Managing MIS Security Control
Managing MIS Security Control
Managing MIS Security Control
OBJECTIVES
R
Figure 10-1
SYSTE| VULNERABILITY AND ABUSE
Internet Vulnerabilities:
Software Vulnerability
R Commercial software contains flaws that create
security vulnerabilities
R Patches
SYSTE| VULNERABILITY AND ABUSE
Figure 10-2
SYSTE| VULNERABILITY AND ABUSE
R
R
R
!
SYSTE| VULNERABILITY AND ABUSE
R Bugs
Program code defects or errors
R |aintenance Nightmare
|aintenance costs high due to
organizational change, software
complexity, and faulty system analysis
and design
SYSTE| VULNERABILITY AND ABUSE
Figure 14-2
2
Overview
R "
'
#
!
R $
R %
'
&'
('
)'
*'
CREATING A CONTROL ENVIRON|ENT
R +
R Load balancing:
balancing: Distributes large number of
requests for access among multiple servers
Risk Assessment:
Security Policy:
R Authorization policies
R Load balancing: Distributes access requests across
multiple servers
R |IS audit
R Identifies the controls that govern information
systems and assesses their effectiveness
R Auditor conducts interviews with key
individuals
R Examines security, application controls,
overall integrity controls, and control
disciplines
Sample Auditor¶s List of Control
Weaknesses
Figure 14-8
Authentication:
R Passwords
Figure 10-7
R Antivirus software: Software that checks computer
systems and drives for the presence of computer
viruses and can eliminate the virus from the infected
area
Figure 10-8
R Digital signature: A digital code attached to an
electronically transmitted message that is used to
verify the origin and contents of a message
Figure 10-9
R Secure Sockets Layer (SSL) and its successor
Transport Layer Security (TLS): protocols for secure
information transfer over the Internet; enable client
and server computer encryption and decryption
activities as they communicate during a secure Web
session.