Title: Laudon
114
INFORMATION SYSTEMS SECURITY CONTROL
2LEARNING OBJECTIVES
- DEMONSTRATE WHY INFO SYSTEMS ARE VULNERABLE TO
DESTRUCTION, ERROR, ABUSE, QUALITY CONTROL
PROBLEMS - COMPARE GENERAL AND APPLICATION CONTROLS
3LEARNING OBJECTIVES
- DESCRIBE MEASURES TO ENSURE RELIABILITY,
AVAILABILITY, SECURITY OF E-COMMERCE, DIGITAL
BUSINESS PROCESSES
4LEARNING OBJECTIVES
- DESCRIBE IMPORTANT SOFTWARE QUALITY- ASSURANCE
TECHNIQUES - DEMONSTRATE IMPORTANCE OF AUDITING INFO SYSTEMS
SAFEGUARDING DATA QUALITY
5MANAGEMENT CHALLENGES
- SYSTEM VULNERABILITY ABUSE
- CREATING A CONTROL ENVIRONMENT
- ENSURING SYSTEM QUALITY
6SYSTEM VULNERABILITY ABUSE
- WHY SYSTEMS ARE VULNERABLE
- HACKERS VIRUSES
- CONCERNS FOR BUILDERS USERS
- SYSTEM QUALITY PROBLEMS
7THREATS TO INFORMATION SYSTEMS
- HARDWARE FAILURE, FIRE
- SOFTWARE FAILURE, ELECTRICAL PROBLEMS
- PERSONNEL ACTIONS, USER ERRORS
- ACCESS PENETRATION, PROGRAM CHANGES
- THEFT OF DATA, SERVICES, EQUIPMENT
TELECOMMUNICATIONS PROBLEMS
8WHY SYSTEMS ARE VULNERABLE
- SYSTEM COMPLEXITY
- COMPUTERIZED PROCEDURES NOT ALWAYS READ OR
AUDITED - EXTENSIVE EFFECT OF DISASTER
- UNAUTHORIZED ACCESS POSSIBLE
9 VULNERABILITIES
- RADIATION Allows recorders, bugs to tap system
- CROSSTALK Can garble data
- HARDWARE Improper connections, failure of
protection circuits - SOFTWARE Failure of protection features, access
control, bounds control - FILES Subject to theft, copying, unauthorized
access
10 VULNERABILITIES
- USER Identification, authentication, subtle
software modification - PROGRAMMER Disables protective features reveals
protective measures - MAINTENANCE STAFF Disables hardware devices
uses stand-alone utilities - OPERATOR Doesnt notify supervisor, reveals
protective measures
11HACKERS COMPUTER VIRUSES
- HACKER Person gains access to computer for
profit, criminal mischief, personal pleasure - COMPUTER VIRUS Rogue program difficult to
detect spreads rapidly destroys data disrupts
processing memory
12COMMON COMPUTER VIRUSES
- CONCEPT, MELISSA Word documents, e-mail.
Deletes files - FORM Makes clicking sound, corrupts data
- EXPLORE.EXE Attached to e-mail, tries to e-mail
to others, destroys files - MONKEY Windows wont run
- CHERNOBYL Erases hard drive, ROM BIOS
- JUNKIE Infects files, boot sector, memory
conflicts
13ANTIVIRUS SOFTWARE
- SOFTWARE TO DETECT
- ELIMINATE VIRUSES
- ADVANCED VERSIONS RUN IN MEMORY TO PROTECT
PROCESSING, GUARD AGAINST VIRUSES ON DISKS, AND
ON INCOMING NETWORK FILES
14CONCERNS FOR BUILDERS USERS
- DISASTER
- BREACH OF SECURITY
- ERRORS
15DISASTER
- LOSS OF HARDWARE, SOFTWARE, DATA BY FIRE,
POWER FAILURE, FLOOD OR OTHER CALAMITY - FAULT-TOLERANT COMPUTER SYSTEMS Backup systems
to prevent system failure (particularly On-line
Transaction Processing)
16SECURITY
- POLICIES, PROCEDURES, TECHNICAL MEASURES TO
PREVENT UNAUTHORIZED ACCESS, ALTERATION, THEFT,
PHYSICAL DAMAGE TO INFORMATION SYSTEMS
17WHERE ERRORS OCCUR
- DATA PREPARATION
- TRANSMISSION
- CONVERSION
- FORM COMPLETION
- ON-LINE DATA ENTRY
- KEYPUNCHING SCANNING OTHER INPUTS
18WHERE ERRORS OCCUR
- VALIDATION
- PROCESSING / FILE MAINTENANCE
- OUTPUT
- TRANSMISSION
- DISTRIBUTION
19SYSTEM QUALITY PROBLEMS
- SOFTWARE DATA
- BUGS Program code defects or errors
- MAINTENANCE Modifying a system in production
use can take up to 50 of analysts time - DATA QUALITY PROBLEMS Finding, correcting
errors costly tedious
20COST OF ERRORS DURING SYSTEMS DEVELOPMENT CYCLE
21CREATING A CONTROL ENVIRONMENT
- CONTROLS Methods, policies, procedures to
protect assets accuracy reliability of
records adherence to management standards - GENERAL CONTROLS
- APPLICATION CONTROLS
22GENERAL CONTROLS
- IMPLEMENTATION Audit system development to
assure proper control, management - SOFTWARE Ensure security, reliability of
software - PHYSICAL HARDWARE Ensure physical security,
performance of computer hardware
23GENERAL CONTROLS
- COMPUTER OPERATIONS Ensure procedures
consistently, correctly applied to data storage,
processing - DATA SECURITY Ensure data disks, tapes protected
from wrongful access, change, destruction - ADMINISTRATIVE Ensure controls properly
executed, enforced - SEGREGATION OF FUNCTIONS Divide
responsibility from tasks
24APPLICATION CONTROLS
25INPUT CONTROLS
- INPUT AUTHORIZATION Record, monitor source
documents - DATA CONVERSION Transcribe data properly from
one form to another - BATCH CONTROL TOTALS Count transactions prior to
and after processing - EDIT CHECKS Verify input data, correct errors
26PROCESSING CONTROLS
- ESTABLISH THAT DATA IS COMPLETE, ACCURATE
DURING PROCESSING - RUN CONTROL TOTALS Generate control totals
before after processing - COMPUTER MATCHING Match input data to master
files
27OUTPUT CONTROLS
- ESTABLISH THAT RESULTS ARE ACCURATE, COMPLETE,
PROPERLY DISTRIBUTED - BALANCE INPUT, PROCESSING, OUTPUT TOTALS
- REVIEW PROCESSING LOGS
- ENSURE ONLY AUTHORIZED RECIPIENTS GET RESULTS
28SECURITY AND THE INTERNET
- ENCRYPTION Coding scrambling messages to deny
unauthorized access - AUTHENTICATION Ability to identify another party
- MESSAGE INTEGRITY
- DIGITAL SIGNATURE
- DIGITAL CERTIFICATE
29SECURITY AND THE INTERNET
PUBLIC KEY ENCRYPTION
30SECURITY AND THE INTERNET
- DIGITAL WALLET Software stores credit card,
electronic cash, owner ID, address for e-commerce
transactions - SECURE ELECTRONIC TRANSACTION Standard for
securing credit card transactions on Internet
31SECURITY AND THE INTERNET
ELECTRONIC PAYMENT SYSTEMS
- CREDIT CARD-SET Protocol for payment security
- ELECTRONIC CASH Digital currency
- ELECTRONIC CHECK Encrypted digital signature
- SMART CARD Chip stores e-cash
- ELECTRONIC BILL PAYMENT Electronic funds
transfer
32DEVELOPING A CONTROL STRUCTURE
- COSTS Can be expensive to build complicated to
use - BENEFITS Reduces expensive errors, loss of time,
resources, good will - RISK ASSESSMENT Determine frequency of
occurrence of problem, cost, damage if it were to
occur
33SYSTEM BUILDING APPROACHES
- STRUCTURED METHODOLOGIES
- COMPUTER AIDED SOFTWARE ENGINEERING (CASE)
- SOFTWARE REENGINEERING
34STRUCTURED METHODOLOGIES
- TOP DOWN, STEP BY STEP, EACH STEP BUILDS ON
PREVIOUS - STRUCTURED ANALYSIS
- STRUCTURED DESIGN
- STRUCTURED PROGRAMMING
- FLOWCHARTS
35 STRUCTURED ANALYSIS
- DEFINES SYSTEM INPUTS, PROCESSES, OUTPUTS
- PARTITIONS SYSTEM INTO SUBSYSTEMS OR MODULES
- LOGICAL, GRAPHICAL MODEL OF INFORMATION FLOW
- DATA FLOW DIAGRAM Graphical display of component
processes, flow of data
36SYMBOLS FOR DATA FLOW DIAGRAMS (DFD)
DATA FLOW
PROCESS
SOURCE OR SINK
FILE
37DATA FLOW DIAGRAM
38 STRUCTURED ANALYSIS
- DATA DICTIONARY Controlled definitions of
descriptions of all data, such as variable names
types of data - PROCESS SPECIFICATIONS Describes logic of
processes at module level
39STRUCTURED DESIGN
- DESIGN RULES / TECHNIQUES TO DESIGN SYSTEM,
TOP DOWN IN HIERARCHICAL FASHION - STRUCTURE CHART
- STRUCTURED PROGRAMMING
- MODULE
- SEQUENCE CONSTRUCT
- SELECTION CONSTRUCT
40HIGH LEVEL STRUCTURE CHART
HIGH LEVEL STRUCTURE CHART
41STRUCTURED PROGRAMMING
- DISCIPLINE TO ORGANIZE, CODE PROGRAMS
- SIMPLIFIES CONTROL PATHS
- EASY TO UNDERSTAND, MODIFY
- MODULE HAS ONE INPUT, ONE OUTPUT
42STRUCTURED PROGRAMMING
- MODULE Logical unit of program. performs
specific task(s) - SEQUENCE CONSTRUCT Sequential steps or actions
in program logic streamlines flow - SELECTION CONSTRUCT IF condition R is True THEN
action C ELSE action D - ITERATION CONSTRUCT WHILE Condition is True DO
action E
43PROGRAM FLOWCHART SYMBOLS
44PROGRAM FLOWCHART
1
START
2
READ
PRINT
gt10,000
REPORT
PROCESS A
lt10,000
2
MORE?
PROCESS B
1
END
45PROGRAM FLOWCHART
46SYSTEM FLOWCHART SYMBOLS
47SYSTEM FLOWCHART
48COMPUTER AIDED SOFTWARE ENGINEERING (CASE)
- AUTOMATION OF SOFTWARE METHODOLOGIES
- PRODUCES CHARTS DIAGRAMS SCREEN REPORT
GENERATORS DATA DICTIONARIES PROGRESS REPORTS
ANALYSIS CHECKING TOOLS CODE DOCUMENTATION
CASE
49COMPUTER AIDED SOFTWARE ENGINEERING (CASE)
- INCREASES PRODUCTIVITY QUALITY
- ENFORCES DEVELOPMENT DISCIPLINE
- IMPROVES COMMUNICATION
- DESIGN REPOSITORY FOR OBJECTS
- AUTOMATES TEDIOUS TASKS
- AUTOMATES TESTING CONTROL
- REQUIRES ORGANIZATIONAL DISCIPLINE
CASE
50MIS AUDIT
- IDENTIFIES CONTROLS OF INFORMATION SYSTEMS,
ASSESSES THEIR EFFECTIVENESS - SOFTWARE METRICS Objective measurements to
assess system - TESTING Early, regular controlled efforts to
detect, reduce errors - WALKTHROUGH
- DEBUGGING
- DATA QUALITY AUDIT Survey samples of files for
accuracy, completeness
5114
INFORMATION SYSTEMS SECURITY CONTROL