Information Systems Security

Slides:



Advertisements
Similar presentations
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Advertisements

Chapter 10. Understand the importance of establishing a health care organization-wide security program. Identify significant threats—internal, external,
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Access Control Methodologies
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security Controls – What Works
CSA 223 network and web security Chapter one
Security Awareness: Applying Practical Security in Your World
Chapter 17 Controls and Security Measures
Information Security Policies and Standards
1 An Overview of Computer Security computer security.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Security Awareness: Applying Practical Security in Your World
Lecture 11 Reliability and Security in IT infrastructure.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Payment Card Industry (PCI) Data Security Standard
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Information Security Technological Security Implementation and Privacy Protection.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
What does “secure” mean? Protecting Valuables
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Today’s Lecture Covers < Chapter 6 - IS Security
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Chapter 2 Securing Network Server and User Workstations.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Network Security & Accounting
Computer Security By Duncan Hall.
CPT 123 Internet Skills Class Notes Internet Security Session B.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Policies and Security for Internet Access
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Computer Security Sample security policy Dr Alexei Vernitski.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Information Systems Design and Development Security Precautions Computing Science.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Understanding Security Policies Lesson 3. Objectives.
Security Issues in Information Technology
ISSeG Integrated Site Security for Grids WP2 - Methodology
Working at a Small-to-Medium Business or ISP – Chapter 8
Security of a Local Area Network
IS4680 Security Auditing for Compliance
County HIPAA Review All Rights Reserved 2002.
IS4680 Security Auditing for Compliance
INFORMATION SYSTEMS SECURITY and CONTROL
IS4680 Security Auditing for Compliance
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Introduction to the PACS Security
G061 - Network Security.
Presentation transcript:

Information Systems Security Chapter 6 Information Systems Security

Learning Objectives Upon successful completion of this chapter, you will be able to: Identify the information security triad Identify and understand the high-level concepts surrounding information security tools Secure yourself digitally

Introduction Computers and digital devices are becoming integral to conducting business Which also makes them a target of attack Devices needs to be secured Networks that computers and devices use should also be secured

CIA Triad Confidentiality Integrity Availability Confidentiality – restrict access to authorized individuals Integrity – data has not been altered in an unauthorized manner Availability – information can be accessed and modified by authorized individuals in an appropriate timeframe Confidentiality Integrity Availability

Tools for Information Security Authentication Access Control Encryption Passwords Backup Firewalls Virtual Private Networks (VPN) Physical Security Security Policies

Authentication Persons accessing the information is who they say they are Factors of identification: Something you know – user ID and password User ID identifies you while the password authenticates you Easy to compromise if weak password Something you have – key or card Can be lost or stolen Something you are – physical characteristics (i.e., biometrics) Much harder to compromise A combination of at least 2 factors is recommended

Access Control Once authenticated – only provide access to information necessary to perform their job duties to read, modify, add, and/or delete information by: Access control list (ACL) created for each resource (information) List of users that can read, write, delete or add information Difficult to maintain all the lists Role-based access control (RBAC) Rather than individual lists Users are assigned to roles Roles define what they can access Simplifies administration

Encryption An algorithm (program) encodes or scrambles information during transmission or storage Decoded/unscrambled by only authorized individuals to read it How is this done? Both parties agree on the encryption method (there are many) using keys Symmetric key – sender and receiver have the key which can be risky Public Key – use a public and private key where the public key is used to send an encrypted message and a private key that the receiver uses to decode the message

Passwords Single-factor authentication (user ID/password) is the easiest to break Password policies ensure that this risk is minimized by requiring: A certain length to make it harder to guess Contain certain characters – such as upper and lower case, one number, and a special character Changing passwords regularly and do not a password to be reused Employees do not share their password Notifying the security department if they feel their password has been compromised. Yearly confirmation from employees that they understand their responsibilities

Backup Important information should be backed up and store in a separate location Very useful in the event that the primary computer systems become unavailable A good backup plan requires: Understanding of the organizational information resources Regular backups of all data Offsite storage of backups Test of the data restoration Complementary practices: UPS systems Backup processing sites

Firewalls Can be a piece of hardware and/or software Inspects and stops packets of information that don’t apply to a strict set of rules Inbound and outbound Hardware firewalls are connected to the network Software firewalls run on the operating system and intercepts packets as they arrive to a computer Can implement multiple firewalls to allow segments of the network to be partially secured to conduct business Intrusion Detection Systems (IDS) watch for specific types of activities to alert security personnel of potential network attack

Virtual Private Networks (VPN) Some systems can be made private using an internal network to limit access to them Can’t be accessed remotely and are more secure Requires specific connections such as being onsite VPN allows users to remotely access these systems over a public network like the Internet Bypasses the firewall Encrypts the communication or the data exchanged CPP students have this ability for: Exchange services from your Outlook client Mapping a drive or mounting a file share Instructions to establish a VPN connection can be found at https://ehelp.wiki.cpp.edu/VPN_(Virtual_Private_Network):_Requirements

Physical Security Protection of the actual equipment Hardware Networking components Organizations need to identify assets that need to be physically secured: Locked doors Physical intrusion detection - e.g., using security cameras Secured equipment Environmental monitoring – temperature, humidity, and airflow for computer equipment Employee training

Security Policies Starting point in developing an overall security plan Formal, brief, and high-level statement issued by senior management Guidelines for employee use of the information resources Embraces general beliefs, goals, objectives, and acceptable procedures Includes company recourse if employees violate the policy Security policies focus on confidentiality, integrity, and availability Includes applicable government or industry regulations Bring Your Own Device (BYOD) policies for mobile devices Use when accessing/storing company information Intellectual property implications Difficult to balance the need for security and users’ needs

Personal Information Security Simple steps that individuals can take to be more secure: Keep your software up to date Install antivirus software Use public networks carefully Backup your data Secure your accounts with two-factor authentication Make your passwords long, unique, and strong Be suspicious of strange links and attachments For more information on personal information security, visit the Stop, Think, Connect website at http://www.stopthinkconnect.org/

Summary Identified the information security triad Identified and understand the high-level concepts surrounding information security tools How to secure yourself digitally