Beruflich Dokumente
Kultur Dokumente
INFORMATION
SYSTEMS
SECURITY AND
CONTROL
OBJECTIVES
OBJECTIVES
MANAGEMENT CHALLENGES
• Hackers
• Computer viruses
Figure 14-1
14.6 © 2004 by Prentice Hall
Management Information Systems 8/e
Chapter 14 Information Systems Security and Control
Disaster
Security
Errors
Maintenance Nightmare
Figure 14-2
14.10 © 2004 by Prentice Hall
Management Information Systems 8/e
Chapter 14 Information Systems Security and Control
Figure 14-3
14.12 © 2004 by Prentice Hall
Management Information Systems 8/e
Chapter 14 Information Systems Security and Control
Overview
Controls
General controls
Figure 14-4
14.15 © 2004 by Prentice Hall
Management Information Systems 8/e
Chapter 14 Information Systems Security and Control
Application controls
Firewalls
Figure 14-5
14.21 © 2004 by Prentice Hall
Management Information Systems 8/e
Chapter 14 Information Systems Security and Control
Figure 14-6
Digital Certificates
• Importance of data
MIS audit
Figure 14-8
Figure 14-9
14.31 © 2004 by Prentice Hall
Management Information Systems 8/e
Chapter 14 Information Systems Security and Control
Figure 14-10
• Inflexible
• Time-consuming
• Automation of step-by-step
methodologies for software and systems
development
Figure 14-12
14.39 © 2004 by Prentice Hall
Management Information Systems 8/e
Chapter 14 Information Systems Security and Control
Resource allocation
Software Metrics
Testing
Data cleansing
INFORMATION
SYSTEMS
SECURITY AND
CONTROL