Securing Information Systems - WordPress

2y ago
19 Views
2 Downloads
7.70 MB
44 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Jacoby Zeller
Transcription

Chapter 8Securing InformationSystems8.1 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsLEARNING OBJECTIVES Explain why information systems are vulnerable todestruction, error, and abuse. Assess the business value of security and control. Identify the components of an organizationalframework for security and control. Evaluate the most important tools and technologiesfor safeguarding information resources.8.2 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsBoston Celtics Score Big Points Against Spyware Problem: Spyware infecting laptops during team travelaffecting accessibility and performance of proprietarysystem Solutions: Deploy security software to reduce spyware. Mi5 Network’s Webgate security appliance tool sitsbetween corporate firewall and network to preventspyware entering network or infected computersconnecting to network Demonstrates IT’s role in combating malicious software Illustrates digital technology’s role in achieving securityon the Web8.3 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsSystem Vulnerability and AbuseOrganizations need to make security and control atop priority to prevent destruction, error and abuse Security: Policies, procedures and technical measures used to preventunauthorized access, alteration, theft, or physical damage toinformation systems Controls: 8.4Methods, policies, and organizational procedures that ensuresafety of organization’s assets; accuracy and reliability of itsaccounting records; and operational adherence tomanagement standards 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsSystem Vulnerability and Abuse Why systems are vulnerable to destruction,error and abuse Hardware problems Breakdowns, configuration errors, damage fromimproper use or crime Software problems Programming errors, installation errors, unauthorizedchanges) Disasters Power failures, flood, fires, earthquakes, etc. Use of networks and computers outside offirm’s control 8.5E.g., with domestic or offshore outsourcing vendors 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsSystem Vulnerability and AbuseContemporary Security Challenges and VulnerabilitiesThe architecture of a Web-based application typically includes a Web client, a server,and corporate information systems linked to databases. Each of these componentspresents security challenges and vulnerabilities. Floods, fires, power failures, andother electrical problems can cause disruptions at any point in the network.Figure 8-18.6 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsSystem Vulnerability and Abuse Internet vulnerabilities8.7 Network open to anyone Size of Internet means abuses can have wide impact Use of fixed Internet addresses with permanentconnections to Internet eases identification by hackers E-mail attachments E-mail used for transmitting trade secrets IM messages lack security, can be easily intercepted 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsSystem Vulnerability and Abuse Wireless security challenges Radio frequency bands easy to scanSSIDs (service set identifiers) War driving Eavesdroppers drive by buildings and try to intercept network trafficWhen hacker gains access to SSID, has access to network’sresourcesWEP (Wired Equivalent Privacy) 8.8Identify access pointsBroadcast multiple timesSecurity standard for 802.11Basic specification uses shared password for both users and accesspointUsers often fail to use security features 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsSystem Vulnerability and AbuseWi-Fi Security ChallengesFigure 8-2Many Wi-Fi networks can bepenetrated easily by intrudersusing sniffer programs toobtain an address to access theresources of a network withoutauthorization.8.9 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsSystem Vulnerability and AbuseThe Worst Data Theft Ever? Read the Interactive Session: Organizations and thendiscuss the following questions: List and describe the security control weaknesses at TJXCompanies What management, organization, and technology factorscontributed to these weaknesses? What was the business impact of TJX’s data loss on TJX,consumers, and banks? How effectively did TJX deal with these problems? Who should be held liable for the losses caused by the use offraudulent credit cards in this case? The banks issuing thecards or the consumers? Justify your answer. What solutions would you suggest to prevent the problems?8.10 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsSystem Vulnerability and Abuse Malicious software (malware) Viruses: Rogue software program that attaches itself to other softwareprograms or data files in order to be executed. Typically spread when sendinge-mail attachment or copying file. Highly destructive e.g. destroying programs/data, clogging computer memory, programs run improperly. Worms: Independent computer programs that copy themselves from onecomputer to other computers over a network. Destroy data/programs, disrupt/halt computer network operation. Trojan horses: Software program that appears to be benign but then doessomething other than expected Spyware: Small programs install themselves surreptitiously on computers tomonitor user Web surfing activity and serve up advertising Key loggers: Record every keystroke on computer to steal serialnumbers, passwords, launch Internet attacks8.11 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsSystem Vulnerability and Abuse Hackers and computer crime Hackers vs. crackers Activities include System intrusion Theft of goods and information System damage Cybervandalism Intentional disruption, defacement, destructionof Web site or corporate information system8.12 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsSystem Vulnerability and Abuse Spoofing Misrepresenting oneself by using fake e-mail addresses ormasquerading as someone else Redirecting Web link to address different from intended one, withsite masquerading as intended destination Sniffer: Eavesdropping program that monitors information travelingover network. Help to identify weak spots on network. Enable hackersto steal information on the network e.g. email, files and reports. Denial-of-service attacks (DoS): Flooding server withthousands of false requests to crash the network Distributed denial-of-service attacks (DDoS): Use ofnumerous computers to launch a DoS 8.13Botnets: Networks of “zombie” PCs infiltrated by bot malware 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsSystem Vulnerability and Abuse Computer crime Defined as “any violations of criminal law that involve aknowledge of computer technology for their perpetration,investigation, or prosecution” Computer may be target of crime, e.g.: 8.14 Breaching confidentiality of protected computerized data Accessing a computer system without authorityComputer may be instrument of crime, e.g.: Theft of trade secrets Using e-mail for threats or harassment 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsSystem Vulnerability and Abuse Identity theft: Theft of personal Information (socialsecurity id, driver’s license or credit card numbers) toimpersonate someone else Phishing: Setting up fake Web sites or sending e-mailmessages that look like legitimate businesses to ask usersfor confidential personal data. Evil twins: Wireless networks that pretend to offertrustworthy Wi-Fi connections to the Internet Pharming: Redirects users to a bogus Web page, evenwhen individual types correct Web page address into his orher browser8.15 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsSystem Vulnerability and Abuse Click fraud Individual or computer program clicks online adwithout any intention of learning more or making apurchase. A serious problem at sites that featurepay-per-click on-line advertising. Global threats - Cyberterrorism and cyberwarfare Concern that Internet vulnerabilities and othernetworks make digital networks easy targets fordigital attacks by terrorists, foreign intelligenceservices, or other groups8.16 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsSystem Vulnerability and Abuse Internal threats – Employees Security threats often originate inside anorganization Inside knowledge Sloppy security procedures Social engineering: 8.17User lack of knowledgeTricking employees into revealing their passwords bypretending to be legitimate members of the companyin need of information 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsSystem Vulnerability and Abuse Software vulnerability Commercial software contains flaws that createsecurity vulnerabilities Hidden bugs (program code defects) Zero defects cannot be achieved because completetesting is not possible with large programsFlaws can open networks to intruders Patches8.18 Vendors release small pieces of software to repair flaws However, amount of software in use can mean exploitscreated faster than patches be released and implemented 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsBusiness Value of Security and Control Lack of security, control can lead to: Loss of revenue Failed computer systems can lead to significant ortotal loss of business function Lowered market value: Information assets can have tremendous value A security breach may cut into firm’s market valuealmost immediately Legal liability Lowered employee productivity Higher operational costs8.19 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsBusiness Value of Security and Control Legal and regulatory requirements for electronicrecords management Firms face new legal obligations for the retentionand storage of electronic records as well as forprivacy protection8.20 HIPAA: Medical security and privacy rules and procedures Gramm-Leach-Bliley Act: Requires financial institutions toensure the security and confidentiality of customer data Sarbanes-Oxley Act: Imposes responsibility on companiesand their management to safeguard the accuracy and integrityof financial information that is used internally and releasedexternally 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsBusiness Value of Security and Control Electronic evidence Evidence for white collar crimes often found indigital form Data stored on computer devices, e-mail, instant messages,e-commerce transactions Proper control of data can save time, money whenresponding to legal discovery request Computer forensics:8.21 Scientific collection, examination, authentication, preservation,and analysis of data from computer storage media for use asevidence in court of law Includes recovery of ambient and hidden data 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsEstablishing a Framework for Security and Control Information systems controls General controls8.22 Govern design, security, and use of computer programsand data throughout organization’s IT infrastructure Combination of hardware, software, and manualprocedures to create overall control environment Types of general controls Software controls Hardware controls Computer operations controls Data security controls Implementation controls Administrative controls 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsEstablishing a Framework for Security and Control Application controls8.23 Specific controls unique to each computerized application,such as payroll or order processing Include both automated and manual procedures Ensure that only authorized data are completely andaccurately processed by that application Types of application controls: Input controls Processing controls Output controls 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsEstablishing a Framework for Security and Control Risk assessment 8.24Determines level of risk to firm if specific activity or process isnot properly controlled Types of threat Probability of occurrence during year Potential losses, value of threat Expected annual lossEXPOSUREPROBABILITYLOSS RANGE (AVERAGE)EXPECTEDANNUAL LOSSPower failure30% 5K - 200K ( 102,500) 30,750Embezzlement5% 1K - 50K ( 25,500) 1,275User error98% 200 - 40K ( 20,100) 19,698 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsEstablishing a Framework for Security and Control Security policy Ranks information risks, identifies acceptable security goals,and identifies mechanisms for achieving these goals Drives other policies Acceptable use policy (AUP): Defines acceptable usesof firm’s information resources and computing equipment Authorization policies: Determine differing levels of useraccess to information assets Authorization management systems 8.25Allow each user access only to those portions of system thatperson is permitted to enter, based on information establishedby set of access rules, profile 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsEstablishing a Framework for Security and ControlSecurity Profiles for a Personnel SystemFigure 8-3These two examplesrepresent two securityprofiles or datasecurity patterns thatmight be found in apersonnel system.Depending on thesecurity profile, a userwould have certainrestrictions on accessto various systems,locations, or data in anorganization.8.26 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsEstablishing a Framework for Security and Control Disaster recovery planning: Devises plans forrestoration of disrupted services Business continuity planning: Focuses on restoringbusiness operations after disaster Both types of plans needed to identify firm’s mostcritical systems and business processes8.27 Business impact analysis to determine impact of an outage Management must determine Maximum time systems can be down Which systems must be restored first 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsEstablishing a Framework for Security and Control MIS audit8.28 Examines firm’s overall security environment as well ascontrols governing individual information systems Reviews technologies, procedures, documentation, training,and personnel May even simulate disaster to test response of technology, ISstaff, other employees Lists and ranks all control weaknesses and estimatesprobability of their occurrence Assesses financial and organizational impact of each threat 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsEstablishing a Framework for Security and ControlSample Auditor’s List of Control WeaknessesFigure 8-4This chart is a samplepage from a list ofcontrol weaknesses thatan auditor might find in aloan system in a localcommercial bank. Thisform helps auditorsrecord and evaluatecontrol weaknesses andshows the results ofdiscussing thoseweaknesses withmanagement, as well asany corrective actionstaken by management.8.29 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsTechnologies and Tools for Security Access control: Policies and procedures to preventimproper access to systems by unauthorizedinsiders and outsiders Authorization Authentication8.30 Password systems Tokens Smart cards Biometric authentication 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsTechnologies and Tools for Security Firewall: Hardware and/or software to preventunauthorized access to private networks Screening technologies Packet filtering Stateful inspection Network address translation (NAT) Application proxy filtering Intrusion detection systems: Monitor vulnerablepoints on networks to detect and deter intruders8.31 Examines events as they are happening to discover attacksin progress Scans network to find patterns indicative of attacks 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsTechnologies and Tools for SecurityA Corporate FirewallThe firewall is placed between thefirm’s private network and thepublic Internet or anotherdistrusted network to protectagainst unauthorized traffic.Figure 8-58.32 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsTechnologies and Tools for Security Antivirus and antispyware software: Checks computers for presence of malware and can ofteneliminate it as well Require continual updating Unified threat management (UTM)8.33 Comprehensive security management products Tools include Firewalls Intrusion detection VPNs Web content filtering Antispam software 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsTechnologies and Tools for Security Securing wireless networks WEP security can be improved: Activating it Assigning unique name to network’s SSID Using it with VPN technology Wi-Fi Alliance finalized WAP2 specification,replacing WEP with stronger standards8.34 Continually changing keys Encrypted authentication system with central server 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsTechnologies and Tools for Security Encryption: Transforming text or data into cipher text that cannotbe read by unintended recipients Two methods for encrypting network traffic Secure Sockets Layer (SSL) and successor Transport LayerSecurity (TLS) Secure Hypertext Transfer Protocol (S-HTTP) Two methods of encryption Symmetric key encryption Public key encryption8.35 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsTechnologies and Tools for SecurityPublic Key EncryptionA public key encryption system can be viewed as a series of public and private keysthat lock data when they are transmitted and unlock the data when they are received.The sender locates the recipient’s public key in a directory and uses it to encrypt amessage. The message is sent in encrypted form over the Internet or a privatenetwork. When the encrypted message arrives, the recipient uses his or her privatekey to decrypt the data and read the message.Figure 7-68.36 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsTechnologies and Tools for Security Digital certificate: Data file used to establish the identity of users and electronicassets for protection of online transactions Uses a trusted third party, certification authority (CA), tovalidate a user’s identity CA verifies user’s identity, stores information in CA server,which generates encrypted digital certificate containingowner ID information and copy of owner’s public key Public key infrastructure (PKI) Use of public key cryptography working with certificateauthority Widely used in e-commerce8.37 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsTechnologies and Tools for SecurityDigital CertificatesFigure 8-7Digital certificateshelp establish theidentity of people orelectronic assets.They protect onlinetransactions byproviding secure,encrypted, onlinecommunication.8.38 2010 by Pearson

Management Information SystemsChapter 8 Securing Information SystemsTechnologies and Tools for Security Ensuring system availability Online transaction processing requires 100%availability, no downtime Fault-tolerant

Chapter 8 Securing Information Systems System Vulnerability and Abuse A zombie \(also known as a bot\) is a computer that a remote attacker has accessed and set up to forward spam and viruses to other computers on the Internet. \r\rMost owners of zombie computers are

Related Documents:

1.1.3 WordPress.com dan WordPress.org WordPress menyediakan dua alamat yang berbeda, yaitu WordPress.com dan WordPress.org. WordPress.com merupakan situs layanan blog yang menggunakan mesin WordPress, didirikan oleh perusahaan Automattic. Dengan mendaftar pada situs WordPress.com, pengguna tidak perlu melakukan instalasi atau

B of the rear panel, and flat cables (CN701, CN702), and re-move the MAIN board. 4Remove the two screws D securing the SUB-TRANS board, and remove the SUB-TRANS board. 5Remove the two screws F securing the REG board. 6Remove the three screws G securing the CDM cover, and re-move the CDM cover. 7Remove the two screws H securing the CDM, move the CDM

WordPress Themes WordPress Premium Themes WordPress Free Themes WordPress Plugins ite Templates WordPress Hosting WordPress.com CreativeMarket.com . with crowdfunding b Astoundif plugin and fundif theme. Plugin will empower o

Lesson 2. Install Wordpress On Your Domain Lesson 3. How To Log In And Out Of Wordpress Lesson 4. The Design Of Your Wordpress Website Lesson 5. First Steps To A Perfect Website Lesson 6. Add Your First Wordpress Page Lesson 7. Add Your First Wordpress Post Lesson 8. All About Widgets IN-DEPTH GUIDE - DRILL DOWN TO THE WONDERS OF WORDPRESS .

Alliance for Securing Democracy October 2020 1 In mid-2020, the Alliance for Securing Democracy convened a task force of 30 leading American national secu-rity and foreign policy experts to devise a natio

Securing WLANs In the simplest terms, securing data in wireless networks focuses on two aspects: – The encryption of the data itself – The authentication of network users 2 RSA White Paper. fact they are generally used for extended periods, shared secr

Where Teams stores your data o Microsoft and third-party storage Who can access your data o Securing external and guest access Securing document sharing with policies, DLP, and/or AIP Using retention policies for compliance Who can create and ma

www.2id.korea.army.mil 2 Indianhead August 13, 2010 “Jeju Island, it takes about a half day to travel, so on a long weekend you can spend three full days touring, exploring, and enjoying yourself.” Pfc. Reginald Garnett HHC, 1-72th Armor OpiniOn “Gangneung is a great place to visit. It has a beautiful beach, Gyeongpo Beach, where many .