Chapter 3 - 1 MIS - Ethical Issues and Privacy
Chapter 3 - 1 MIS - Ethical Issues and Privacy
Espionage or trespass
Information extortion
Sabotage or vandalism
Theft of equipment or information
Identity theft
Compromises to intellectual property
Software attacks
Alien software
Supervisory control and data acquisition (SCADA) attacks
Cyberterrorism and cyberwarfare
Deliberate Threats to Information Systems contd..
Organizations spend a great deal of time and money protecting their information
resources.
Before doing so, they perform risk management.
A risk is the probability that a threat will impact an information resource.
The goal of risk management is to identify, control, and minimize the impact of
threats.
Risk management consists of three processes: risk analysis, risk mitigation, and
controls evaluation.
1.Risk analysis
1. Inadvertent Acts
2. Deliberate Acts
3. Natural Disaster (Natural Forces)
4. Technical Failures
5. Management Failure
INADVERTENT ACTS
• These are the acts that happen by mistake. They are not
deliberate
• The attacker does not have any ill will or malicious intent or
his attack is not proven in categories of theft.
• Acts of Human error and failure, Deviation from service
quality, communication error, are examples of inadvertent acts
DELIBERATE ACTS
He/She is a person who enjoys the challenge of breaking into computers without the
knowledge of the user.
4
4
A . Confidentiality
General controls
50
O Software controls
O Authorised access to systems
O Hardware controls
O Physically secure hardware
O Monitor for and fix malfunction
O Environmental systems and protection
O Backup of disk-based data
51
O Computer operations controls
O Day-to-day operations of Information Systems
O Procedures
O System set-up
O Job processing
O Backup and recovery procedures
O Data security controls
O Prevent unauthorised access, change or destruction
O When data is in use or being stored
O Physical access to terminals
O Password protection
O Data level access controls
52
O Administrative controls
O Ensure organisational policies, procedures and standards and
enforced
O Segregation of functions to reduce errors and fraud
O Supervision of personal to ensure policies and procedures are
being adhered to
53
CREATING A CONTROL ENVIRONMENT
Application controls
54
O Input controls
O Data is accurate and consistent on entry
O Direct keying of data, double entry or automated input
O Data conversion, editing and error handling
O Field validation on entry
O Input authorisation and auditing
O Checks on totals to catch errors
O Output controls
O Data is accurate, complete and properly distributed on output
O Checks on totals to catch errors
O Review processing logs
55
56