You are on page 1of 21

Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control

INFORMATION
SYSTEMS SECURITY,
QUALITY, AND
CONTROL

Copyright © 2005 Pearson Education Canada Inc.


11.1
Management Information Systems, Second Canadian Edition

Chapter 11: Information


OBJECTIVESSystems Security, Quality, and Control

• Why are information systems so


vulnerable ?
• What special measures must be taken to
ensure the reliability, availability, and
security of electronic commerce ?
• Why are auditing information systems and
safeguarding data quality so important?

Copyright © 2005 Pearson Education Canada Inc.


11.2
Management Information Systems, Second Canadian Edition

Chapter
11.1 11: Information
SYSTEM Systems Security,
VULNERABILITY AND Quality,
ABUSEand Control

Why Systems are Vulnerable

• Unauthorized access
– by Hackers or Employees
– to destroy, steal or alter data, hardware or software
• Denial of Service (DOS) Attack
– Flooding a server with bogus requests in order to crash
the network
• Computer Viruses
– self-replicating, malicious code
• Disasters
– flood, fire, power loss etc.
• Errors
– in Data Entry, Hardware or Software
Copyright © 2005 Pearson Education Canada Inc.
11.3
Management Information Systems, Second Canadian Edition

Chapter
11.1 11: Information
SYSTEM Systems Security,
VULNERABILITY AND Quality,
ABUSEand Control

Why Systems are Vulnerable

Copyright © 2005 Pearson Education Canada Inc.


11.4
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11.1 SYSTEM VULNERABILITY AND ABUSE
Concerns for System Builders and Users

Copyright © 2005 Pearson Education Canada Inc.


11.5
Management Information Systems, Second Canadian Edition

Chapter 11: Information


OBJECTIVESSystems Security, Quality, and Control

• Why are information systems so


vulnerable ?
• What special measures must be taken to
ensure the reliability, availability, and
security of electronic commerce ?
• Why are auditing information systems and
safeguarding data quality so important?

Copyright © 2005 Pearson Education Canada Inc.


11.6
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
General Controls and Application Controls

Copyright © 2005 Pearson Education Canada Inc.


11.7
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
General Controls and Application Controls

Copyright © 2005 Pearson Education Canada Inc.


11.8
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
General Controls and Application Controls

Copyright © 2005 Pearson Education Canada Inc.


11.9
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
Protecting the Digital Firm
• Fault-Tolerant Computer Systems:
• Contain extra hardware, power supply etc. to
ensure uninterrupted service
• Disaster Recovery Plan:
• Data backup, recovery procedures etc. to keep
business running in event of computer outage
• Mirroring:
• Duplicating data on backup server to prevent
any interruption in service
• Clustering:
• Linking two computers together so one can
backup the other or speed up processing
Copyright © 2005 Pearson Education Canada Inc.
11.10
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
Protecting the Digital Firm

Internet Security

• Firewalls
– Prevent unauthorized users from accessing
private networks
• Intrusion Detection System
– Monitors vulnerable points in network to detect
and deter unauthorized intruders

Copyright © 2005 Pearson Education Canada Inc.


11.11
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
Protecting the Digital Firm

Copyright © 2005 Pearson Education Canada Inc.


11.12
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT

Security and E-Commerce


• Encryption:
• Coding messages to prevent unauthorized
access
• Digital Signature:
• Digital code attached to message to uniquely
identify sender
• Digital Certificate:
• Attachment to electronic message to verify the
sender and to provide receiver with means to
encode reply
Copyright © 2005 Pearson Education Canada Inc.
11.13
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
Protecting the Digital Firm

Figure 11.8:
Digital Certificates

Copyright © 2005 Pearson Education Canada Inc.


11.14
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
Developing a Control Structure: Costs and Benefits

Criteria for Determining Control Structure


• Importance of data
• Efficiency and expense of each control
technique
• Level of risk if a specific activity or process is
not properly controlled

Copyright © 2005 Pearson Education Canada Inc.


11.15
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
Developing a Control Structure: Costs and Benefits

Copyright © 2005 Pearson Education Canada Inc.


11.16
Management Information Systems, Second Canadian Edition

Chapter 11: Information


OBJECTIVESSystems Security, Quality, and Control

• Why are information systems so


vulnerable ?
• What special measures must be taken to
ensure the reliability, availability, and
security of electronic commerce ?
• Why are auditing information systems and
safeguarding data quality so important?

Copyright © 2005 Pearson Education Canada Inc.


11.17
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
The Role of Auditing in the Control Process

MIS Audit
• Identifies all controls that govern
individual information systems and
assesses their effectiveness

Copyright © 2005 Pearson Education Canada Inc.


11.18
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control


11. 2 CREATING A CONTROL ENVIRONMENT
The Role of Auditing in the Control Process

Copyright © 2005 Pearson Education Canada Inc.


11.19
Management Information Systems, Second Canadian Edition

Chapter 11: InformationSYSTEM


11.3 ENSURING Systems Security,
QUALITY Quality, and Control

• Software Walkthrough:
• Review of software design by small group of people
• Software Debugging:
• Process of discovering and eliminating defects (bugs)
• Data Quality Audit:
• Determines accuracy of data
• via survey of end users for their perceptions of data
quality or survey of samples from data files
• Data Cleansing:
• Correcting errors in data to increase accuracy

Copyright © 2005 Pearson Education Canada Inc.


11.20
Management Information Systems, Second Canadian Edition

Chapter 11: Information Systems Security, Quality, and Control

INFORMATION
SYSTEMS SECURITY,
QUALITY, AND
CONTROL

Copyright © 2005 Pearson Education Canada Inc.


11.21

You might also like