Скачать презентацию Managing Information Systems Security and Control Part 2 Скачать презентацию Managing Information Systems Security and Control Part 2

f5aa7ebf1efcb96f21690349b421ce86.ppt

  • Количество слайдов: 23

Managing Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345 Managing Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345 Dr. S. Loizidou - ACSC 345

Objectives § Demonstrate that Information System vulnerabilities can be controlled § Demonstrate the ways Objectives § Demonstrate that Information System vulnerabilities can be controlled § Demonstrate the ways in which Information Systems can be controlled in an organisation § Demonstrate some of the technologies that can be used to control Information Systems vulnerabilities Dr. S. Loizidou - ACSC 345 2

Controlling Information Systems § Recall there are numerous threats to Information Systems – Hardware Controlling Information Systems § Recall there are numerous threats to Information Systems – Hardware failures – Software failures – Upgrade issues – Disasters – Malicious intent Dr. S. Loizidou - ACSC 345 3

Controlling Information Systems § To minimise likelihood of threats, must control the environment in Controlling Information Systems § To minimise likelihood of threats, must control the environment in which Information Systems are developed and deployed § Controls put in place to: – Manually control environment of Information Systems – Automatically add controls to Information Systems Dr. S. Loizidou - ACSC 345 4

Controlling Information Systems § Implemented through – Policies – Procedures – Standards § Control Controlling Information Systems § Implemented through – Policies – Procedures – Standards § Control must be thought about through all stages of Information Systems analysis, construction, deployment operations and maintenance Dr. S. Loizidou - ACSC 345 5

Controlling Information Systems § What sort of controls can be put in place? Dr. Controlling Information Systems § What sort of controls can be put in place? Dr. S. Loizidou - ACSC 345 6

Controls § General controls – Controls for design, security and use of Information Systems Controls § General controls – Controls for design, security and use of Information Systems throughout the organisation § Application controls – Specific controls for each application – User functionality specific Dr. S. Loizidou - ACSC 345 7

General Controls § Implementation controls – Audit system development – Ensure properly managed and General Controls § Implementation controls – Audit system development – Ensure properly managed and controlled – Ensure user involvement – Ensure procedures and standards are in use § Software controls – Authorised access to systems Dr. S. Loizidou - ACSC 345 8

General Controls § Hardware controls – Physically secure hardware – Monitor for and fix General Controls § Hardware controls – Physically secure hardware – Monitor for and fix malfunction – Environmental systems and protection – Backup of disk-based data Dr. S. Loizidou - ACSC 345 9

General Controls § Computer operations controls – Day-to-day operations of Information Systems – Procedures General Controls § Computer operations controls – Day-to-day operations of Information Systems – Procedures – System set-up – Job processing – Backup and recovery procedures Dr. S. Loizidou - ACSC 345 10

General Controls § Data security controls – Prevent unauthorised access, change or destruction – General Controls § Data security controls – Prevent unauthorised access, change or destruction – When data is in use or being stored – Physical access to terminals – Password protection – Data level access controls Dr. S. Loizidou - ACSC 345 11

General Controls § Administrative controls – Ensure organisational policies, procedures and standards and enforced General Controls § Administrative controls – Ensure organisational policies, procedures and standards and enforced – Segregation of functions to reduce errors and fraud – Supervision of personal to ensure policies and procedures are being adhered to Dr. S. Loizidou - ACSC 345 12

Application Controls § Input controls – Data is accurate and consistent on entry – Application Controls § Input controls – Data is accurate and consistent on entry – Direct keying of data, double entry or automated input – Data conversion, editing and error handling – Field validation on entry – Input authorisation and auditing – Checks on totals to catch errors Dr. S. Loizidou - ACSC 345 13

Application Controls § Processing controls – Data is accurate and complete on processing – Application Controls § Processing controls – Data is accurate and complete on processing – Checks on totals to catch errors – Compare to master records to catch errors – Field validation on update Dr. S. Loizidou - ACSC 345 14

Application Controls § Output controls – Data is accurate, complete and properly distributed on Application Controls § Output controls – Data is accurate, complete and properly distributed on output – Checks on totals to catch errors – Review processing logs – Track recipients of data Dr. S. Loizidou - ACSC 345 15

Protecting Information Systems § What sorts of technology can we use to implement Information Protecting Information Systems § What sorts of technology can we use to implement Information Systems controls? Dr. S. Loizidou - ACSC 345 16

Protecting Information Systems § Information Systems, especially TPS, require high degrees of availability § Protecting Information Systems § Information Systems, especially TPS, require high degrees of availability § Technology is available to ensure systems are available and contain accurate information Dr. S. Loizidou - ACSC 345 17

High Availability Computing § Systems available for most of the time (some downtime allowed) High Availability Computing § Systems available for most of the time (some downtime allowed) – Recover quickly from crash / downtime – Redundant servers and clustering – Mirroring of data and networked storage – Load balancing – Scalable and robust infrastructure – Disaster recovery planning Dr. S. Loizidou - ACSC 345 18

Fault Tolerant Computing § Systems available all the time (no downtime allowed) – Specialist Fault Tolerant Computing § Systems available all the time (no downtime allowed) – Specialist hardware § HP Non. Stop (Tandem), Stratos – Detect and correct faults in hardware and software to keep processing Dr. S. Loizidou - ACSC 345 19

Network Security § Permanent (open) network connectivity: Internet, Extranet, wireless – Firewall: proxy or Network Security § Permanent (open) network connectivity: Internet, Extranet, wireless – Firewall: proxy or stateful inspection – Firewalls must be managed and part of security policy – Encryption: public key, SSL of S-HTTP – Authentication and integrity – Digital signatures and certificates Dr. S. Loizidou - ACSC 345 20

Developing Control § § § Lots of threats to Information Systems Lots of controls Developing Control § § § Lots of threats to Information Systems Lots of controls required Decision on which controls to use based upon likelihood of threat and cost § Risk assessment – Likely frequency of threat – Cost of damage – Cost of implementation Dr. S. Loizidou - ACSC 345 21

HOMEWORK Dr. S. Loizidou - ACSC 345 22 HOMEWORK Dr. S. Loizidou - ACSC 345 22

HOMEWORK Dr. S. Loizidou - ACSC 345 23 HOMEWORK Dr. S. Loizidou - ACSC 345 23