The driving force behind E-Commerce:
2: Technology - The driving force behind E-Commerce:
 
Analysis & Design of Business Systems - 1
Analysis & Design of Business Systems - 1Analysis & Design of Business Systems - 1
Analysis & Design of Business Systems - 1
 

Ähnlich wie Analysis & Design of Business System - 6

chapter2-190516054412.pdf
chapter2-190516054412.pdfchapter2-190516054412.pdf
chapter2-190516054412.pdfchetanvchaudhari
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit Sreekanth Narendran
 
Security Architecture
Security ArchitectureSecurity Architecture
Security ArchitecturePriyank Hada
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchMcKonly & Asbury, LLP
 
auditing-190520092523.pdf
auditing-190520092523.pdfauditing-190520092523.pdf
auditing-190520092523.pdfchetanvchaudhari
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Sreekanth Narendran
 
ch14.ppt
ch14.pptch14.ppt
ch14.pptFizZaShYkh
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Knoldus Inc.
 
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...Health IT Conference – iHT2
 
SiteFM Managing an Effective Safety Committee
SiteFM Managing an Effective Safety CommitteeSiteFM Managing an Effective Safety Committee
SiteFM Managing an Effective Safety CommitteeMichele Thompson
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringTieu Luu
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptxPrashant Singh
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Professional Designations IT Assurance
Professional Designations IT AssuranceProfessional Designations IT Assurance
Professional Designations IT Assurancea3virani
 
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]n|u - The Open Security Community
 

Ähnlich wie Analysis & Design of Business System - 6 (20)

chapter2-190516054412.pdf
chapter2-190516054412.pdfchapter2-190516054412.pdf
chapter2-190516054412.pdf
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit
 
IT Audit - Evolve and Stay in the Game
IT Audit - Evolve and Stay in the GameIT Audit - Evolve and Stay in the Game
IT Audit - Evolve and Stay in the Game
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
auditing-190520092523.pdf
auditing-190520092523.pdfauditing-190520092523.pdf
auditing-190520092523.pdf
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
 
Compliance
ComplianceCompliance
Compliance
 
ch14.ppt
ch14.pptch14.ppt
ch14.ppt
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
 
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
 
SiteFM Managing an Effective Safety Committee
SiteFM Managing an Effective Safety CommitteeSiteFM Managing an Effective Safety Committee
SiteFM Managing an Effective Safety Committee
 
Chapter 02
Chapter 02Chapter 02
Chapter 02
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptx
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Professional Designations IT Assurance
Professional Designations IT AssuranceProfessional Designations IT Assurance
Professional Designations IT Assurance
 
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
 
ISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An IntorductionISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An Intorduction
 

Mehr von Jitendra Tomar

Industrial IIOT and Physical Internet
Industrial IIOT and Physical InternetIndustrial IIOT and Physical Internet
Industrial IIOT and Physical InternetJitendra Tomar
 
Artificial Intelligence and Internet of Things.pptx
Artificial Intelligence and Internet of Things.pptxArtificial Intelligence and Internet of Things.pptx
Artificial Intelligence and Internet of Things.pptxJitendra Tomar
 
AI, Business Intelligence and MIS
AI, Business Intelligence and MISAI, Business Intelligence and MIS
AI, Business Intelligence and MISJitendra Tomar
 
Reshaping Business with Artificial Intelligence
Reshaping Business with Artificial IntelligenceReshaping Business with Artificial Intelligence
Reshaping Business with Artificial IntelligenceJitendra Tomar
 
Redefining Management using AI
Redefining Management using AIRedefining Management using AI
Redefining Management using AIJitendra Tomar
 
AI - Rise of Big Data in Business Planning
AI - Rise of Big Data in Business PlanningAI - Rise of Big Data in Business Planning
AI - Rise of Big Data in Business PlanningJitendra Tomar
 
AI in economics and business management.
AI in economics and business management.AI in economics and business management.
AI in economics and business management.Jitendra Tomar
 
4. Internet of Things - Reference Model and Architecture
4. Internet of Things - Reference Model and Architecture4. Internet of Things - Reference Model and Architecture
4. Internet of Things - Reference Model and ArchitectureJitendra Tomar
 
3. M2M and IoT - Technology Fundamentals
3. M2M and IoT - Technology Fundamentals3. M2M and IoT - Technology Fundamentals
3. M2M and IoT - Technology FundamentalsJitendra Tomar
 
2. Internet of Things - A Market Perspective
2. Internet of Things - A Market Perspective2. Internet of Things - A Market Perspective
2. Internet of Things - A Market PerspectiveJitendra Tomar
 
1. Internet of Things - M2M to IoT
1. Internet of Things - M2M to IoT1. Internet of Things - M2M to IoT
1. Internet of Things - M2M to IoTJitendra Tomar
 
Module 3: Code of Ethics
Module 3: Code of EthicsModule 3: Code of Ethics
Module 3: Code of EthicsJitendra Tomar
 
PFE5.2 Research Ethics and Academic Integrity - Publication Ethics
PFE5.2 Research Ethics and Academic Integrity - Publication EthicsPFE5.2 Research Ethics and Academic Integrity - Publication Ethics
PFE5.2 Research Ethics and Academic Integrity - Publication EthicsJitendra Tomar
 
PFE5.1 Research Ethics and Academic Integrity - Research Ethics
PFE5.1 Research Ethics and Academic Integrity - Research EthicsPFE5.1 Research Ethics and Academic Integrity - Research Ethics
PFE5.1 Research Ethics and Academic Integrity - Research EthicsJitendra Tomar
 
PFE4.4 Global Issues - Sustainable Development Goals
PFE4.4 Global Issues - Sustainable Development GoalsPFE4.4 Global Issues - Sustainable Development Goals
PFE4.4 Global Issues - Sustainable Development GoalsJitendra Tomar
 
PFE4.3 Global Issues - Environmental Ethics
PFE4.3 Global Issues - Environmental EthicsPFE4.3 Global Issues - Environmental Ethics
PFE4.3 Global Issues - Environmental EthicsJitendra Tomar
 
PFE4.2 Global Issues - Business Ethics and Corporate Governance
PFE4.2 Global Issues - Business Ethics and Corporate GovernancePFE4.2 Global Issues - Business Ethics and Corporate Governance
PFE4.2 Global Issues - Business Ethics and Corporate GovernanceJitendra Tomar
 
PFE4.1 Global Issues - Globalization of MNCs
PFE4.1 Global Issues - Globalization of MNCsPFE4.1 Global Issues - Globalization of MNCs
PFE4.1 Global Issues - Globalization of MNCsJitendra Tomar
 
PFE3.5 Ethical Considerations - Employee Grievance
PFE3.5 Ethical Considerations - Employee GrievancePFE3.5 Ethical Considerations - Employee Grievance
PFE3.5 Ethical Considerations - Employee GrievanceJitendra Tomar
 
PFE3.4 Ethical Considerations - Working with Minors
PFE3.4 Ethical Considerations - Working with MinorsPFE3.4 Ethical Considerations - Working with Minors
PFE3.4 Ethical Considerations - Working with MinorsJitendra Tomar
 

Mehr von Jitendra Tomar (20)

Industrial IIOT and Physical Internet
Industrial IIOT and Physical InternetIndustrial IIOT and Physical Internet
Industrial IIOT and Physical Internet
 
Artificial Intelligence and Internet of Things.pptx
Artificial Intelligence and Internet of Things.pptxArtificial Intelligence and Internet of Things.pptx
Artificial Intelligence and Internet of Things.pptx
 
AI, Business Intelligence and MIS
AI, Business Intelligence and MISAI, Business Intelligence and MIS
AI, Business Intelligence and MIS
 
Reshaping Business with Artificial Intelligence
Reshaping Business with Artificial IntelligenceReshaping Business with Artificial Intelligence
Reshaping Business with Artificial Intelligence
 
Redefining Management using AI
Redefining Management using AIRedefining Management using AI
Redefining Management using AI
 
AI - Rise of Big Data in Business Planning
AI - Rise of Big Data in Business PlanningAI - Rise of Big Data in Business Planning
AI - Rise of Big Data in Business Planning
 
AI in economics and business management.
AI in economics and business management.AI in economics and business management.
AI in economics and business management.
 
4. Internet of Things - Reference Model and Architecture
4. Internet of Things - Reference Model and Architecture4. Internet of Things - Reference Model and Architecture
4. Internet of Things - Reference Model and Architecture
 
3. M2M and IoT - Technology Fundamentals
3. M2M and IoT - Technology Fundamentals3. M2M and IoT - Technology Fundamentals
3. M2M and IoT - Technology Fundamentals
 
2. Internet of Things - A Market Perspective
2. Internet of Things - A Market Perspective2. Internet of Things - A Market Perspective
2. Internet of Things - A Market Perspective
 
1. Internet of Things - M2M to IoT
1. Internet of Things - M2M to IoT1. Internet of Things - M2M to IoT
1. Internet of Things - M2M to IoT
 
Module 3: Code of Ethics
Module 3: Code of EthicsModule 3: Code of Ethics
Module 3: Code of Ethics
 
PFE5.2 Research Ethics and Academic Integrity - Publication Ethics
PFE5.2 Research Ethics and Academic Integrity - Publication EthicsPFE5.2 Research Ethics and Academic Integrity - Publication Ethics
PFE5.2 Research Ethics and Academic Integrity - Publication Ethics
 
PFE5.1 Research Ethics and Academic Integrity - Research Ethics
PFE5.1 Research Ethics and Academic Integrity - Research EthicsPFE5.1 Research Ethics and Academic Integrity - Research Ethics
PFE5.1 Research Ethics and Academic Integrity - Research Ethics
 
PFE4.4 Global Issues - Sustainable Development Goals
PFE4.4 Global Issues - Sustainable Development GoalsPFE4.4 Global Issues - Sustainable Development Goals
PFE4.4 Global Issues - Sustainable Development Goals
 
PFE4.3 Global Issues - Environmental Ethics
PFE4.3 Global Issues - Environmental EthicsPFE4.3 Global Issues - Environmental Ethics
PFE4.3 Global Issues - Environmental Ethics
 
PFE4.2 Global Issues - Business Ethics and Corporate Governance
PFE4.2 Global Issues - Business Ethics and Corporate GovernancePFE4.2 Global Issues - Business Ethics and Corporate Governance
PFE4.2 Global Issues - Business Ethics and Corporate Governance
 
PFE4.1 Global Issues - Globalization of MNCs
PFE4.1 Global Issues - Globalization of MNCsPFE4.1 Global Issues - Globalization of MNCs
PFE4.1 Global Issues - Globalization of MNCs
 
PFE3.5 Ethical Considerations - Employee Grievance
PFE3.5 Ethical Considerations - Employee GrievancePFE3.5 Ethical Considerations - Employee Grievance
PFE3.5 Ethical Considerations - Employee Grievance
 
PFE3.4 Ethical Considerations - Working with Minors
PFE3.4 Ethical Considerations - Working with MinorsPFE3.4 Ethical Considerations - Working with Minors
PFE3.4 Ethical Considerations - Working with Minors
 

KĂźrzlich hochgeladen

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A BeĂąa
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
USPSÂŽ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSÂŽ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPSÂŽ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSÂŽ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 

KĂźrzlich hochgeladen (20)

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
USPSÂŽ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSÂŽ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPSÂŽ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSÂŽ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 

Analysis & Design of Business System - 6

  • 1. Amity School of Business Module- VI System Security & Auditing 1
  • 2. Topics Amity School of Business • System Security: Data Security • Backup • Recovery during System • Database failure • Ethical Issues in System Development • Threat and Risk Analysis • Audit • System Audit • System Audit Standards (Planning, Implantation and Reporting Standards) • System Analysis and Programming (Overview, Role & Duties of System Experts as Analyst and Programmer). 2
  • 3. Amity School of Business System Security • The Protection of data or hardware against accidental or intentional damage from a defined threat. • The system security problem can be divided into four related issues : – Security – Integrity – Privacy – confidentiality 3
  • 4. Amity School of Business • System Security refers to the technical innovation and procedures applied to the hardware and operating systems to protect against deliberate or accidental damage from a defined threat. • System Integrity refers to the proper functioning of hardware and programs without any improper modification, appropriate physical security, and safety against external threats. • Privacy defines the rights of the users or organizations to determine what information they are willing to share with or accept from others and how the organization can be protected against unwelcome, unfair excessive dissemination of information about it. • Confidentially is a special status given to sensitive information in a database to minimize the possible 4 invasion of privacy.
  • 5. Basic Components of Security Amity School of Business • Confidentiality – Keeping data and resources hidden from unauthorized disclosure. • Integrity(Data integrity and origin integrity ) – It refers to the requirement that information be protected from improper modification. • Availability – Enabling access to data and resources to users who have legitimate right. 5
  • 6. Goals of Security Amity School of Business • Prevention – Prevent attackers from violating security policy • Detection – Detect attackers’ violation of security policy • Recovery – Stop attack, assess and repair damage – Continue to function correctly even if attack succeeds 6
  • 7. Threat & Risk Analysis Amity School of Business • Natural Threat • Physical threat • Malicious attack (virus, worm , trojan) • Attack by hackers 7
  • 8. Data Security, Backup & Amity School of Business • Recovery data from loss, Data Security :- Protection of disclosure, modification, or destruction. • Backup & Recovery :- Restoring a damage database is generally done by rollforward or rollback procedure. – The rollforward approach involves updating a prior valid copy of the data base with the necessary changes to produce a current version of database. – The rollback approach starts current invalid state and removes the record of activity to produce the prior valid state of the database. Either approach depends largely on the software to bring the backup copy up to date and determine the cause of failure. • Backup can be extremely important in a recovery procedure. If database is physically damage, one could not rollback because of the damage database – only roll forward. 8
  • 9. Amity School of Business Database Failure • In a database environment, there are three types of failures : Catastrophic, logical, and structural • Catastrophic failure is one where part of a database is unreadable. It is restoring using rollforward method of recovery. • A logical failure occurs when activity to the database is interrupted with no chance of completing the currently executing transaction. • Structural damage is that when a pointer incorrectly stored in a record that points to unrelated or nonexistent data. 9
  • 10. Ethical Issues In System Amity School of Business Development • Ethical behavior of the analysts and computer professionals has led to the development of standards and codes of behavior by a number of professional associations. Three association are worth mentioning : – Association for Computing Machinery (ACM) – Data Processing Management Association (DPMA) – Institute for Certificate of Computer Professional (ICCP) • Ethics can be described as Fairness, Justice, Equity, Honesty, Trustworthiness, and equality. • Stealing, cheating, lying or backing out of one’s words all describe lack of Ethics. • Code of Ethics: is a declaration of the principles and beliefs that govern how employees of an organization are expected to behave. 10
  • 11. Amity School of Business What is Audit ? • Evaluation of a person, organization, system, process, project or product. • An audit provides a baseline of the existing system from which new investment can be accurately planned, avoiding excessive or inappropriate expenditure. • The goal of an audit is to express an opinion on the person/organization/system in question, under evaluation based on work done. 11
  • 12. Amity School of Business • Audit is performed by an AUDITOR • There are two types of auditors – – Internal Auditor – External Auditor 12
  • 13. Amity School of Business • Internal Auditors – Employees of the company hired to assess and evaluate its system of internal control. To maintain independence, they present their reports directly to the top level management. • External Auditors – Independent staff assigned by an auditing firm to assess and evaluate financial statements of their clients or to perform other agreed upon evaluations. They are called on from outside the company. 13
  • 14. Amity School of Business System Audit • It is also called Process Audit: can be conducted for any activity. Usually made against a specific document such as operating procedure, work instruction, training manual, etc. • A series of activities in which a system auditor, an impartial position independent of the object of audit, performs overall inspection and evaluation of an information system, issues advice and recommendations, and provides any necessary follow- up. 14
  • 15. Amity School of Business • System audits will help spot any errors in configuration which can leave vulnerabilities in the most secure products. • Audits can help overcome 'rule-creep' as small system changes over time cumulatively produce a significant shift in overall system security. • A policy audit will check that the security policies which management has communicated are being adhered to. 15
  • 16. Amity School of Business System Auditor A person who engages in system audits with the following knowledge and abilities: • Basic knowledge of information systems • Knowledge of system audits • Ability to perform system audits • Related knowledge for the performance of system audits 16
  • 17. Amity School of Business System Audit Standard • Purpose • Definitions of Terms • Composition of the Standards • Philosophy behind the Implementation Standards • General Standards • Implementation Standards 17
  • 18. Amity School of Business System Audit Standard • Purpose - The purpose of the Standards is to improve the reliability, security, and efficiency of information systems and thus contribute to the realization of a healthy information society by enumerating the matters necessary for system audits. 18
  • 19. Amity School of Business • Definitions of Terms These are the principal terms used in the Standards – System Audit : A series of activities in which a system auditor, an impartial position independent of the object of audit, performs overall inspection and evaluation of an information system, issues advice and recommendations, and provides any necessary follow-up. – System Auditor : A person who engages in system audits with the following knowledge and abilities: a. Basic knowledge of information systems. b. Knowledge of system audits. c. Ability to perform system audits. d. Related knowledge for the performance of system audits. 19
  • 20. Amity School of Business – Improvement of reliability: To improve the quality of information systems, prevent failure, minimize the effects of failure, and speed up recovery. – Improvement of security: To make an information system more secure from natural disasters, unauthorized access, and destructive actions. – Improvement of efficiency: To improve the cost performance of an information system by making the most of its resources. – Basic plan: A general plan of system audits to be performed during any given year. 20
  • 21. Amity School of Business • Individual plan: A plan for any of the individual system audit operations based on a basic plan. • Risk analysis: To identify the risks that may arise from or in connection with the use of an information system and analyze the degrees of their effects. • Audited division: A division that is an object of a system audit • Matter noted: A problem pointed out by a system auditor according to his or her criteria and noted on a system audit report. • Recommendation of improvement: A matter noted that is judged by a system auditor as requiring improvement and noted as such on a system audit report • Follow-up: The measure or measures taken by a system auditor to ensure the audited division carries out any recommendations of improvement 21
  • 22. Amity School of Business Composition of the Standards The Standards are composed of - • General Standards • Implementation Standards • Reporting Standards 22
  • 23. Amity School of Business General Standards General Standards outline the principles of an audit plan that provides a basis for a system audit, the qualifications of a system auditor, and so forth. 2. System The organization shall prepare a system for proper implementation of system audit 4. Audit Plan Preparation of a basic plan and individual plan for system audit. 23
  • 24. Amity School of Business 1. Responsibility and Authority of a system auditor • The system auditor shall make the grounds for each of his or her judgments clear. • The system auditor may demand data and materials from the audited division. • The system auditor may demand a report on the implementation of improvement be issued by the head of an organization to an audited division. 2. Professional Ethics The system auditor shall firmly maintain his or her position as an impartial evaluator. The system auditor shall be aware of the ethical demands on himself or herself and meet the internal and external trust by performing an accurate and sincere system audit. 24
  • 25. Amity School of Business 1. Confidentiality The system auditor must not divulge any secret he or she may come to know in the course of performing his or her job or use such secret for any undue purpose. 25
  • 26. Amity School of Business Implementation 1. Planning Standards  Information Strategy  Formulation of a General Plan  Formulation of a Development Plan  System Analysis and Definitions of Requirements • Development  Development Procedures  System Design  Program Design  Programming  System Tests  Conversion 26
  • 27. Amity School of Business 1. Operation  Operation Control  Input Management  Data Management  Output Management  Software Management  Hardware Management  Network Management  Configuration Management  Management of Buildings and Related Facilities 27
  • 28. Amity School of Business 1. Maintenance  Maintenance Procedures  Maintenance Plan  Implementation of Maintenance  Confirmation of Maintenance  System Conversion  Disposal of Old Systems 28
  • 29. Amity School of Business 1. Common Work  Document Management  Preparation  Management  Progress Management  Implementation  Evaluation  Personnel Management  Responsibility and Authority  Implementation of Work  Education and Training  Health Management 29
  • 30. Amity School of Business  Outsourcing  Outsourcing plan  Selection of service providers  Service agreements  Contents of services  Measures against Disasters  Risk Analysis  Anti-Disaster Plan  Backup  Alternative Processing and Recovery 30
  • 31. Amity School of Business  Reporting Standards • Preparation of Reports • The system auditor must prepare a system audit report. • The system audit report must state the results of evaluation of the reliability, security, and efficiency of an information system. • The system audit report must state, as matters noted, the problems based on the results of the audit. • The system audit report must state, as recommendations of improvement, the important matters that need to be improved. • The system audit report must state improvements that can be proposed for the matters that need to be improved. • The system auditor must state on his or her system audit report any other matters he or she considers necessary. 31
  • 32. Amity School of Business 1. Reporting - The system audit report must be submitted to the head of the organization. 2. Follow-up - The system auditor must try to grasp the progress of improvement made based on recommendations of improvement and promote that improvement. 32
  • 33. Amity School of Business System Analyst The System Analyst designs and implements systems to suit the organization’s needs. He plays a major role in seeking business benefits from computer technology. His job is not just confined to data processing, but also deals heavily with people, procedures and technology. 33
  • 34. Amity School of Business Skills of System Analyst Interpersonal Skills – Communication, Understanding, Foresightedness and Vision, Adaptability, Flexibility, Teaching, Selling, Patience and Rationality, Sound Temperament, Managerial Skills, Leadership Skills, Training and Documentation Capability. Technical Skills – Creativity, Problem Solving, Project Management, Dynamic Interface, Questioning Attitude and Inquiring mind, Knowledge. 34
  • 35. Amity School of Business 7 Roles of a System Analyst  Change Agent  Investigator and Monitor  Architect  Psychologist  Salesperson  Motivator  Politician 35
  • 36. Amity School of Business Change Agent The system analyst may select various styles to introduce change to the user organization – • Persuader (mildest form of intervention) • Catalyst (helper) • Confronter (severe) • Imposer (the most severe form of intervention) 36
  • 37. Amity School of Business Investigator and Monitor • To investigate why the present system does not work well and what changes will correct the problem. • To undertake and successfully complete a project, the analyst must monitor programs in relation to time, cost, and quality. Time is the most important resource. If time is wasted, the project suffers from increased costs and wasted human resources. 37
  • 38. Amity School of Business Architect • The architect’s primary function as liaison between the client’s abstract design requirements and the contractor's detailed building plan may be compared to the analyst's role as liaison between the user's logical design requirements and the detailed physical system design. As architect, the analyst also creates a detailed physical design of candidate systems. He aids users in formalizing abstract ideas and provides details to build the end product- the candidate system. 38
  • 39. Amity School of Business Psychologist • The analyst plays the role of a psychologist in the way he reaches people, interprets their thoughts, assesses their behavior, and draws conclusions from these interactions. In other words, understanding inter-functional relationships is important. 39
  • 40. Amity School of Business Salesperson • Selling change can be as crucial as initiating change. Selling the system actually takes place at each step in the system life cycle. However, Sales skills and persuasiveness are crucial to the success of the system. 40
  • 41. Amity School of Business Motivator • A candidate system must be well designed and acceptable to the user. System acceptance is achieved through user participation in its development, effective user training, and proper motivation to use the system. The analyst's role as a motivator is obvious during the first few weeks after implementation and during time when turnover results in new people being trained to work with the candidate system. 41
  • 42. Amity School of Business Politician • Related to the role of motivator is that of politician. In implementing a candidate system, the analyst tries to appease all parties involved. Diplomacy and finesse in dealing with people can improve acceptance of the system. As much as a politician must have the support of his/her constituency, so is the analyst's goal to have the support of the users' staff. He represents their thinking and tries to achieve their goals through computerization. 42
  • 43. Amity School of Business Thank You & All the best ! 43

Hinweis der Redaktion

  1. Confidentiality: a good example is cryptography, which traditionally is used to protect secret messages. But cryptography is traditionally used to protect data, not resources. Resources are protected by limiting information, for example by using firewalls or address translation mechanisms. Integrity: a good example here is that of an interrupted database transaction, leaving the database in an inconsistent state (this foreshadows the Clark-Wilson model). Trustworthiness of both data and origin affects integrity, as noted in the book’s example. That integrity is tied to trustworthiness makes it much harder to quantify than confidentiality. Cryptography provides mechanisms for detecting violations of integrity, but not preventing them (e.g., a digital signature can be used to determine if data has changed). Availability: this is usually defined in terms of “quality of service,” in which authorized users are expected to receive a specific level of service (stated in terms of a metric). Denial of service attacks are attempts to block availability.
  2. Prevention is ideal, because then there are no successful attacks. Detection occurs after someone violates the policy. The mechanism determines that a violation of the policy has occurred (or is underway), and reports it. The system (or system security officer) must then respond appropriately. Recovery means that the system continues to function correctly, possibly after a period during which it fails to function correctly. If the system functions correctly always, but possibly with degraded services, it is said to be intrusion tolerant. This is very difficult to do correctly; usually, recovery means that the attack is stopped, the system fixed (which may involve shutting down the system for some time, or making it unavailable to all users except the system security officers), and then the system resumes correct operations.