Enhancing Information Systems Security: Vulnerabilities, Controls, and Quality Assurance
This comprehensive guide explores the vulnerabilities of information systems to threats such as hacking and viruses. It emphasizes the importance of implementing effective controls and quality assurance techniques to safeguard data integrity. Key topics include system vulnerabilities caused by hardware and software failures, unauthorized access, and the grave concerns of data loss. The guide also covers the role of antivirus software, disaster recovery methods, and security policies necessary for protecting assets against unauthorized access and ensuring reliable operations.
Enhancing Information Systems Security: Vulnerabilities, Controls, and Quality Assurance
E N D
Presentation Transcript
14. INFORMATION SYSTEMS SECURITY & CONTROL
Learning Objectives • Demonstrate why info systems are vulnerable to destruction, error, abuse, quality control problems • Compare general and application controls • Select factors for developing controls *
Learning Objectives • Describe important software quality-assurance techniques • Demonstrate importance of auditing info systems & safeguarding data quality *
System Vulnerability & Abuse • Why systems are vulnerable • Hackers & viruses • Concerns for builders & users • System quality problems *
Threats to Information Systems • Hardware failure, fire • Software failure, electrical problems • Personnel actions, user errors • Access penetration, program changes • Theft of data, services, equipment • Telecommunications problems *
System Vulnerability • System complexity • Computerized procedures not always read or audited • Extensive effect of disaster • Unauthorized access possible *
Vulnerabilities • RADIATION:Allows recorders, bugs to tap system • CROSSTALK:Can garble data • HARDWARE:Improper connections, failure of protection circuits • SOFTWARE:Failure of protection features,access control, bounds control • FILES:Subject to theft, copying,unauthorized access *
VULNERABILITIES • USER: Identification, authentication, subtle software modification • PROGRAMMER: Disables protective features; reveals protective measures • MAINTENANCE STAFF: Disables hardware devices; uses stand-alone utilities • OPERATOR: Doesn’t Notify supervisor, reveals protective measures *
HACKERS & COMPUTER VIRUSES • HACKER:Person gains access to computer for profit, criminal mischief, personal pleasure • COMPUTER VIRUS:Rouge program; difficult to detect; spreads rapidly; destroys data; disrupts processing & memory *
Antivirus Software • Software to detect • Eliminate viruses • Advanced versions run in memory to protect processing, guard against viruses on disks, and on incoming network files *
Concerns For Builders & Users • Disaster • Breach of security • Errors *
Disaster • Loss of hardware, software, data by fire, power failure, flood or other calamity • Fault-tolerant computer systems: backup systems to prevent system failure (particularly on-line transaction processing) *
Security Policies, procedures, technical measures to prevent unauthorized access, alteration, theft, physical damage to information systems *
System Quality Problems Software & data • Bugs:program code defects or errors • Maintenance:modifying a system in production use; Can take up to 85% of analysts’ time • Data quality problems:finding, correcting errors; costly; tedious (do it right the first time!) *
Cost Of Errors During Systems Development Cycle 6.00 5.00 4.00 3.00 COSTS 2.00 1.00 Analysis & design Programming Conversion POST- Implementation
Creating A Control Environment Controls:methods, policies, procedures to protect assets; Accuracy & reliability of records; Adherence to management standards • General • Application *
General Controls • Implementation: audit system development to assure proper control, management • Software:ensure security, reliability of software • Program security:prevent unauthorized changes to programs • Hardware:ensure physical security, performance of computer hardware *
General controls • Computer operations:ensure procedures consistently, correctly applied to data storage, processing • Data security:ensure data disks, tapes protected from wrongful access, change, destruction • Administrative:ensure controls properly executed, enforced • Segregation of functions:divide tasks to minimize risks *
Application Controls • Input • Processing • Output *
Input Controls • Input authorization:record, monitor source documents • Data conversion:transcribe data properly from one form to another • Batch control totals:count transactions prior to and after processing • Edit checks:verify input data, correct errors *
Developing A Control Structure • Costs:Can be expensive to build; complicated to use • Benefits:Reduces expensive errors, loss of time, resources, good will • Risk assessment:Determine frequency of occurrence of problem, cost, damage if it were to occur *