Professional Documents
Culture Documents
Course Code: Course Title: (: INFS 432 Organizational Information Systems)
Course Code: Course Title: (: INFS 432 Organizational Information Systems)
College of Education
School of Continuing and Distance Education
2017/2018 – 2018/2019 ACADEMIC YEAR
Course Information
Provide the following information:
Course Credit 3
Phone Number:
Phone
Your Email: mallotey@ug.edu.gh
E-mail Slide 4
Introduction/ Subject or Session Overview
This Session covers safety and security issues when using Information
Systems in Organizations or at home. As the use of information
systems increase in organizations, the risks/threats associated with
them also continue to increase. These risks can be categorized into
two:
1. Risks to users
2. Risks to the systems.
This Session will focus on risks or threats to users as they use
information systems in organizations. Many of these risk/threats are
associated with the Internet.
Slide 5
Session Outline
The key topics to be covered in the session are as follows:
1. Introduction
2. Physical Security
3. E-safety
4. Security of Data
Slide 6
Session Learning Objectives
By the end of the section, you will have learnt the
following:
Slide 7
Session Activities and Assignments
This week, complete the following tasks:
• Log onto the UG Sakai LMS course site:
– http://sakai.ug.edu.gh
• Read Recommended Text – Akussah, H. (2016).
Organizational Information Systems. Department of
Information Studies, Legon, NAB Superior Services.
• Watch the Videos for Session 10
• Review Lecture Slides: Session 10
• Visit the Chat Room and discuss the Forum question for
Session 10
• Complete the Individual Activities for Session 10
Slide 8
Reading List
• Required Text
– Akussah, H. (2016). Organizational Information Systems. Department of Information Studies, Legon, NAB Superior Services.
– Long, P. et al (2016) Cambridge International AS and A Level IT Course book, University Printing House, Cambridge CB2 8BS, UK.
• Supplemental Texts
– Laudon, C.K. Laudon, J.P. (2000) Management Information Systems (11th Ed.), NJ, Prentice-Hall in Honkong, Pearson.
– Lucey Terry, (1995) Management Information Systems, DP Publishing Ltd. Aldine Place, London.
– Hutchinson, S.E. & Sawyer, S.C. (2000) Computers, Communications and Information: A User’s Introduction.
– Alter, S. (1999). Information systems: A management perspective. Reading, Mass. [u.a.: Addison Wesley.
Slide 9
Topic One
INTRODUCTION
Slide 10
Introduction
PHYSICAL SECURITY
Slide 12
Physical Security
The increase use of Information Systems in
organizations brings about some physical
dangers to employees. Physical security is
categorized into:
• Health Aspects
• Safety Aspects
Slide 13
Health Aspects
Health aspects has to do with how people become
ill or affected by their daily contact with Computer
Based Information Systems (CBIS). The following
are some health risks:
• Back and neck problems/strain
• Repetitive strain injury (RSI)
• Eye strain
• Headaches
• Ozone irritation
Slide 14
Safety Aspects
Safety aspects has to do with the dangers that could
lead to serious injury or even loss of life. Some
common examples of safety risks are as follows:
• Electrocution
• Trailing wires (Can make you trip)
• Heavy equipment falling and causing injury
• Fire risk
Slide 15
Topic Three
E-SAFETY
Slide 16
E-safety
• This refers to safety when using the internet. That
is keeping personal data safe when using
Information Systems.
Slide 17
E-safety Issues Encountered when Using
Information Systems In organizations
• Giving out personal information to people who are unknown
to you
• Sending photos of ones self- either online or via a mobile
phone
• Failing to maintain your privacy settings when using online
devices
• Failing to verify the security of websites before visiting them
• Opening emails from unknown sources
• Emailing people you do not know
• Failing to be vigilant when using social network sites, instant
messaging and chat rooms.
Slide 18
Activity 1
Slide 19
Topic Four
SECURITY OF DATA
Slide 20
Security of Data
This refers to the security risks/ threats to our personal
data on information systems. Security of data is associated
with any electronic devise that connects to a network. The
following are some examples:
• Hacking • Spam
• Phishing • Cookies
• Smishing • Malwares
• Vishing
• Pharming
Slide 21
Hacking (Unauthorized Access)
• This is the act of gaining unauthorized access to a
computer system.
Slide 22
Activity 2
Slide 23
Phishing
• This is normally carried out through electronic
communications, such as emails.
• This is when an authorized person attempts to gather
personal data, such as passwords and credit card details,
by distinguishing themselves as a trustworthy person or
organization.
• The email will look legitimate and will normally
encourage a person to click on a link on the email and
when the link is clicked, it will take the user to a website
that will ask them for their personal information.
Slide 24
Smishing
• Smishing is short for SMS phishing. It is similar
to phishing , but it is carried out using SMS
text messaging rather than email.
Slide 25
Vishing
• Vishing is short for voice phishing. It is the
act of using a telephone call to try and scam
a user into giving their personal data.
Slide 26
Pharming
• Pharming is another method of collecting
personal data.
Slide 27
Spam
• Spam is often referred to as Junk email.
• While spam is less of a security risk, it can cause
denial of service by clogging up the bandwidth on
the internet.
Slide 28
Cookies
• Cookies are small files or code that are
stored on a user’s computer.
• Once a cookie has been read by the web
browser or users computer, the data can
be retrieved and used to customize the
webpage for each individual.
Slide 29
Malwares
• Malware is a computer program that is designed to
damage or disrupt a computer system and the files
that are stored on it.
• Malwares can take the following forms:
• Viruses • Adware
• Trojan horse • Rootkit
• Worms • Malicious bots
• Spyware • Ransomware
Slide 30
Virus
• This is a program code or software that
can replicate itself with the intention of
deleting or corrupting files on a
computer.
• They often cause the computer to
malfunction. For example by filling up
the hard disk drive.
Slide 31
Trojan Horse
• This is a malicious computer program
that disguises itself as another
application, such as a game or a utility
program. It normally acts as a computer
virus would.
Slide 32
Worms
• This is a small computer program that uses computer
networks and finds security holes to replicate itself.
• They can also exploit security holes in a piece of
software or operating system. Worms also often acts
like a virus would.
Slide 33
Spyware/ Key-Logging Software
• This is a software that gathers data by
monitoring key presses on the users
keyboard; the gathered data is sent back
to the person who sent the software.
Slide 34
Adware
• Adware is short for advertising-supported
software.
• It is a software program that is used to
display adverts that are targeted at the
user.
• It can analyze the website the user visits
and will target them with advertising of a
similar nature.
Slide 35
Rootkit
• This is a computer program that enables
a person to gain administrator access to
a victims computer.
• It normally gets installed when a victims
password is cracked.
Slide 36
Assignment 3
Slide 37
Summary
This is the end of section 4. You have learned
about the following:
• Safety and security risks related to the use of
Information systems
• Health risks related to the use of information
systems
• E-safety
• The threats to your personal data online and how
you can secure your personal data.
Slide 38