Securing Is

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

10/26/2021

7/29/2021

Securing Information Systems


Dilhani Abeykoon
Department of Marketing
Faculty of Management and Finance
University of Ruhuna

Learning Objectives

7/29/2021

System Vulnerability and Abuse

Online Games Need Security, too

1
10/26/2021

7/29/2021

System Vulnerability and Use

Why Systems Are Vulnerable

7/29/2021

Contemporary Security Challenges and Vulnerabilities

Internet vulnerabilities

2
10/26/2021

7/29/2021

Wireless security challenges

Many Wi-Fi
networks can be
penetrated easily
by intruders
using sniffer
programs to
obtain
an address to
access the
resources of a
network without
authorization.

7/29/2021

Malicious Software: Viruses, Worms, Trojan Horses, and Spyware

Cont.

3
10/26/2021

7/29/2021

Hackers and Computer Crime

Cont.

7/29/2021

Cont.

Cont.

4
10/26/2021

7/29/2021

Cont.

Internal Threats: Employees

7/29/2021

Software Vulnerability

Cont.

10

10

5
10/26/2021

7/29/2021

Establishing a Framework for Security and


Control

Disaster Recovery Planning and Business Continuity Planning

11

11

7/29/2021

The Role of Auditing

Sample Auditor’s List of Control Weaknesses

This chart is a sample


page from a list of
control weaknesses
that an auditor might
find in a loan system in
a local commercial
bank.
This form helps
auditors record and
evaluate control
weaknesses and
shows the results of
discussing those
weaknesses with
management, as well
as any corrective
actions taken by
management.

12

12

6
10/26/2021

7/29/2021

Technologies and Tools for Security

Access Control

13

13

7/29/2021

Biometric Authentication

Firewalls, Intrusion Detection Systems, and Antivirus Software

14

14

7
10/26/2021

7/29/2021

The firewall is placed


between the firm’s
private
network and the public
Internet or another
distrusted network to
protect against
unauthorized traffic.

Cont.

15

15

7/29/2021

16

16

You might also like