261446 Information Systems Week 7 Securing Information Systems.

Slides:



Advertisements
Similar presentations
POSSIBLE THREATS TO DATA
Advertisements

Lecture 14 Securing Information Systems
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Module 2: Information Technology Infrastructure
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
Cyber X-Force-SMS alert system for threats.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
Lecture 10 Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
CYBER CRIME AND SECURITY TRENDS
Quiz Review.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Issues Raised by ICT.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Securing Information Systems
7.1 © 2007 by Prentice Hall 10 Chapter Securing Information Systems.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Cyber crime & Security Prepared by : Rughani Zarana.
BUSINESS B1 Information Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
8.1 CSC 601 Management Information Systems Chapter 8 Securing Information Systems.
C8- Securing Information Systems
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Management Information Systems Chapter Eight Securing Information Systems Md. Golam Kibria Lecturer, Southeast University.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Chapter 7 Securing Information Systems. Security & Controls Security: – Policies, procedures, and technical measures used to prevent unauthorized access,
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Computer Skills and Applications Computer Security.
C8- Securing Information Systems Facebook Virus Update your Adobe Flash! Security and Control ***
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
Computer Security By Duncan Hall.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
8.1 © 2010 by Prentice Hall 8 Chapter Securing Information Systems.
ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
7 Chapter Securing Information Systems 1. The Boston Celtics Score Big Points Against Spyware Problem: frequency of wireless usage exposed Celtics’ proprietary.
8.1 © 2010 by Prentice Hall 7 Chapter Securing Information Systems.
Securing Information Systems
Securing Information Systems
IT Security  .
Securing Information Systems
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
– Communication Technology in a Changing World
Week 7 Securing Information Systems
ISNE101 Dr. Ken Cosh Week 13.
Securing Information Systems
INFORMATION SYSTEMS SECURITY and CONTROL
Securing information systems
Securing Information Systems
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Information Systems Week 7 Securing Information Systems

Week 7 Topics System Vulnerability & Abuse Business Value of Security & Control Establishing a Framework for Security & Control Technologies & Tools for Protecting Information Resources

Case Studies Case Study #1) You’re On LinkedIn? Watch Out! Case Study #2) Information Security Threats and Policies in Europe

Security & Controls Security Policies, procedures and technical measures used to prevent unauthorized access, alteration, theft or physical damage to information systems Controls Methods, policies and organizational procedures that ensure the safety of the organization’s assets, the accuracy and reliability of its records and operational adherence to management standards

Threats

Unauthorised access can occur at any access point in the network At every layer, and in the communication between layers When partnering with other companies, valuable information may exist on networks & computers beyond the control of the organization With the growing popularity of mobile devices the threats increase Data goes mobile Easy to lose or steal

The Internet & Wireless As systems move more onto the Internet, more data flows through machines that the organization has no control over. Transmitting data via or IM may leave them open to interception & P2P file sharing is also vulnerable to malicious software Connecting wirelessly (particularly vi public wifi connections) also opens possibilities for hackers

Malicious Software Malware Virus - rogue software program attached to other software programs to be executed Worms – independent programs that copy themselves from one machine to another Trojan Horse – program that appears to be benign, and then does something unexpected Spyware – Monitor activity such as web surfing activity, and offer up advertising Keyloggers – record every keystroke made to steal passwords, or personal information

Malware Malware goes Mobile Hackers can do to a smartphone just about anything they can do to any other internet device McAfee found 13,000 different kinds of malware targeting mobile devices in 2012 (largely targeting Android) Malware goes Social Networking Blogs, wikis & sites like Facebook are also conduits for malware or spyware Malware is Increasing Particularly Trojans, but there are increasing amounts of malware being produced – as many as one in ten downloads contains harmful programs.

SQL Injections Poorly coded Web application software to introduce malware into a company’s systems & networks Rogue SQL queries sent to access the database from any data entry point.

Spoofing & Sniffing Misrepresenting oneself Fake address / website Redirecting a weblink Sniffing software can be used legitimately to identify network trouble spots, or criminal activity, or can be used to steal information

Denial of Service Attacks DoS attacks or DDoS attacks F5 Botnets make DDoS attacks easier Grum botnet responsible for 18% of spam traffic, having infected and controlled 560, ,000 computers

Computer Crime “Any violations of criminal law that involve knowledge of computer technology for their perpetration, investigation or prosecution” Nobody knows the extent of computer crime Many companies don’t report computer crimes, for fear their vulnerability will be exposed

Computer Crime Computers as targets of crime Breaching confidentiality of protected data Accessing a computer system without authority Knowingly accessing a protected computer to commit fraud Intentionally accessing a protected computer and causing damage Knowingly transmitting a program, code or command that causes damage to a protected computer Threatening to cause damage to a protected computer

Computer Crime Computers as instruments of crime Theft of trade secrets Unauthorised copying of software or IP Schemes to defraud Using for threats or harassment Intentionally attempting to intercept electronic communication Illegally accessing stored communications Child Pornography

Identity Theft Also increasing 11.6 million people, losses of $18 billion (in 2011) How? Hacking Ecommerce website databases Phishing Evil Twins Pharming

Click Fraud Fraudulent clicks on ads I could put some ads on kencosh.com, and click on them… or get y’all to click on them… Or, fraudulent clicks on competitors ads, to drive up their marketing costs

Internal Threats: Employees Employees have access to information Can you trust them? Many employees lack the knowledge to protect themselves against security breaches Social Engineering Tricking employees by pretending to be a member of the company in need of information

Why Spend on Security? No tangible return on investment No direct impact on sales revenues But what if there IS a breach? Confidential records, tax reports, financial assets, medical records, performance reviews, trade secrets, new product development plans, marketing strategies. Government systems contain information on weapons systems, intelligences ops, military targets And what about the Legal responsibility?

Legal Responsibilities? Different countries have different legal liabilities………

IS Security Protection Identity Management & Authentication Keeping track of users and their system privileges. Passwords How good is your password? Physical Token Could you lose it, or leave it behind? Biometrics

IS Security Protection Firewalls Hardware and software controlling incoming and outgoing network traffic Checks names, IP addresses, etc. against access rules Packet filtering examines the header of each packet, Stateful inspection tracks if packets are parts of ongoing dialogues Network Address Translation (NAT) conceals the true IP address of computers within the private network

IS Security Protection Intrusion Detection Monitoring vulnerable parts of a system – if there is a breach, finding out that it has happened, and what the intruder has done is not easy. Anti-virus / Anti Spyware Encryption & Public Key Infrastructure Translating plain text into cipher text that requires the encryption key to decode

Ensuring System Availability (Reliability) Redundant Hardware, Software, Power Supplies, Network connections Triple Modular Redundancy for Hardware Components N-Version Programming for Software Components