Week 12 - Ch. 11 &12
Week 12 - Ch. 11 &12
Systems
2 2 2
Q1. How Is the IT Department
Organized?
3 3 3
Typical Senior-Level Reporting
Relationships
Note:
Organizational
structure varies,
depending on the
organization’s
size, culture,
competitive
environment,
industry, etc.
4 4 4
What About the Web?
5 5 5
Web Design
6 6 6
Q2. What Jobs Exist in IT Services?
7 7 7
Jobs in IT Services
8 8 8
Q3: What Is IT Architecture?
9 9 9
Organizational Strategy and
Information Systems
10 10 10
Q3: What Is IT Architecture?
•Like a city plan that lays out the street network, water
systems, emergency system, power grids
•IT architecture: Basic framework for all the computers,
systems, and information management that supports
organizational services
•Enterprise architect: new title being used to describe
person who manages IT architecture
◦ Create a blueprint of an organization’s IS and the management
of these systems
◦ Must understand current investments in technology and plan for
changes
11 11 11
IT Architecture
12 12 12
A Framework of Enterprise
Architecture
13 13 13
Q4: What Is Alignment, Why Is It
Important, and Why Is It Difficult?
14 14 14
Q4: What Is Alignment, Why Is It
Important, and Why Is It Difficult?
15 15 15
Q4: What Is Alignment, Why Is It
Important, and Why Is It Difficult?
16 16 16
Q5: What Is Information Systems
Governance?
17 17 17
Creating Benefits from IT Governance
18 18 18
The Sarbanes-Oxley Act and the
Budget Measures Act
19 19 19
The Sarbanes-Oxley Act and the
Budget Measures Act
Example:
•The computer-based accounting information system used by the
company must have appropriate controls, and management must
assert that they do
•The order-processing information system used by the company,
which stores credit card data and customer identifies, must
prevent unauthorized persons from access
20 20 20
SOX- Enron Company Scandal
•https://www.investopedia.com/updates/enron-scandal-summary/
21 21 21
Q6: What Is an Information Systems
Audit, and Why Should You Care About
It?
•Financial audit: examination and verification of a company’s
financial and accounting records and supporting documents by an
accredited professional
◦ Chartered Professional Accountant (CPA)
•IS audit: the focus is placed on information resources that are
used to collect, store, process, and retrieve information
•Information Systems Audit and Control Association (ISACA):
leader in developing knowledge and standards relating to IT audit
and IT governance
◦ The Certified Information Systems Auditor (CISA)
22 22 22
COBIT
http://www.isaca.org/cobit/pages/default.aspx
23 23 23
COBIT 5
24 https://youtu.be/Y8kqh9q3Jwg
24 24
Q7: What Is Information Systems
Ethics?
25 25 25
Q8: What Is Green IT, and Why
Should You Care About It?
26 26 26
Green IT
27 27 27
E-cycling
28 28 28
Foundations of Information
Systems
30 30 30
Q1: What Is Identity Theft?
31 31 31
Protect Yourself from Identity Theft
https://www.getcybersafe.gc.ca/index-en.aspx
32 32 32
Q2: What Is PIPEDA?
33 33 33
PIPEDA and Organizations
34 34 34
Q3: What Types of Security Threats
Do Organizations Face?
35 35 35
Sources of Security Threats
36 36 36
Sources of Security Threats
37 37 37
Types of Security Problems
38 38 38
Sources and Types of Security Threats
39 39 39
Elements of a Security Program
•Safeguards
◦ Protections against security threats
•Incident response
◦ Must plan for prior to incidents
40 40 40
Security Safeguards as They Relate to
the Five Components
41 41 41
Q4: How Can Technical Safeguards
Protect Against Security Threats?
42 42 42
Technical Safeguards
43 43 43
Technical Safeguards (Cont’d)
Malware Protection
Malware includes viruses, worms, Trojan horses, spyware, and
adware
44 44 44
Malware
https://youtu.be/n8mbzU0X2nQ
45 45 45
Technical Safeguards
•Malware safeguards
◦ Install antivirus and anti-spyware programs
◦ Scan your computer frequently
◦ Update malware definitions
◦ Patterns the exist in malware
◦ Open e-mail attachments only from known sources
◦ Install software updates promptly
◦ Browse only reputable Web sites
46 46 46
Q5: How Can Data Safeguards Protect
Against Security Threats?
47 47 47
Data Safeguards
48 48 48
Q6: How Can Human Safeguards
Protect Against Security Threats?
49 49 49
Human Safeguards for Employees
50 50 50
Human Safeguards for Non-
Employees
51 51 51
Human Safeguards for Non-
Employees
•Public users
◦ Harden Web site and facility
◦ Hardening: Take extraordinary measures to reduce system’s vulnerability
•Partners and public that receive benefits from the information
system
◦ Protect these users from internal company security problems
52 52 52
Account Administration
•Account management
◦ Creation of new user accounts
◦ Modification of existing account permissions
◦ Removal of unneeded accounts
•Password management
◦ Acknowledgment forms
◦ Change passwords frequently
53 53 53
Account Administration (Cont’d)
•Help-desk policies
◦ Authentication of users who have lost their password
◦ Password should not be e-mailed (just a notification of password change)
•System procedures
◦ Normal operation
◦ Backup
◦ Recovery
54 54 54
System Procedures
55 55 55
System Procedures
56 56 56
Security Monitoring
57 57 57
Security Monitoring
•Investigation of incidents
◦ How did the problem occur?
•Lessons learned
◦ Indication of potential vulnerability and corrective actions
58 58 58
Q7: What Is Disaster Preparedness?
59 59 59
Disaster Preparedness Guidelines
60 60 60
Remote Backup Facilities
61 61
https://youtu.be/xWTbPY0OfB0 61
Q8: How Should Organizations
Respond to Security Incidents?
62 62 62