Module 3 - 3 MIS - Ethical Issues and Privacy
Module 3 - 3 MIS - Ethical Issues and Privacy
Module 3 - 3 MIS - Ethical Issues and Privacy
What is Information?
What is Information Security?
What is RISK?
An Introduction to ISO for information
technology
User Responsibilities
2
Information can be
Created
Stored
Destroyed
Processed
Transmitted
Corrupted
Lost
Stolen
3
Printed or written on paper
Stored electronically
4
What Is Information Security
5
What Is Information Security
Monitored 24x7
6/16/201
1
Mohan Kamat 7
INFORMATION
SECURITY
6/16/201 Mohan
7
1 Kamat
ISO 27002:2005 defines Information Security as the
preservation of:
8
What is Risk?
9
Threat Identification
Elements of threats
Agent : The catalyst that performs the
threat.
Human
Machine
Nature
10
6/16/201 Mohan
1 Kamat
Threat Identification
Elements of threats
Motive : Something that causes the agent
to act.
Accidental
Intentional
Only motivating factor that can be both
accidental and intentional is human
Threat Identification
Elements of threats
Results : The outcome of the applied
threat. The results normally lead to the
loss of CIA
Confidentiality
Integrity
Availability
12
6/16/201 Mohan
1 Kamat
Threats
• Employees
• External Parties
• Low awareness of security issues
• Growth in networking and distributed computing
• Growth in complexity and effectiveness of hacking tools
and viruses
• Natural Disasters eg. fire, flood, earthquake
13
6/16/201 Mohan
1 Kamat
No Categories of Threat Example
1 Human Errors or failures Accidents, Employee mistakes
2 Compromise to Intellectual Property Piracy, Copyright infringements
3 Deliberate Acts or espionage or Unauthorized Access and/or data collection
trespass
15
• Information Security Policy - To provide
management direction and support for Information
security.
• Organisation Of Information Security
-
Management framework for implementation
• Asset Management - To ensure the security
of valuable organisational IT and its related
assets
• of
Human
humanResources
error, theft,Security
fraud or -misuse
To reduce the risks
of facilities.
• Physical & Environmental Security -To prevent
unauthorised access, theft, compromise , damage,
information and information processing facilities.
• Communications & Operations Management - To
ensure the correct and secure operation of information
processing facilities.
• Access Control - To control access to information
and information processing facilities on „need to know‟
and „need to do‟ basis.
• Information Systems Acquisition, Development
& Maintenance - To ensure security built into
information systems
• Information Security Incident Management - To
ensure information security events and weaknesses
associated with information systems are
communicated.
17
•Business Continuity Management - To reduce
disruption caused by disasters and security failures to an
acceptable level.
•Compliance - To avoid breaches of any criminal and
civil law, statutory, regulatory or contractual obligations
and of any security requirements.
18
Access Control - Physical
• Follow Security Procedures
• Wear Identity Cards and Badges
• Ask unauthorized visitor his credentials
• Attend visitors in Reception and Conference Room only
19
6/16/201 Mohan
1 Kamat
Password Guidelines
20
6/16/201 Mohan
1 Kamat
Internet Usage
Use internet services for business purposes only
21
6/16/201 Mohan
1 Kamat
E-mail Usage
Use official mail for business purposes only
Follow the mail storage guidelines to avoid blocking of E-mails
If you come across any junk / spam mail, do the following
a) Remove the mail.
b) Inform the security help desk
c) Inform the same to server administrator
d) Inform the sender that such mails are undesired
22
6/16/201 Mohan
1 Kamat