AACS3034 MIS_Chap 7_Managing System Security and Control

AACS3034 MIS_Chap 7_Managing System Security and Control -...

Info icon This preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
AACS3034 Managing Information Systems CHAPTER 7 CHAPTER 7: Managing System Security and Control After reading this chapter, you will be able to: Explain why information systems are vulnerable to destruction, error, and abuse. Evaluate the most important tools and technologies for safeguarding information resources. Policies, procedures and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems 7.0 System Vulnerability and Abuse If you operate a business today, you need to make security and control top priority. Security: Controls: Methods, policies, and organizational procedures that ensure safety of organization’s assets; accuracy and reliability of its accounting records; and operational adherence to management standards. Why Systems Are Vulnerable Information systems are vulnerable to technical, organizational, and environmental threats from internal and external sources. The weakest link in the chain is poor system management. If managers at all levels don’t make security and reliability their number one priority, then the threats to an information system can easily become real. The figure below gives an idea of some of the threats to each component of a typical network. Figure 7-1: Contemporary Security Challenges and Vulnerabilities . The architecture of a Web-based application typically includes a Web client, a server, and corporate information systems linked to databases. Each of these components presents security challenges and vulnerabilities. Floods, fires, power failures, and other electrical problems can cause disruptions at any point in the network.
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon