Risks, Security, and Disaster Recovery

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

Management Information Systems, Sixth Edition
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Crime and Security in the Networked Economy Part 4.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Database Administration and Security Transparencies 1.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Chapter 17 Controls and Security Measures
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Lecture 10 Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Risks, Controls and Security Measures
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
E-Commerce Security and Fraud Issues and Protections
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Security. Introduction to Security Why do we need security? What happens if data is lost? –Wrong business decisions through lack of information –Long-term.
Securing Information Systems
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Defining Security Issues
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Internet Security facilities for secure communication.
C8- Securing Information Systems
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
INFORMATION SYSTEM : SECURITY MEASURES Nurul Filzah Bt Hussain Muhammad Lokman Nurhakim Bin Hamin Nor Afina Binti Nor Aziz
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Security and Privacy Issues.
SESSION 14 INFORMATION SYSTEMS SECURITY AND CONTROL.
CSCI 3140 Module 6 – Database Security Theodore Chiasson Dalhousie University.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
Zulhizam Bin Ebrahim Mohd Shamir Bin Abd Azia Muhammad Salehin Bin Suhaimi
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
IT in Business Issues in Information Technology Lecture – 13.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Chap1: Is there a Security Problem in Computing?.
Security and Ethics Safeguards and Codes of Conduct.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Management Information Systems by Prof. Park Kyung-Hye Chapter 14 (15th Week) Risks, Security, and Disaster Recovery 14.
ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Securing Information Systems
INFORMATION SYSTEMS SECURITY AND CONTROL.
Chapter 17 Risks, Security and Disaster Recovery
Securing Information Systems
IT effective auditing in MIS and prevention
INFORMATION SYSTEMS SECURITY and CONTROL
INFORMATION SYSTEMS IN ORGANIZATIONS
Presentation transcript:

Risks, Security, and Disaster Recovery

Objectives Describe the primary goals of information security Enumerate the main types of risks to information systems List the various types of attacks on networked systems Describe the types of controls required to ensure the integrity of data entry and processing and uninterrupted e-commerce

Objectives (continued) Describe the various kinds of security measures that can be taken to protect data and ISs Improve the security of your personal information system and the information it stores Recognize online scams Outline the principles of developing a recovery plan Explain the economic aspects of information security

Goals of Information Security Protecting IT resources is a primary concern Securing corporate ISs is becoming increasingly challenging The major goals of information security are to: Reduce the risk of systems ceasing operation Maintain information confidentiality Ensure the integrity and reliability of data resources Ensure the uninterrupted availability of resources Ensure compliance with policies and laws

Risks to Information Systems Downtime: the period of time during which an IS is not available Extremely expensive: average losses of: $2,500/minute for CRM systems $7,800/minute for e-commerce applications $4 billion lost annually in the U.S. due to downtime

Risks to Hardware #1 cause of system downtime is hardware failure Major causes of damage to hardware include: Natural disasters Fires, floods, earthquakes, hurricanes, tornadoes, and lightning Blackouts and brownouts Blackout: total loss of electricity Brownout: partial loss of electricity Uninterruptible power supply (UPS): backup power Vandalism Deliberate destruction

Risks to Data and Applications Data should be a primary concern because it is often a unique resource Data and applications are susceptible to disruption, damage, and theft The culprit in damage to software or data is almost always human Keystroke logging: records individual keystrokes Social engineering: con artists pretend to be service people, and ask for passwords Identity theft: pretending to be another person

Risks to Data and Applications (continued) Risks to data include: Alteration Destruction Web defacement Deliberate alteration or destruction is often done as a prank, but has a high cost The target may be a company’s Web site Honeytoken: a bogus record in a networked database used to combat hackers

Risks to Data and Applications (continued) Honeypot: a server containing a mirrored copy of a database or a bogus database Educates security officers about vulnerable points Virus: spreads from computer to computer Worm: spreads in a network without human intervention Antivirus software: protects against viruses Trojan horse: a virus disguised as legitimate software

Risks to Data and Applications (continued) Logic bomb: software that is programmed to cause damage at a specific time Unintentional, nonmalicious damage can be caused by: Human error Lack of adherence to backup procedures Poor training Unauthorized downloading and installation of software may cause damage

Risks to Online Operations Many hackers try daily to interrupt online businesses Types of attacks include: Unauthorized access Data theft Defacing of Web pages Denial of service Hijacking

Denial of Service Denial of service (DoS): an attacker launches a large number of information requests Slows down legitimate traffic to site Distributed denial of service (DDoS): an attacker launches a DoS attack from multiple computers Usually launched from hijacked personal computers called “zombies” No definitive cure for this A site can filter illegitimate traffic

Computer Hijacking Hijacking: using some or all of a computer’s resources without the consent of its owner Often done for making a DDoS attack Done by installing a software bot on the computer Main purpose of hijacking is usually to send spam Bots are planted by exploiting security holes in operating systems and communications software A bot usually installs e-mail forwarding software

Controls Controls: constraints and restrictions imposed on a user or a system Controls can be used to secure against risks Controls are also used to ensure that nonsensical data is not entered Controls can reduce damage caused to systems, application, and data

Controls (continued)

Application Reliability and Data Entry Controls A reliable application is one that can resist inappropriate usage such as incorrect data entry or processing The application should provide clear messages when errors or deliberate misuses occur Controls also translate business policies into system features

Backup Backup: periodic duplication of all data Redundant Arrays of Independent Disks (RAID): set of disks programmed to replicate stored data Data must be routinely transported off-site as protection from a site disaster Some companies specialize in data backup services or backup facilities for use in the event of a site disaster

Access Controls Access controls: measures taken to ensure only authorized users have access to a computer, network, application, or data Physical locks: lock the equipment in a secure facility Software locks: determine who is authorized Three types of access controls: What you know: access codes, such as user ID and password What you have: requires special devices Who you are: unique physical characteristics

Access Controls (continued) Access codes and passwords are usually stored in the OS or in a database Security card is more secure than a password Allows two-factor access Biometric: uses unique physical characteristics such as fingerprints, retinal scans, or voiceprints Up to 50% of help desk calls are from people who have forgotten their passwords Biometrics can eliminate these kinds of calls

Atomic Transactions Atomic transaction: a set of indivisible transactions All of the transactions in the set must be completely executed, or none can be Ensures that only full entry occurs in all the appropriate files to guarantee integrity of the data Is also a control against malfunction and fraud

Atomic Transactions (continued)

Audit Trail Audit trail: a series of documented facts that help detect who recorded which transactions, at what time, and under whose approval Sometimes automatically created using data and timestamps Certain policy and audit trail controls are required in some countries Information systems auditor: a person whose job is to find and investigate fraudulent cases

Security Measures Organizations can protect against attacks using various approaches, including: Firewalls Authentication Encryption Digital signatures Digital certificates

Firewalls and Proxy Servers Firewall: the best defense against unauthorized access over the Internet Consists of hardware and software that blocks access to computing resources Firewalls are now routinely integrated into routers DMZ: demilitarized zone approach One end of the network is connected to the trusted network, and the other end to the Internet Proxy server: represents another server Employs a firewall, and is usually placed between the Internet and the trusted network

Authentication and Encryption Authentication: the process of ensuring that you are who you say you are Encryption: coding a message into an unreadable form Messages are encrypted and authenticated to ensure security A message may be text, image, sound, or other digital information

Authentication and Encryption (continued)

Authentication and Encryption (continued) Encryption programs scramble the transmitted information Plaintext: the original message Ciphertext: the encoded message Encryption uses a mathematical algorithm and a key Key: a unique combination of bits that will decipher the ciphertext Public-key encryption: uses two keys, one public and one private

Authentication and Encryption (continued) Symmetric encryption: when the sender and the recipient use the same key Asymmetric encryption: both a public and a private key are used Transport Layer Security (TLS): a protocol for transactions on the Web that uses a combination of public key and symmetric key encryption HTTPS: the secure version of HTTP Digital signature: a means to authenticate online messages; implemented with public keys

Authentication and Encryption (continued) Message digest: unique fingerprint of file Digital certificates: computer files that associate one’s identity with one’s public key Issued by certificate authority Certificate authority (CA): a trusted third party A digital certificate contains its holder’s name, a serial number, its expiration dates, and a copy of holder’s public key Also contains the digital signature of the CA

The Downside of Security Measures Single sign-on (SSO): a user must enter his or her name/password only once Single sign-on saves employees time Encryption slows down communication Every message must be encrypted and then decrypted IT specialists must clearly explain the implications of security measures to upper management

Recovery Measures Security measures may reduce mishaps, but no one can control all disasters Preparation for uncontrolled disasters requires that recovery measures are in place Redundancy may be used Very expensive, especially in distributed systems Other measures must be taken

The Business Recovery Plan Business recovery plan: a plan about how to recover from a disaster Also called disaster recovery plan, business resumption plan, or business continuity plan Nine steps to develop a business recovery plan: Obtain management’s commitment to the plan Establish a planning committee Perform risk assessment and impact analysis Prioritize recovery needs Mission-critical applications: those without which the business cannot conduct operations

The Business Recovery Plan (continued) Nine steps to develop a business recovery plan (continued): Select a recovery plan Select vendors Develop and implement the plan Test the plan Continually test and evaluate The plan should include key personnel and their responsibilities

Recovery Planning and Hot Site Providers Can outsource recovery plans to firms that specialize in disaster recover planning Hot sites: alternative sites that a business can use when a disaster occurs Backup sites provide desks, computer systems, and Internet links

The Economics of Information Security Security measures should be regarded as analogous to insurance Spending for security measures should be proportional to the potential damage A business must assess the minimum acceptable rate of system downtime and ensure that the company can financially sustain the downtime

How Much Security Is Enough Security? Two costs should be considered: Cost of the potential damage Cost of implementing a preventative measure As the cost of security measures increases, the cost of potential damage decreases Companies try to find the optimal point The company must define what needs to be protected Security measures should never exceed the value of protected system

How Much Security Is Enough Security? (continued)

Calculating Downtime Businesses should try to minimize downtime, but the benefit of greater uptime must be compared to the added cost Mission-critical systems must be connected to an alternative source of power, duplicated with a redundant system, or both Many ISs are now interfaced with other systems Interdependent systems have greater downtime Redundancy reduces downtime

Summary The purpose of controls and security measures is to maintain the functionality of ISs Risks to ISs include risks to hardware, data, and networks, and natural disaster and vandalism Risks to data and applications include theft of information, identity theft, data alteration, data destruction, defacement of Web sites, viruses, worms, logic bombs, and nonmalicious mishaps Risks to online systems include denial of service and hijacking

Summary (continued) Controls are used to minimize disruption Access controls require information to be entered before resources are made available Atomic transactions ensure data integrity Firewalls protect against Internet attacks Encryption schemes scramble messages to protect them on the Internet A key is used to encrypt and decrypt messages

Summary (continued) SSL, TLS, and HTTPS are encryption standards designed for the Web Keys and digital certificates can be purchased from a certificate authority Many organizations have business recovery plans, which may be outsourced Careful evaluation of the amount spent on security measures is necessary Redundancy reduces the probability of downtime Governments are obliged to protect citizens against crime and terrorism