220 likes | 239 Views
Managing Information Systems. Information Systems Security and Control Part 1 Dr. Stephania Loizidou Himona ACSC 345. Objectives. Demonstrate the differences in vulnerability between traditional systems and Information Systems Demonstrate the impact of Information System vulnerability
E N D
Managing Information Systems Information Systems Security and Control Part 1 Dr. Stephania Loizidou Himona ACSC 345
Objectives • Demonstrate the differences in vulnerability between traditional systems and Information Systems • Demonstrate the impact of Information System vulnerability • Demonstrate why Information Systems are vulnerable Dr. S. Loizidou - ACSC345
Protecting Information Systems • Information Systems are now very important within organisations • Disabling or corrupting these Information Systems can lead to significant loss • Financial impact • Loss of life / health and safety issues Dr. S. Loizidou - ACSC345
On-line Auction Site8 Hour Downtime Dr. S. Loizidou - ACSC345 Technology Spotlight: The Financial Impact of Site Outages. The Industry Standard, 1999
Vulnerability • Why are Information Systems more vulnerable than paper-based systems? Dr. S. Loizidou - ACSC345
Vulnerability • Paper-based systems • Documents / data stored in filing cabinets • Secured by physical access • Information systems: • Data stored electronically • Logical, rather than physical, access Dr. S. Loizidou - ACSC345
Vulnerability • Information Systems open to more vulnerabilities than paper-based systems Dr. S. Loizidou - ACSC345
Security • What examples of threats to Information Systems can you think of? Dr. S. Loizidou - ACSC345
Malicious Intent • Hackers • Person who gains unauthorised access to a system for profit, criminal purpose or pleasure • Trojan horse • Program that has hidden, secondary purpose • Denial of service • Overwhelm server with requests to disable • (Partially) countered by security procedures Dr. S. Loizidou - ACSC345
Malicious Intent • Viruses • Software that is difficult to detect, spreads rapidly, destroys data, processing and memory • Logic bomb • Timed virus • (Partially) countered by anti-virus software Dr. S. Loizidou - ACSC345
Malicious Intent? • The vulnerability of Information Systems is not just restricted to external security threats Dr. S. Loizidou - ACSC345
Vulnerability • What other types of vulnerability do Information Systems have? Dr. S. Loizidou - ACSC345
Vulnerability • Threats: • Hardware failure (disk crash, Pentium bug) • Software failure (bugs, design flaws) • Personal actions (accidental, malicious) • Terminal access penetration (hacking) • Theft of data, services or equipment (virus) Dr. S. Loizidou - ACSC345
Vulnerability • Threats: • Fire (also true of paper-based systems) • Electrical problems (downtime) • User errors (wrong data) • Program changes (upgrades, assumptions) • Telecommunications (Internet, wireless) Dr. S. Loizidou - ACSC345
Concerns • Disaster: • Hardware, software, data destroyed by fire, flood, power failures, etc. • Software and data may not be replaceable • Significant (financial) loss • Backup, fault tolerance • Disaster recovery planning • Standby sites, equipment, personnel Dr. S. Loizidou - ACSC345
Concerns • Security • Policies, procedures, technical measures • Prevent unauthorised access, theft, damage • Errors • Software bugs can cause significant loss • Financial: rounding errors? • Life: missile systems Dr. S. Loizidou - ACSC345
Data quality problems: Data preparation Conversion Input Form completion On-line data entry Keypunching Scanning Validation Processing File maintenance Output Transmission Distribution Data Quality Dr. S. Loizidou - ACSC345
Software Quality • What types of problems may a software system have? Dr. S. Loizidou - ACSC345
Software Quality • Software problems • Bugs • Defects (wrong requirements) • Misinterpretation of requirements • Incorrect assumptions Dr. S. Loizidou - ACSC345
Software Quality • The more complex a system is, the less likely it is to be bug free • Impractical to test all paths of complex code • Difficult to test • Too much time required • Total Quality Management • Can only improve quality, not eliminate bugs • Uncertain what bugs remain and their impact Dr. S. Loizidou - ACSC345
Maintenance • Maintenance of software systems should be built into the design • Maintenance is the most expensive phase of a system • Complexity • Associated organisational changes • (Regression) testing overheads • More expensive to fix bugs as implementation proceeds Dr. S. Loizidou - ACSC345