Management Information Systems

Slides:



Advertisements
Similar presentations
CHAPTER 9 INFORMATION SECURITY
Advertisements

© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 1 Management Information Systems, 10/e Raymond McLeod Jr.
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
Information Security EDU IT Security Terms EDU
1 Pertemuan 23 Information security Matakuliah: M0084/Sistem Informasi dalam Manajemen Tahun: 2005 Versi: 1/1.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Security Controls – What Works
Security+ Guide to Network Security Fundamentals
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Session 3 – Information Security Policies
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Agenda  Introduce key concepts in information security from the practitioner’s viewpoint.  Discuss identifying and prioritizing information assets through.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Management Information Systems The Islamia University of Bahawalpur Delivered by: Tasawar Javed Lecture 17.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Management Information Systems The Islamia University of Bahawalpur Delivered by: Tasawar Javed Lecture 19.
Chap1: Is there a Security Problem in Computing?.
ISO/IEC 27001:2013 Annex A.8 Asset management
CONTROLLING INFORMATION SYSTEMS
Management Information Systems The Islamia University of Bahawalpur Delivered by: Tasawar Javed Lecture 16.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
UNIT V Security Management of Information Technology.
Securing Information Systems
Information Systems Security
CS457 Introduction to Information Security Systems
Securing Information Systems
Management Information Systems
Securing Network Servers
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Security measures deployed by e-communication providers
INFORMATION SYSTEMS SECURITY AND CONTROL.
Network Security Basics: Malware and Attacks
Lecture 8. Cyber Security, Ethics and Trust
Chapter 17 Risks, Security and Disaster Recovery
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Securing Information Systems
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
IS4550 Security Policies and Implementation
County HIPAA Review All Rights Reserved 2002.
INFORMATION SYSTEMS SECURITY and CONTROL
Chapter # 3 COMPUTER AND INTERNET CRIME
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Management Information Systems M Agung Ali Fikri, SE. MM.

Chapter 9 Information Security

Learning Objectives Understand the organizational needs for information security & control. Know that information security is concerned with securing all information resources, not just hardware & data. Know the three main objectives of information security. Know that management of information security consists of two areas: information security management (ISM) & business continuity management (BCM). See the logical relationship among threats, risks & controls. Know what the main security threats are. Know what the main security risks are.

Learning Objectives (Cont’d) Recognize the security concerns of e-commerce & how credit card companies are dealing with them. Be familiar with a formal way to engage in risk management. Know the process for implementing an information security policy. Be familiar with the more popular security controls. Be familiar with actions of government & industry that influence information security. Know how to obtain professional certification in security & control. Know the types of plans that are included in contingency planning.

Organizational Needs for Security & Control Experience inspired industry to: Place security precautions aimed at eliminating or reducing the opportunity of damage or destruction. Provide the organization the ability to continue operations after disruption. Patriot Act & Office of Homeland Security 1st issue is security vs. individual rights. 2nd issue is security vs. availability (i.e. HIPPA).

Information Security System security focuses on protecting hardware, data, software, computer facilities, & personnel. Information security describes the protection of both computer & non-computer equipment, facilities, data, & information from misuse by unauthorized parties. Includes copiers, faxes, all types of media, paper documents.

Objectives of Information Security Information security is intended to achieve three main objectives: Confidentiality: protecting a firm’s data and information from disclosure to unauthorized persons. Availability: making sure that the firm's data & information is only available to those authorized to use it. Integrity: information systems should provide an accurate representation of the physical systems that they represent. Firm’s information systems must protect data & information from misuse, ensure availability to authorized users, display confidence in its accuracy.

Management of Information Security Information security management (ISM) is the activity of keeping information resources secure. Business continuity management (BCM) is the activity of keeping the firm & its information resources functioning after a catastrophe. Corporate information systems security officer (CISSO) is responsible for the firm’s information systems security. Corporate information assurance officer (CIAO) reports to the CEO & manage an information assurance unit.

Information Security Management Concerned with formulating the firm’s information security policy. Risk management approach is basing the security of the firm’s information resources on the risks (threats imposed) that it faces. Information security benchmark is a recommended level of security that in normal circumstances should offer reasonable protection against unauthorized intrusion. Benchmark is a recommended level of performance. Defined by governments & industry associations What authorities believe to be components of a good information security program. Benchmark compliance is when a firm adheres to the information security benchmark & recommended standards by industry authorities.

Figure 9.1 Information Security Management (ISM) Strategies

Threats Information security threat is a person, organization, mechanism, or event that has potential to inflict harm on the firm’s information resources. Internal & external threats. Internal include firm’s employees, temp. workers, consultants, contractors, & even business partners. As high as 81% of computer crimes have been committed by employees. Internal threats present potentially more serious damage due to more intimate knowledge of the system. Accidental & deliberate acts.

Figure 9.2 Unauthorized Acts Threaten System Security Objectives

Types of Threats Malicious software (malware) consists of complete programs or segments of code that can invade a system & perform functions not intended by the system owners (i.e. erase files, halt system, etc.). Virus is a computer program that can replicate itself without being observable to the user & embed copies of itself in other programs & boot sectors. Worm cannot replicate itself within a system, but it can transmit its copies by means of e-mail. Trojan horse is distributed by users as a utility & when the utility is used, it produces unwanted changes in the system’s functionality; can’t replicate nor duplicate itself. Adware generates intrusive advertising messages. Spyware gathers data from the user’s machine.

Risks Information security risk is a potential undesirable outcome of a breach of information security by an information security threat. all risks represent unauthorized acts. Unauthorized disclosure & threats. Unauthorized use. Unauthorized destruction & denial of service. Unauthorized modifications.

E-commerce Considerations “Disposable” credit card (AMEX) – an action aimed at 60 to 70% of consumers who fear credit card fraud arising from Internet use. Visa’s 10 required security practices for its retailers plus 3 general practices for achieving information security in all retailers’ activities. Cardholder Information Security Program (CISP) augmented these required practices.

Risk Management Defining risks consists of four substeps. Identify business assets to be protected from risks. Recognize the risks. Determine the level of of impact on the firm should the risks materialize. Analyze the firm’s vulnerabilities. Impact severity can be classified as: Severe impact puts the firm out of business or severely limits its ability to function. Significant impact causes significant damage & cost, but the firm will survive. Minor impact causes breakdowns that are typical of day-to-day operations.

Table 9.1 Degree of Impact & Vulnerability Determine Controls

Risk Analysis Report The findings of the risk analysis should be documented in a report that contains detailed information such as the following for each risk: A description of the risk. Source of the risk. Severity of the risk. Controls that are being applied to the risk. The owner(s) of the risk. Recommended action to address the risk. Recommended time frame for addressing the risk. What was done to mitigate the risk.

Information Security Policy The five phases of implementing: Phase 1: Project Initiation. Phase 2: Policy Development. Phase 3: Consultation & Approval. Phase 4:Awareness and Education. Phase 5: Policy Dissemination.

Figure 9.3 Development of Security Policy

Controls Control is a mechanism that is implemented to either protect the firm from risks or to minimize the impact of risks on the firm should they occur. Technical controls are those that are built into systems by the system developers during the systems development life cycle. Include an internal auditor on project team. Based on hardware & software technology.

Technical Controls Access control is the basis for security against threats by unauthorized persons. Access control three-step process includes: User identification; User authentication; User authorization. User profiles - descriptions of authorized users; used in identification & authorization.

Figure 9.4 Access Control Functions

Technical Controls (Cont’d) Intrusion detection systems (IDS) recognize an attempt to break the security before it has an opportunity to inflict damage. Virus protection software that is effective against viruses transported in e-mail. Identifies virus-carrying message & warns user. Inside threat prediction tools classify internal threats in categories such as: Possible intentional threat; Potential accidental threat; Suspicious; Harmless.

Firewalls Firewall acts as a filter & barrier that restricts the flow of data to & from the firm & the Internet. Three types of firewalls are: Packet-filtering are routers equipped with data tables of IP addresses which reflect the filtering policy positioned between the Internet and the internal network, it can serve as a firewall. Router is a network device that directs the flow of network traffic. IP address is a set of four numbers (each from 0 to 255) that uniquely identify each computer connected to the Internet. Circuit-level firewall installed between the Internet & the firm’s network but closer to the communications medium (circuit) than the router. Allows for a high amount of authentication & filtering to be performed. Application-level firewall located between the router & computer performing the application. Allows for full power of additional security checks to be performed.

Figure 9.5 Firewall Locations in the Network

Cryptographic & Physical Controls Cryptography is the use of coding by means of mathematical processes. The data and information can be encrypted as it resides in storage and or transmitted over networks. If an unauthorized person gains access, the encryption makes the data and information unreadable and prevents its unauthorized use. Special protocols such as SET (Secure Electronic Transactions) perform security checks using digital signatures developed for use in e-commerce. Export of encryption technology is prohibited to Cuba, Iran, Iraq, Libya, North Korea, Sudan, & Syria. Physical controls against unauthorized intrusions such as door locks, palm prints, voice prints, surveillance cameras, & security guards Locate computer centers in remote areas that are less susceptible to natural disasters such as earthquakes, floods, & hurricanes.

Formal Controls Formal controls include the establishment of codes of conduct, documentation of expected procedures & practices, monitoring, & preventing behavior that varies from the established guidelines. Management denotes considerable time to devising them. Documented in writing. Expected to be in force for the long term. Top management must participate actively in their establishment & enforcement.

Informal Controls Education. Training programs. Management development programs. Intended to ensure the firm’s employees both understand & support the security program. Good business practice is not to spend more for a control than the expected cost of the risk that it addresses. Establish controls at the proper level.

Government & Industry Assistance United Kingdom's BS7799. The UK standards establish a set of baseline controls. They were first published by the British Standards Institute in 1995, then published by the International Standards Organization as ISO 17799 in 2000, & made available to potential adopters online in 2003. BSI IT Baseline Protection Manual. The baseline approach is also followed by the German Bundesamt fur Sicherheit in der Informationstechnik (BSI). The baselines are intended to provide reasonable security when normal protection requirements are intended. The baselines can also serve as the basis for higher degrees of protection when those are desired. COBIT. COBIT, from the Information Systems Audit and Control Association & Foundation (ISACAF), focuses on the process that a firm can follow in developing standards, paying special attention to the writing & maintaining of the documentation. GASSP. Generally Accepted System Security Principles (GASSP) is a product of the U. S. National Research Council. Emphasis is on the rationale for establishing a security policy. ISF Standard of Good Practice. The Information Security Forum Standard of Good Practice takes a baseline approach, devoting considerable attention to the user behavior that is expected if the program is to be successful. The 2005 edition addresses such topics as secure instant messaging, Web server security, & virus protection.

Government Legislation Both U.S. & U.K. established standards & passed legislation aimed at addressing the increasing importance of information security. U.S. Government Computer Security Standards. Set of security standards organizations should meet. Availability of software program that grades users’ systems & assists them in configuring their systems to meet standards. U.K. Anti-terrorism, Crime & Security Act (ATCSA) 2001.

Professional Certification Beginning in the 1960s the IT profession began offering certification programs: Information Systems Audit and Control Association (ISACA) International Information System Security Certification Consortium (ISC) SANS (SysAdmin, Audit, Network, Security) Institute

Business Continuity Management Business continuity management (BCM) are activities aimed at continuing operations after an information system disruption. This activity was called disaster planning, then more positive term contingency planning. Contingency plan is the key element in contingency planning; it is a formal written document that spells out in detail the actions to be taken in the event that there is a disruption, or threat of disruption, in any part of the firm’s computing operations.

Contingency Subplans Emergency plan specifies those measures that ensure the safety of employees when disaster strikes. Include alarm systems, evacuation procedures, & fire-suppression systems. Backup plan is the arrangements for backup computing facilities in the event that the regular facilities are destroyed or damaged beyond use. Backup can be achieved by some combination of redundancy, diversity, & mobility. Vital records are those paper documents, microforms, & magnetic & optical storage media that are necessary for carrying on the firm’s business. Vital records plan specifies how the vital records will be protected & should include offsite backup copies.