You are on page 1of 23

Managing Information Systems

Information Systems Security and Control


Part 2
Section 14.2

1
Objectives
• Demonstrate that Information System
vulnerabilities can be controlled
• Demonstrate the ways in which Information
Systems can be controlled in an
organisation
• Demonstrate some of the technologies that
can be used to control Information Systems
vulnerabilities

2
Controlling Information Systems
• Recall there are numerous threats to
Information Systems
– Hardware failures
– Software failures
– Upgrade issues
– Disasters
– Malicious intent

3
Controlling Information Systems
• To minimise likelihood of threats, must
control the environment in which
Information Systems are developed and
deployed
• Controls put in place to:
– Manually control environment of Information
Systems
– Automatically add controls to Information
Systems
4
Controlling Information Systems
• Implemented through
– Policies
– Procedures
– Standards
• Control must be thought about through all
stages of Information Systems analysis,
construction, deployment operations and
maintenance

5
Controlling Information Systems
• What sort of controls can be put in place?

6
Controls
• General controls
– Controls for design, security and use of
Information Systems throughout the
organisation
• Application controls
– Specific controls for each application
– User functionality specific

7
General Controls
• Implementation controls
– Audit system development
– Ensure properly managed and controlled
– Ensure user involvement
– Ensure procedures and standards are in use
• Software controls
– Authorised access to systems

8
General Controls
• Hardware controls
– Physically secure hardware
– Monitor for and fix malfunction
– Environmental systems and protection
– Backup of disk-based data

9
General Controls
• Computer operations controls
– Day-to-day operations of Information Systems
– Procedures
– System set-up
– Job processing
– Backup and recovery procedures

10
General Controls
• Data security controls
– Prevent unauthorised access, change or
destruction
– When data is in use or being stored
– Physical access to terminals
– Password protection
– Data level access controls

11
General Controls
• Administrative controls
– Ensure organisational policies, procedures and
standards and enforced
– Segregation of functions to reduce errors and
fraud
– Supervision of personal to ensure policies and
procedures are being adhered to

12
Application Controls
• Input controls
– Data is accurate and consistent on entry
– Direct keying of data, double entry or
automated input
– Data conversion, editing and error handling
– Field validation on entry
– Input authorisation and auditing
– Checks on totals to catch errors
13
Application Controls
• Processing controls
– Data is accurate and complete on processing
– Checks on totals to catch errors
– Compare to master records to catch errors
– Field validation on update

14
Application Controls
• Output controls
– Data is accurate, complete and properly
distributed on output
– Checks on totals to catch errors
– Review processing logs
– Track recipients of data

15
Protecting Information Systems
• What sorts of technology can we use to
implement Information Systems controls?

16
Protecting Information Systems
• Information Systems, especially TPS,
require high degrees of availability
• Technology is available to ensure systems
are available and contain accurate
information

17
High Availability Computing
• Systems available for most of the time
(some downtime allowed)
– Recover quickly from crash / downtime
– Redundant servers and clustering
– Mirroring of data and networked storage
– Load balancing
– Scalable and robust infrastructure
– Disaster recovery planning

18
Fault Tolerant Computing
• Systems available all the time (no downtime
allowed)
– Specialist hardware
• HP NonStop (Tandem), Stratos
– Detect and correct faults in hardware and
software to keep processing

19
Network Security
• Permanent (open) network connectivity:
Internet, Extranet, wireless
– Firewall: proxy or stateful inspection
– Firewalls must be managed and part of security
policy
– Encryption: public key, SSL of S-HTTP
– Authentication and integrity
– Digital signatures and certificates
20
Developing Control
• Lots of threats to Information Systems
• Lots of controls required
• Decision on which controls to use based
upon likelihood of threat and cost
• Risk assessment
– Likely frequency of threat
– Cost of damage
– Cost of implementation
21
HOMEWORK

22
HOMEWORK

23

You might also like