Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) =.00625 * 5,349.44 = $33.434 What happens to the.004?.004+.004+.004=.012.004.

Slides:



Advertisements
Similar presentations
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Advertisements

2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
CHAPTER OVERVIEW SECTION 4.1 – Ethics
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
BUSINESS PLUG-IN B6 Information Security.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B6 Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
The Systems Development Life Cycle Systems Implementation Product: Operational System Systems Implementation Product: Operational System Systems Investigation.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
4-1 Chapter Four Overview SECTION ETHICS –Ethics –Information Ethics –Developing Information Management Policies –Ethics in the Workplace SECTION.
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
CSUN Information Systems IS312 Information Systems for Business Lecture 9 Ethic & Information Security.
CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 11 Security and Privacy: Computers and the Internet.
Securing Information Systems
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Defining Security Issues
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Today’s Lecture Covers < Chapter 6 - IS Security
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
Types of Electronic Infection
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B6 Information Security.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
CPT 123 Internet Skills Class Notes Internet Security Session B.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Information Systems Design and Development Security Precautions Computing Science.
Securing Information Systems
Securing Information Systems
BUSINESS DRIVEN TECHNOLOGY
CHAPTER FOUR OVERVIEW SECTION ETHICS
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Securing Information Systems
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
INFORMATION SYSTEMS SECURITY and CONTROL
CHAPTER FOUR OVERVIEW SECTION ETHICS
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

Security

If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? = * 1,000,000 customers * 12 months = $48,000!!!!! Nice income supplement. Standard Example

Computer Crime  Computer crime losses estimated between $15-$300 Billion annually.  “The playground bullies are learning how to type” -- Forbes Magazine.

BUT, crime is not the only security area!  Three main concerns:  evil (crime)  system limitations  Carelessness / Stupidity

The First Line of Defense - People n Organizations must enable employees, customers, and partners to access information electronically n The biggest issue surrounding information security is not a technical issue, but a people issue n 33% of security incidents originate within the organization –Insiders – legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident

The First Line of Defense - People n The first line of defense an organization should follow to help combat insider issues is to develop information security policies and an information security plan –Information security policies – identify the rules required to maintain information security –Information security plan – details how an organization will implement the information security policies

The First Line of Defense - People n Five steps to creating an information security plan: 1.Develop the information security policies 2.Communicate the information security policies 3.Identify critical information assets and risks – Firewall – hardware and/or software that guards a private network by analyzing the information leaving and entering the network – Intrusion detection software (IDS) – searches out patterns in network traffic to indicate attacks and quickly respond to prevent harm 4.Test and reevaluate risks 5.Obtain stakeholder support

The First Line of Defense - People n Hackers frequently use “social engineering” to obtain password –Social engineering – using one’s social skills to trick people into revealing access credentials or other information valuable to the attacker

The Second Line of Defense - Technology n Three primary information security areas: 1.Authentication and authorization 2.Prevention and resistance 3.Detection and response

AUTHENTICATION AND AUTHORIZATION n Authentication – a method for confirming users’ identities n The most secure type of authentication involves a combination of the following: 1.Something the user knows such as a user ID and password 2.Something the user has such as a smart card or token 3.Something that is part of the user such as a fingerprint or voice signature

Something the User Knows such as a User ID and Password n This is the most common way to identify individual users and typically contains a user ID and a password n This is also the most ineffective form of authentication n Over 50 percent of help-desk calls are password related

Something the User Has such as a Smart Card or Token n Smart cards and tokens are more effective than a user ID and a password –Tokens – small electronic devices that change user passwords automatically –Smart card – a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing

Something That Is Part of the User such as a Fingerprint or Voice Signature n This is by far the best and most effective way to manage authentication –Biometrics – the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting n Unfortunately, this method can be costly and intrusive

PREVENTION AND RESISTANCE n Downtime can cost an organization anywhere from $100 to $1 million per hour n Technologies available to help prevent and build resistance to attacks include: 1.Content filtering 2.Encryption 3.Firewalls

Content Filtering n Organizations can use content filtering technologies to filter and prevent e- mails containing sensitive information from transmitting and stop spam and viruses from spreading. –Content filtering – occurs when organizations use software that filters content to prevent the transmission of unauthorized information –Spam – a form of unsolicited

ENCRYPTION n If there is an information security breach and the information was encrypted, the person stealing the information would be unable to read it –Encryption – scrambles information into an alternative form that requires a key or password to decrypt the information

SENDER SCRAMBLED MESSAGE RECIPIENT Encrypt with public key Decrypt with private key PUBLIC KEY ENCRYPTION SECURITY AND THE INTERNET

FIREWALLS n One of the most common defenses for preventing a security breach is a firewall –Firewall – hardware and/or software that guards a private network by analyzing the information leaving and entering the network

FIREWALLS n Sample firewall architecture connecting systems located in Chicago, New York, and Boston

DETECTION AND RESPONSE n If prevention and resistance strategies fail and there is a security breach, an organization can use detection and response technologies to mitigate the damage n Antivirus software is the most common type of detection and response technology

DETECTION AND RESPONSE n Some of the most damaging forms of security threats to e-business sites include: –Malicious code – includes a variety of threats such as viruses, worms, and Trojan horses –Hoaxes – attack computer systems by transmitting a virus hoax, with a real virus attached –Spoofing – the forging of the return address on an so that the message appears to come from someone other than the actual sender –Sniffer – a program or device that can monitor data traveling over a network

Providing Security - Procedural  Keep an electronic audit trail  Separate duties.  Never allow too much power to one individual. In ES, don’t allow the expert to update the knowledge base.  Continually asses threats, risks, exposures, and vulnerabilities.  Have standard procedures and documentation.  Strict authorization requirements.

Providing Security - Procedural  Outside audits.  “Security is everybody’s business” -- give awards, etc.  Have a disaster recovery plan. Lacked by 60% of all businesses!  Use intelligent systems capability of firm to flag problems.

Providing Security - Physical  All hard drives will eventually crash. This fact should be your first to consider. Everything else doesn’t count if you’ve forgotten this.  Secure systems physically.  Separate systems physically.  Have off site storage.  Backups -files more than programs.  Fault tolerance - UPS.  Don’t let your corporate knowledge get lost. This is WAY more important for DSS than TPS… should figure 2:1 on physical security procedures.