44
14.1 © 2003 by Prentice Hall 14 INFORMATION INFORMATION SYSTEMS SYSTEMS SECURITY AND SECURITY AND CONTROL CONTROL Chapter

Chapter14 Information Systems Security and Control

Embed Size (px)

Citation preview

Page 1: Chapter14 Information Systems Security and Control

14.1 © 2003 by Prentice Hall

1414

INFORMATIONINFORMATION

SYSTEMSSYSTEMS

SECURITY ANDSECURITY AND

CONTROLCONTROL

Chapter

Page 2: Chapter14 Information Systems Security and Control

14.2 © 2003 by Prentice Hall

• Why are information systems so vulnerable to Why are information systems so vulnerable to destruction, error, abuse, and system quality destruction, error, abuse, and system quality problems?problems?

• What types of controls are available for What types of controls are available for information systems?information systems?

• What special measures must be taken to What special measures must be taken to ensure the reliability, availability and security ensure the reliability, availability and security of electronic commerce and digital business of electronic commerce and digital business processes?processes?

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

OBJECTIVES

Page 3: Chapter14 Information Systems Security and Control

14.3 © 2003 by Prentice Hall

• What are the most important software What are the most important software quality assurance techniques?quality assurance techniques?

• Why are auditing information systems and Why are auditing information systems and safeguarding data quality so important?safeguarding data quality so important?

OBJECTIVES

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Page 4: Chapter14 Information Systems Security and Control

14.4 © 2003 by Prentice Hall

• Designing systems that are neither over-Designing systems that are neither over-controlled nor under-controlledcontrolled nor under-controlled

• Applying quality assurance standards in large Applying quality assurance standards in large systems projectssystems projects

MANAGEMENT CHALLENGES

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Page 5: Chapter14 Information Systems Security and Control

14.5 © 2003 by Prentice Hall

• Advances in telecommunications and Advances in telecommunications and computer softwarecomputer software

• Unauthorized access, abuse, or fraud Unauthorized access, abuse, or fraud

• Hackers Hackers

• Denial of service attackDenial of service attack

• Computer virusComputer virus

SYSTEM VULNERABILITY AND ABUSE

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Why Systems are Vulnerable

Page 6: Chapter14 Information Systems Security and Control

14.6 © 2003 by Prentice Hall

SYSTEM VULNERABILITY AND ABUSE

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Telecommunication Network Vulnerabilities

Figure 14-1

Page 7: Chapter14 Information Systems Security and Control

14.7 © 2003 by Prentice Hall

DisasterDisaster

• Destroys computer hardware, programs, Destroys computer hardware, programs, data files, and other equipment data files, and other equipment

SecuritySecurity

• Prevents unauthorized access, alteration, Prevents unauthorized access, alteration, theft, or physical damagetheft, or physical damage

SYSTEM VULNERABILITY AND ABUSE

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Concerns for System Builders and Users

Page 8: Chapter14 Information Systems Security and Control

14.8 © 2003 by Prentice Hall

ErrorsErrors

• Cause computers to disrupt or destroy Cause computers to disrupt or destroy organization’s record-keeping and organization’s record-keeping and operationsoperations

SYSTEM VULNERABILITY AND ABUSE

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Concerns for System Builders and Users

Page 9: Chapter14 Information Systems Security and Control

14.9 © 2003 by Prentice Hall

BugsBugs

• Program code defects or errorsProgram code defects or errors

Maintenance NightmareMaintenance Nightmare

• Maintenance costs high due to Maintenance costs high due to organizational change, software organizational change, software complexity, and faulty system analysis complexity, and faulty system analysis and designand design

SYSTEM VULNERABILITY AND ABUSE

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

System Quality Problems: Software and Data

Page 10: Chapter14 Information Systems Security and Control

14.10 © 2003 by Prentice Hall

SYSTEM VULNERABILITY AND ABUSE

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Points in the Processing Cycle where Errors can Occur

Figure 14-2

Page 11: Chapter14 Information Systems Security and Control

14.11 © 2003 by Prentice Hall

Data Quality ProblemsData Quality Problems

• Caused due to errors during data input or Caused due to errors during data input or faulty information system and database faulty information system and database designdesign

SYSTEM VULNERABILITY AND ABUSE

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

System Quality Problems: Software and Data

Page 12: Chapter14 Information Systems Security and Control

14.12 © 2003 by Prentice Hall

SYSTEM VULNERABILITY AND ABUSE

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

The Cost of Errors over the Systems Development Cycle

Figure 14-3

Page 13: Chapter14 Information Systems Security and Control

14.13 © 2003 by Prentice Hall

ControlsControls

• Methods, policies, and procedures Methods, policies, and procedures

• Ensures protection of organization’s Ensures protection of organization’s assetsassets

• Ensures accuracy and reliability of Ensures accuracy and reliability of records, and operational adherence to records, and operational adherence to management standardsmanagement standards

CREATING A CONTROL ENVIRONMENT

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Overview

Page 14: Chapter14 Information Systems Security and Control

14.14 © 2003 by Prentice Hall

General controlsGeneral controls

• Establish framework for controlling Establish framework for controlling design, security, and use of computer design, security, and use of computer programs programs

• Include software, hardware, computer Include software, hardware, computer operations, data security, implementation, operations, data security, implementation, and administrative controlsand administrative controls

CREATING A CONTROL ENVIRONMENT

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

General Controls and Application Controls

Page 15: Chapter14 Information Systems Security and Control

14.15 © 2003 by Prentice Hall

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Security Profiles for a Personnel System

CREATING A CONTROL ENVIRONMENT

Figure 14-4

Page 16: Chapter14 Information Systems Security and Control

14.16 © 2003 by Prentice Hall

Application controlsApplication controls

• Unique to each computerized applicationUnique to each computerized application

• Include input, processing, and output Include input, processing, and output controlscontrols

CREATING A CONTROL ENVIRONMENT

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

General Controls and Application Controls

Page 17: Chapter14 Information Systems Security and Control

14.17 © 2003 by Prentice Hall

• On-line transaction processing:On-line transaction processing: Transactions entered online are Transactions entered online are immediately processed by computerimmediately processed by computer

• Fault-tolerant computer systems:Fault-tolerant computer systems: Contain extra hardware, software, and Contain extra hardware, software, and power supply componentspower supply components

CREATING A CONTROL ENVIRONMENT

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Protecting the Digital Firm

Page 18: Chapter14 Information Systems Security and Control

14.18 © 2003 by Prentice Hall

• High-availability computing:High-availability computing: Tools and Tools and technologies enabling system to recover technologies enabling system to recover from a crashfrom a crash

• Disaster recovery plan:Disaster recovery plan: Runs business Runs business in event of computer outagein event of computer outage

• Load balancing:Load balancing: Distributes large Distributes large number of requests for access among number of requests for access among multiple servers multiple servers

CREATING A CONTROL ENVIRONMENT

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Protecting the Digital Firm

Page 19: Chapter14 Information Systems Security and Control

14.19 © 2003 by Prentice Hall

• Mirroring:Mirroring: Duplicating all processes and Duplicating all processes and transactions of server on backup server to transactions of server on backup server to prevent any interruptionprevent any interruption

• Clustering:Clustering: Linking two computers Linking two computers together so that a second computer can together so that a second computer can act as a backup to the primary computer act as a backup to the primary computer or speed up processingor speed up processing

CREATING A CONTROL ENVIRONMENT

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Protecting the Digital Firm

Page 20: Chapter14 Information Systems Security and Control

14.20 © 2003 by Prentice Hall

FirewallsFirewalls

• Prevent unauthorized users from Prevent unauthorized users from accessing private networksaccessing private networks

• Two types: proxies and stateful inspectionTwo types: proxies and stateful inspection

Intrusion Detection SystemIntrusion Detection System

• Monitors vulnerable points in network to Monitors vulnerable points in network to detect and deter unauthorized intrudersdetect and deter unauthorized intruders

CREATING A CONTROL ENVIRONMENT

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Internet Security Challenges

Page 21: Chapter14 Information Systems Security and Control

14.21 © 2003 by Prentice Hall

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Figure 14-5

CREATING A CONTROL ENVIRONMENT

Internet Security Challenges

Page 22: Chapter14 Information Systems Security and Control

14.22 © 2003 by Prentice Hall

• Encryption:Encryption: Coding and scrambling of Coding and scrambling of messages to prevent their access without messages to prevent their access without authorizationauthorization

• Authentication:Authentication: Ability of each party in a Ability of each party in a transaction to ascertain identity of other transaction to ascertain identity of other partyparty

• Message integrity:Message integrity: Ability to ascertain Ability to ascertain that transmitted message has not been that transmitted message has not been copied or alteredcopied or altered

CREATING A CONTROL ENVIRONMENT

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Security and Electronic Commerce

Page 23: Chapter14 Information Systems Security and Control

14.23 © 2003 by Prentice Hall

• Digital signature:Digital signature: Digital code attached Digital code attached to electronically transmitted message to to electronically transmitted message to uniquely identify contents and senderuniquely identify contents and sender

• Digital certificate:Digital certificate: Attachment to Attachment to electronic message to verify the sender electronic message to verify the sender and to provide receiver with means to and to provide receiver with means to encode replyencode reply

CREATING A CONTROL ENVIRONMENT

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Security and Electronic Commerce

Page 24: Chapter14 Information Systems Security and Control

14.24 © 2003 by Prentice Hall

• Secure Electronic Transaction (SET):Secure Electronic Transaction (SET): Standard for securing credit card Standard for securing credit card transactions over Internet and other transactions over Internet and other networksnetworks

CREATING A CONTROL ENVIRONMENT

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Security and Electronic Commerce

Page 25: Chapter14 Information Systems Security and Control

14.25 © 2003 by Prentice Hall

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Public Key Encryption

CREATING A CONTROL ENVIRONMENT

Figure 14-6

Page 26: Chapter14 Information Systems Security and Control

14.26 © 2003 by Prentice Hall

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Digital Certificates

CREATING A CONTROL ENVIRONMENT

Figure 14-7

Page 27: Chapter14 Information Systems Security and Control

14.27 © 2003 by Prentice Hall

Criteria for determining control Criteria for determining control

structurestructure

• Importance of dataImportance of data

• Efficiency, complexity, and expense of Efficiency, complexity, and expense of each control techniqueeach control technique

• Level of risk if a specific activity or Level of risk if a specific activity or process is not properly controlledprocess is not properly controlled

CREATING A CONTROL ENVIRONMENT

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Developing a Control Structure: Costs and Benefits

Page 28: Chapter14 Information Systems Security and Control

14.28 © 2003 by Prentice Hall

MIS auditMIS audit

• Identifies all controls that govern Identifies all controls that govern individual information systems and individual information systems and assesses their effectivenessassesses their effectiveness

CREATING A CONTROL ENVIRONMENT

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

The Role of Auditing in the Control Process

Page 29: Chapter14 Information Systems Security and Control

14.29 © 2003 by Prentice Hall

ENSURING SYSTEM QUALITY

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Sample Auditor’s List of Control Weaknesses

Figure 14-8

Page 30: Chapter14 Information Systems Security and Control

14.30 © 2003 by Prentice Hall

• Development methodology:Development methodology: Collection Collection of methods, for every activity within every of methods, for every activity within every phase of development projectphase of development project

• Structured:Structured: Refers to fact that Refers to fact that techniques are carefully drawn up, step-techniques are carefully drawn up, step-by-step, with each step building on a by-step, with each step building on a previous oneprevious one

ENSURING SYSTEM QUALITY

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Software Quality Assurance Methodologies and Tools

Page 31: Chapter14 Information Systems Security and Control

14.31 © 2003 by Prentice Hall

• Structured analysis:Structured analysis: Method for Method for defining system inputs, processes, and defining system inputs, processes, and outputs, for partitioning systems into outputs, for partitioning systems into subsystems or modules subsystems or modules

• Data Flow Diagram (DFD):Data Flow Diagram (DFD): Graphically Graphically illustrates system’s component processes illustrates system’s component processes and flow of dataand flow of data

ENSURING SYSTEM QUALITY

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Software Quality Assurance Methodologies and Tools

Page 32: Chapter14 Information Systems Security and Control

14.32 © 2003 by Prentice Hall

ENSURING SYSTEM QUALITY

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Data Flow Diagram for Mail-in University Registration System

Figure 14-9

Page 33: Chapter14 Information Systems Security and Control

14.33 © 2003 by Prentice Hall

• Structured design:Structured design: Encompasses set of Encompasses set of design rules and techniques for designing design rules and techniques for designing systems systems

• Structured programming:Structured programming: Organizing Organizing and coding programs that simplify control and coding programs that simplify control paths paths

• System flowchart:System flowchart: Graphic design tool Graphic design tool depicting physical media and sequence of depicting physical media and sequence of processing steps processing steps

ENSURING SYSTEM QUALITY

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Software Quality Assurance Methodologies and Tools

Page 34: Chapter14 Information Systems Security and Control

14.34 © 2003 by Prentice Hall

ENSURING SYSTEM QUALITY

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

High-Level Structure Chart For a Payroll System

Figure 14-10

Page 35: Chapter14 Information Systems Security and Control

14.35 © 2003 by Prentice Hall

ENSURING SYSTEM QUALITY

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Basic Program Control Constructs

Figure 14-11

Page 36: Chapter14 Information Systems Security and Control

14.36 © 2003 by Prentice Hall

ENSURING SYSTEM QUALITY

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

System Flow-Chart for a Payroll System

Figure 14-12

Page 37: Chapter14 Information Systems Security and Control

14.37 © 2003 by Prentice Hall

• Inflexible Inflexible

• Time-consumingTime-consuming

ENSURING SYSTEM QUALITY

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Limitation of Traditional Methods

Page 38: Chapter14 Information Systems Security and Control

14.38 © 2003 by Prentice Hall

• Automation of step-by-step methodologies Automation of step-by-step methodologies for software and systems development for software and systems development

• Reduces repetitive workReduces repetitive work

• Enforces standard development Enforces standard development methodology and design disciplinemethodology and design discipline

• Improves communication between users Improves communication between users and technical specialistsand technical specialists

ENSURING SYSTEM QUALITY

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Computer-Aided Software Engineering (CASE)

Page 39: Chapter14 Information Systems Security and Control

14.39 © 2003 by Prentice Hall

• Organizes and correlates design Organizes and correlates design componentscomponents

• Automates tedious and error-prone Automates tedious and error-prone portion of analysis and design, code portion of analysis and design, code generation, testing, and control rolloutgeneration, testing, and control rollout

ENSURING SYSTEM QUALITY

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Computer-Aided Software Engineering (CASE)

Page 40: Chapter14 Information Systems Security and Control

14.40 © 2003 by Prentice Hall

Resource allocationResource allocation

• Determines how costs, time, and Determines how costs, time, and personnel are assigned to different personnel are assigned to different phases of systems development projectphases of systems development project

ENSURING SYSTEM QUALITY

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Resource Allocation During Systems Development

Page 41: Chapter14 Information Systems Security and Control

14.41 © 2003 by Prentice Hall

• Objective assessment of software used in Objective assessment of software used in the system in form of quantified the system in form of quantified measurementsmeasurements

ENSURING SYSTEM QUALITY

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Software Metrics

Page 42: Chapter14 Information Systems Security and Control

14.42 © 2003 by Prentice Hall

• Walkthrough:Walkthrough: Review of specification or Review of specification or design document by small group of people design document by small group of people

• Debugging:Debugging: Process of discovering and Process of discovering and eliminating errors and defects in program eliminating errors and defects in program codecode

ENSURING SYSTEM QUALITY

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Testing

Page 43: Chapter14 Information Systems Security and Control

14.43 © 2003 by Prentice Hall

Data quality auditData quality audit

• Survey and/or sample of files Survey and/or sample of files

• Determines accuracy and completeness of Determines accuracy and completeness of data data

Data cleansingData cleansing

• Correcting errors and inconsistencies in Correcting errors and inconsistencies in data to increase accuracy data to increase accuracy

ENSURING SYSTEM QUALITY

Essentials of Management Information SystemsEssentials of Management Information SystemsChapter 14 Information Systems Security and ControlChapter 14 Information Systems Security and Control

Data Quality Audit and Data Cleansing

Page 44: Chapter14 Information Systems Security and Control

14.44 © 2003 by Prentice Hall

1414

INFORMATIONINFORMATION

SYSTEMSSYSTEMS

SECURITY ANDSECURITY AND

CONTROLCONTROL

Chapter