Securing Information Systems
Securing Information Systems
Securing Information Systems
RISK ASSESSSMENT:
Level of risk to the firm if certain activity is not properly controlled
INCLUDES:
Determination of value of information assets.
Points of vulnerability.
Probability of occurrence of a problem.
Potential for damage.
Assessment of risk helps system builders to focus on points that have greatest
potential for loss and to minimize the potential loss.
SECURITY POLICY:
Security policies are statements ranking information risks, identifying goals and
give mechanism for achieving these goals.
AUTHORIZATION POLICY:
Authorization policies are policies that determine different access levels of
information for different levels of users.
AUTHORIZATION MANAGEMENT SYSTEMS:
They explain when and how users are permitted to access certain parts of
corporate database.
This system knows exactly what information each user is permitted to access.
Some users can update information but cannot read the updated information; others
cannot update but can read the updated information.
Firms need to ensure that their systems and applications are always available.
Contain redundant hardware software and power supply that provide uninterrupted
service.
Such computers use software that detect hardware failure and automatically switch
to a backup device.
Repairing of such computer components can be done without disruption to the
system.
DOWN TIME:
Periods of time in which a system is not operational
Backup servers.
High storage.
Disaster recovery and business plans.
SECURITY OUTSOURCING:
AUDITING:
An audit examines the firms overall security environment and controls individual
information systems.
Audit lists and ranks all weaknesses and estimate the probability of their
occurrence.
……………………………………………………………………………………….