Security ~ Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.

Slides:



Advertisements
Similar presentations
Lecture 14 Securing Information Systems
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Module 2: Information Technology Infrastructure
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
7.1 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 7 Chapter Securing Information Systems.
Lecture 10 Security and Control.
Lecture 10 Security and Control.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Misbahuddin Azzuhri SE. MM. CPHR.
Chapter 8 Security and Control.
1.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for.
Securing Information Systems
Information Security in Corporation
8.1 © 2010 by Prentice Hall 8 Chapter Securing Information Systems.
7.1 © 2007 by Prentice Hall 10 Chapter Securing Information Systems.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
8.1 © 2010 by Prentice Hall 8 Chapter Securing Information Systems.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
8.1 CSC 601 Management Information Systems Chapter 8 Securing Information Systems.
C8- Securing Information Systems
8.1 © 2010 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Management Information Systems Chapter Eight Securing Information Systems Md. Golam Kibria Lecturer, Southeast University.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
Chapter 7 Securing Information Systems. Security & Controls Security: – Policies, procedures, and technical measures used to prevent unauthorized access,
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Topic 5: Basic Security.
C8- Securing Information Systems Facebook Virus Update your Adobe Flash! Security and Control ***
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
Information Systems Week 7 Securing Information Systems.
8.1 © 2010 by Prentice Hall 8 Chapter Securing Information Systems.
ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
8.1 © 2010 by Pearson 6 Chapter Securing Information Systems.
7 Chapter Securing Information Systems 1. The Boston Celtics Score Big Points Against Spyware Problem: frequency of wireless usage exposed Celtics’ proprietary.
8.1 © 2010 by Prentice Hall 7 Chapter Securing Information Systems.
Securing Information Systems
Securing Information Systems
Securing Information Systems
Securing Information Systems
– Communication Technology in a Changing World
Week 7 Securing Information Systems
ISNE101 Dr. Ken Cosh Week 13.
Securing Information Systems
Chapter 10 Security and Control.
INFORMATION SYSTEMS SECURITY and CONTROL
Securing Information Systems
Presentation transcript:

Security ~ Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems Control ~ Methods, policies, and organizational procedures that ensure safety of organization’s assets; accuracy and reliability of its accounting records; and operational adherence to management standards

Why system are vulnerable? › Accessibility of networks › Hardware problems (breakdowns, configuration errors, damage from improper use or crime) › Software problems (programming errors, installation errors, unauthorized changes) › Disasters › Use of networks/computers outside of firm’s control › Loss and theft of portable devices  Potential for unauthorized access, abuse or fraud is not limited to a single location but can occur at any access point in the network.  System malfunction if computer hardware break down, not configured properly, damaged by improper use or criminal acts.

 Internet Vulnerabilities Open to anyone From widespread use of (contain attachment that serve as springboards for malicious software to internal corporate systems), instant messaging (IM do not use a secure layer for text messages), and peer-to-peer file sharing program ( P2P transmit malicious software or expose information on either individual or corporate computer). The switched voice network if it does not run over a secure private network (encrypted VoIP) Constantly connected to the internet by cable modems or digital subsciber line (DSL) Internet is so huge (size of internet)

 Wireless security challenges Radio frequency bands easy to scan Bluetooth and wifi network are susceptible to hacking by eavesdroppers. Local area network (LANs) can be easily penetrated by outsiders armed with laptops, wireless cards, external antennae, and hacking software. Service set identifiers (SSIDs) identifying the access point in a wifi network are broadcast multiple time and can be picked up easily by intruder’sniffer programs.

 Malicious software program – as malware and include a variety of threats  Computer virus – rogue software program that attaches itself to other software programs or data files in order to be excuted, usually without user knowledge or permission.  Payload (computer viruses delivers) – destroying program or data, clogging computer memory, reformatting a computer’s hard drive, or causing program to run improperly. Malicious software : viruses, worms, trojan horses and spyware

 Worms - Independent programs that copy themselves from one computer to other computers over a network. Worm destroy data and program as disrupt or even halt the operation of computer network.  Worms and viruses spread by  Downloads (drive-by downloads)  , IM attachments  Downloads on Web sites and social networks  Trojan horses  Software that appears benign but does something other than expected. The trojan virus is not itself a virus because it does not replicate but it is often a way for viruses to be introduced into a computer systems.

 SQL injection attacks  These vulnerabilities occur when a web application fails to properly validate or filter data entered by a user on a web page, which might occur when ordering something online.  Spyware  Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising  Example: Key loggers - record every keystroke on computer to steal serial numbers, passwords, launch Internet attacks, to gain access to account, to obtain pasword, to protected computer system or to pickup personal information. :Reset browser home page :Redirect search requests :Slow computer performance by taking up memory

 Hacker is an individual who intends to gain unauthorized access to a computer systems  Crackers is typically used to denote a hacker with criminal intent.  Hacker activities: System intrusion System damage Cybervandalism – Intentional disruption, defacement, destruction of Web site or corporate information system Hackers and computer crime

 Spoofing – Misrepresenting oneself by using fake addresses or masquerading as someone else – Redirecting Web link to address different from intended one, with site masquerading as intended destination  Sniffer – Eavesdropping program that monitors information traveling over network – Enables hackers to steal proprietary information such as e- mail, company files, and so on  Denial-of-service attacks (DoS) › Flooding server with thousands of false requests to crash the network.  Distributed denial-of-service(DDoS) › Attack use of numerous computers to inundate and overwhelm the network from numerous launch points.

 Computer crime › Most hacker activities are criminal offenses and the vulnerabilities of systems we have just described make them target for other types of computer crime. › Defined as“any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution”  Identity theft › Theft of personal Information (social security ID, driver’s license, or credit card numbers) to impersonate someone else. › Popular tactic is a form of spoofing called Phishing  Setting up fake Web sites or sending messages that look like legitimate businesses to ask users for confidential personal data.  New phishing technique is Evil twins - Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet. › Pharming  Redirects users to a bogus Web page, even when individual types correct Web page address into his or her browser

 Click fraud › Occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase.  Cyberterrorism and Cyberwarfare › Cybercriminal activities  Launching malware, denilal-of-service attacks and phishing probes.

– Employees have access to privileged information, and in the presence of sloopy internal security procedures, they are often able to roam throughout an organization system without leaving trace. – Security threats often originate inside an organization and inside knowledge – Social engineering: Tricking employees into revealing their passwords by pretending to be legitimate members of the company in need of information Internal threats : Employees

– Commercial software contains flaws that create security vulnerabilities A major problem is Hidden bugs or program code defects) – Zero defects cannot be achieved because complete testing is not possible with large programs – Patches for repair the flow without disturbing the proper operation of the software Create Small pieces of software Exploits often created faster than patches can be released and implemented Software vulnerabilty

 Lack of security, control can lead to : 1. Loss of revenue  Failed computer systems can lead to significant or total loss of business function. 2. Lowered market value  Information asset can have tremendous value A security breach may cut into a firm’s market value almost immediately. 3. Legal liability 4.Lowered employee productivity 5.Higher operational costs

In USA legal and regulatory requirements for electronic records management and privacy protection – HIPAA :Medical security and privacy rules and procedures – Gramm-Leach-Bliley Act: Requires financial institutions to ensure the security and confidentiality of customer data – Sarbanes-Oxley Act: Imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally

Electronic evidence –Evidence for white collar crimes often in digital form Data on computers, , instant messages, e-commerce transactions –Proper control of data can save time and money when responding to legal discovery request Computer forensics: –Scientific collection, examination, authentication, preservation, and analysis of data from computer storage media for use as evidence in court of law whi Includes recovery of ambient and hidden data

 Information systems controls 1)General controls Govern design, security, and use of computer programs and security of data files in general throughout organization’s information technology infrastructure. Establishing a Framework for Security and Control Administr ative Controls Software control Impleme ntation Controls Data Security Controls Hardwar e control Compute r Operatio n system Types of general Control

2) Application Controls Specific controls unique to each computerized application, such as payroll or order processing. Application controls can be classified as: Input controls Output controls Processing controls

 Risk Assesment Determines level of risk to firm if specific activity or process is not properly Control Types of threat Probability of occurrence during year Potential losses, value of threat Expected annual loss ExposureProbability of Occurance (%) Loss Range/Avarage ($) Expected Annual Loss ($) Power Failure30%$5,000-$200,000 ($102,000) $30,750 Embezzlemen t 5%$1,000-$50,000 ($25,000) $1,275 User Error98%$200-$40,000 ($20,100) $19,698

 Security policy Ranks information risks, identifies acceptable security goals, and identifies mechanisms for achieving these goals. Acceptable use policy (AUP) Defines acceptable uses of firm’s information resources and computing equipment Authorization policies Determine differing levels of user access to information assets Drives other policies

Identity management – Business processes and tools to identify valid users of system and control access Identifies and authorizes different categories of users Specifies which portion of system users can access Authenticating users and protects identities – Identity management systems Captures access rules for different levels of users SECURITY PROFILES FOR A PERSONNEL SYSTEM

Disaster recovery planning Business continuity planning Devises plans for restoration of disrupted services Focuses on restoring business operations after disaster  Both types of plans needed to identify firm’s most critical systems  Business impact analysis to determine impact of an outage  Management must determine which systems restored first

MIS  Examines firm’s overall security environment as well as controls governing individual information systems  Reviews technologies, procedures, documentation, training, and personnel.  May even simulate disaster to test response of technology, IS staff, other employees  Lists and ranks all control weaknesses and estimates probability of their occurrence  Assesses financial and organizational impact of each threat

Identity Management and Authentication  Identity Management Software › keeping track of all users and the system privileges › Authenticating users, protecting user identities and controlling access to system resources  Authentication › Ability to know that person is who he or she claims to be › Passwords, tokens, smart cards, and biometric authentication.

Firewalls, Intrusion Detection System, and Antivirus Software  Firewall › Unauthorized users from accessing private network › There are a number of firewall screening technologies  Static packet filtering  Stateful inspection  Network address translation (NAT)  Application proxy filtering

Firewalls, Intrusion Detection System, and Antivirus Software  Intrusion Defection Systems › Protect against suspicious network traffic and attempts to access files and databases Antivirus and Antispyware Software  Antivirus software: designed to check computer systems and drives for the presence of computer viruses  Must be continually updated

Firewalls, Intrusion Detection System, and Antivirus Software  Unified Threat Management (UTM) Systems › To help businesses reduce costs and improve manageability

Encryption and Public Key Infrastructure  Encryption › Transforming plains text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver › Two method for encrypting network traffic on the Web:  Secure Socket Layer (SSL) and its successor Transport Layer Security (TLS)  Secure Hypertext Transfer Protocol (S-HTTP) — Two method of encryption  Symmetric key encryption  Public key encryption

Encryption and Public Key Infrastructure  Digital Certificates › Establish the identity of users and electronic assets for protection of online transaction › Digital Certification System uses a trusted third party (VeriSign, IdenTrust, and Australia’s KeyPost) to validate a user’s identity. Public Key Infrastructure (PKI) – Use of public key cryptography working with a certification authority

Ensuring System Availability  Online transaction process requires 100% availability, no downtime  Fault-tolerant computer system › Contain redundant hardware, software and power supply components that create an environment that provide continuous, uninterrupted service  High-availability computing Downtime › Period of time in which a system is not operational  Recovery-oriented computing › Designing system that recover quickly and implementing capabilities and tools to help operators pinpoint the sources of fault in multi- component system and easily correct their mistakes

 Deep Packet Inspection (DPI) › Examines data files and sorts out low-priority online material while assigning higher priority to business-critical files  Security Outsourcing › Management security service providers (MSSPs)  Monitor network activity and perform vulnerability testing and intrusion detection

 Security in the cloud › Responsibility for security resides with company owning the data › Firms must ensure providers provides adequate protection:  Where data are stored  Meeting corporate requirements, legal privacy laws  Segregation of data from other clients  Audits and security certifications › Service level agreements (SLAs)

 Securing mobile platforms › Security policies should include and cover any special requirements for mobile devices  Guidelines for use of platforms and applications › Mobile device management tools  Authorization  Inventory records  Control updates  Lock down/erase lost devices  Encryption › Software for segregating corporate data on devices

 Ensuring Software Quality – Software metrics: Objective assessments of system in form of quantified measurements Number of transactions Online response time Payroll checks printed per hour Known bugs per hundred lines of code – Early and regular testing – Walkthrough: Review of specification or design document by small group of qualified people – Debugging: Process by which errors are eliminated