110 likes | 285 Views
Management Information Systems. The Islamia University of Bahawalpur Delivered by: Tasawar Javed Lecture 17. Information Security. Today’s talk E-Commerce Considerations The Disposable Credit Card Visa’s required Security Practices Risk Management Information Security Policy Controls.
E N D
Management Information Systems The Islamia University of Bahawalpur Delivered by: Tasawar Javed Lecture 17
Information Security • Today’s talk • E-Commerce Considerations • The Disposable Credit Card • Visa’s required Security Practices • Risk Management • Information Security Policy • Controls
Information Security • E-Commerce Consideration • New Security Concern • Not only protection of data • Not only protection of information • Not only protection of software But protection from Credit Card Fraud
Information Security • The Disposable Credit Card • American Express announced a “disposable” credit card • The fear came due to internet use • When user enter credit card number for purchasing; it creates the randomly generated number from the credit card company’s website; this number is given to the e-commerce retailer, who submits it to the credit card company for repayment. • Later on it was closed down; and disposable card was issued. On which you can make much more purchases. • Citibank offers Virtual Account Numbers, and MBNA has a program called ShopSafe.
Information Security • Visa’s Required Security Practices • Visa announced 10 security related practices • Install and maintain a firewall • Keep security patches up to date • Encrypt stored data • Encrypt transmitted data • Use and update antivirus software • Restrict data access to those with a need to know • Assign unique IDs to persons with data access privileges • Track data access with the unique ID • Not use vendor supplied password defaults • Regularly test the security system
Information Security • Risk Management • Identify business assets to be protected from risks • Recognize the risks • Determine the level of impact on the firm should the risks materialize • Analyze the firm’s vulnerabilities Impact could be severe Impact Impact could be Significant Impact Impact could be Minor Impact
Information Security • Risk Management should prepare the report • A description of the risk • Source of the risk • Severity of the risk • Controls that are being applied to the risk • The owner of the risk • Recommended action to address the risk • Recommended time frame for addressing the risk • What was done to mitigate the risk
Information Security • Information Security Policy • Phase 1- Project Initiation • Phase 2- Policy development • Phase 3- Consultation and approval • Phase 4- Awareness and education • Phase 5- Policy dissemination
Information Security Project team Phase 1 Security project steering com Establish Phase 2 Consultation Interested & affected parties Phase 3 Consultation management Phase 4 Organizational units Training awareness & policy education Phase 5 Organizational units Security Policies
Thank you!!! • Q&A