SlideShare a Scribd company logo
Chapter-9 : Information Systems Security and Control
MIS
MANAGING INFORMATION SYSTEMS IN BUSINESS,
GOVERNMENT AND SOCIETY
Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
LEARNING OBJECTIVES
• Get an overview of threats to the Organization
• Learn about technologies for handling Security
• Get an overview of wireless technology
• Understand managing security
2
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
MIND MAP OF CHAPTER TOPICS
3
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
THREATS TO THE ORGANIZATION
• Malware – various kinds of malicious software.
• Viruses – infiltrate and spread in organisational networks, infecting PCs and
destroying files and data.
• Worms – Much like a virus, but does not harm data, other than infiltrate and choke
the network.
• Trojans – Infiltrates computers and secretly allows external software and people to
invade the computer and use its resources.
• Denial-of-service Attack
4
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
THREATS TO THE ORGANIZATION
• Cracking and Espionage – The act of breaking into networks and computers illegally,
usually with intent to create mischief. It is also used for industrial and political
espionage – to steal information.
• Ethical Hacking – same as Cracking but the motivation is benign - not to harm but
expose weaknesses.
• Phishing and Identity Theft – use of fake websites to lure unsuspecting users to
reveal their private information.
5
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
MALWARE
• Damage caused by viruses, worms and Malware in the USA and worldwide (in USD).
6
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
DENIAL-OF-SERVICE ATTACK
• The requesting server sends a request for service, the responding server sends a
response; but the requesting server does not respond, thus, allowing the connection
to time out.
7
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
DISTRIBUTED DENIAL-OF-SERVICE ATTACK
• Many requesting servers send service requests to the responding server, which
responds, but requesting servers allow the connection request to time out.
8
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
TECHNOLOGIES FOR HANDLING SECURITY
• Encryption
• Public-key Cryptography
• Firewall
• Virtual Private Network
• Wireless Technology
• Wi-Fi Routers
• Bluetooth
• BlackBerry
• RFID
• Wireless Sensor Networks
9
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
ENCRYPTION
• Transformation of a message from plain text to a coded form (cipher text) that is not
easily readable.
• Symmetric Key – A key used to decrypt an encrypted message that is sent to the
receiver.
10
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
PUBLIC KEY CRYPTOGRAPHY
• Solves the problem of Symmetric Key cryptography in having to send across a secret
key.
• A pair of keys called the public key and the private key are used. The public key is
used to encrypt a message and is openly available. The private key is a secret key
used to decrypt the message encrypted with the public key
• RSA encryption is used to generate the key pairs from large prime numbers
• Digital certificates are used to authenticate the owners of public keys. Authentication
of senders is through the use of Digital Certificates
11
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
PUBLIC KEY CRYPTOGRAPHY
• Sending a message with Public key encryption
• The problem of impersonation with public-key encryption
12
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
AUTHENTICATION WITH PUBLIC-KEY CRYPTOGRAPHY
13
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
FIREWALL
• Firewalls are filtering and protection devices -usually a combination of hardware and
software
• Packet-level filtering
• Application-level filtering
• Firewalls slow down traffic at the perimeter – to overcome this firewalls are built into
hardware.
• Deep Packet Inspection
14
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
VIRTUAL PRIVATE NETWORK (VPN)
• A technology that enables clients or employees of an organisation, who are outside
the network, to connect securely to the organisation on the public Internet.
• It creates a 'tunnel' relying on authentication and encryption.
15
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
WIRELESS TECHNOLOGY
• Wi-Fi Routers
• Bluetooth – connects personal devices like mobile phones with other devices.
• BlackBerry – smart phone with 'push-email' service
• RFID (Radio Frequency Identification) – radio transmission through tiny transmitters
and receivers embedded in identifiable objects (tagging); maybe passive or active
(energy consuming)
• Wireless Sensor Networks – networks of sensors; used for monitoring and targeted
treatments in agriculture
16
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
WIRELESS MESH NETWORK
• Wireless hotpots or Access points act as routers to provide wireless Internet
connectivity.
• Unsecure Wi-Fi are source of security problems
17
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
MANAGING SECURITY
• Securing the Network
• Perimeter Security
• Two Factor Authentication
• Securing the Client
• Desktop Firewalls
• Password Policy
• Creating a Secure Environment
• Security Audit and Risk Assessment
• Disaster Recovery Planning
18
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
MANAGING SECURITY
The four features that need to be managed to enable a secure IS infrastructure in an
organisation -
• Confidentiality
• Authentication
• Message Integrity
• Access and Availability
19
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
SECURING THE NETWORK
• Perimeter Security – Demilitarised Zone
• Two-factor Authentication – Authentication by two independent methods
Typical layout for a demilitarised zone (DMZ)
20
MIS : Managing Information Systems in Business, Government and Society by Rahul De
Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
SECURING THE CLIENT
• Desktop Firewalls
• Password Policy
• Creating a Secure Environment
• Security Audit and Risk Assessment
• Disaster Recovery Planning
21

More Related Content

PPTX
IDENTITY IN THE WORLD OF IOT
PPT
Identity-Defined Privacay & Security for Internet of Things
PDF
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
PPTX
9.35am robert humphrey
PDF
Blockchain and IAM for IOT Edge Authentication
PDF
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
PDF
SE-4111 Max Berman, User Authentication for Mobile Devices and Access
PDF
Encryption by Default BoF by Gihan Dias [APRICOT 2015]
IDENTITY IN THE WORLD OF IOT
Identity-Defined Privacay & Security for Internet of Things
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
9.35am robert humphrey
Blockchain and IAM for IOT Edge Authentication
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
SE-4111 Max Berman, User Authentication for Mobile Devices and Access
Encryption by Default BoF by Gihan Dias [APRICOT 2015]

What's hot (20)

PPTX
IoT Security
PDF
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
PDF
Okta Digital Enterprise Report
PDF
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
PDF
Security On The Edge - A New Way To Think About Securing the Internet of Things
PPTX
apidays LIVE New York 2021 - Securing access to high performing API in a regu...
PPTX
Onboarding in the IoT
PPT
Policies and Law in IT
PDF
Enhancing System Security Using PKI
PDF
Spellpoint - Securing Access for Microservices
PDF
Kantara - Digital Identity in 2018
PDF
Trends in IRM: Internet of Things
PDF
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
PDF
SecureMAG Volume 6 - 2014
PDF
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
PDF
Aditro - IAM as part of Cloud Business strategy
PDF
Open Identity Exchange - the Global Growth of Digital Identity
PDF
AI+Blockchain+IoT Integration Innovation Insights from Patents
PDF
PKI in Korea
PDF
Bhadale group of companies bfsi products catalogue
IoT Security
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
Okta Digital Enterprise Report
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
Security On The Edge - A New Way To Think About Securing the Internet of Things
apidays LIVE New York 2021 - Securing access to high performing API in a regu...
Onboarding in the IoT
Policies and Law in IT
Enhancing System Security Using PKI
Spellpoint - Securing Access for Microservices
Kantara - Digital Identity in 2018
Trends in IRM: Internet of Things
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
SecureMAG Volume 6 - 2014
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
Aditro - IAM as part of Cloud Business strategy
Open Identity Exchange - the Global Growth of Digital Identity
AI+Blockchain+IoT Integration Innovation Insights from Patents
PKI in Korea
Bhadale group of companies bfsi products catalogue
Ad

Similar to information control and Security system (20)

PDF
• E-commerce, e-business ,e-governance
PDF
managing inforamation system
PDF
information technology and infrastructures choices
PDF
ethical issues,social issues
PDF
organisations and information systems
PDF
IT stratergy and digital goods
PDF
Cost effective authentic and anonymous data sharing with forward security
PDF
Webinar hiware
PDF
Reddy Anna is India’s Biggest Online ID Service Provider.
PPTX
Zero Trust Networks
PDF
Cybersecurity Interview Questions and Answers
PDF
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
PDF
India's Leading Cyber Security Companies to Watch.pdf
DOCX
General manager | NMO 2019
PDF
Barcelona presentationv6
PPTX
What is Zero Trust
PDF
DDI Market Major Manufacturers.pdf
PDF
2. Enterprise and Business Architecture Cloud Video Data
PDF
The Case For Next Generation IAM
PPTX
Catalyst 2015: Patrick Harding
• E-commerce, e-business ,e-governance
managing inforamation system
information technology and infrastructures choices
ethical issues,social issues
organisations and information systems
IT stratergy and digital goods
Cost effective authentic and anonymous data sharing with forward security
Webinar hiware
Reddy Anna is India’s Biggest Online ID Service Provider.
Zero Trust Networks
Cybersecurity Interview Questions and Answers
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
India's Leading Cyber Security Companies to Watch.pdf
General manager | NMO 2019
Barcelona presentationv6
What is Zero Trust
DDI Market Major Manufacturers.pdf
2. Enterprise and Business Architecture Cloud Video Data
The Case For Next Generation IAM
Catalyst 2015: Patrick Harding
Ad

More from bhavesh lande (16)

PDF
The Annual G20 Scorecard – Research Performance 2019
PDF
IT and innovations
PDF
Implement Mapreduce with suitable example using MongoDB.
PDF
aggregation and indexing with suitable example using MongoDB.
PDF
Unnamed PL/SQL code block: Use of Control structure and Exception handling i...
PDF
database application using SQL DML statements: all types of Join, Sub-Query ...
PDF
database application using SQL DML statements: Insert, Select, Update, Delet...
PDF
Design and Develop SQL DDL statements which demonstrate the use of SQL objec...
PDF
working with python
PDF
applications and advantages of python
PDF
introduction of python in data science
PDF
PDF
data scientists and their role
PDF
applications
PDF
statistics techniques to deal with data
PPTX
introduction to data science
The Annual G20 Scorecard – Research Performance 2019
IT and innovations
Implement Mapreduce with suitable example using MongoDB.
aggregation and indexing with suitable example using MongoDB.
Unnamed PL/SQL code block: Use of Control structure and Exception handling i...
database application using SQL DML statements: all types of Join, Sub-Query ...
database application using SQL DML statements: Insert, Select, Update, Delet...
Design and Develop SQL DDL statements which demonstrate the use of SQL objec...
working with python
applications and advantages of python
introduction of python in data science
data scientists and their role
applications
statistics techniques to deal with data
introduction to data science

Recently uploaded (20)

PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
master seminar digital applications in india
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PPTX
Lesson notes of climatology university.
PDF
Classroom Observation Tools for Teachers
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Trump Administration's workforce development strategy
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Cell Types and Its function , kingdom of life
PDF
Updated Idioms and Phrasal Verbs in English subject
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Microbial disease of the cardiovascular and lymphatic systems
master seminar digital applications in india
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Practical Manual AGRO-233 Principles and Practices of Natural Farming
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Lesson notes of climatology university.
Classroom Observation Tools for Teachers
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Trump Administration's workforce development strategy
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Cell Structure & Organelles in detailed.
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
UNIT III MENTAL HEALTH NURSING ASSESSMENT
What if we spent less time fighting change, and more time building what’s rig...
Anesthesia in Laparoscopic Surgery in India
Cell Types and Its function , kingdom of life
Updated Idioms and Phrasal Verbs in English subject
Final Presentation General Medicine 03-08-2024.pptx
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf

information control and Security system

  • 1. Chapter-9 : Information Systems Security and Control MIS MANAGING INFORMATION SYSTEMS IN BUSINESS, GOVERNMENT AND SOCIETY Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002
  • 2. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 LEARNING OBJECTIVES • Get an overview of threats to the Organization • Learn about technologies for handling Security • Get an overview of wireless technology • Understand managing security 2
  • 3. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 MIND MAP OF CHAPTER TOPICS 3
  • 4. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 THREATS TO THE ORGANIZATION • Malware – various kinds of malicious software. • Viruses – infiltrate and spread in organisational networks, infecting PCs and destroying files and data. • Worms – Much like a virus, but does not harm data, other than infiltrate and choke the network. • Trojans – Infiltrates computers and secretly allows external software and people to invade the computer and use its resources. • Denial-of-service Attack 4
  • 5. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 THREATS TO THE ORGANIZATION • Cracking and Espionage – The act of breaking into networks and computers illegally, usually with intent to create mischief. It is also used for industrial and political espionage – to steal information. • Ethical Hacking – same as Cracking but the motivation is benign - not to harm but expose weaknesses. • Phishing and Identity Theft – use of fake websites to lure unsuspecting users to reveal their private information. 5
  • 6. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 MALWARE • Damage caused by viruses, worms and Malware in the USA and worldwide (in USD). 6
  • 7. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 DENIAL-OF-SERVICE ATTACK • The requesting server sends a request for service, the responding server sends a response; but the requesting server does not respond, thus, allowing the connection to time out. 7
  • 8. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 DISTRIBUTED DENIAL-OF-SERVICE ATTACK • Many requesting servers send service requests to the responding server, which responds, but requesting servers allow the connection request to time out. 8
  • 9. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 TECHNOLOGIES FOR HANDLING SECURITY • Encryption • Public-key Cryptography • Firewall • Virtual Private Network • Wireless Technology • Wi-Fi Routers • Bluetooth • BlackBerry • RFID • Wireless Sensor Networks 9
  • 10. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 ENCRYPTION • Transformation of a message from plain text to a coded form (cipher text) that is not easily readable. • Symmetric Key – A key used to decrypt an encrypted message that is sent to the receiver. 10
  • 11. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 PUBLIC KEY CRYPTOGRAPHY • Solves the problem of Symmetric Key cryptography in having to send across a secret key. • A pair of keys called the public key and the private key are used. The public key is used to encrypt a message and is openly available. The private key is a secret key used to decrypt the message encrypted with the public key • RSA encryption is used to generate the key pairs from large prime numbers • Digital certificates are used to authenticate the owners of public keys. Authentication of senders is through the use of Digital Certificates 11
  • 12. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 PUBLIC KEY CRYPTOGRAPHY • Sending a message with Public key encryption • The problem of impersonation with public-key encryption 12
  • 13. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 AUTHENTICATION WITH PUBLIC-KEY CRYPTOGRAPHY 13
  • 14. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 FIREWALL • Firewalls are filtering and protection devices -usually a combination of hardware and software • Packet-level filtering • Application-level filtering • Firewalls slow down traffic at the perimeter – to overcome this firewalls are built into hardware. • Deep Packet Inspection 14
  • 15. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 VIRTUAL PRIVATE NETWORK (VPN) • A technology that enables clients or employees of an organisation, who are outside the network, to connect securely to the organisation on the public Internet. • It creates a 'tunnel' relying on authentication and encryption. 15
  • 16. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 WIRELESS TECHNOLOGY • Wi-Fi Routers • Bluetooth – connects personal devices like mobile phones with other devices. • BlackBerry – smart phone with 'push-email' service • RFID (Radio Frequency Identification) – radio transmission through tiny transmitters and receivers embedded in identifiable objects (tagging); maybe passive or active (energy consuming) • Wireless Sensor Networks – networks of sensors; used for monitoring and targeted treatments in agriculture 16
  • 17. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 WIRELESS MESH NETWORK • Wireless hotpots or Access points act as routers to provide wireless Internet connectivity. • Unsecure Wi-Fi are source of security problems 17
  • 18. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 MANAGING SECURITY • Securing the Network • Perimeter Security • Two Factor Authentication • Securing the Client • Desktop Firewalls • Password Policy • Creating a Secure Environment • Security Audit and Risk Assessment • Disaster Recovery Planning 18
  • 19. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 MANAGING SECURITY The four features that need to be managed to enable a secure IS infrastructure in an organisation - • Confidentiality • Authentication • Message Integrity • Access and Availability 19
  • 20. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 SECURING THE NETWORK • Perimeter Security – Demilitarised Zone • Two-factor Authentication – Authentication by two independent methods Typical layout for a demilitarised zone (DMZ) 20
  • 21. MIS : Managing Information Systems in Business, Government and Society by Rahul De Copyright © 2018 by Wiley India Pvt. Ltd., 4436/7, Ansari Road, Daryaganj, New Delhi-110002 SECURING THE CLIENT • Desktop Firewalls • Password Policy • Creating a Secure Environment • Security Audit and Risk Assessment • Disaster Recovery Planning 21