Securing Information Systems

Slides:



Advertisements
Similar presentations
Lecture 14 Securing Information Systems
Advertisements

1 MIS 2000 Class 22 System Security Update: Winter 2015.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
7.1 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall 7 Chapter Securing Information Systems.
Lecture 10 Security and Control.
Lecture 10 Security and Control.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Misbahuddin Azzuhri SE. MM. CPHR.
Chapter 8 Security and Control.
1.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
Information Security in Corporation
8.1 © 2010 by Prentice Hall 8 Chapter Securing Information Systems.
7.1 © 2007 by Prentice Hall 10 Chapter Securing Information Systems.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Defining Security Issues
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
8.1 © 2010 by Prentice Hall 8 Chapter Securing Information Systems.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
8.1 CSC 601 Management Information Systems Chapter 8 Securing Information Systems.
C8- Securing Information Systems
8.1 © 2010 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Management Information Systems Chapter Eight Securing Information Systems Md. Golam Kibria Lecturer, Southeast University.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Chapter 7 Securing Information Systems. Security & Controls Security: – Policies, procedures, and technical measures used to prevent unauthorized access,
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
7.1 © 2007 by Prentice Hall STUDENT LEARNING OBJECTIVES Essentials of Business Information Systems Chapter 7 Securing Information Systems Why are information.
C8- Securing Information Systems Facebook Virus Update your Adobe Flash! Security and Control ***
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
Copyright © 2013 Dorling Kindersley (India) Pvt. Ltd. Management Information Systems: Managing the Digital Firm, 12eAuthors: Kenneth C. Laudon and Jane.
Securing Information Systems
8.1 © 2010 by Prentice Hall 8 Chapter Securing Information Systems.
Security ~ Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.
ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
8.1 © 2010 by Pearson 6 Chapter Securing Information Systems.
8.1 © 2010 by Prentice Hall 7 Chapter Securing Information Systems.
Securing Information Systems
Securing Information Systems
IT Security and Control
Securing Information Systems
Securing Information Systems
Securing Information Systems
Securing Information Systems
Chapter 10 Security and Control.
Control , Audit & Security of Information
INFORMATION SYSTEMS SECURITY and CONTROL
Presentation transcript:

Securing Information Systems Chapter 8 Securing Information Systems

System Vulnerability Security (policies, procedures, technical measures) and controls (methods, policies, procedures) important to ensure your system is not vulnerable Internet Emails and other ways hackers access Wireless security challenges War driving and RFID bands Wi-fi transmission Malware, Viruses, Worms, Trojan horses, Spyware, SQL injection attacks, key loggers

System Vulnerability (cont) Hackers, crackers, Script Kiddies Spoofing (redirecting web address) and Sniffing (eavesdropping program monitoring info over a network) Denial-of-service (DoS) attack Distributed denial-of-service (DoS) attack Botnet Computer Crime

Common Computer Crime

System Vulnerability (cont) Identity Theft Phishing Evil Twins Pharming Click Fraud Cyberterrorism and Cyber Warfare Internal threats Social engineering Software Vulnerability Bugs and patches Chapter 8 Notes

Security and Control Legal and Regulatory HIPPA for medical Gramm-Leach-Bliley (Financial Services Moderation) – consumer data in financial institutions Sarbanes-Oxley Act – protects investors from financial scandals Electronic Evidence and Computer Forensics Computer forensics – collecting, analyzing, authentication, preservation and analysis of data/on storage media/used in court

Security and Control Framework Types of controls General (govern design, security, and use of computer programs/security of data files/throughout organization’s infrastructure) Application (specific controls unique to each computerized application such as payroll or order processing) Input, Processing, output controls Risk Assessment (determines level of risk to the firm) Once risks assessed, system builders will look at control points with greatest vulnerability and potential for loss

Security and Control Framework (cont) Security Policy Created after risk assessment How to protect company’s assets Acceptable Use Policy (AUP) – acceptable uses of firms info systems, etc. Identity Management – determine valid users of the system Disaster Recovery Hot Site vs Cold Site Business Continuity Planning Auditing MIS Audit (examines firm’s security environment)

Technologies and Tools for Protecting Info Resources Identity Management Authentication Passwords Token Smart Cards Biometric authentication (human traits) What you know, what you have, who you are

Technologies (cont) Firewalls (prevent unauthorized users from accessing private networks) Combination of hardware and software that controls the flow of incoming and outgoing network traffic Identifies names, IP address, applications, and other characteristics of incoming traffic Intrusion detection systems (monitor for vulnerability) Antivirus and Antispyware software Unified threat management (UTM) (comprehensive security management systems/inside a single device)

Wireless Security Encryption and Public Key Infrastructure Secure Socket Layer (SSL) – secure connection between computers Secure Hypertext Transfer Protocol (S-HTTP) – encrypts messages Public Key Encryption (PKE) - secure encryption/uses two keys Digital Certificates – data files to establish identity of users and electronic assets Public key infrastructure (PKI) – public key cryptography working with a certification authority.

System Availability Online transaction processing (OLTP) – immediately process transactions Fault-tolerant computer systems – detect hardware failures High-availability computing – for recovering quickly from a crash Downtime – periods when system operational Recovery-oriented computing – try to minimize downtime Deep packet inspection (DPI) – examines data files and sorts out low-priority online material/assigns higher priority to business critical functions Security Outsourcing Managed security service providers (MSSP) – monitor network activity