Information Systems Technology Ross Malaga "Part III - Building and Managing Information Systems III 12 Copyright © 2005 Prentice Hall, Inc MANAGING.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
An Introduction to System Administration Chapter 1.
11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 
Security+ Guide to Network Security Fundamentals
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 12 Information Security Management © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
II Information Systems Technology Ross Malaga 9 "Part II Using Information Systems" Copyright © 2005 Prentice Hall, Inc. 9-1 USING INFORMATION SYSTEMS.
I Information Systems Technology Ross Malaga 3 "Part I Understanding Information Systems Technology" Copyright © 2005 Prentice Hall, Inc. 3-1 SOFTWARE.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Discovery Planning steps (1)
Securing Information Systems
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.
BUSINESS B1 Information Security.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Small Business Security Keith Slagle April 24, 2007.
Topic 5: Basic Security.
Introduction to Information Security
Chap1: Is there a Security Problem in Computing?.
Security fundamentals Topic 1 Addressing security threats and vulnerabilities.
CPT 123 Internet Skills Class Notes Internet Security Session B.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Computer Security Sample security policy Dr Alexei Vernitski.
Welcome to the ICT Department Unit 3_5 Security Policies.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Information Systems Security
Securing Information Systems
Securing Network Servers
Seminar On Ethical Hacking Submitted To: Submitted By:
Risk management.
Chapter 8 – Administering Security
MANAGING SECURITY, DISASTER RECOVERY, AND DATA RETENTION
Enterprise Network Security
USING INFORMATION SYSTEMS FOR BUSINESS INTEGRATION
Chapter 17 Risks, Security and Disaster Recovery
Processing Integrity and Availability Controls
Lecture 14: Business Information Systems - ICT Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Unit 7 – Organisational Systems Security
CYB 110 Competitive Success/snaptutorial.com
Malware, Phishing and Network Policies
Enterprise Network Security
Chapter 9 E-Commerce Security and Fraud Protection
INFORMATION SYSTEMS SECURITY and CONTROL
Enterprise Network Security
Chapter # 3 COMPUTER AND INTERNET CRIME
G061 - Network Security.
Presentation transcript:

Information Systems Technology Ross Malaga "Part III - Building and Managing Information Systems III 12 Copyright © 2005 Prentice Hall, Inc MANAGING SECURITY, DISASTER RECOVERY, AND DATA RETENTION

Copyright © 2005 Prentice Hall, Inc LEARNING GOALS Discuss the major threats to information systems. Describe the major components of an information systems security plan. Explain the disaster planning and recovery process. Describe the concepts of data retention and record information management.

Copyright © 2005 Prentice Hall, Inc Bead Bar Consultant Securing Information Systems How to safeguard the Bead Bar technology against natural or man-made disasters and business interruptions –Meredith – Worried about hackers or terrorists –Suzanne – What about studios located in Manhattan if there should be another terrorist attack? –Leda – Do franchisee systems pose a security problem? –Mitch – How do I secure my laptop computer and the data that it contains?

Copyright © 2005 Prentice Hall, Inc Bead Bar Consultant (continued) –Julia – Concerned over the accuracy of the data in financial systems –Miriam – Security of marketing data and systems –Rachel – Need for improved business continuity plans exposed by the reactions to 9/11 attack –Jim – Need to update HR policies to include security actions –Abe – Burden of all planning for security and business continuity

Copyright © 2005 Prentice Hall, Inc The Security Problem 2002 Computer Crime and Security Survey –90% of large companies and government agencies reported computer security breach –80% reported sizeable financial loss –Only 40% indicated security attacks came from outside the company –85% reported as victim of computer virus

Copyright © 2005 Prentice Hall, Inc IS Security Threats Major security threats –Poorly written software or improperly configured systems –Computer viruses or worms –External breaches –Internal breaches

Copyright © 2005 Prentice Hall, Inc Software & Systems Problems Check the CERT Web site for latest vulnerabilitiesCERT Latest CERT statisticsCERT statistics Buffer overflow in Microsoft Windows shell is one typical software vulnerabilityBuffer overflow in Microsoft Windows shell Improper configuration of or database servers are typical systems configuration problems

Copyright © 2005 Prentice Hall, Inc Improper Mail Server Configuration

Copyright © 2005 Prentice Hall, Inc Computer Viruses and Worms Virus – self-replicating program that loads itself onto a computer without the user’s knowledge Worm – a virus that spreads over a computer network, most often the Internet

Copyright © 2005 Prentice Hall, Inc External Security Breaches Hackers –People who perpetrate external breaches, or –Clever programmer who breaks into a computer system –Types Black hat – keeps security breach secret to exploit White hat – informs hacked organization of problem Crackers – programmer who breaches system to cause damage and steal information Script kiddies – person with little or no programming skill who uses publicly available software to breach systems

Copyright © 2005 Prentice Hall, Inc Types of External Security Breaches Technical attack –Uses computer program to analyze systems –Looks for known vulnerabilities –Brute force attack tries millions of user names and passwords – cNet articlecNet article Social engineering –Tricking a person into doing something they would not ordinarily do

Copyright © 2005 Prentice Hall, Inc Internal Security Breaches Most organizations’ security problems originate from within Disgruntled and former employees pose major security risks because they were authorized to access system –see IBM network security recommendationsIBM network security recommendations

Copyright © 2005 Prentice Hall, Inc Security Planning Goal of security plan – manage the risks and lessen the possibility that security breach occurs Information security plan –Includes technical methods, policies, and education –Requires periodic review and revision

Copyright © 2005 Prentice Hall, Inc Continued…

Copyright © 2005 Prentice Hall, Inc

Copyright © 2005 Prentice Hall, Inc Risk Analysis Assess what systems get what levels of security Two approaches –Quantitative Estimate probability of threat and monetary loss –Qualitative Determines each system’s importance and the possible threats and vulnerabilities Organization then ranks systems

Copyright © 2005 Prentice Hall, Inc Roles and Responsibilities of a Security Plan Determine who is responsible for the various aspects of security Information security Physical security Chief Security Officer –Charged with maintaining both physical and information security

Copyright © 2005 Prentice Hall, Inc Systems Configuration Details how an organization’s information systems should be put together and connected Poorly written software can be a major security vulnerability –Software must be updated frequently CERT Advisory Mailing List Microsoft Windows Update –Software can be configured to locate updates automatically

Copyright © 2005 Prentice Hall, Inc Antivirus Controls Each virus or worm has a unique program structure Key aspect of relying on antivirus software is ensuring that antivirus definitions are up- to-date Norton Antivirus definitions Updating can be scheduled regularly and automatically – Norton LiveUpdateNorton LiveUpdate

Copyright © 2005 Prentice Hall, Inc Physical Security Physical access control – securing the actual space where computer systems reside Physical controls apply to employees as well as outsiders Types of physical controls –Procedural –Mechanical –Biometric

Copyright © 2005 Prentice Hall, Inc

Copyright © 2005 Prentice Hall, Inc Network Security Multiple layers –Passwords –Firewalls –Intrusion detection systems –Policies and procedures How often users must change passwords and prohibit the reusing of passwords Prescriptions for length and composition of passwords –Security education

Copyright © 2005 Prentice Hall, Inc Data Access Details who should be given access to what data –Access security –Modify security

Copyright © 2005 Prentice Hall, Inc Outsourcing and Business Partners Security plan should contain –A description of the minimum security standards required for outsourcing –The security standards required for business partners –Depends on the sensitivity of the data being shared

Copyright © 2005 Prentice Hall, Inc Intrusion Detection Monitor corporate systems for patterns of suspicious behavior Key component of intrusion detection systems is the formulation of procedures that employees need to follow when an intrusion occurs

Copyright © 2005 Prentice Hall, Inc Acceptable Use Policies Policy that states what employees can and cannot do with corporate information systems –General computer use – –WWW browsing –File sharing Presented to employees when hired

Copyright © 2005 Prentice Hall, Inc Disaster Planning and Recovery Business continuity planning Disasters –Natural Hurricane Earthquake Tornado Forest fire –Man-made Theft Arson Terrorism Construction accident Time is of the essence Importance of people [and backup alternates for people]

Copyright © 2005 Prentice Hall, Inc Disaster Recovery Plan How to reduce risk of disaster How to recover when disaster occurs Components –Business impact analysis –Disaster mitigation –Data backup and recovery –System recovery –Testing!!

Copyright © 2005 Prentice Hall, Inc Business Impact Analysis Assign a level of risk and priority to each component of a company’s information systems –Mission critical –Important –Noncritical

Copyright © 2005 Prentice Hall, Inc Disaster Mitigation Techniques that will minimize the affect of disasters –Secondary telephone connections –Uninterruptible power supplies (UPS), possibly including generators

Copyright © 2005 Prentice Hall, Inc Data Backup and Recovery Disaster recovery plan must specify procedures for the backup of business data and for the storage of the backups –A backup of company data files stored in the room adjacent to the server would not be of much use in case of fire or tornado damage. –How often to perform backups Procedures for recovering data in case of emergency

Copyright © 2005 Prentice Hall, Inc Systems Recovery Rebuild –Purchase and install replacement system components –Time intensive and not for critical systems – $ Cold site –Contracted site with some hardware and network cabling installed – $$ Hot site –Ready to run site with support staff on hand – $$$ Redundancy –Fully redundant system at remote location – $$$$

Copyright © 2005 Prentice Hall, Inc Data Retention and Records Management Sarbanes-Oxley Act of 2002Sarbanes-Oxley Policies and procedures that specify which data are to be kept and for how long

Copyright © 2005 Prentice Hall, Inc Bead Bar Consultant How Security, Disasters, and Data Retention Issues Affect the Bead Bar? –Meredith and Suzanne – “Security is everyone’s business.” –Leda – Franchisee identification system –Mitch – Passwords must be complex to duplicate and the passwords must be used –Julia – Sarbanes-Oxley has increased our data retention requirements for financial data

Copyright © 2005 Prentice Hall, Inc Bead Bar Consultant (continued) –Miriam – Need to develop policies on who can access confidential information –Rachel and Jim – Work with Abe to develop comprehensive disaster recovery plan –Abe – Work with Rachel and Jim on disaster recovery plan including technical, educational, and procedural approaches

Copyright © 2005 Prentice Hall, Inc Learning Goals Summary In this chapter you have learned: The major threats to information systems The major components of an information systems security plan The disaster planning and recovery process The concepts of data retention and record information management