CASE STUDY 5
INFORMATION SYSTEMS SECURITY: SHANGHAI WIRELESS CAFE
SISTEM INFORMASI DAN PENGENDALIAN INTERNAL
Chitarani Kartikadewi - 1406524682
Desi Susanti - 1406524695
Karina Ayu Ditriani - 1406524713
FAKULTAS EKONOMI
PROGRAM MAKSI-PPAK
OKTOBER 2014
CHAPTER I
INTRODUCTION
CHAPTER II
META-PERSPECTIVE OF MANAGING INFORMATION RESOURCES AND SECURITY
The Information System Vulnerability
Information resources (physical resources, data, software, procedures, and other information resources) are scattered throughout the firm. Information is transmitted to and from the firm’s components. Therefore vulnerabilities exist at many points and at any time.
System Vulnerability
A universal vulnerability is a state in a computing system which either: allows an attacker to execute commands as another user; allows an attacker to access data that is contrary to the access restrictions for that data; allows an attacker to pose as another entity; or allows an attacker to conduct a denial of service.
An exposure is a state in a computing system (or set of systems) which is not a universal vulnerability, but either: allows an attacker to conduct information gathering activities; allows an attacker to hide activities; includes a capability that behaves as expected, but can be easily compromised; is a primary point of entry that an attacker may attempt to use to gain access to the system or data; and is considered a problem according to some reasonable security policy.
The vulnerability of information systems is increasing as we move to a world of networked and especially wireless computing. Theoretically, there are hundreds of points in a corporate information system that can be subject to some threats. These threats can be classified as:
1. Unintentional
a. Human errors
b. Environmental hazards
c. Computer system failures
2. Intentional
a. Theft of data
b. Inappropriate use of data
c. Theft of mainframe computer time
d. Theft of equipment