AY25 ITAPP Unit-6
AY25 ITAPP Unit-6
2
© Stephen Sonn Centeno, 2024
© Stephen Sonn Centeno, 2024
INFORMATION TECHNOLOGY
GOVERNANCE
WHAT IS GOVERNANCE?
▪ Refers to the act or process of
governing or overseeing the control
and direction of something (such as
a country or an organization).
(Reference: Merriam-Webster)
4
© Stephen Sonn Centeno, 2024
DIFFERENT TYPES OF GOVERNANCE
CORPORATE GOVERNANCE
Refers to the combination of
rules, processes and laws by
which businesses are operated,
CORPORATE regulated and controlled.
GOVERNANCE
5
© Stephen Sonn Centeno, 2024
DIFFERENT TYPES OF GOVERNANCE
DATA GOVERNANCE
DATA Refers to the process of
GOVERNANCE
managing the availability,
usability, integrity and security of
CORPORATE the data in enterprise systems,
GOVERNANCE based on internal data standards
and policies that also control
data usage.
6
© Stephen Sonn Centeno, 2024
WHY DATA GOVERNANCE MATTERS?
Source: https://www.techtarget.com/searchdatamanagement/definition/data-governance
7
© Stephen Sonn Centeno, 2024
KEY PARTICIPANTS IN DATA GOVERNANCE
Source: https://www.techtarget.com/searchdatamanagement/definition/data-governance 8
© Stephen Sonn Centeno, 2024
DATA GOVERNANCE FRAMEWORK &
IMPLEMENTATION
PEOPLE PROCESS
Before implementing a data
Once the structure is in place, data
governance framework, owners or
governance policies, data standards,
custodians of different data
rules, controls and audit procedures
assets, or designated surrogates,
must be developed and documented
involved in the governance
to establish clarity on how governance
program should be identified.
is to be carried out.
TECHNOLOGY
Data governance software can be used to automate aspects of managing a governance program.
While data governance tools aren't a mandatory framework component, they support program and
workflow management, collaboration, development of governance policies, process
documentation, and other functions. 9
© Stephen Sonn Centeno, 2024
DIFFERENT TYPES OF GOVERNANCE
IT GOVERNANCE
DATA ▪ Defined as the processes that
GOVERNANCE
ensure the effective and
efficient use of IT in enabling
CORPORATE an organization to achieve its
GOVERNANCE goals.
▪ Provides a structure for
IT aligning IT strategy with
GOVERNANCE
business strategy.
10
© Stephen Sonn Centeno, 2024
WHAT IS AN IT GOVERNANCE FRAMEWORK?
▪ Refers to a type of framework that defines the ways and methods through
which an organization can implement, manage and monitor IT governance
within an organization.
▪ An ITG framework typically provides reference models
for:
✓ IT processes;
✓ process inputs and outputs;
✓ key process objectives; and,
✓ performance measurement techniques.
11
© Stephen Sonn Centeno, 2024
COMMONLY USED IT GOVERNANCE FRAMEWORKS
12
© Stephen Sonn Centeno, 2024
WHAT IS COBIT?
The main COBIT framework has been created to link business goals with IT
operations. It is done by providing certain information metrics as well as
maturity models that help integrate the responsibilities of the IT and business
aspects in an organization and check the progress.
13
© Stephen Sonn Centeno, 2024
MAIN COMPONENTS OF COBIT
14
© Stephen Sonn Centeno, 2024
COBIT
15
© Stephen Sonn Centeno, 2024
WHAT IS ITIL?
16
© Stephen Sonn Centeno, 2024
4 DIMENSIONS OF SERVICE MANAGEMENT PER ITIL
17
© Stephen Sonn Centeno, 2024
DIFFERENT TYPES OF GOVERNANCE
INFORMATION GOVERNANCE
DATA ▪ Information governance is a
GOVERNANCE
comprehensive strategy and
strategic framework that
CORPORATE organizations use to manage
GOVERNANCE information.
▪ This not only includes digital
INFORMATION IT information but also physical
GOVERNANCE GOVERNANCE
assets such as servers and
computers.
18
© Stephen Sonn Centeno, 2024
© Stephen Sonn Centeno, 2024
SECURITY THREATS TO
INFORMATION TECHNOLOGY
AND INFORMATION SYSTEM
UNDERSTANDING VULNERABILITIES & THREATS
VULNERABILITY
THREAT
VULNERABILITY
THREAT
Theft
21
© Stephen Sonn Centeno, 2024
RELATIONSHIP OF VULNERABILITIES & THREATS
VULNERABILITY
THREAT
Lawsuit, virus/malware
22
© Stephen Sonn Centeno, 2024
KNOWLEDGE CHECK
VULNERABILITY VULNERABILITY
VULNERABILITY THREAT
THREAT THREAT
23
© Stephen Sonn Centeno, 2024
UNDERSTANDING RISKS
RISK
Refers to the potential that a given threat will exploit vulnerabilities of an asset or
group of assets and thereby cause harm to the organization.
Likelihood Consequence
Risk
(Occurrence) (Impact)
24
© Stephen Sonn Centeno, 2024
COMMON EXAMPLES OF THREATS TO IT & IS
SOFTWARE ATTACKS
25
© Stephen Sonn Centeno, 2024
COMMON EXAMPLES OF THREATS TO IT & IS
▪ Refer to malwares attached to a document or ▪ Refer to malwares that rapidly replicates and
file that supports macros to execute its code spreads to any device within the network.
and spread from host to host.
▪ Unlike viruses, worms do not need host
▪ Once downloaded, the virus will lay dormant programs to disseminate.
until the file is opened and in use.
▪ A worm infects a device via a downloaded file
▪ Viruses are designed to disrupt a system’s or a network connection before it multiplies
ability to operate. As a result, viruses can and disperses at an exponential rate.
cause significant operational issues and data
▪ Like viruses, worms can severely disrupt the
loss.
operations of a device and cause data loss.
26
© Stephen Sonn Centeno, 2024
COMMON EXAMPLES OF THREATS TO IT & IS
▪ Refers to a malicious software used to collect ▪ Refers to a malware that runs secretly on a
data on your computer usage and provide computer and reports back to a remote user.
appropriate advertisements to you. Rather than simply disrupting a device’s
▪ Adware can redirect your browser to unsafe operations, spyware targets sensitive
sites, and it can even contain Trojan horses information and can grant remote access to
and spyware. predators.
▪ Additionally, significant levels of adware can ▪ Often used to steal financial or personal
slow down your system noticeably. information. A specific type of spyware is a
keylogger, which records your keystrokes to
reveal passwords and personal information.
28
© Stephen Sonn Centeno, 2024
COMMON EXAMPLES OF THREATS TO IT & IS
▪ Refers to a malware that gains access to ▪ Refers to a type of clandestine software that
sensitive information within a system, enables hackers to remotely access and
encrypts that information so that the user possibly control a computer undetected.
cannot access it, and then demands a financial
▪ Rootkits can also conceal other malware, like
payout for the data to be released.
keyloggers or spyware. This type of malware
can affect a computer’s performance and steal
personal or commercial data.
▪ Rootkits can be spread through phishing
emails, malicious attachments, or
compromised shared drives. 29
© Stephen Sonn Centeno, 2024
COMMON EXAMPLES OF THREATS TO IT & IS
THEFT OF INTELLECTUAL PROPERTY
30
© Stephen Sonn Centeno, 2024
COMMON EXAMPLES OF THREATS TO IT & IS
IDENTITY THEFT
31
© Stephen Sonn Centeno, 2024
COMMON EXAMPLES OF THREATS TO IT & IS
INFORMATION EXTORTION
32
© Stephen Sonn Centeno, 2024
COMMON EXAMPLES OF THREATS TO IT & IS
THEFT OF EQUIPMENT &INFORMATION
33
© Stephen Sonn Centeno, 2024
COMMON EXAMPLES OF THREATS TO IT & IS
SABOTAGE
34
© Stephen Sonn Centeno, 2024
© Stephen Sonn Centeno, 2024
SECURITY THREATS TO
INTERNET SERVICES
MOST COMMON INTERNET THREATS
MAN-IN-THE-MIDDLE
COMPUTER VIRUS COMPUTER WORM
ATTACK
ROGUE SECURITY
DOS & DDOS ATTACKS SPAM
SOFTWARE
SQL INJECTION
ATTACK
36
© Stephen Sonn Centeno, 2024
SOLUTIONS TO OVERCOME SECURITY THREATS
37
© Stephen Sonn Centeno, 2024
SOLUTIONS TO OVERCOME SECURITY THREATS
38
© Stephen Sonn Centeno, 2024
© Stephen Sonn Centeno, 2024
COMMON ISSUES IN
INFORMATION TECHNOLOGY
COMMON ISSUES IN INFORMATION TECHNOLOGY
PRIVACY
HACKING
VIRUS
PLAGIARISM
ERGONOMY
HEALTH ISSUES
40
© Stephen Sonn Centeno, 2024
Thanks!
Any questions?
41
© Stephen Sonn Centeno, 2024
Reference:
IT Application Tools in Business
2021 Edition
Rolou Lyn Rodriguez Maata and Ronina Caoili-Tayuan
ISBN: 978-971-98-1580-8, © 2021 C&E Publishing, Inc.