Download presentation
Presentation is loading. Please wait.
Published byReynard Harmon Modified over 9 years ago
1
Security
2
If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) =.00625 * 5,349.44 = $33.434 What happens to the.004?.004+.004+.004=.012.004 * 1,000,000 customers * 12 months = $48,000!!!!! Nice income supplement. Standard Example
3
Computer Crime Computer crime losses estimated between $15-$300 Billion annually. “The playground bullies are learning how to type” -- Forbes Magazine.
4
BUT, crime is not the only security area! Three main concerns: evil (crime) system limitations Carelessness / Stupidity
5
The First Line of Defense - People n Organizations must enable employees, customers, and partners to access information electronically n The biggest issue surrounding information security is not a technical issue, but a people issue n 33% of security incidents originate within the organization –Insiders – legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
6
The First Line of Defense - People n The first line of defense an organization should follow to help combat insider issues is to develop information security policies and an information security plan –Information security policies – identify the rules required to maintain information security –Information security plan – details how an organization will implement the information security policies
7
The First Line of Defense - People n Five steps to creating an information security plan: 1.Develop the information security policies 2.Communicate the information security policies 3.Identify critical information assets and risks – Firewall – hardware and/or software that guards a private network by analyzing the information leaving and entering the network – Intrusion detection software (IDS) – searches out patterns in network traffic to indicate attacks and quickly respond to prevent harm 4.Test and reevaluate risks 5.Obtain stakeholder support
8
The First Line of Defense - People n Hackers frequently use “social engineering” to obtain password –Social engineering – using one’s social skills to trick people into revealing access credentials or other information valuable to the attacker
9
The Second Line of Defense - Technology n Three primary information security areas: 1.Authentication and authorization 2.Prevention and resistance 3.Detection and response
10
AUTHENTICATION AND AUTHORIZATION n Authentication – a method for confirming users’ identities n The most secure type of authentication involves a combination of the following: 1.Something the user knows such as a user ID and password 2.Something the user has such as a smart card or token 3.Something that is part of the user such as a fingerprint or voice signature
11
Something the User Knows such as a User ID and Password n This is the most common way to identify individual users and typically contains a user ID and a password n This is also the most ineffective form of authentication n Over 50 percent of help-desk calls are password related
12
Something the User Has such as a Smart Card or Token n Smart cards and tokens are more effective than a user ID and a password –Tokens – small electronic devices that change user passwords automatically –Smart card – a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing
13
Something That Is Part of the User such as a Fingerprint or Voice Signature n This is by far the best and most effective way to manage authentication –Biometrics – the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting n Unfortunately, this method can be costly and intrusive
14
PREVENTION AND RESISTANCE n Downtime can cost an organization anywhere from $100 to $1 million per hour n Technologies available to help prevent and build resistance to attacks include: 1.Content filtering 2.Encryption 3.Firewalls
15
Content Filtering n Organizations can use content filtering technologies to filter e-mail and prevent e- mails containing sensitive information from transmitting and stop spam and viruses from spreading. –Content filtering – occurs when organizations use software that filters content to prevent the transmission of unauthorized information –Spam – a form of unsolicited e-mail
16
ENCRYPTION n If there is an information security breach and the information was encrypted, the person stealing the information would be unable to read it –Encryption – scrambles information into an alternative form that requires a key or password to decrypt the information
17
SENDER SCRAMBLED MESSAGE RECIPIENT Encrypt with public key Decrypt with private key PUBLIC KEY ENCRYPTION SECURITY AND THE INTERNET
18
FIREWALLS n One of the most common defenses for preventing a security breach is a firewall –Firewall – hardware and/or software that guards a private network by analyzing the information leaving and entering the network
19
FIREWALLS n Sample firewall architecture connecting systems located in Chicago, New York, and Boston
20
DETECTION AND RESPONSE n If prevention and resistance strategies fail and there is a security breach, an organization can use detection and response technologies to mitigate the damage n Antivirus software is the most common type of detection and response technology
21
DETECTION AND RESPONSE n Some of the most damaging forms of security threats to e-business sites include: –Malicious code – includes a variety of threats such as viruses, worms, and Trojan horses –Hoaxes – attack computer systems by transmitting a virus hoax, with a real virus attached –Spoofing – the forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender –Sniffer – a program or device that can monitor data traveling over a network
22
Providing Security - Procedural Keep an electronic audit trail Separate duties. Never allow too much power to one individual. In ES, don’t allow the expert to update the knowledge base. Continually asses threats, risks, exposures, and vulnerabilities. Have standard procedures and documentation. Strict authorization requirements.
23
Providing Security - Procedural Outside audits. “Security is everybody’s business” -- give awards, etc. Have a disaster recovery plan. Lacked by 60% of all businesses! Use intelligent systems capability of firm to flag problems.
24
Providing Security - Physical All hard drives will eventually crash. This fact should be your first to consider. Everything else doesn’t count if you’ve forgotten this. Secure systems physically. Separate systems physically. Have off site storage. Backups -files more than programs. Fault tolerance - UPS. Don’t let your corporate knowledge get lost. This is WAY more important for DSS than TPS… should figure 2:1 on physical security procedures.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.