Bugs and DefectsComplete testing not possible The Maintenance Nightmare Maintenance costs high due to organizational change, software complexity, and faulty system analysis and design
Trang 1Information System Security
and Control
Trang 21 Why are information systems so vulnerable to
destruction, error, abuse, and system quality
problems?
2 What types of controls are available for
information systems?
3 What special measures must be taken to ensure
the reliability, availability and security of
electronic commerce, and digital business
processes?
Trang 34 What are the most important software quality
assurance techniques?
5 Why are auditing information systems and
safeguarding data quality so important?
Trang 4Management Challenges
1 Achieving a sensible balance between too little
control and too much.
.
2 Applying quality assurance standards in large
systems projects.
Trang 5• Accessibility to electronic data
• Increasingly complex software, hardware
• Network access points
• Wireless vulnerability
• Internet
System Vulnerability and Abuse
Why Systems Are Vulnerable
Trang 6System Vulnerability and Abuse
• Telecommunication problems
Threats to Computerized Information Systems
Trang 7System Vulnerability and Abuse
Telecommunications networks vulnerabilities
Trang 8Credit Card Fraud: Still on the Rise
• To what extent are Internet credit card thefts
management and organizational problems, and to
what extent are they technical problems?
• Address the technology and management issues
for both the credit card issuers and the retail
companies.
• Suggest possible ways to address the problem.
System Vulnerability and Abuse
Window on Organizations
Trang 9System Vulnerability and Abuse
Why Systems Are Vulnerable
Trang 10Smarter Worms and Viruses:
The Worst Is Yet to Come
• Why are worms so harmful?
• Describe their business and organizational impact.
System Vulnerability and Abuse
Window on Technology
Trang 11• Disaster
• Security
• Administrative error
• Cyberterrorism and Cyberwarfare
System Vulnerability and Abuse
Concerns for System Builders and Users
Trang 12System Vulnerability and Abuse
Points in the processing cycle where errors can occur
Figure 15-2
Trang 13Bugs and Defects
Complete testing not possible
The Maintenance Nightmare
Maintenance costs high due to organizational
change, software complexity, and faulty system
analysis and design
System Vulnerability and Abuse
System Quality Problems: Software and Data
Trang 14System Vulnerability and Abuse
The cost of errors over the systems development cycle
Figure 15-3
Trang 15Data Quality Problems
Caused by errors during data input or faulty
information system and database design
System Vulnerability and Abuse
System Quality Problems: Software and Data
Trang 16• Methods, policies, and procedures
• Protection of organization’s assets
• Accuracy and reliability of records
• Operational adherence to management standards
Creating a Control Environment
Trang 17General Controls
• Govern design, security, use of computer
programs throughout organization
• Apply to all computerized applications
• Combination of hardware, software, manual
procedures to create overall control environment
Creating a Control Environment
General Controls and Application Controls
Trang 18General Controls
• Software controls
• Hardware controls
• Computer operations controls
• Data security controls
• Implementation
• Administrative controls
Creating a Control Environment
General Controls and Application Controls
Trang 19Creating a Control Environment
Security profiles for a personnel system
Trang 20Application Controls
• Automated and manual procedures that ensure
only authorized data are processed by application
• Unique to each computerized application
• Classified as (1) input controls, (2) processing
controls, and (3) output controls.
Creating a Control Environment
General Controls and Application Controls
Trang 21Application Controls
Computer matching: Input, processing
Run control totals: Processing, output
Creating a Control Environment
General Controls and Application Controls
Trang 22• High-availability computing
• Fault-tolerant computer systems
• Disaster recovery planning
• Business continuity planning
• Load balancing; mirroring; clustering
• Recovery-oriented computing
• Managed security service providers (MSSPs)
Creating a Control Environment
Protecting the Digital Firm
Trang 23Internet Security Challenges
• Public, accessible network
• Abuses have widespread effect
• Fixed Internet addresses
Creating a Control Environment
Protecting the Digital Firm
Trang 24Creating a Control Environment
Internet security challenges
Figure 15-5
Trang 25• Firewall screening technologies
• Static packet filtering
• Stateful inspection
• Network address translation
• Application proxy filtering
• Intrusion detection systems
Creating a Control Environment
Protecting the Digital Firm
Trang 26Security and Electronic Commerce
• Public key infrastructure (PKI)
Creating a Control Environment
Protecting the Digital Firm
Trang 27Creating a Control Environment
Public key encryption
Trang 28Creating a Control Environment
Digital certificates
Figure 15-7
Trang 29Security for Wireless Internet Access
• Service set identifiers (SSID)
– Identify access points in network
– Form of password for user’s radio network interface
card
– Broadcast multiple time per second
Creating a Control Environment
Protecting the Digital Firm
Trang 30Creating a Control Environment
Wi-Fi security challenges
Figure 15-8
Trang 31• Wired Equivalent Privacy (WEP):
– Initial security standard
– Call for access point and all users to share the same
40-bit encrypted password
• Wi-Fi Protected Access (WPA) specification
– 128-bit, non-static encryption key
Creating a Control Environment
Protecting the Digital Firm
Trang 32Criteria for Determining Control Structure
Creating a Control Environment
Developing a Control Structure: Costs and Benefits
Trang 33MIS Audit
• Identifies all controls that govern individual
information systems and assesses their
effectiveness
• Lists and ranks all control weaknesses and
Creating a Control Environment
The Role of Auditing in the Control Process
Trang 34Creating a Control Environment
Sample auditor’s list of control weaknesses
Figure 15-9
Trang 35Development Methodology
• Collection of methods
• One or more method for every activity in every
phase of development project
Ensuring System Quality: Software and Data
Software Quality Assurance Methodologies and Tools
Trang 36Ensuring System Quality: Software and Data
Software Quality Assurance Methodologies and Tools
Trang 37Structured Analysis
• Defines system inputs, processes, outputs
• Logical graphic model of information flow
• Data flow diagram
• Data dictionary
Ensuring System Quality: Software and Data
Software Quality Assurance Methodologies and Tools
Trang 38Ensuring System Quality: Software and Data
Data flow diagram for mail-in university registration system
Figure 15-10
Trang 39Structured Design
• Set of design rules and techniques
• Promotes program clarity and simplicity
• Design from top-down; main functions and
subfunctions
• Structure chart
Ensuring System Quality: Software and Data
Software Quality Assurance Methodologies and Tools
Trang 40Ensuring System Quality: Software and Data
High-level structure chart for a payroll system
Figure 15-11
Trang 41Structured Programming
• Organizes and codes programs to simplify control
paths for easy use and modification
• Independent modules with one entry and exit point
• Three basic control constructs:
– Simple sequence
Ensuring System Quality: Software and Data
Software Quality Assurance Methodologies and Tools
Trang 42Ensuring System Quality: Software and Data
Basic program control constructs
Figure 15-12
Trang 43Limitations of Traditional Methods
• Can be inflexible and time-consuming
• Programming depends on completion of analysis
and design phases
• Specification changes require changes in analysis
and design documents first
Ensuring System Quality: Software and Data
Software Quality Assurance Methodologies and Tools
Trang 44Unified Modeling Language (UML)
• Industry standard for analysis and design of
object-oriented systems
• Represents different views using graphical
diagrams
• Underlying model integrates views for consistency
during analysis, design, and implementation
Ensuring System Quality: Software and Data
Software Quality Assurance Methodologies and Tools
Trang 45UML Components
• Things:
collaborations, use cases, active classes, components, nodes
Ensuring System Quality: Software and Data
Software Quality Assurance Methodologies and Tools
Trang 46UML Components
• Relationships
– Structural Dependencies, aggregations,
associations, generalizations – Behavioral Communicates, includes, extends,
generalizes
• Diagrams
– Structural Class, object, component, and deployment
diagrams – Behavioral Use case, sequence, collaboration, stateschart,
and activity diagrams Ensuring System Quality: Software and Data
Software Quality Assurance Methodologies and Tools
Trang 47Ensuring System Quality: Software and Data
A UML use-case diagram
Trang 48Ensuring System Quality: Software and Data
A UML sequence diagram
Figure 15-14
Trang 49Computer-Aided Software Engineering (CASE)
• Automation of step-by-step methodologies
• Reduce repetitive development work
• Support documentation creation and revisions
• Organize design components; design repository
• Support code generation
• Require organizational discipline
Ensuring System Quality: Software and Data
Software Quality Assurance Methodologies and Tools
Trang 50• Resource Allocation: Assigning costs, time,
personnel to different development phases
• Software Metrics: Quantified measurements of
systems performance
• Testing: Walkthroughs, debugging
Ensuring System Quality: Software and Data
Software Quality Assurance Methodologies and Tools
Trang 51• Data Quality Audit
– Survey end users for perceptions of data quality
– Survey entire data files
– Survey samples from data files
• Data Cleansing
– Correcting errors and inconsistencies in data between
business units
Ensuring System Quality: Software and Data
Data Quality Audits and Data Cleansing
Trang 521 Summarize the ISM security problem and its
impact on ISM and its clients.
2 Describe the control weaknesses of ISM and
those of its clients that made it possible for this
problem to occur What management,
organization, and technology factors contributed
to those weaknesses?
Chapter 15 Case Study
Could a Missing Hard Drive Create Canada’s Biggest Identity Theft?
Trang 533 Was the disappearance of the hard drive a
management problem, an organization problem,
or a technical problem? Explain your answer.
4 If you were responsible for designing security at
ISM and its client companies, what would you
have done differently? How would you have
Chapter 15 Case Study
Could a Missing Hard Drive Create Canada’s Biggest Identity Theft?