Module 2: Information Technology Infrastructure

Slides:



Advertisements
Similar presentations
Lecture 14 Securing Information Systems
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
 ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Lecture 10 Security and Control.
Lecture 10 Security and Control.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Chapter 8 Security and Control.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
Securing Information Systems
7.1 © 2007 by Prentice Hall 10 Chapter Securing Information Systems.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Module 2: Information Technology Architecture Chapter 7: Information Systems Security.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
BUSINESS B1 Information Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
8.1 CSC 601 Management Information Systems Chapter 8 Securing Information Systems.
 a crime committed on a computer network, esp. the Internet.
C8- Securing Information Systems
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Management Information Systems Chapter Eight Securing Information Systems Md. Golam Kibria Lecturer, Southeast University.
Types of Electronic Infection
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Chapter 7 Securing Information Systems. Security & Controls Security: – Policies, procedures, and technical measures used to prevent unauthorized access,
Topic 5: Basic Security.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Chap1: Is there a Security Problem in Computing?.
Computer Skills and Applications Computer Security.
Ingredients of Security
C8- Securing Information Systems Facebook Virus Update your Adobe Flash! Security and Control ***
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
Computer crimes.
Information Systems Week 7 Securing Information Systems.
Cybersecurity Test Review Introduction to Digital Technology.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
8.1 © 2010 by Prentice Hall 8 Chapter Securing Information Systems.
Issues for Computer Users, Electronic Devices, Computer and Safety.
ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
7 Chapter Securing Information Systems 1. The Boston Celtics Score Big Points Against Spyware Problem: frequency of wireless usage exposed Celtics’ proprietary.
8.1 © 2010 by Prentice Hall 7 Chapter Securing Information Systems.
Securing Information Systems
Securing Information Systems
IT Security  .
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Securing Information Systems
Securing Information Systems
Security in Networking
– Communication Technology in a Changing World
Week 7 Securing Information Systems
ISNE101 Dr. Ken Cosh Week 13.
Securing Information Systems
INFORMATION SYSTEMS SECURITY and CONTROL
HOW DO I KEEP MY COMPUTER SAFE?
Securing Information Systems
Presentation transcript:

Module 2: Information Technology Infrastructure Chapter 7: Information Systems Security

Learning Objectives Identify the reasons for Information Systems’ vulnerabilities Discuss the reasons for security for business Discuss the different types of threats Identify the components of an organizational framework for security and control Discuss the various tools and technologies for safeguarding IS

Security and Control Security Control Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft or physical damage to Information Systems Control Methods, policies, and organizational procedures that ensure that safety of the organizational assets; the accuracy and reliability or records; operational adherence to management standards

Why Systems are Vulnerable? Data stored in electronic form is vulnerable In communication network, breach can occur at any access point Steal data, alter messages Intruders with DoS attacks disrupts Web sites operations Hardware breakdowns Bad configuring, improper installation, or unauthorized changes Offshore partnering also adds to system vulnerability Portability makes cell phones, smart phones, tablets to be easily stolen Apps for mobile phones can be used to malicious purposes

Internet and Wireless Security Challenges Internet more vulnerable than internal networks Widespread impact of attack Always-on connection have fixed address becomes fixed target Also most VoIP transmission is not encrypted, so susceptible to interception Vulnerability also increases because of e-mails, IMs and peer-to-peer(P2P) file sharing

Wireless Security Challenges Wireless communication is vulnerable because radio frequency bands are easier to scan (eavesdropping) Hackers use wireless cards, external antenna and hacking software to intrude into WLANs Sniffer programs OS have the ability to identify the SSID of the network, and configures the NIC accordingly Wired Equivalent Privacy (WEP) Security standard Allows access point users to share a 40-bit encrypted password Stronger encryption: WPA2

Malicious Software (Malware) Virus Malicious software program that attaches itself to another program or file to be executed Mostly they deliver a ‘payload’, (just a message or destroys data) Spread from computer to computer, triggered by human actions Worm Copy themselves from computer to computer through network Destroy data and halt operations of computer network Usually come through downloaded programs, e-mail attachments Malware target mobile devices too, thus being a serious threat to enterprise computing

Malicious Software Trojan Horse SQL injection attacks Spyware Looks like a legitimate program Does not replicate itself, but creates way for virus and other malicious code Based on the Greek Trojan war SQL injection attacks Malware that takes advantage of vulnerabilities in poorly coded web application software Enter data into online form to check for vulnerability to a SQL injection Spyware Small programs that temporarily install themselves on the computer to monitor web surfing for advertising, but they also act as malware, affecting the computer performance

Hacking and Computer Crime Accessing a computer system unauthorized Usually “cracker” is an individual with criminal intent Find weaknesses in the security features of web sites or computer systems CyberVandalism Intentional disruption, defacement of web site or corporate information Spoofing Hackers hide themselves behind fake ids Also involves redirecting a Web link to a fake ones that looks like the original site

Hacking and Computer Crime Sniffing Eavesdropping program that monitors information traveling over a network They have a legitimate use as well, but otherwise can be very lethal DoS Attack Hackers flood a network server or web server will many requests for services to crash the network For e-commerce sites, these attacks can be costly

Hacking and Computer Crime “Any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation or prosecution” Computers as targets of crime Computer as instruments of crime Breaching the confidentiality of protected computerized data Accessing a computer without authority Accessing a protected computer to commit fraud Accessing a protected computer to cause damage Transmitting a program that intentionally causes damage Threatening to cause damage to protected computer Theft of trade secrets Unauthorized copying of software or copyrighted intellectual property Schemes to defraud Using e-mail for threats and harassment Intentionally attempting to intercept electronic communication Illegally accessing stored electronic documents

Hacking and Computer Crime Identity Theft Crime in which an imposter obtains key pieces of key personal information to impersonate someone else, eg. Credit card theft Phishing Setting up fake web sites or sending fake e-mails that look legitimate to ask users for personal data Pharming Redirects users to fake web page even when they have entered the correct web address Happens when ISP companies have flawed software Cyberterrorism Cyber attacks that target software that run electric power grids, air traffic control, or bank networks (on large scale)

Business Value of Security and Control Usually businesses don’t put much effort in security However, security and control is critical to businesses They lose 2.1% of market value if security breach happens Valuable and confidential info needs protection Inadequacy can lead to Legal liability Data exposure Implementation Advantages High return on investment Employee productivity Lower operational costs

Electronic Evidence and Computer Forensics Nowadays, legal cases rely on digital data stored on storage media along with e-mail and e-commerce transactions Effective electronic document policy Records organized, discarded not too soon Computer Forensics scientific collection, examination, authentication, preservation and analysis of data retrieved from storage media Used for court evidence Also includes ambient data Firm’s contingency planning process should have awareness of this

Case Study: When Antivirus software cripples your computers Company: McAfee – prominent antivirus software Product: AntiVirus Plus Problem: released an update that caused the computers to crash and failed to reboot Lost network capability Couldn’t detect USB drives Usually Windows XP service pack 3, McAfee VirusScan version 8.7 Conducted investigation to figure out ‘why’ was the mistake made and ‘who’ got affected

Case Study: When Antivirus software cripples your computers Result Users did not receive a warning that svchost.exe was going to be quarantined Quality assurance failed to detect the critical error Testing was not conducted on the mentioned operating system Created a “SuperDAT Remediation tool” to fix the problem

Case Study: When Antivirus software cripples your computers Management factors Did not apply proper quality assurance procedures Organizational factors Had recently changed their QA environment Technology factors The users did not receive a warning that a critical file will be quarantined Business Impact Damage an antivirus company’s reputation because people blindly trust such companies Customer’s businesses became non-functional and had to shut down until computers were fixed