IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 10-1 Accessories for “war driving” can.

Slides:



Advertisements
Similar presentations
Ethics, Privacy and Information Security
Advertisements

Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Information Systems Ethics, Computer Crime, and Security
Computer Security and Risks 11.  2001 Prentice Hall11.2 Chapter Outline On-line Outlaws: Computer Crime Computer Security: Reducing Risks Security, Privacy,
Security, Privacy, and Ethics Online Computer Crimes.
Security+ Guide to Network Security Fundamentals
Lecture 10 Security and Control.
Chapter 10 Privacy and Security McGraw-Hill
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senn’s Information Technology, 3 rd Edition Chapter 14 Issues in Information.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
CYBER CRIME AND SECURITY TRENDS
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Chapter 11 Security and Privacy: Computers and the Internet.
Securing Information Systems
IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 8/30/ Accessories for “war driving” can.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/10/ Chapter 11 Information Systems Ethics.
IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 9/10/ Accessories for “war driving” can.
IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 9/10/ Accessories for “war driving” can.
Cyber crime & Security Prepared by : Rughani Zarana.
Chapter 12 Computer Security and Risks.  2002 Prentice Hall 2 Topics “Computers are power, and direct contact with power can bring out the best or worst.
BUSINESS B1 Information Security.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
IS Today (Valacich & Schneider) Copyright © 2010 Pearson Education, Inc. Published as Prentice Hall 9/19/ Chapter 10 Information Systems Security.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
IT in Business Issues in Information Technology Lecture – 13.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
CONTROLLING INFORMATION SYSTEMS
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
James A. Senn’s Information Technology, 3rd Edition
Securing Information Systems
Securing Information Systems
Chapter 17 Risks, Security and Disaster Recovery
Securing Information Systems
Chapter 10: Privacy, Security, and Ethics
INFORMATION SYSTEMS SECURITY and CONTROL
Presentation transcript:

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/ Accessories for “war driving” can be easily built using simple parts. Accessories for “war driving” can be easily built using simple parts. Chapter 10 Securing Information Systems

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Worldwide losses due to software piracy in 2008 exceeded $50 billion. Business Software Alliance, 2009 Worldwide losses due to software piracy in 2005 exceeded $34 billion. Business Software Alliance, 2006 Worldwide losses due to software piracy in 2010 exceeded $59 billion. Business Software Alliance, 2011

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Learning Objectives 10-3

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Primary Threats to Information Systems Security 10-4 Natural disasters  Power outages, hurricanes, floods, and so on Accidents  Power outages, cats walking across keyboards Employees and consultants Links to outside business contacts  Travel between business affiliates Outsiders  Viruses

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Computer Crime Computer crime—The act of using a computer to commit an illegal act.  Targeting a computer while committing an offense.  Using a computer to commit an offense.  Using computers to support a criminal activity. Overall trend for computer crime has been declining over the past several years (CSI, 2009). Many incidents are never reported. 10-5

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/ Types of Computer Crimes and Financial Losses What do you think happens to a company’s stock price if they report that their systems have been compromised? Would you report it if you didn’t have to?

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Computer Virus Attacks Financial impact of virus attacks, 1995–2006, and beyond. Source: Based on:

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Federal and State Laws The two main federal laws against computer crime are:  Computer Fraud and Abuse Act of 1986  Stealing or compromising data about national defense, foreign relations, atomic energy, or other restricted information  Violating data belonging to banks or other financial institutions  Intercepting or otherwise intruding on communications between states or foreign countries  Threatening to damage computer systems in order to extort money or other valuables from persons, businesses, or institutions  Electronic Communications Privacy Act of 1986  makes it a crime to break into any electronic communications service, including telephone services  prohibits the interception of any type of electronic communications 10-8

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Other Federal Laws Patent protection U.S. Copyright Act  amended in 1980 for computer software Financial Privacy Act  protects information: credit card, credit reporting, bank loan applications Enforcement responsibilities  FBI—espionage, terrorism, banking, organized crime, and threats to national security  Secret Service—crimes against U.S. Treasury Department computers and against violations of the Right to Financial Privacy Act 10-9

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Hacking and Cracking Which one is the “bad guy”?  Hackers  Crackers  Hacktivists 10-10

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Types of Criminals No clear profile as to who commits computer crimes Four groups of computer criminals 1. Current or former employees  85–95% of theft from businesses comes from the inside 2. People with technical knowledge committing crimes for personal gain 3. Career criminals using computers to assist them in crimes 4. Outside crackers hoping to find information of value  About 12 percent of cracker attacks cause damage

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Computer Viruses and Other Destructive Code What is your favorite virus?

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Denial of Service Attack Attackers prevent legitimate users from accessing services. Zombie computers  Created by viruses or worms  Attack Web sites Servers crash under increased load.  MyDoom attack on Microsoft’s Web site

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Cybersquatting The practice of registering a domain name and later reselling it. Some of the victims include:  Eminem  Panasonic  Hertz  Avon Anti-Cybersquatting Consumer Protection Act in 1999  Fines as high as $100,000  Some companies pay the cybersquatters to speed up the process of getting the domain.

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Cyber Harassment, Stalking, and Bullying Cyber harassment—Crime that broadly refers to the use of a computer to communicate obscene, vulgar, or threatening content. Cyber stalking  Making false accusations that damage reputation of another  Gaining information on a victim by monitoring online activities  Using the Internet to encourage others to harass a victim  Attacking data and equipment of a victim by sending viruses or other destructive code  Using the Internet to place false orders for goods or services

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Learning Objectives 10-16

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Cyberterrorism

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Learning Objectives 10-18

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Information Systems Security All systems connected to a network are at risk.  Internal threats  External threats Information systems security  Precautions to keep IS safe from unauthorized access and use Increased need for good computer security with increased use of the Internet

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Technological Safeguards Physical access restrictions  Authentication  Use of passwords  Photo ID cards, smart cards  Keys to unlock a computer  Combination Authentication dependent on  Something you have  Something you know  Something you are 10-20

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Biometrics Form of authentication  Fingerprints  Retinal patterns  Facial features and so on Fast authentication High security

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Wireless LAN Control Wireless LAN cheap and easy to install Use on the rise Signal transmitted through the air  Susceptible to being intercepted  Drive-by hacking

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Virtual Private Networks Connection constructed dynamically within an existing network Tunneling  Send private data over public network  Encrypted information

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Firewalls Firewall—A system designed to detect intrusion and prevent unauthorized access Implementation  Hardware, software, mixed

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Encryption Message encoded before sending Message decoded when received Cryptography—the science of encryption.  It requires use of a key for decoding. Certificate authority—manages distribution of keys on a busy Web site. Secure Sockets Layer (SSL)—popular public key encryption method.

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Virus Monitoring and Prevention Virus prevention  Purchase and install antivirus software.  Update frequently.  Do not download data from unknown sources.  Flash drives, disks, Web sites  Delete (without opening) s from unknown sources.  Do not blindly open attachments  Even if they come from a known source.  Report any viruses to the IT department.

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Secure Data Centers Specialized facilities are important. Technical Requirements  Power  Cooling How do organizations reliably protect themselves from threats?

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Ensuring Availability High-availability facilities  To ensure uninterrupted service  Self-sufficient  Backup cooling systems  Raised floors (to more easily reconfigure systems)  Built to withstand storms Collocation facilities UPS servers need 24/7/365 reliability

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Securing the Facilities Infrastructure Backups  Secondary storage devices  Regular intervals Backup sites  Cold backup site  Hot backup site Redundant data centers  Different geographic areas Closed-circuit television (CCTV)  Monitoring for physical intruders  Video cameras display and record all activity  Digital video recording Uninterruptible power supply (UPS)  Protection against power surges

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 What is “Computer Forensics”?

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Learning Objectives 10-31

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Managing Information Systems Security Non-technical safeguards  Management of people’s use of IS  Acceptable use policies  Trustworthy employees  Well-treated employees

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Disaster Planning Disasters can’t be completely avoided. Need to be prepared. Business continuity plan  describes how a business resumes operation after a disaster Disaster recovery plan  Subset of business continuity plan  Procedures for recovering from systems-related disasters  Two types of objectives  Recovery time objectives (Maximum time allowed to recover)  Recovery point objectives (How current should the backup material be?) 10-33

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Responding to a Security Breach Restore lost data. Perform new risk audit. Implement additional safeguards. Contact law enforcement.  Computer Emergency Response Team Coordination Center (Federal government center of Internet security expertise)

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Learning Objectives 10-35

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Hierarchy of IS Controls 10-36

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Types of IS Controls Policies  Define aim and objectives. Standards  Support the requirements of policies. Organization and management  Define the lines of reporting. Physical and environmental controls  Protect the organization’s IS assets.

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 Types of IS Controls (cont’d) Systems software controls  Enable applications and users to utilize the systems. Systems development and acquisition controls  Ensure systems meet the organization’s needs. Application-based controls  Ensures correct input, processing, storage, and output of data; maintain record of data as it moves through the system.

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 IS Auditing Information Systems audit  Performed by external auditors to help organizations assess the state of their IS controls.  To determine necessary changes  To assure the IS availability, confidentiality, and integrity Risk assessment  Determine what type of risks the IS infrastructure faces. Computer-Assisted Auditing Tools (CAAT)  Specific software to test applications and data, using test data or simulations.

IS Today (Valacich & Schneider) 5/e Copyright © 2012 Pearson Education, Inc. Published as Prentice Hall 10/15/2015 The Sarbanes-Oxley Act The Sarbanes-Oxley Act was formed as a reaction to large- scale accounting scandals.  WorldCom, Enron It primarily addresses the accounting side of organizations. Companies have to demonstrate that:  controls are in place to prevent misuse and fraud,  controls are in place to detect potential problems, and  measures are in place to correct problems COBIT (Control Objectives for Information and Related Technology)  Set of best practices  Help organizations to maximize the benefits from their IS infrastructure  Establish appropriate controls