Professional Documents
Culture Documents
INFORMATION
SYSTEMS SECURITY,
QUALITY, AND
CONTROL
Chapter
11.1 11: Information
SYSTEM Systems Security,
VULNERABILITY AND Quality,
ABUSEand Control
• Unauthorized access
– by Hackers or Employees
– to destroy, steal or alter data, hardware or software
• Denial of Service (DOS) Attack
– Flooding a server with bogus requests in order to crash
the network
• Computer Viruses
– self-replicating, malicious code
• Disasters
– flood, fire, power loss etc.
• Errors
– in Data Entry, Hardware or Software
Copyright © 2005 Pearson Education Canada Inc.
11.3
Management Information Systems, Second Canadian Edition
Chapter
11.1 11: Information
SYSTEM Systems Security,
VULNERABILITY AND Quality,
ABUSEand Control
Internet Security
• Firewalls
– Prevent unauthorized users from accessing
private networks
• Intrusion Detection System
– Monitors vulnerable points in network to detect
and deter unauthorized intruders
Figure 11.8:
Digital Certificates
MIS Audit
• Identifies all controls that govern
individual information systems and
assesses their effectiveness
• Software Walkthrough:
• Review of software design by small group of people
• Software Debugging:
• Process of discovering and eliminating defects (bugs)
• Data Quality Audit:
• Determines accuracy of data
• via survey of end users for their perceptions of data
quality or survey of samples from data files
• Data Cleansing:
• Correcting errors in data to increase accuracy
INFORMATION
SYSTEMS SECURITY,
QUALITY, AND
CONTROL