Information Systems Security, Quality, and Control

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 21

Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control

INFORMATION
SYSTEMS SECURITY,
QUALITY, AND
CONTROL

Copyright © 2005 Pearson Education Canada Inc.


11.1
Management Information Systems, Second Canadian Edition

Chapter 11: Information


OBJECTIVESSystems Security, Quality, and Control

• Why are information systems so


vulnerable ?
• What special measures must be taken to
ensure the reliability, availability, and
security of electronic commerce ?
• Why are auditing information systems and
safeguarding data quality so important?

Copyright © 2005 Pearson Education Canada Inc.


11.2
Management Information Systems, Second Canadian Edition

Chapter
11.1 11: Information
SYSTEM Systems Security,
VULNERABILITY AND Quality,
ABUSEand Control

Why Systems are Vulnerable

• Unauthorized access
– by Hackers or Employees
– to destroy, steal or alter data, hardware or software
• Denial of Service (DOS) Attack
– Flooding a server with bogus requests in order to crash
the network
• Computer Viruses
– self-replicating, malicious code
• Disasters
– flood, fire, power loss etc.
• Errors
– in Data Entry, Hardware or Software
Copyright © 2005 Pearson Education Canada Inc.
11.3
Management Information Systems, Second Canadian Edition

Chapter
11.1 11: Information
SYSTEM Systems Security,
VULNERABILITY AND Quality,
ABUSEand Control

Why Systems are Vulnerable

Copyright © 2005 Pearson Education Canada Inc.


11.4
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11.1 SYSTEM VULNERABILITY AND ABUSE
Concerns for System Builders and Users

Copyright © 2005 Pearson Education Canada Inc.


11.5
Management Information Systems, Second Canadian Edition

Chapter 11: Information


OBJECTIVESSystems Security, Quality, and Control

• Why are information systems so


vulnerable ?
• What special measures must be taken to
ensure the reliability, availability, and
security of electronic commerce ?
• Why are auditing information systems and
safeguarding data quality so important?

Copyright © 2005 Pearson Education Canada Inc.


11.6
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
General Controls and Application Controls

Copyright © 2005 Pearson Education Canada Inc.


11.7
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
General Controls and Application Controls

Copyright © 2005 Pearson Education Canada Inc.


11.8
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
General Controls and Application Controls

Copyright © 2005 Pearson Education Canada Inc.


11.9
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
Protecting the Digital Firm
• Fault-Tolerant Computer Systems:
• Contain extra hardware, power supply etc. to
ensure uninterrupted service
• Disaster Recovery Plan:
• Data backup, recovery procedures etc. to keep
business running in event of computer outage
• Mirroring:
• Duplicating data on backup server to prevent
any interruption in service
• Clustering:
• Linking two computers together so one can
backup the other or speed up processing
Copyright © 2005 Pearson Education Canada Inc.
11.10
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
Protecting the Digital Firm

Internet Security

• Firewalls
– Prevent unauthorized users from accessing
private networks
• Intrusion Detection System
– Monitors vulnerable points in network to detect
and deter unauthorized intruders

Copyright © 2005 Pearson Education Canada Inc.


11.11
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
Protecting the Digital Firm

Copyright © 2005 Pearson Education Canada Inc.


11.12
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT

Security and E-Commerce


• Encryption:
• Coding messages to prevent unauthorized
access
• Digital Signature:
• Digital code attached to message to uniquely
identify sender
• Digital Certificate:
• Attachment to electronic message to verify the
sender and to provide receiver with means to
encode reply
Copyright © 2005 Pearson Education Canada Inc.
11.13
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
Protecting the Digital Firm

Figure 11.8:
Digital Certificates

Copyright © 2005 Pearson Education Canada Inc.


11.14
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
Developing a Control Structure: Costs and Benefits

Criteria for Determining Control Structure


• Importance of data
• Efficiency and expense of each control
technique
• Level of risk if a specific activity or process is
not properly controlled

Copyright © 2005 Pearson Education Canada Inc.


11.15
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
Developing a Control Structure: Costs and Benefits

Copyright © 2005 Pearson Education Canada Inc.


11.16
Management Information Systems, Second Canadian Edition

Chapter 11: Information


OBJECTIVESSystems Security, Quality, and Control

• Why are information systems so


vulnerable ?
• What special measures must be taken to
ensure the reliability, availability, and
security of electronic commerce ?
• Why are auditing information systems and
safeguarding data quality so important?

Copyright © 2005 Pearson Education Canada Inc.


11.17
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
The Role of Auditing in the Control Process

MIS Audit
• Identifies all controls that govern
individual information systems and
assesses their effectiveness

Copyright © 2005 Pearson Education Canada Inc.


11.18
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
The Role of Auditing in the Control Process

Copyright © 2005 Pearson Education Canada Inc.


11.19
Management Information Systems, Second Canadian Edition

Chapter 11: InformationSYSTEM


11.3 ENSURING Systems Security,
QUALITY Quality, and Control

• Software Walkthrough:
• Review of software design by small group of people
• Software Debugging:
• Process of discovering and eliminating defects (bugs)
• Data Quality Audit:
• Determines accuracy of data
• via survey of end users for their perceptions of data
quality or survey of samples from data files
• Data Cleansing:
• Correcting errors in data to increase accuracy

Copyright © 2005 Pearson Education Canada Inc.


11.20
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control

INFORMATION
SYSTEMS SECURITY,
QUALITY, AND
CONTROL

Copyright © 2005 Pearson Education Canada Inc.


11.21

You might also like