Unit-5 Mis
Unit-5 Mis
Unit-5 Mis
UNIT- 5
Information Systems Security and Control: Vulnerability and Abuse, Anti–Virus Packages
and Systems Audit. Managing Global Information Systems.
Information security controls are measures taken to reduce information security risks such as
information systems breaches, data theft, and unauthorized changes to digital information or
systems. These security controls are intended to help protect the availability, confidentiality, and
integrity of data and networks, and are typically implemented after an information security risk
assessment.
Confidentiality
When protecting information, we want to be able to restrict access to those who are allowed to
see it; everyone else should be disallowed from learning anything about its contents. This is the
essence of confidentiality. For example, federal law requires that universities restrict access to
private student information. The university must be sure that only those who are authorized have
access to view the grade records.
Integrity
Integrity is the assurance that the information being accessed has not been altered and truly
represents what is intended. Just as a person with integrity means what he or she says and can be
trusted to consistently represent the truth, information integrity means information truly
represents its intended meaning. Information can lose its integrity through malicious intent, such
as when someone who is not authorized makes a change to intentionally misrepresent something.
An example of this would be when a hacker is hired to go into the university’s system and
change a grade.
Integrity can also be lost unintentionally, such as when a computer power surge corrupts a file or
someone authorized to make a change accidentally deletes a file or enters incorrect information.
Availability
Availability means that information can be accessed and modified by anyone authorized to do so
in an appropriate timeframe. Depending on the type of information, appropriate timeframe can
mean different things. For example, a stock trader needs information to be available
immediately, while a sales person may be happy to get sales numbers for the day in a report the
next morning.
In order to ensure the confidentiality, integrity, and availability of information, organizations can
choose from a variety of tools
Authentication
The most common way to identify someone is through their physical appearance, but how do we
identify someone sitting behind a computer screen or at the ATM? Tools for authentication are
used to ensure that the person accessing the information is, indeed, who they present themselves
to be.
Access Control
Once a user has been authenticated, the next step is to ensure that they can only access the
information resources that are appropriate. This is done through the use of access control. Access
control determines which users are authorized to read, modify, add, and/or delete information.
Several different access control models exist. Here we will discuss two:
The access control list (ACL) and role-based access control (RBAC).
RBAC: Role- Based access Controls (RBAC) is a Method of regulating access to computer or
Network resources based on the roles of individual users within organizations.
Types of information security controls include security policies, procedures, plans, devices and
software intended to strengthen cyber security. There are three categories of information security
controls:
Preventive security controls, designed to prevent cyber security incidents
Detective security controls, aimed at detecting a cyber security breach attempt (“event”)
or successful breach (“incident”) while it is in progress, and alerting cyber security
personnel
Corrective security controls, used after a cyber security incident to help minimize data
loss and damage to the system or network, and restore critical business systems and
processes as quickly as possible (“resilience”)
When large amounts of data are stored in electronic form they are vulnerable to many more kinds
of threats than when they exist in manual form. Through communications networks, information
systems in different locations can be interconnected. The potential for unauthorized access,
abuse, or fraud is not limited to a single location but can occur at any access point in the
network.
When data are stored in digital form, they are more vulnerable than when they exist in
manual form. Security refers to the policies, procedures, and technical measures used to
prevent unauthorized access, alteration, theft, or physical damage to information systems
Controls consist of all the methods, policies, and organizational procedures that ensure
the safety of the organization's assets; the accuracy and reliability of its accounting
records; and operational adherence to management standards.
Threats to computerized information systems include hardware and software failure; user
errors; physical disasters such as fire or power failure; theft of data, services, and
equipment; unauthorized use of data; and telecommunications disruptions.
On-line systems and telecommunications are especially vulnerable because data and files
can be immediately and directly accessed through computer terminals or at points in the
telecommunications network.
Contemporary security challenges and vulnerabilities: The architecture of a Web-based
application typically includes a Web client, a server, and corporate information systems linked to
databases. Each of these components presents security challenges and vulnerabilities. Floods,
fires, power failures, and other electrical problems can cause disruptions at any point in the
network.
The Internet poses additional problems because it was explicitly designed to be easily accessed
by people on different computer systems. Information traveling over unsecured media can be
intercepted and misused. Fixed IP addresses serve as fixed targets for hackers, and Internet
software has become a means for introducing viruses and malicious software to otherwise secure
networks.
Wi-Fi security challenges: Many Wi-Fi networks can be penetrated easily by intruders using
sniffer programs to obtain an address to access the resources of a network without authorization.
Malicious software, or malware, includes threats such as computer viruses and worms, and
Trojan horses. A computer virus is rogue software that attaches itself to other programs or data
files in order to be executed, and may be highly destructive to files, computer memory, and hard
drives. Viruses are typically designed to spread from computer to computer through e-mail
attachments or copied files.
Worldwide damage from digital attacks: This chart shows estimates of the average annual
worldwide damage from hacking, malware, and spam since 1999. These data are based on
figures from mi2G and the authors.
In computer crime, the computer can be either the target of or the instrument of a crime. The
most economically damaging kinds of computer crime are DOS attacks, introducing viruses,
theft of services, and disruption of computer systems.
Internet vulnerabilities
Large public networks such as the Internet are more vulnerable than internal networks because
they are virtually open to anyone. The Internet is so huge that when abuses do occur, they can
have an enormously widespread impact. When the Internet becomes part of the corporate
network, the organization’s information systems are even more vulnerable to actions from
outsiders.
Anti–Virus Packages:
Antivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer.
Once installed, most antivirus software runs automatically in the background to provide real-time
protection against virus attacks.
Comprehensive virus protection programs help protect your files and hardware from malware
such as worms, Trojan horses and spyware, and may also offer additional protection such as
customizable firewalls and website blocking.
Antivirus programs and computer protection software are designed to evaluate data such as web
pages, files, software and applications to help find and eradicate malware as quickly as possible.
Most provide real-time protection, which can protect your devices from incoming threats; scan
your entire computer regularly for known threats and provide automatic updates; and identify,
block and delete malicious codes and software.
Malware:
Malware, short for “malicious software,” is a blanket term that refers to a wide variety of
software programs designed to do damage or do other unwanted actions to a computer; server or
computer network Common examples include viruses, spyware and trojan horses. Malware can
slow down or crash your device or delete files.
Spyware:
Spyware is a type of malware that attaches itself and hides on a computer’s operating system
without your permission to make unwanted changes to your user experience. It can be used to
spy on your online activity and may generate unwanted advertisements or make your browser
display certain website sites or search results.
Phishing:
Phishing attacks use email or fraudulent websites to try to trick you into providing personal or
financial information to compromise an account or steal money by posing as a trustworthy entity.
They may claim there’s a problem with payment information or that they’ve noticed activity on
an account and ask you to click on a link or attachment and provide personal information.
Systems Audit:
The audit of systems involves the review and evaluation of controls and computer systems, as
well as their use, efficiency, and security in the company, which processes the information.
Thanks to the audit of systems as an alternative to control, follow-up, and review, the computer
process and technologies are used more efficiently and safely, guaranteeing adequate decision-
making?
The audit of systems involves the review and evaluation of controls and computer systems, as
well as their use, efficiency, and security in the company, which processes the information.
Thanks to the audit of systems as an alternative to control, follow-up, and review, the computer
process and technologies are used more efficiently and safely, guaranteeing adequate decision-
making?
The analysis and evaluation carried out through the systems audit must be objective, critical,
systematic, and impartial. The final audit report should be a clear example of the reality of the
company in terms of processes and computerization, to make better decisions and improve the
business
Therefore, systems auditing is a way of monitoring and evaluating not only the computer
equipment itself. Its field of action also revolves around the control of the entry systems to this
equipment (think, for example, of access codes and codes), archives and security thereof, etc.
“Systematic, independent and documented process for obtaining audit evidence and evaluating it
objectively to determine the extent to which the audit criteria are fulfilled.”
A system audit is important as it allows a company to review the performance of its operational
systems.
1. Evaluate the actual performance of their operations compared to what was planned
2. Validate that the objectives pursued by the organization remain relevant
3. Validate whether or not the company is achieving those objectives
4. Ensure that the systems used are reliable
5. Review system records to ensure systems operate based on specifications
6. Identify vulnerabilities and risks
7. Allow a company to define a mitigation plan to better achieve its objectives
8. Monitor its operational systems to ensure they meet the objectives on an ongoing basis
1. Audit initiation
2. Audit preparation
3. Audit execution
4. Audit report
5. Audit closure and follow-up
Audit initiation: Audit initiation is the start of the system audit process. During the audit
initiation, the auditor and the client will determine the scope and frequency of the audit. When
deciding on the scope, importance is given to the client’s needs, requirements, objectives and
timeline.
Audit preparation: The audit preparation is when the auditor starts the review of the auditing
procedure of the system. In the preparation phase, the goal is to define an audit plan that
typically includes:
Audit execution: The audit execution is the actual process of performing the system audit.
During the audit execution process, the auditor will look at the specifics of the company systems,
how they operate, identify what is compliant and what may not be compliant, get clarification
from the client and so on.
Audit report: The final phase of the system audit process is the issuance of the audit report. The
auditor’s responsibility is to ensure a report is produced providing an independent evaluation of
the audited systems. The report should be factual and present any discrepancies found along with
objective evidence to that effect. The auditor will also provide his or her judgment as to the
company’s compliance with the system standards against which the audit was conducted.
According to ISO 19011, an audit is closed when: “The audit is completed when all the planned
audit activities have been carried out, or otherwise agreed with the audit client.” Once all the
audit activities have been carried out, we have reached the end of the audit process.
The first step in managing a global transition is identifying core systems; which includes
identifying critical core business processes, identifying centers of excellence for these processes,
and rank-ordering these centers. You then can decide which processes should be core
applications, centrally coordinated, designed, and implemented around the globe, and which
should be regional and local.
LOCAL, REGIONAL AND GLOBAL SYSTEMS
Agency and other coordination costs increase as the firm moves from local option systems
toward regional and global systems. However, transaction costs of participating in global
markets probably decrease as firms develop global systems. A sensible strategy is to reduce
agency costs by developing only a few core global systems that are vital for global operations,
leaving other systems in the hands of regional and local units.
3. Costs can be spread over a larger, global customer base, unleashing new economies of
scale at production facilities
4. The ability to optimize the use of corporate funds over a much larger capital base.
International information systems architecture consists of the basic information systems required
by organizations to coordinate worldwide trade and other activities. The basic strategy to follow
when building an international system is to understand the global environment in which your
firm is operating. This means understanding the overall market forces, or business drivers, that
are pushing your industry toward global competition. A business driver is a force in the
environment to which businesses must respond and that influences the direction of the business.
The Global Environment: Business Drivers and Challenges
The global business drivers can be divided into two groups: general cultural factors and
specific business factors. Easily recognized general cultural factors have driven
internationalization since World War II.
The development of global communications has created a global village in a second
sense: A global culture created by television, the Internet, and other globally shared
media such as movies now permits different cultures and peoples to develop common
expectations about right and wrong, desirable and undesirable, heroic and cowardly.
Responding to demand, global production and operations have emerged with precise
online coordination between far-flung production facilities and central headquarters
thousands of miles away. The new global markets and pressure toward global production
and operation have called forth whole new capabilities for global coordination.
Finally, global markets, production, and administration create the conditions for
powerful, sustained global economies for scale. Not all industries are similarly affected
by these trends. Clearly, manufacturing has been much more affected than services that
still tend to be domestic and highly inefficient. However, the localism of services is
breaking down in telecommunications, entertainment, transportation, finance law, and
general business.
The Management Solution: Implementation
********