Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Managerial Implications of IT/IS in Global Business: CSIT-204 Module-IV

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 19

CSIT-204

Module-IV
Managerial implications of IT/IS in
Global business
Impact of information technology in the
development of global businesses

Information technology (IT) systems and


computer science are used by business
organizations to perform various tasks.
Some use IT to provide for the basic processing of

transactions, while others enable customers,


distributors, and suppliers to interact with the
organization activities through various
communication technology systems such as the
internet and intranet
Impact of information technology in the
development of global businesses
 Information Technology (IT) and Modern Corporate Strategy
 Information Technology (IT) and Cultural Diversity:
 Improved Communication and Increased Productivity in
Business:
 Outsourcing, Freelancing and International Collaboration:
 Automation and future global business atmosphere :
 Work Group Support and Executive Support in the working
environment
 Facilitating Business Monetization through Globalization:
 Digital Currencies and Cryptocurrency in Global Businesses:
 Using IT some other potential and Intelligent works within
2030
Information Security.

Information security, refers to the processes


and tools designed and deployed to protect
sensitive business information from
modification, disruption, destruction, and
inspection.
Difference between cyber security and
information security?

InfoSec is a crucial
Information security part of cyber security, Cyber security is a
and cyber but it refers more general term
security are often exclusively to the that includes
confused. processes designed InfoSec.
for data security.
Information Security- Requirements

Confidentiality:


Controlling who gets to read information;

Integrity:


Assuring that information and programs are changed only in a specified and authorized manner; and

Availability:


Assuring that authorized users have continued access to information and resources.
MANAGEMENT CONTROLS –
SECURE INFORMATION AND OPERATIONS

Organizations in almost every line of endeavor have established controls based on the
following key principles:

Individual accountability:  Who is responsible for this statement or


action? 

Auditing: Auditing services make and keep the records necessary to


support accountability.

Separation of duty: Specifies that important operations cannot be


performed by a single person but instead require the agreement of
(at least) two different people. 
Responding to Breaches of Security

 Recovery controls provide the means to


respond to, rather than prevent, a security
breach. 
 Recovery from a security breach may involve
taking disciplinary or legal action, notifying
incidentally compromised parties, or
changing policies.
RISKS AND VULNERABILITIES
 Misusing authority, through activities such as
improper acquisition of resources 
 Masquerading, as in one user impersonating another.
 Bypassing intended controls, by means such as
password attacks and exploitation of trapdoors.
 Setting up subsequent abuses such as Trojan horses,
or viruses.
 Carrying out hardware and media abuses, such as
physical attacks on equipment and scavenging of
information from discarded media.
Information Security Management
System (ISMS)

An ISMS is a set of guidelines and processes created to help organizations in a data


breach scenario.

By having a formal set of guidelines, businesses can minimize risk and can ensure work
continuity in case of a staff change.
Why ISMS ?

 Information security that can be achieved


through technical means is limited
 Security also depends on people, policies,
processes and procedures
 Resources are limited
 It is not a once off exercise, but an ongoing
activity
All these can be addressed effectively and
efficiently only through a proper ISMS
Who needs ISMS?
 Every organisation which values information
needs to protect it e.g.
 Banks
 Call centers
 IT companies
 Government & parastatal bodies
 Manufacturing concerns
 Hospitals
 Insurance companies
Benefits of ISMS

 Assurance through discipline of compliance


 Risk management
 Secure environment (protection of IPRs)
 Minimize security breaches (continuity of
business)
 Increase trust & customer confidence &
business opportunities
Major components of the ISMS
…the major steps towards achieving ISO 27001:2005 compliance
ISO ISO
27001:2013
27001

ISO 27001:2013 is an information security standard

It is a specification for an information security management


system (ISMS)

It is designed to protect ANY kind of required information

12 of 17
Why ISO 27001:2013
be ISO 27001 compliant?

Some reasons may include:


Maintain ISO 27001 Certification

Protect Employee Data

Protect Consumer Data

Comply with applicable privacy and security laws

Satisfy contractual obligations

Be prepared to deal with changing threats with respect to new cloud based services

Streamline Processes and adopt best practices
Example timeline: 3 year cycle

Original Certification: Full Audit


2012

Surveillance Audit: High level Audit


2013 Maintaining
the certificate

Surveillance Audit: High level Audit


2014

Re-Certification: Full Audit


2015
ETHICAL ISSUES OF INFORMATION
TECHNOLOGY

According to Ministry of Electronic and


Information Technology, Government of
India :


Cyber Laws yields legal recognition to electronic documents and a
structure to support e-filing and e-commerce transactions and also
provides a legal structure to reduce, check cyber crimes.
ETHICAL ISSUES OF INFORMATION
TECHNOLOGY
 Area of Cyber Law:
 Fraud: Laws are made to prevent identity theft, credit card theft and other financial crimes that
happen online. 
 Copyright: Copyright violation is an area of cyber law that protects the rights of individuals and
companies to profit from their own creative works.
 Defamation: Defamation laws are civil laws that save individuals from fake public statements
that can harm a business or someone’s personal reputation.
 Harassment and Stalking: When a person makes threatening statements again and again
about someone else online, there is violation of both civil and criminal laws.
 Freedom of Speech: Freedom of speech is an important area of cyber law. Even though cyber
laws forbid certain behaviors online, freedom of speech laws also allow people to speak their
minds.
 Trade Secrets: Companies doing businesses online often depend on cyber laws to protect their
trade secrets.

You might also like