ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.

Slides:



Advertisements
Similar presentations
Lecture 14 Securing Information Systems
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Lecture 10 Security and Control.
Lecture 10 Security and Control.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Misbahuddin Azzuhri SE. MM. CPHR.
Chapter 8 Security and Control.
1.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
Securing Information Systems
Information Security in Corporation
8.1 © 2010 by Prentice Hall 8 Chapter Securing Information Systems.
7.1 © 2007 by Prentice Hall 10 Chapter Securing Information Systems.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Prepared by: Dinesh Bajracharya Nepal Security and Control.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
8.1 CSC 601 Management Information Systems Chapter 8 Securing Information Systems.
C8- Securing Information Systems
8.1 © 2010 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Management Information Systems Chapter Eight Securing Information Systems Md. Golam Kibria Lecturer, Southeast University.
Types of Electronic Infection
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Chapter 7 Securing Information Systems. Security & Controls Security: – Policies, procedures, and technical measures used to prevent unauthorized access,
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
C8- Securing Information Systems Facebook Virus Update your Adobe Flash! Security and Control ***
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
Information Systems Week 7 Securing Information Systems.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
8.1 © 2010 by Prentice Hall 8 Chapter Securing Information Systems.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
8.1 © 2010 by Pearson 6 Chapter Securing Information Systems.
7 Chapter Securing Information Systems 1. The Boston Celtics Score Big Points Against Spyware Problem: frequency of wireless usage exposed Celtics’ proprietary.
8.1 © 2010 by Prentice Hall 7 Chapter Securing Information Systems.
Securing Information Systems
Securing Information Systems
Securing Information Systems
Securing Information Systems
Week 7 Securing Information Systems
ISNE101 Dr. Ken Cosh Week 13.
Securing Information Systems
Securing Information Systems
Chapter 10 Security and Control.
Control , Audit & Security of Information
INFORMATION SYSTEMS SECURITY and CONTROL
Presentation transcript:

ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan

LEARNING OBJECTIVES Why are information systems vulnerable to destruction, error, and abuse? What is the business value of security and control? What are the components of an organizational framework for security and control? What are the most important tools and technologies for safeguarding information resources?

SYSTEM VULNERABILITY & ABUSE Security: – Policies, procedures and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems Controls: – Methods, policies, and organizational procedures that ensure safety of organization’s assets; accuracy and reliability of its accounting records; and operational adherence to management standards

SYSTEM VULNERABILITY & ABUSE Why systems are vulnerable? Vulnerable – weaknesses in information systems, policies and procedures Electronic data vulnerable to more types of threats than manual data Vulnerable exists at each layer and between layers and creates risk Examples : user error, viruses, hackers, radiation, disaster, hardware or software failure, theft

SYSTEM VULNERABILITY & ABUSE Malicious Software (Malware) Many of the vulnerabilities that exist today are related to the advancement of technology Software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems It can appear in the form of code, scripts, active content, and other software

SYSTEM VULNERABILITY & ABUSE Malware includes :- – Virus Rogue software program that attaches itself to other software programs or data files in order to be executed – Worms Independent computer programs that copy themselves from one computer to other computers over a network. – Trojan horse Software program that appears to be benign but then does something other than expected.

SYSTEM VULNERABILITY & ABUSE – SQL injection attacks Hackers submit data to Web forms that exploits site’s unprotected software and sends rogue SQL query to database – Spyware Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising – Key loggers Record every keystroke on computer to steal serial numbers, passwords, launch Internet attacks

SYSTEM VULNERABILITY & ABUSE Hackers and Computer Crime Hacker is someone who seeks and exploits weaknesses in a computer system or computer network Hacker activities :  Cyber vandalism - Intentional disruption, defacement, destruction of Web site or corporate information system  Spoofing - misrepresenting oneself by using fake e- mail addresses or masquerading as someone else  Sniffing – spy program that monitors information traveling over network  Denial of service attacks - flooding server with thousands of false requests to crash the network

SYSTEM VULNERABILITY & ABUSE Computer Crime Computer crime or cybercrime refers to any crime that involves a computer and a network The computer may have been used in the commission of a crime, or it may be the target Activities such as :-  Identity theft - Theft of personal Information (social security id, driver’s license or credit card numbers) to impersonate someone else  Phishing - Setting up fake Web sites or sending messages that look like legitimate businesses to ask users for confidential personal data.  Fraud - Occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase  Global threats : cyber terrorism and cyber warfare

BUSINESS VALUE OF SECURITY & CONTROL Why need to secure ?  ensure the information remains confidential  make sure the information is available when needed  protect from the unauthorized access or modification

BUSINESS VALUE OF SECURITY & CONTROL Electronic Records Management (ERM) Policies, procedures, and tools for managing retention, destruction, and storage of electronic records Legal and regulatory requirements for ERM HIPAA Outlines medical security and privacy rules and procedures Gramm-Leach-Bliley Act Requires financial institutions to ensure security and confidentiality of customer data Sarbanes-Oxley Act Imposes responsibility on companies and their management to safeguard accuracy and integrity of financial information used internally and released externally

BUSINESS VALUE OF SECURITY & CONTROL Electronic evidence Legal cases today increasingly rely on evidence represented as digital data most common electronic evidence Courts impose severe financial, even criminal penalties for improper destruction of electronic documents, failure to produce records, and failure to store records properly

BUSINESS VALUE OF SECURITY & CONTROL Computer forensics Scientific collection, examination, authentication, preservation, and analysis of data on computer storage media so that it can be used as evidence in a court Awareness of computer forensics should be incorporated into firm’s contingency planning process

ESTABLISHING FRAMEWORK Information systems controls  General controls – software, physical hardware, computer operations, data security, administrative  Application controls – include automated and manual procedures Risk assessment - determines level of risk to firm if specific activity or process is not properly controlled Security policy - statements ranking information risks, identifying acceptable security goals, and identifying mechanisms for achieving these goals

ESTABLISHING FRAMEWORK Disaster recovery planning - Restoring computing and communication services after earthquake, flood, etc. Business continuity planning - Focuses on restoring business operations after disaster

ESTABLISHING FRAMEWORK Auditing MIS audit: Examines firm’s overall security environment as well as controls governing individual information systems Security audit: Reviews technologies, procedures, documentation, training, and personnel Audits: List and rank all control weaknesses Estimate probability of occurrence Assess financial and organizational impact of each threat

TECHNOLOGIES AND TOOLS Identity management and authentication Access control Policies and procedures used to prevent improper access to systems by unauthorized insiders and outsiders Users must be authorized and authenticated Authentication Typically established by password systems New authentication technologies Tokens Smart cards Biometric authentication

TECHNOLOGIES AND TOOLS Firewalls, and antivirus software Combination of hardware and software controlling flow of incoming and outgoing network traffic Prevents unauthorized access Screening technologies Packet filtering Stateful inspection Network address translation (NAT) Application proxy filtering

TECHNOLOGIES AND TOOLS A CORPORATE FIREWALL The firewall is placed between the firm’s private network and the public Internet or another distrusted network to protect against unauthorized traffic.

TECHNOLOGIES AND TOOLS Intrusion detection systems Full-time, real-time monitoring tools Placed at most vulnerable points of corporate networks to detect and deter intruders Scanning software looks for patterns such as bad passwords, removal of important files, and notifies administrators

TECHNOLOGIES AND TOOLS Antivirus and antispyware systems Antivirus software: Checks computer systems and drives for presence of computer viruses To remain effective, antivirus software must be continually updated Antispyware software tools: Many leading antivirus software vendors include protection against spyware Standalone tools available (Ad-Aware, Spybot)

TECHNOLOGIES AND TOOLS Securing wireless networks WEP: Provides some measure of security if activated VPN technology: Can be used by corporations to help security i specification: Tightens security for wireless LANs

TECHNOLOGIES AND TOOLS Encryption Transforming message into cipher text, using encryption key Receiver must decrypt encoded message Two methods of encryption : Secure Sockets Layer (SSL) and Secure Hypertext Transfer Protocol (S- HTTP)

TECHNOLOGIES AND TOOLS Public Key Infrastructure Two keys, one shared/public and one private Messages encrypted with recipient’s public key but can only be decoded with recipient’s private key

TECHNOLOGIES AND TOOLS Digital certificate: – Data file used to establish the identity of users and electronic assets for protection of online transactions – Uses a trusted third party, certification authority (CA), to validate a user’s identity – CA verifies user’s identity, stores information in CA server, which generates encrypted digital certificate containing owner ID information and copy of owner’s public key

TECHNOLOGIES AND TOOLS DIGITAL CERTIFICATES Digital certificates help establish the identity of people or electronic assets. They protect online transactions by providing secure, encrypted, online communication.

THANK YOU