Page 343 -
P. 343

342 Part Two  Information Technology Infrastructure


                                   TABLE 8.5  ONLINE ORDER PROCESSING RISK ASSESSMENT

                                                  PROBABILITY OF                              EXPECTED
                                   EXPOSURE       OCCURRENCE (%)  LOSS RANGE/ AVERAGE ($)     ANNUAL LOSS ($)
                                   Power failure             30%  $5,000–$200,000 ($102,500)  $30,750
                                   Embezzlement                5%  $1,000–$50,000 ($25,500)   $1,275
                                   User error                98%  $200–$40,000 ($20,100)      $19,698






                                   depending on how long  processing is halted. The probability of embezzlement
                                   occurring over a yearly period is about 5  percent, with potential losses ranging
                                   from $1,000 to $50,000 (and averaging $25,500) for each  occurrence. User errors
                                   have a 98 percent chance of occurring over a yearly period, with losses ranging
                                   from $200 to $40,000 (and averaging $20,100) for each occurrence.
                                     Once the risks have been assessed, system builders will concentrate on the
                                   control points with the greatest vulnerability and potential for loss. In this case,
                                   controls should focus on ways to minimize the risk of power failures and user
                                   errors because anticipated annual losses are highest for these areas.


                                   SECURITY POLICY

                                   Once you’ve identified the main risks to your systems, your company will need
                                   to develop a security policy for protecting the company’s assets. A security
                                   policy consists of  statements ranking information risks, identifying acceptable
                                   security goals, and identifying the  mechanisms for achieving these goals. What
                                   are the firm’s most important information assets? Who generates and controls
                                   this information in the firm? What existing security policies are in place to
                                   protect the information? What level of risk is management willing to accept for
                                   each of these assets? Is it willing, for instance, to lose customer credit data once
                                   every 10 years? Or will it build a security system for credit card data that can
                                   withstand the once-in-a-hundred-year disaster? Management must estimate
                                   how much it will cost to achieve this level of acceptable risk.
                                     The security policy drives other policies determining acceptable use of the
                                   firm’s information resources and which members of the company have access
                                   to its information assets. An acceptable use policy (AUP) defines acceptable
                                   uses of the firm’s information resources and computing equipment, including
                                   desktop and laptop computers, wireless devices,  telephones, and the Internet.
                                   The policy should clarify company policy regarding privacy, user responsibil-
                                   ity, and personal use of company equipment and networks. A good AUP defines
                                   unacceptable and acceptable actions for every user and specifies consequences
                                   for noncompliance. For example, security policy at Unilever, the giant multina-
                                   tional consumer goods company, requires every employee to use a company-
                                   specified device and employ a password or other method of identification when
                                   logging onto the corporate network.
                                     Security policy also includes provisions for identity management. Identity
                                     management consists of business processes and software tools for identifying
                                   the valid users of a  system and controlling their access to system resources. It
                                   includes policies for identifying and authorizing different categories of system
                                   users, specifying what systems or portions of  systems each user is allowed
                                   to access, and the processes and technologies for  authenticating users and
                                     protecting their identities.






   MIS_13_Ch_08 Global.indd   342                                                                             1/17/2013   3:10:21 PM
   338   339   340   341   342   343   344   345   346   347   348