Professional Documents
Culture Documents
Information Systems Security, Quality, and Control
Information Systems Security, Quality, and Control
Information Systems Security, Quality, and Control
INFORMATION
SYSTEMS SECURITY,
QUALITY, AND
CONTROL
Chapter
11.1 11: Information
SYSTEM Systems Security,
VULNERABILITY AND Quality,
ABUSEand Control
• Unauthorized access
– by Hackers or Employees
– to destroy, steal or alter data, hardware or software
• Denial of Service (DOS) Attack
– Flooding a server with bogus requests in order to crash
the network
• Computer Viruses
– self-replicating, malicious code
• Disasters
– flood, fire, power loss etc.
• Errors
– in Data Entry, Hardware or Software
Copyright © 2005 Pearson Education Canada Inc.
11.3
Management Information Systems, Second Canadian Edition
Chapter
11.1 11: Information
SYSTEM Systems Security,
VULNERABILITY AND Quality,
ABUSEand Control
Internet Security
• Firewalls
– Prevent unauthorized users from accessing
private networks
• Intrusion Detection System
– Monitors vulnerable points in network to detect
and deter unauthorized intruders
Figure 11.8:
Digital Certificates
MIS Audit
• Identifies all controls that govern
individual information systems and
assesses their effectiveness
• Software Walkthrough:
• Review of software design by small group of people
• Software Debugging:
• Process of discovering and eliminating defects (bugs)
• Data Quality Audit:
• Determines accuracy of data
• via survey of end users for their perceptions of data
quality or survey of samples from data files
• Data Cleansing:
• Correcting errors in data to increase accuracy
INFORMATION
SYSTEMS SECURITY,
QUALITY, AND
CONTROL