Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

Slides:



Advertisements
Similar presentations
Information and Ethics, Information Security and Malicious Programs BSAD 141 Dave Novak.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
CHAPTER OVERVIEW SECTION 4.1 – Ethics
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
MANAGING IT SYSTEMS Top Things to Keep in Mind to Protect Yourself and Others.
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
BUSINESS PLUG-IN B6 Information Security.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B6 Information Security.
ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
4-1 Chapter Four Overview SECTION ETHICS –Ethics –Information Ethics –Developing Information Management Policies –Ethics in the Workplace SECTION.
Lecture 11 Reliability and Security in IT infrastructure.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
CSUN Information Systems IS312 Information Systems for Business Lecture 9 Ethic & Information Security.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Securing Information Systems
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
Protecting People and Information: Threats and Safeguards
PROTECTING PEOPLE AND INFORMATION Threats and Safeguards
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
MANAGING IT SYSTEMS Top Things to Keep in Mind to Protect Yourself and Others.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
Management Information Systems Chapter Eight Securing Information Systems Md. Golam Kibria Lecturer, Southeast University.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B6 Information Security.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Computer Security By Duncan Hall.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Any criminal action perpetrated primarily through the use of a computer.
Information Systems Design and Development Security Risks Computing Science.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Information Systems Design and Development Security Precautions Computing Science.
Chapter 40 Internet Security.
Securing Information Systems
BUSINESS DRIVEN TECHNOLOGY
Add video notes to lecture
Information Security and Malicious Programs
CHAPTER FOUR OVERVIEW SECTION ETHICS
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Security in Networking
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Chapter 9 E-Commerce Security and Fraud Protection
INFORMATION SYSTEMS SECURITY and CONTROL
CHAPTER FOUR OVERVIEW SECTION ETHICS
Presentation transcript:

Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education. Business Plug-In B6 Information Security

6-2 LEARNING OUTCOMES 1. Describe the relationships and differences between hackers and viruses 2. Describe the relationship between information security policies and an information security plan 3. Provide an example of each of the three primary security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response

6-3 PROTECTING INTELLECTUAL ASSETS O Organizational information is intellectual capital - it must be protected O Information security – The protection of information from accidental or intentional misuse by persons inside or outside an organization O Downtime – Refers to a period of time when a system is unavailable

6-4 PROTECTING INTELLECTUAL ASSETS Sources of Unplanned Downtime

6-5 PROTECTING INTELLECTUAL ASSETS How Much Will Downtime Cost Your Business?

6-6 Security Threats Caused by Hackers and Viruses O Hacker – Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge O Black-hat hacker O Cracker O Cyberterrorist O Hactivist O Script kiddies or script bunnies O White-hat hacker

6-7 Security Threats Caused by Hackers and Viruses O Virus - Software written with malicious intent to cause annoyance or damage O Backdoor program O Denial-of-service attack (DoS) O Distributed denial-of-service attack (DDoS) O Polymorphic virus O Trojan-horse virus O Worm

6-8 Security Threats Caused by Hackers and Viruses How Computer Viruses Spread

6-9 Security Threats Caused by Hackers and Viruses O Security threats to ebusiness include O Elevation of privilege O Hoaxes O Malicious code O Packet tampering O Sniffer O Spoofing O Splogs O Spyware

6-10 THE FIRST LINE OF DEFENSE - PEOPLE O Organizations must enable employees, customers, and partners to access information electronically O The biggest issue surrounding information security is not a technical issue, but a people issue O Insiders O Social engineering O Dumpster diving

6-11 THE FIRST LINE OF DEFENSE - PEOPLE O The first line of defense an organization should follow to help combat insider issues is to develop information security policies and an information security plan O Information security policies O Information security plan

6-12 THE SECOND LINE OF DEFENSE - TECHNOLOGY O There are three primary information technology security areas

6-13 Authentication and Authorization O Identity theft – The forging of someone’s identity for the purpose of fraud O Phishing – A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent O Pharming – Reroutes requests for legitimate websites to false websites

6-14 Authentication and Authorization O Authentication – A method for confirming users’ identities O Authorization – The process of giving someone permission to do or have something O The most secure type of authentication involves 1. Something the user knows 2. Something the user has 3. Something that is part of the user

6-15 Something the User Knows Such As a User ID and Password O This is the most common way to identify individual users and typically contains a user ID and a password O This is also the most ineffective form of authentication O Over 50 percent of help-desk calls are password related

6-16 O Smart cards and tokens are more effective than a user ID and a password O Tokens – Small electronic devices that change user passwords automatically O Smart card – A device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing Something the User Knows Such As a User ID and Password

6-17 Something That Is Part Of The User Such As a Fingerprint or Voice Signature O This is by far the best and most effective way to manage authentication O Biometrics – The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting O Unfortunately, this method can be costly and intrusive

6-18 Prevention and Resistance O Downtime can cost an organization anywhere from $100 to $1 million per hour O Technologies available to help prevent and build resistance to attacks include 1. Content filtering 2. Encryption 3. Firewalls

6-19 Prevention and Resistance O Content filtering - Prevents s containing sensitive information from transmitting and stops spam and viruses from spreading

6-20 Prevention and Resistance O If there is an information security breach and the information was encrypted, the person stealing the information would be unable to read it O Encryption O Public key encryption (PKE) O Certificate authority O Digital certificate

6-21 Prevention and Resistance

6-22 Prevention and Resistance O One of the most common defenses for preventing a security breach is a firewall O Firewall – Hardware and/or software that guards a private network by analyzing the information leaving and entering the network

6-23 Prevention and Resistance O Sample firewall architecture connecting systems located in Chicago, New York, and Boston

6-24 Detection and Response O If prevention and resistance strategies fail and there is a security breach, an organization can use detection and response technologies to mitigate the damage O Intrusion detection software – Features full-time monitoring tools that search for patterns in network traffic to identify intruders