how to secure mis

30

Upload: aadi-malik

Post on 27-Jun-2015

96 views

Category:

Business


1 download

DESCRIPTION

MANAGEMENT INFORMATION SYSTEM

TRANSCRIPT

Page 1: How To Secure MIS
Page 2: How To Secure MIS
Page 3: How To Secure MIS

MALIK TOUQEER

BBA(HONS) THE ISLAMIA UNIVERSITY BAHAWALPUR PAKISTAN

Page 4: How To Secure MIS

SECURING MANAGEMENT INFORMATION

SYSTEM

Page 5: How To Secure MIS

Introduction to MIS

An MIS provides managers with information and support for effective decision making, and provides feedback on daily operations.

MIS is a system, which makes available the Right Information to the Right Person at the Right place at the Right Time in the Right Form and at Right Cost.

Page 6: How To Secure MIS

The quality or state of being secure to be free from danger Security is achieved using several strategies simultaneously or used in

combination with one another Security is recognized as essential to protect vital processes and the

systems that provide those processes Security is not something you buy, it is something you do

What is security?

Page 7: How To Secure MIS

Vulnerability, Threat and Attack A vulnerability:- is a weakness in security system

Can be in design, implementation, etc. Can be hardware, or software

A threat:- is a set of circumstances that has the potential to cause loss or harm Or it’s a potential violation of security Threat can be:

Accidental (natural disasters, human error, …) Malicious (attackers, insider fraud, …)

An attack:- is the actual violation of security

Page 8: How To Secure MIS

Why Systems are Vulnerable?

Hardware problems-• Breakdowns, configuration errors, damage from

improper use or crime Software problems-

• Programming errors, installation errors, unauthorized changes)

Disasters-• Power failures, flood, fires, etc.

Use of networks and computers outside of firm’s control -• E.g. with domestic or offshore outsourcing vendors

Page 9: How To Secure MIS

SO HOW DO WE OVERCOME THESE PROBLEMS???

Page 10: How To Secure MIS

BUSINESS VALUE OF SECURITY AND CONTROL

• Inadequate security and control may create serious legal liability.• Businesses must protect not only their own information assets but also

those of customers, employees, and business partners. Failure to do so can lead to costly litigation for data exposure or theft.

• A sound security and control framework that protects business information assets can thus produce a high return on investment.

Page 11: How To Secure MIS

ESTABLISHING A MANAGEMENT FRAMEWORK FOR SECURITY AND CONTROL

General controls:Establish framework for controlling design, security, and use of computer programs

• Software controls

• Hardware controls

• Computer operations controls

• Data security controls

• Implementation controls

Page 12: How To Secure MIS

ESTABLISHING A MANAGEMENT FRAMEWORK FOR SECURITY AND CONTROL

Application controls:

• Input • Processing• Output

Unique to each computerized application

Page 13: How To Secure MIS

CREATING A CONTROL ENVIRONMENT

Controls:-

• Methods, policies, and procedures

• Ensures protection of organization’s assets

• Ensures accuracy and reliability of records, and operational adherence to management standards

Page 14: How To Secure MIS

Worldwide Damage from Digital Attacks

Page 15: How To Secure MIS

CREATING A CONTROL ENVIRONMENT

Disaster recovery plan: Runs business in event of computer outage

Load balancing: Distributes large number of requests for access among

multiple servers

Page 16: How To Secure MIS

CREATING A CONTROL ENVIRONMENT

• Mirroring: Duplicating all processes and transactions of server on

backup server to prevent any interruption

• Clustering: Linking two computers together so that a second computer can act

as a backup to the primary computer or speed up processing

Page 17: How To Secure MIS

CREATING A CONTROL ENVIRONMENT

Internet Security Challenges

Firewalls:-

• Hardware and software controlling flow of incoming and outgoing network traffic

• Prevent unauthorized users from accessing private networks

• Two types: proxies and stateful inspection

Intrusion Detection System:-

• Monitors vulnerable points in network to detect and deter unauthorized intruders

Page 18: How To Secure MIS

Figure 10-7

A Corporate Firewall

Page 19: How To Secure MIS

Because they can A large fraction of hacker attacks have been pranks

Financial Gain Espionage Venting anger at a company or organization Terrorism

Why do Hackers Attack?

Page 20: How To Secure MIS

Access Control - Physical

USER RESPONSIBILITIES

• Follow Security Procedures• Wear Identity Cards• Ask unauthorized visitor his credentials• Attend visitors in Reception and Conference Room only

• Bring visitors in operations area without prior permission

• Bring hazardous and combustible material in secure area

• Practice “Piggybacking”

• Bring and use pen drives, zip drives, ipods, other storage devices unless and otherwise authorized to do so

Page 21: How To Secure MIS

Password Guidelines

Always use at least 8 character password with combination of alphabets, numbers and special characters (*, %, @, #, $, ^)

Use passwords that can be easily remembered by you Change password regularly as per policy Use password that is significantly different from earlier passwords Use passwords which reveals your personal information or words found

in dictionaryWrite down or Store passwordsShare passwords over phone or EmailUse passwords which do not match above complexity criteria

Page 22: How To Secure MIS

Dictionary Attack

Hacker tries all words in dictionary to crack password 70% of the people use dictionary words as passwords

Brute Force Attack

Try all permutations of the letters & symbols in the alphabet Hybrid Attack

Words from dictionary and their variations used in attack Shoulder Surfing

Hackers slyly watch over peoples shoulders to steal passwords Dumpster Diving

People dump their trash papers in garbage which may contain information to crack passwords

Password Attacks - Types

Page 23: How To Secure MIS

Internet Usage

Use internet services for business purposes only

Do not access internet through dial-up connectivity Do not use internet for accessing auction sites Do not use internet for hacking other computer systems Do not use internet to download / upload commercial software /

copyrighted material Technology Department is continuously monitoring Internet

Usage. Any illegal use of internet and other assets shall call for Disciplinary Action.

Page 24: How To Secure MIS

CREATING A CONTROL ENVIRONMENTAntivirus Software

Antivirus software: -

Software that checks computer systems and drives for the presence of computer viruses and can eliminate the virus from the infected area

• Wi-Fi Protected Access specification

Page 25: How To Secure MIS

This NEC PC has a biometric fingerprint reader for fast yet secure access to files and networks. New models of PCs are starting to use biometric identification to authenticate users

Page 26: How To Secure MIS

MANAGEMENT CHALLENGES

Implementing an effective security policy Applying quality assurance standards in large systems projects

What are the most important software quality assurance techniques?

Why are auditing information systems and safeguarding data quality so important?

Page 27: How To Secure MIS

Solution Guidelines

• Security and control must become a more visible and explicit priority and area of information systems investment.

• Support and commitment from top management is required to show that security is indeed a corporate priority and vital to all aspects of the business.

• Security and control should be the responsibility of everyone in the organization.

Page 28: How To Secure MIS

. . . LET US BUILD A HUMAN WALL ALONG WITH FIREWALL

Human Wall Is Always Better Than A Firewall

Page 29: How To Secure MIS
Page 30: How To Secure MIS