Cmpe 471 Computer Crime: Techniques and Countermeasures.

Slides:



Advertisements
Similar presentations
Configuration Management
Advertisements

NetPay provides best and effective solution for company Managers to maintain their employee scheduling task (including staff in/out details, overtime,
SOFTWARE TESTING. INTRODUCTION  Software Testing is the process of executing a program or system with the intent of finding errors.  It involves any.
ITAuditing Using GAS & CAATs
COMPSCI 105 S Principles of Computer Science 12 Abstract Data Type.
Software Engineering CSE470: Process 15 Software Engineering Phases Definition: What? Development: How? Maintenance: Managing change Umbrella Activities:
Design Concepts and Principles
Dr Gordon Russell, Napier University Unit Data Dictionary 1 Data Dictionary Unit 5.3.
Software Engineering and Design Principles Chapter 1.
R R R CSE870: Advanced Software Engineering (Cheng): Intro to Software Engineering1 Advanced Software Engineering Dr. Cheng Overview of Software Engineering.
Design The goal is to design a modular solution, using the techniques of: Decomposition Abstraction Encapsulation In Object Oriented Programming this is.
Jump to first page 1 System Design (Finalizing Design Specifications) Chapter 3d.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
Fundamentals of Information Systems, Second Edition
Chapter 1 Principles of Programming and Software Engineering.
Principles of Information Systems, Sixth Edition 1 Systems Investigation and Analysis Chapter 12.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Investigation and Analysis Chapter 12.
9 1 Chapter 9 Database Design Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
© 2006 Pearson Addison-Wesley. All rights reserved2-1 Chapter 2 Principles of Programming & Software Engineering.
Software Engineering CSE470: Systems Engineering 35 Computer System Engineering Computer System Engineering is a problem-solving activity. Itemize desired.
SDLC. Information Systems Development Terms SDLC - the development method used by most organizations today for large, complex systems Systems Analysts.
 QUALITY ASSURANCE:  QA is defined as a procedure or set of procedures intended to ensure that a product or service under development (before work is.
University of Toronto at Scarborough © Kersti Wain-Bantin CSCC40 system design 1 what is systems design? preparation of the system’s specifications with.
1 Building and Maintaining Information Systems. 2 Opening Case: Yahoo! Store Allows small businesses to create their own online store – No programming.
Systems Analysis – Analyzing Requirements.  Analyzing requirement stage identifies user information needs and new systems requirements  IS dev team.
Chapter 5CSA 217 Design in Construction Chapter 5 1.
Chapter 6 Software Implementation Process Group
Dillon: CSE470: SE, Process1 Software Engineering Phases l Definition: What? l Development: How? l Maintenance: Managing change l Umbrella Activities:
1 Chapter 2 The Process. 2 Process  What is it?  Who does it?  Why is it important?  What are the steps?  What is the work product?  How to ensure.
CSE 303 – Software Design and Architecture
ITEC 3220M Using and Designing Database Systems
1 Chapter 9 Database Design. 2 2 In this chapter, you will learn: That successful database design must reflect the information system of which the database.
Cmpe 471 Computer Crime: Techniques and Countermeasures.
SOFTWARE DESIGN (SWD) Instructor: Dr. Hany H. Ammar
Conducting an Information Systems Audit
MODULE 12 Control Audit And Security Of Information System 12.1 Controls in Information systems 12.2 Need and methods of auditing Information systems 12.3.
CSE 219 Computer Science III Program Design Principles.
SE: CHAPTER 7 Writing The Program
1 Introduction to Software Engineering Lecture 1.
Chapter 7 Software Engineering Introduction to CS 1 st Semester, 2015 Sanghyun Park.
System Implementation System Implementation - Mr. Ahmad Al-Ghoul System Analysis and Design.
Principles of Information Systems, Sixth Edition Systems Investigation and Analysis Chapter 12.
CS Data Structures I Chapter 2 Principles of Programming & Software Engineering.
Software Engineering Principles. SE Principles Principles are statements describing desirable properties of the product and process.
Chapter 10 Software Engineering. Understand the software life cycle. Describe the development process models. Understand the concept of modularity in.
Fundamentals of Information Systems, Second Edition 1 Systems Development.
Cmpe 589 Spring 2006 Lecture 2. Software Engineering Definition –A strategy for producing high quality software.
1 CSCD 326 Data Structures I Software Design. 2 The Software Life Cycle 1. Specification 2. Design 3. Risk Analysis 4. Verification 5. Coding 6. Testing.
Chapter 6 CASE Tools Software Engineering Chapter 6-- CASE TOOLS
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
© 2006 Pearson Addison-Wesley. All rights reserved2-1 Chapter 2 Principles of Programming & Software Engineering.
Dr D. Greer, Queens University Belfast )Chapter Six 1 Software Engineering Chapter Six Software Design Quality Learning Outcomes.
© 2006 Pearson Addison-Wesley. All rights reserved 2-1 Chapter 2 Principles of Programming & Software Engineering.
Software Engineering and Object-Oriented Design Topics: Solutions Modules Key Programming Issues Development Methods Object-Oriented Principles.
MNP1163/MANP1163 (Software Construction).  Minimizing complexity  Anticipating change  Constructing for verification  Reuse  Standards in software.
Or how to work smarter when building solutions.  2:30 – 3:30 Mondays – focus on problem solving (with some terminology thrown in upon occasion)  All.
PROGRAMMING FUNDAMENTALS INTRODUCTION TO PROGRAMMING. Computer Programming Concepts. Flowchart. Structured Programming Design. Implementation Documentation.
Chapter 29: Program Security Dr. Wayne Summers Department of Computer Science Columbus State University
Advanced Higher Computing Science The Project. Introduction Worth 60% of the total marks for the course Must include: An appropriate interface using input.
Principles of Programming & Software Engineering
Project planning The systems life cycle.
Software Testing.
System Design.
Lecture 9- Design Concepts and Principles
Principles of Programming and Software Engineering
Lecture 9- Design Concepts and Principles
Programming Logic and Design Fourth Edition, Comprehensive
CHAPTER 10 METHODOLOGIES FOR CUSTOM SOFTWARE DEVELOPMENT
MANAGING THE DEVELOPMENT AND PURCHASE OF INFORMATION SYSTEMS
What is a System? A system is a collection of interrelated components that work together to perform a specific task.
Presentation transcript:

Cmpe 471 Computer Crime: Techniques and Countermeasures

Preventing Computer Crime Proper employee relations –careful supervision of employees’ state of mind –take note of unusual personal problems –beware if the employee radiates negative energy about the systems, peers and the company in general –try to solve the problem before it becomes a physical attack –take measures to prevent unauthorised access to information assets

Take physical measures for piggybacking –Guard –physical gates –outsourced external security company –proper guard back-up procedures –prevent more than one person to enter: man- trap: Kuzey Kampus, GarantiB headquarters Preventing Computer Crime

Preventing logical piggybacking –Unattended terminals or PCs are the portals for logical piggybacking –configurable time-out function –automatic branching to a security screen –user-configurable screen lay-out for re-authentication –integration with a security database –automatic return to the previous (interrupted) state –apply biometrics Preventing Computer Crime

Controls Against Program Threats –Software development the design writing testing –Programming Controls –Description of the programming task individual task that requires independent thought programs are very individualistic programmers are solitary people who enjoy working alone programming is an art only understood by programmers Preventing Computer Crime

Controls Against Program Threats –None of these arguments hold true!!! –The basic principles of software engineering are division of labour reuse of code use of standard pre-constructed software tools organised activity –Peer reviews: code and design –modularity, encapsulation and information hiding Preventing Computer Crime

Controls Against Program Threats –Writing code in small self-contained units: modules advantages for program development and security a module can be isolated from the negative effects of other models with which it interacts: encapsulation –Information hiding: other modules know that a module performs a certain task, but not know how it performs that task Preventing Computer Crime

Controls Against Program Threats –Modularity: Unity: performs one purpose Smallness: consists of an amount of information of which a person can readily grasp both structure and content Simplicity: low degree of complexity so that a person can readily understand the purpose and structure of the module Independence: performs a task isolated from other modules maintenance: a module can be replaced with a revised one understandability: small modules are easier to understand reuse correctness: an error can be found and corrected easily testing: a single module with well-defined inputs, output, function can be tested without effecting other modules Preventing Computer Crime

Controls Against Program Threats –From a standpoint of security, programmers and analysts must be able to understand each module as an independent unit and be assured of its limited effect on other modules –Proper modularity leads to modules that have minimal interaction with other modules Preventing Computer Crime

Encapsulation Tight coupling Independent, loosely coupled modules

Information hiding Access to all parts of module Method, data hidden

Configuration Management A person or system controls and records all changes to a program or documentation change control board –judges the desirability and correctness of all proposed changes to guard against loss of a version of a program to manage the parallel development of several similar versions of one program to provide facilities for controlled sharing of modules that combine to form one system

Configuration Management Security advantages: –protects against unintentional threats –guard against malicious ones –protects integrity of programs and documentation

Proofs of Program Correctness A security specialist wants to make sure that a given program computes a particular result and computes it correctly. Program correctness proofs are hindered by several factors: –depends on the programmer to translate program’s statements into logical implications- translation is prone to errors

Proofs of Program Correctness –Deriving the correctness proof from the initial assertions and the implications of statements is difficult; less appropriate for large programs –the current state of program verification is well- developed than code production; consistent and successful application to large production systems is a challenge.

Process Improvement Development stages: –system requirements design –software requirements analysis –preliminary design –detailed design –coding and unit testing –component integration and testing –subsystem integration and testing –system integration and testing

Process Improvement Each of these phases has the following requirements: –software development management: planning, organisation, reviews –software engineering: development, decomposition, adherence to standards for coding and language –formal qualification testing –software product evaluation –configuration management

Capability Maturity Model Software Engineering Institute (SEI) grants CMM levels from 1 to 5, 5 being the highest standard –Initial –Repeatable –Defined –Managed –Optimising

Administrative Controls Standards of program development Enforcing program development standards –security audits –segregation of duties