SlideShare a Scribd company logo
How To Secure MIS
How To Secure MIS
MALIK TOUQEER
BBA(HONS) THE ISLAMIA
UNIVERSITY BAHAWALPUR
PAKISTAN
SECURING MANAGEMENT
INFORMATION
SYSTEM
Introduction to MIS
An MIS provides managers with information and support for effective decision
making, and provides feedback on daily operations.
MIS is a system, which makes available the Right Information to the Right
Person at the Right place at the Right Time in the Right Form and at
Right Cost.
 The quality or state of being secure to be free from danger
 Security is achieved using several strategies simultaneously or used in
combination with one another
 Security is recognized as essential to protect vital processes and the
systems that provide those processes
 Security is not something you buy, it is something you do
What is security?
Vulnerability, Threat and Attack
 A vulnerability:- is a weakness in security system
Can be in design, implementation, etc.
Can be hardware, or software
 A threat:- is a set of circumstances that has the potential to cause loss or
harm
Or it’s a potential violation of security
Threat can be:
Accidental (natural disasters, human error, …)
Malicious (attackers, insider fraud, …)
 An attack:- is the actual violation of security
Why Systems are Vulnerable?
 Hardware problems-
• Breakdowns, configuration errors, damage from
improper use or crime
 Software problems-
• Programming errors, installation errors, unauthorized
changes)
 Disasters-
• Power failures, flood, fires, etc.
 Use of networks and computers outside of firm’s control
-
• E.g. with domestic or offshore outsourcing vendors
SO HOW DO WE
OVERCOME THESE
PROBLEMS???
BUSINESS VALUE OF SECURITY AND
CONTROL
• Inadequate security and control may create serious legal liability.
• Businesses must protect not only their own information assets but also
those of customers, employees, and business partners. Failure to do so
can lead to costly litigation for data exposure or theft.
• A sound security and control framework that protects business information
assets can thus produce a high return on investment.
ESTABLISHING A MANAGEMENT FRAMEWORK
FOR SECURITY AND CONTROL
 General controls:
Establish framework for controlling design, security, and use of computer
programs
• Software controls
• Hardware controls
• Computer operations controls
• Data security controls
• Implementation controls
ESTABLISHING A MANAGEMENT FRAMEWORK FOR
SECURITY AND CONTROL
Application controls:
• Input
• Processing
• Output
Unique to each computerized
application
CREATING A CONTROL ENVIRONMENT
 Controls:-
• Methods, policies, and procedures
• Ensures protection of organization’s assets
• Ensures accuracy and reliability of records, and
operational adherence to management standards
Worldwide Damage from Digital Attacks
CREATING A CONTROL ENVIRONMENT
 Disaster recovery plan:
Runs business in event of computer outage
 Load balancing:
Distributes large number of requests for access among
multiple servers
CREATING A CONTROL ENVIRONMENT
• Mirroring:
Duplicating all processes and transactions of server on backup server to
prevent any interruption
• Clustering:
Linking two computers together so that a second computer can act as a
backup to the primary computer or speed up processing
CREATING A CONTROL ENVIRONMENT
Internet Security Challenges
 Firewalls:-
• Hardware and software controlling flow of incoming and outgoing network
traffic
• Prevent unauthorized users from accessing private networks
• Two types: proxies and stateful inspection
 Intrusion Detection System:-
• Monitors vulnerable points in network to detect and deter unauthorized
intruders
Figure 10-7
A Corporate Firewall
 Because they can
 A large fraction of hacker attacks have been pranks
 Financial Gain
 Espionage
 Venting anger at a company or organization
 Terrorism
Why do Hackers Attack?
Access Control - Physical
USER RESPONSIBILITIES
• Follow Security Procedures
• Wear Identity Cards
• Ask unauthorized visitor his credentials
• Attend visitors in Reception and Conference Room only
• Bring visitors in operations area without prior permission
• Bring hazardous and combustible material in secure area
• Practice “Piggybacking”
• Bring and use pen drives, zip drives, ipods, other storage devices
unless and otherwise authorized to do so
Password Guidelines
 Always use at least 8 character password with combination of
alphabets, numbers and special characters (*, %, @, #, $, ^)
 Use passwords that can be easily remembered by you
 Change password regularly as per policy
 Use password that is significantly different from earlier passwords
Use passwords which reveals your personal information or words found
in dictionary
Write down or Store passwords
Share passwords over phone or Email
Use passwords which do not match above complexity criteria
 Dictionary Attack
 Hacker tries all words in dictionary to crack password
 70% of the people use dictionary words as passwords
 Brute Force Attack
 Try all permutations of the letters & symbols in the alphabet
 Hybrid Attack
 Words from dictionary and their variations used in attack
 Shoulder Surfing
 Hackers slyly watch over peoples shoulders to steal passwords
 Dumpster Diving
 People dump their trash papers in garbage which may contain information to
crack passwords
Password Attacks - Types
Internet Usage
Use internet services for business purposes only
 Do not access internet through dial-up connectivity
 Do not use internet for accessing auction sites
 Do not use internet for hacking other computer systems
 Do not use internet to download / upload commercial software /
copyrighted material
 Technology Department is continuously monitoring Internet
Usage. Any illegal use of internet and other assets shall call for
Disciplinary Action.
CREATING A CONTROL ENVIRONMENT
Antivirus Software
 Antivirus software: -
Software that checks computer systems and drives for
the presence of computer viruses and can eliminate the
virus from the infected area
• Wi-Fi Protected Access specification
This NEC PC has a biometric fingerprint reader
for fast yet secure access to files and networks.
New models of PCs are starting to use
biometric identification to authenticate users
MANAGEMENT CHALLENGES
 Implementing an effective security policy
 Applying quality assurance standards in large systems projects
 What are the most important software quality assurance techniques?
 Why are auditing information systems and safeguarding data quality so
important?
Solution Guidelines
• Security and control must become a more visible and explicit
priority and area of information systems investment.
• Support and commitment from top management is required to
show that security is indeed a corporate priority and vital to all
aspects of the business.
• Security and control should be the responsibility of everyone in
the organization.
. . . LET US BUILD A HUMAN WALL ALONG WITH FIREWALL
Human Wall Is Always Better Than A
Firewall
How To Secure MIS
How To Secure MIS
Ad

More Related Content

What's hot (20)

Business Cluster SWOT Analysis
Business Cluster SWOT AnalysisBusiness Cluster SWOT Analysis
Business Cluster SWOT Analysis
UNC Eshelman School of Pharmacy
 
Leave & attendance project
Leave & attendance projectLeave & attendance project
Leave & attendance project
Suraj Zare
 
Lean Production
Lean ProductionLean Production
Lean Production
tutor2u
 
Lean 5s
Lean 5s  Lean 5s
Lean 5s
John Newquist
 
JIT & Lean Manufacturing - ADDVALUE - Nilesh Arora
JIT & Lean Manufacturing - ADDVALUE - Nilesh AroraJIT & Lean Manufacturing - ADDVALUE - Nilesh Arora
JIT & Lean Manufacturing - ADDVALUE - Nilesh Arora
ADD VALUE CONSULTING Inc
 
Motion economy work design_
Motion economy work design_Motion economy work design_
Motion economy work design_
Selman Kaymaz
 
Design of Work Systems
Design of Work SystemsDesign of Work Systems
Design of Work Systems
aizellbernal
 
Salient features on all labour codes ppt [compatibility mode]
Salient features on all labour codes  ppt [compatibility mode]Salient features on all labour codes  ppt [compatibility mode]
Salient features on all labour codes ppt [compatibility mode]
Dr.PBS KUMAR Pbskumar2010
 
Maintenance Management
Maintenance ManagementMaintenance Management
Maintenance Management
Vijay325
 
Process layout operations management
Process layout   operations managementProcess layout   operations management
Process layout operations management
Silas Alexander
 
Posh @ workplace
Posh @ workplacePosh @ workplace
Posh @ workplace
Rtn. Adv. Sonia Rajesh
 
Manufacturing systems design
Manufacturing systems designManufacturing systems design
Manufacturing systems design
Kiran Hanjar
 
Maintenance module1 ppt number 3
Maintenance module1 ppt number 3Maintenance module1 ppt number 3
Maintenance module1 ppt number 3
Dhanesh S
 
Handling grievances, discipline, termination and dismissal
Handling grievances, discipline, termination and dismissalHandling grievances, discipline, termination and dismissal
Handling grievances, discipline, termination and dismissal
Elizabeth Koki
 
POSH PPT.pptx
POSH PPT.pptxPOSH PPT.pptx
POSH PPT.pptx
Anita Verma
 
Work study and method study
Work study and method studyWork study and method study
Work study and method study
Nitin Gulgulia
 
UAE Labour Law
UAE Labour Law UAE Labour Law
UAE Labour Law
deepakmelwyn
 
Work study
Work studyWork study
Work study
Dharam Ranka.Rvd
 
Just In Time (JIT) Systems
Just In Time (JIT) SystemsJust In Time (JIT) Systems
Just In Time (JIT) Systems
We Learn - A Continuous Learning Forum from Welingkar's Distance Learning Program.
 
Leave & attendance project
Leave & attendance projectLeave & attendance project
Leave & attendance project
Suraj Zare
 
Lean Production
Lean ProductionLean Production
Lean Production
tutor2u
 
JIT & Lean Manufacturing - ADDVALUE - Nilesh Arora
JIT & Lean Manufacturing - ADDVALUE - Nilesh AroraJIT & Lean Manufacturing - ADDVALUE - Nilesh Arora
JIT & Lean Manufacturing - ADDVALUE - Nilesh Arora
ADD VALUE CONSULTING Inc
 
Motion economy work design_
Motion economy work design_Motion economy work design_
Motion economy work design_
Selman Kaymaz
 
Design of Work Systems
Design of Work SystemsDesign of Work Systems
Design of Work Systems
aizellbernal
 
Salient features on all labour codes ppt [compatibility mode]
Salient features on all labour codes  ppt [compatibility mode]Salient features on all labour codes  ppt [compatibility mode]
Salient features on all labour codes ppt [compatibility mode]
Dr.PBS KUMAR Pbskumar2010
 
Maintenance Management
Maintenance ManagementMaintenance Management
Maintenance Management
Vijay325
 
Process layout operations management
Process layout   operations managementProcess layout   operations management
Process layout operations management
Silas Alexander
 
Manufacturing systems design
Manufacturing systems designManufacturing systems design
Manufacturing systems design
Kiran Hanjar
 
Maintenance module1 ppt number 3
Maintenance module1 ppt number 3Maintenance module1 ppt number 3
Maintenance module1 ppt number 3
Dhanesh S
 
Handling grievances, discipline, termination and dismissal
Handling grievances, discipline, termination and dismissalHandling grievances, discipline, termination and dismissal
Handling grievances, discipline, termination and dismissal
Elizabeth Koki
 
Work study and method study
Work study and method studyWork study and method study
Work study and method study
Nitin Gulgulia
 

Similar to How To Secure MIS (20)

Management Information System Presentation
Management Information System PresentationManagement Information System Presentation
Management Information System Presentation
AaDi Malik
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
Gurjit
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
RAJESH S
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
Vishal Patyal
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
Meletis Belsis MPhil/MRes/BSc
 
introduction of the cyber security PPT.pptx
introduction of the cyber security PPT.pptxintroduction of the cyber security PPT.pptx
introduction of the cyber security PPT.pptx
luci774493
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
Kirti Ahirrao
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
Muhammad Asim
 
Security and Control.ppt
Security and Control.pptSecurity and Control.ppt
Security and Control.ppt
AfricaRealInformatic
 
What is Cyber & information security.pptx
What is Cyber & information security.pptxWhat is Cyber & information security.pptx
What is Cyber & information security.pptx
amnamahfooz615
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
aizazhussain234
 
Cyber Security awareness of cyber security
Cyber Security awareness of cyber securityCyber Security awareness of cyber security
Cyber Security awareness of cyber security
BabaBoss5
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
mishogelashvili28
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Knoldus Inc.
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
muhammad awais
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
Mark Simos
 
Introduction to Cyber Security and its importance
Introduction to Cyber Security and its importanceIntroduction to Cyber Security and its importance
Introduction to Cyber Security and its importance
ishasindwani
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architecture
angelohammond
 
IT_Security_Awareness_Detailed_PPT1.pptx
IT_Security_Awareness_Detailed_PPT1.pptxIT_Security_Awareness_Detailed_PPT1.pptx
IT_Security_Awareness_Detailed_PPT1.pptx
sachinthb2510
 
Management Information System Presentation
Management Information System PresentationManagement Information System Presentation
Management Information System Presentation
AaDi Malik
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
Gurjit
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
RAJESH S
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
Vishal Patyal
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
Meletis Belsis MPhil/MRes/BSc
 
introduction of the cyber security PPT.pptx
introduction of the cyber security PPT.pptxintroduction of the cyber security PPT.pptx
introduction of the cyber security PPT.pptx
luci774493
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
Kirti Ahirrao
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
Muhammad Asim
 
What is Cyber & information security.pptx
What is Cyber & information security.pptxWhat is Cyber & information security.pptx
What is Cyber & information security.pptx
amnamahfooz615
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
aizazhussain234
 
Cyber Security awareness of cyber security
Cyber Security awareness of cyber securityCyber Security awareness of cyber security
Cyber Security awareness of cyber security
BabaBoss5
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Knoldus Inc.
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
muhammad awais
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
Mark Simos
 
Introduction to Cyber Security and its importance
Introduction to Cyber Security and its importanceIntroduction to Cyber Security and its importance
Introduction to Cyber Security and its importance
ishasindwani
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architecture
angelohammond
 
IT_Security_Awareness_Detailed_PPT1.pptx
IT_Security_Awareness_Detailed_PPT1.pptxIT_Security_Awareness_Detailed_PPT1.pptx
IT_Security_Awareness_Detailed_PPT1.pptx
sachinthb2510
 
Ad

Recently uploaded (20)

Paul Turovsky - A Financial Analyst
Paul Turovsky - A Financial AnalystPaul Turovsky - A Financial Analyst
Paul Turovsky - A Financial Analyst
Paul Turovsky
 
Allan Kinsella: A Life of Accomplishment, Service, Resiliency.
Allan Kinsella: A Life of Accomplishment, Service, Resiliency.Allan Kinsella: A Life of Accomplishment, Service, Resiliency.
Allan Kinsella: A Life of Accomplishment, Service, Resiliency.
Allan Kinsella
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...
Continuity and Resilience
 
Eric Hannelius - A Serial Entrepreneur
Eric  Hannelius  -  A Serial EntrepreneurEric  Hannelius  -  A Serial Entrepreneur
Eric Hannelius - A Serial Entrepreneur
Eric Hannelius
 
Top Solar Panel Manufacturers in India and Photovoltaic Module Manufacturers....
Top Solar Panel Manufacturers in India and Photovoltaic Module Manufacturers....Top Solar Panel Manufacturers in India and Photovoltaic Module Manufacturers....
Top Solar Panel Manufacturers in India and Photovoltaic Module Manufacturers....
Insolation Energy
 
Rackspace-White-Paper-OpenStack-PRI-TSK-11768-5.pdf
Rackspace-White-Paper-OpenStack-PRI-TSK-11768-5.pdfRackspace-White-Paper-OpenStack-PRI-TSK-11768-5.pdf
Rackspace-White-Paper-OpenStack-PRI-TSK-11768-5.pdf
ericnewman522
 
Solving Disintermediation in Ride-Hailing
Solving Disintermediation in Ride-HailingSolving Disintermediation in Ride-Hailing
Solving Disintermediation in Ride-Hailing
xnayankumar
 
IT Support Company Profile by Slidesgo.pptx
IT Support Company Profile by Slidesgo.pptxIT Support Company Profile by Slidesgo.pptx
IT Support Company Profile by Slidesgo.pptx
ahmed gamal
 
Why Startups Should Hire Fractionals - GrowthExpertz
Why Startups Should Hire Fractionals - GrowthExpertzWhy Startups Should Hire Fractionals - GrowthExpertz
Why Startups Should Hire Fractionals - GrowthExpertz
GrowthExpertz
 
The Profitability Paradox: How Dunzo Can Scale AOV While Maintaining Liquidity
The Profitability Paradox: How Dunzo Can Scale AOV While Maintaining LiquidityThe Profitability Paradox: How Dunzo Can Scale AOV While Maintaining Liquidity
The Profitability Paradox: How Dunzo Can Scale AOV While Maintaining Liquidity
xnayankumar
 
Presentation - The Evolution of the Internet.pdf
Presentation - The Evolution of the Internet.pdfPresentation - The Evolution of the Internet.pdf
Presentation - The Evolution of the Internet.pdf
kasierra8090
 
How AI Helps HR Lead Better, Not Just Work Faster
How AI Helps HR Lead Better, Not Just Work FasterHow AI Helps HR Lead Better, Not Just Work Faster
How AI Helps HR Lead Better, Not Just Work Faster
Aginto - A Digital Agency
 
Ibrahim Mardam-Bey on Navigating New Global Finance Trends
Ibrahim Mardam-Bey on Navigating New Global Finance TrendsIbrahim Mardam-Bey on Navigating New Global Finance Trends
Ibrahim Mardam-Bey on Navigating New Global Finance Trends
Ibrahim Mardam-bey
 
Vannin Healthcare Greencube Electronic Health Record -Modules and Features.pdf
Vannin Healthcare Greencube Electronic Health Record -Modules and Features.pdfVannin Healthcare Greencube Electronic Health Record -Modules and Features.pdf
Vannin Healthcare Greencube Electronic Health Record -Modules and Features.pdf
ovanveen
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...
Continuity and Resilience
 
HyperVerge's journey from $10M to $30M ARR: Commoditize Your Complements
HyperVerge's journey from $10M to $30M ARR: Commoditize Your ComplementsHyperVerge's journey from $10M to $30M ARR: Commoditize Your Complements
HyperVerge's journey from $10M to $30M ARR: Commoditize Your Complements
xnayankumar
 
1911 Gold Corporate Presentation May 2025.pdf
1911 Gold Corporate Presentation May 2025.pdf1911 Gold Corporate Presentation May 2025.pdf
1911 Gold Corporate Presentation May 2025.pdf
Shaun Heinrichs
 
TechnoFacade Innovating Façade Engineering for the Future of Architecture
TechnoFacade Innovating Façade Engineering for the Future of ArchitectureTechnoFacade Innovating Façade Engineering for the Future of Architecture
TechnoFacade Innovating Façade Engineering for the Future of Architecture
krishnakichu7296
 
Price Bailey Valuation Quarterly Webinar May 2025pdf
Price Bailey Valuation Quarterly Webinar May 2025pdfPrice Bailey Valuation Quarterly Webinar May 2025pdf
Price Bailey Valuation Quarterly Webinar May 2025pdf
FelixPerez547899
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Vijay - 4 B...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Vijay - 4 B...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Vijay - 4 B...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Vijay - 4 B...
Continuity and Resilience
 
Paul Turovsky - A Financial Analyst
Paul Turovsky - A Financial AnalystPaul Turovsky - A Financial Analyst
Paul Turovsky - A Financial Analyst
Paul Turovsky
 
Allan Kinsella: A Life of Accomplishment, Service, Resiliency.
Allan Kinsella: A Life of Accomplishment, Service, Resiliency.Allan Kinsella: A Life of Accomplishment, Service, Resiliency.
Allan Kinsella: A Life of Accomplishment, Service, Resiliency.
Allan Kinsella
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...
Continuity and Resilience
 
Eric Hannelius - A Serial Entrepreneur
Eric  Hannelius  -  A Serial EntrepreneurEric  Hannelius  -  A Serial Entrepreneur
Eric Hannelius - A Serial Entrepreneur
Eric Hannelius
 
Top Solar Panel Manufacturers in India and Photovoltaic Module Manufacturers....
Top Solar Panel Manufacturers in India and Photovoltaic Module Manufacturers....Top Solar Panel Manufacturers in India and Photovoltaic Module Manufacturers....
Top Solar Panel Manufacturers in India and Photovoltaic Module Manufacturers....
Insolation Energy
 
Rackspace-White-Paper-OpenStack-PRI-TSK-11768-5.pdf
Rackspace-White-Paper-OpenStack-PRI-TSK-11768-5.pdfRackspace-White-Paper-OpenStack-PRI-TSK-11768-5.pdf
Rackspace-White-Paper-OpenStack-PRI-TSK-11768-5.pdf
ericnewman522
 
Solving Disintermediation in Ride-Hailing
Solving Disintermediation in Ride-HailingSolving Disintermediation in Ride-Hailing
Solving Disintermediation in Ride-Hailing
xnayankumar
 
IT Support Company Profile by Slidesgo.pptx
IT Support Company Profile by Slidesgo.pptxIT Support Company Profile by Slidesgo.pptx
IT Support Company Profile by Slidesgo.pptx
ahmed gamal
 
Why Startups Should Hire Fractionals - GrowthExpertz
Why Startups Should Hire Fractionals - GrowthExpertzWhy Startups Should Hire Fractionals - GrowthExpertz
Why Startups Should Hire Fractionals - GrowthExpertz
GrowthExpertz
 
The Profitability Paradox: How Dunzo Can Scale AOV While Maintaining Liquidity
The Profitability Paradox: How Dunzo Can Scale AOV While Maintaining LiquidityThe Profitability Paradox: How Dunzo Can Scale AOV While Maintaining Liquidity
The Profitability Paradox: How Dunzo Can Scale AOV While Maintaining Liquidity
xnayankumar
 
Presentation - The Evolution of the Internet.pdf
Presentation - The Evolution of the Internet.pdfPresentation - The Evolution of the Internet.pdf
Presentation - The Evolution of the Internet.pdf
kasierra8090
 
How AI Helps HR Lead Better, Not Just Work Faster
How AI Helps HR Lead Better, Not Just Work FasterHow AI Helps HR Lead Better, Not Just Work Faster
How AI Helps HR Lead Better, Not Just Work Faster
Aginto - A Digital Agency
 
Ibrahim Mardam-Bey on Navigating New Global Finance Trends
Ibrahim Mardam-Bey on Navigating New Global Finance TrendsIbrahim Mardam-Bey on Navigating New Global Finance Trends
Ibrahim Mardam-Bey on Navigating New Global Finance Trends
Ibrahim Mardam-bey
 
Vannin Healthcare Greencube Electronic Health Record -Modules and Features.pdf
Vannin Healthcare Greencube Electronic Health Record -Modules and Features.pdfVannin Healthcare Greencube Electronic Health Record -Modules and Features.pdf
Vannin Healthcare Greencube Electronic Health Record -Modules and Features.pdf
ovanveen
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...
Continuity and Resilience
 
HyperVerge's journey from $10M to $30M ARR: Commoditize Your Complements
HyperVerge's journey from $10M to $30M ARR: Commoditize Your ComplementsHyperVerge's journey from $10M to $30M ARR: Commoditize Your Complements
HyperVerge's journey from $10M to $30M ARR: Commoditize Your Complements
xnayankumar
 
1911 Gold Corporate Presentation May 2025.pdf
1911 Gold Corporate Presentation May 2025.pdf1911 Gold Corporate Presentation May 2025.pdf
1911 Gold Corporate Presentation May 2025.pdf
Shaun Heinrichs
 
TechnoFacade Innovating Façade Engineering for the Future of Architecture
TechnoFacade Innovating Façade Engineering for the Future of ArchitectureTechnoFacade Innovating Façade Engineering for the Future of Architecture
TechnoFacade Innovating Façade Engineering for the Future of Architecture
krishnakichu7296
 
Price Bailey Valuation Quarterly Webinar May 2025pdf
Price Bailey Valuation Quarterly Webinar May 2025pdfPrice Bailey Valuation Quarterly Webinar May 2025pdf
Price Bailey Valuation Quarterly Webinar May 2025pdf
FelixPerez547899
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Vijay - 4 B...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Vijay - 4 B...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Vijay - 4 B...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Vijay - 4 B...
Continuity and Resilience
 
Ad

How To Secure MIS

  • 3. MALIK TOUQEER BBA(HONS) THE ISLAMIA UNIVERSITY BAHAWALPUR PAKISTAN
  • 5. Introduction to MIS An MIS provides managers with information and support for effective decision making, and provides feedback on daily operations. MIS is a system, which makes available the Right Information to the Right Person at the Right place at the Right Time in the Right Form and at Right Cost.
  • 6.  The quality or state of being secure to be free from danger  Security is achieved using several strategies simultaneously or used in combination with one another  Security is recognized as essential to protect vital processes and the systems that provide those processes  Security is not something you buy, it is something you do What is security?
  • 7. Vulnerability, Threat and Attack  A vulnerability:- is a weakness in security system Can be in design, implementation, etc. Can be hardware, or software  A threat:- is a set of circumstances that has the potential to cause loss or harm Or it’s a potential violation of security Threat can be: Accidental (natural disasters, human error, …) Malicious (attackers, insider fraud, …)  An attack:- is the actual violation of security
  • 8. Why Systems are Vulnerable?  Hardware problems- • Breakdowns, configuration errors, damage from improper use or crime  Software problems- • Programming errors, installation errors, unauthorized changes)  Disasters- • Power failures, flood, fires, etc.  Use of networks and computers outside of firm’s control - • E.g. with domestic or offshore outsourcing vendors
  • 9. SO HOW DO WE OVERCOME THESE PROBLEMS???
  • 10. BUSINESS VALUE OF SECURITY AND CONTROL • Inadequate security and control may create serious legal liability. • Businesses must protect not only their own information assets but also those of customers, employees, and business partners. Failure to do so can lead to costly litigation for data exposure or theft. • A sound security and control framework that protects business information assets can thus produce a high return on investment.
  • 11. ESTABLISHING A MANAGEMENT FRAMEWORK FOR SECURITY AND CONTROL  General controls: Establish framework for controlling design, security, and use of computer programs • Software controls • Hardware controls • Computer operations controls • Data security controls • Implementation controls
  • 12. ESTABLISHING A MANAGEMENT FRAMEWORK FOR SECURITY AND CONTROL Application controls: • Input • Processing • Output Unique to each computerized application
  • 13. CREATING A CONTROL ENVIRONMENT  Controls:- • Methods, policies, and procedures • Ensures protection of organization’s assets • Ensures accuracy and reliability of records, and operational adherence to management standards
  • 14. Worldwide Damage from Digital Attacks
  • 15. CREATING A CONTROL ENVIRONMENT  Disaster recovery plan: Runs business in event of computer outage  Load balancing: Distributes large number of requests for access among multiple servers
  • 16. CREATING A CONTROL ENVIRONMENT • Mirroring: Duplicating all processes and transactions of server on backup server to prevent any interruption • Clustering: Linking two computers together so that a second computer can act as a backup to the primary computer or speed up processing
  • 17. CREATING A CONTROL ENVIRONMENT Internet Security Challenges  Firewalls:- • Hardware and software controlling flow of incoming and outgoing network traffic • Prevent unauthorized users from accessing private networks • Two types: proxies and stateful inspection  Intrusion Detection System:- • Monitors vulnerable points in network to detect and deter unauthorized intruders
  • 19.  Because they can  A large fraction of hacker attacks have been pranks  Financial Gain  Espionage  Venting anger at a company or organization  Terrorism Why do Hackers Attack?
  • 20. Access Control - Physical USER RESPONSIBILITIES • Follow Security Procedures • Wear Identity Cards • Ask unauthorized visitor his credentials • Attend visitors in Reception and Conference Room only • Bring visitors in operations area without prior permission • Bring hazardous and combustible material in secure area • Practice “Piggybacking” • Bring and use pen drives, zip drives, ipods, other storage devices unless and otherwise authorized to do so
  • 21. Password Guidelines  Always use at least 8 character password with combination of alphabets, numbers and special characters (*, %, @, #, $, ^)  Use passwords that can be easily remembered by you  Change password regularly as per policy  Use password that is significantly different from earlier passwords Use passwords which reveals your personal information or words found in dictionary Write down or Store passwords Share passwords over phone or Email Use passwords which do not match above complexity criteria
  • 22.  Dictionary Attack  Hacker tries all words in dictionary to crack password  70% of the people use dictionary words as passwords  Brute Force Attack  Try all permutations of the letters & symbols in the alphabet  Hybrid Attack  Words from dictionary and their variations used in attack  Shoulder Surfing  Hackers slyly watch over peoples shoulders to steal passwords  Dumpster Diving  People dump their trash papers in garbage which may contain information to crack passwords Password Attacks - Types
  • 23. Internet Usage Use internet services for business purposes only  Do not access internet through dial-up connectivity  Do not use internet for accessing auction sites  Do not use internet for hacking other computer systems  Do not use internet to download / upload commercial software / copyrighted material  Technology Department is continuously monitoring Internet Usage. Any illegal use of internet and other assets shall call for Disciplinary Action.
  • 24. CREATING A CONTROL ENVIRONMENT Antivirus Software  Antivirus software: - Software that checks computer systems and drives for the presence of computer viruses and can eliminate the virus from the infected area • Wi-Fi Protected Access specification
  • 25. This NEC PC has a biometric fingerprint reader for fast yet secure access to files and networks. New models of PCs are starting to use biometric identification to authenticate users
  • 26. MANAGEMENT CHALLENGES  Implementing an effective security policy  Applying quality assurance standards in large systems projects  What are the most important software quality assurance techniques?  Why are auditing information systems and safeguarding data quality so important?
  • 27. Solution Guidelines • Security and control must become a more visible and explicit priority and area of information systems investment. • Support and commitment from top management is required to show that security is indeed a corporate priority and vital to all aspects of the business. • Security and control should be the responsibility of everyone in the organization.
  • 28. . . . LET US BUILD A HUMAN WALL ALONG WITH FIREWALL Human Wall Is Always Better Than A Firewall
  翻译: