Download presentation
Presentation is loading. Please wait.
Published byClement Ellis Modified over 9 years ago
1
Information Security Management Chapter 10
2
10-2 “But How Do You Implement That Security?” Copyright © 2016 Pearson Education, Inc. Video conference with potential PRIDE promoter and advertiser, San Diego Sports PRIDE originally designed to store medical data. SDS wants to know if PRIDE systems provide acceptable level of security. Doesn’t want to be affiliated with company with major security problem. Criminals now focus attacks on inter-organizational systems.
3
10-3 PRIDE Design for Security Copyright © 2016 Pearson Education, Inc.
4
10-4 Study Questions Copyright © 2016 Pearson Education, Inc. Q1: What is the goal of information systems security? Q2: How big is the computer security problem? Q3: How should you respond to security threats? Q4: How should organizations respond to security threats? Q5: How can technical safeguards protect against security threats? Q6: How can data safeguards protect against security threats? Q7: How can human safeguards protect against security threats? Q8: How should organizations respond to security incidents? Q9: 2025?
5
10-5 Q1: What Is the Goal of Information Systems Security? Copyright © 2016 Pearson Education, Inc.
6
10-6 Examples of Threat/Loss Copyright © 2016 Pearson Education, Inc.
7
10-7 What Are the Sources of Threats? Copyright © 2016 Pearson Education, Inc.
8
10-8 What Types of Security Loss Exists? Copyright © 2016 Pearson Education, Inc. Unauthorized Data Disclosure Pretexting Phishing Spoofing –IP spoofing –Email spoofing Drive-by sniffers –Wardrivers Hacking Natural disasters
9
10-9 Incorrect Data Modification Copyright © 2016 Pearson Education, Inc. Procedures incorrectly designed or not followed Increasing a customer’s discount or incorrectly modifying employee’s salary Placing incorrect data on company Web site Improper internal controls on systems System errors Faulty recovery actions after a disaster
10
10-10 Faulty Service Copyright © 2016 Pearson Education, Inc. Incorrect data modification Systems working incorrectly Procedural mistakes Programming errors IT installation errors Usurpation Denial of service (unintentional) Denial-of-service attacks (intentional)
11
10-11 Loss of Infrastructure Copyright © 2016 Pearson Education, Inc. Human accidents Theft and terrorist events Disgruntled or terminated employee Natural disasters Advanced Persistent Threat (APT)Advanced Persistent Threat –Sophisticated, possibly long-running computer hack perpetrated by large, well-funded organizations
12
10-12 Goal of Information Systems Security Copyright © 2016 Pearson Education, Inc. Find appropriate trade-off between risk of loss and cost of implementing safeguards Use antivirus software Deleting browser cookies? Get in front of security problem by making appropriate trade-offs for your life and your business
13
10-13 Q2: How Big Is the Computer Security Problem? Copyright © 2016 Pearson Education, Inc. Computer Crime Costs per Organizational Respondent
14
10-14 Average Computer Crime Cost and Percent of Attacks by Type (5 Most Expensive Types) Copyright © 2016 Pearson Education, Inc.
15
10-15 Computer Crime Costs Copyright © 2016 Pearson Education, Inc.
16
10-16 Ponemon Study Findings (2013) Copyright © 2016 Pearson Education, Inc. No one knows exact cost of computer crime Cost of computer crime based on surveys Data loss single most expensive consequence of computer crime, accounting for 44% of costs in 2013 80% of respondents believe data on mobile devices poses significant risks.
17
10-17 Ponemon 2013 Studies Summary Copyright © 2016 Pearson Education, Inc. Median cost of computer crime increasing Malicious insiders increasingly serious security threat Data loss is principal cost of computer crime Survey respondents believe mobile device data a significant security threat Security safeguards work Ponemon Study 2014
18
10-18 Q3: How Should You Respond to Security Threats? Copyright © 2016 Pearson Education, Inc. Personal Security Safeguards
19
10-19 So What? The Latest from Black Hat Copyright © 2016 Pearson Education, Inc. Annual security conference caters to hackers, security professionals, corporations, and government entities Briefings on how things can be hacked Show how to exploit weaknesses in hardware, software, protocols, or systems from smartphones to ATMs Encourage companies to fix product vulnerabilities and serve as educational forum for hackers, developers, manufacturers, and government agencies
20
10-20 Q4: How Should Organizations Respond to Security Threats? Copyright © 2016 Pearson Education, Inc.
21
10-21 Security Policy Should Stipulate Copyright © 2016 Pearson Education, Inc. What sensitive data the organization will store How it will process that data Whether data will be shared with other organizations How employees and others can obtain copies of data stored about them How employees and others can request changes to inaccurate data What employees can do with their own mobile devices at work As a new hire, seek out your employer’s security policy
22
10-22 Ethics Guide: Securing Privacy Copyright © 2016 Pearson Education, Inc. “The best way to solve a problem is not to have it.” –Resist providing sensitive data –Don’t collect data you don’t need Gramm-Leach-Bliley (GLB) Act, 1999 Privacy Act of 1974 Health Insurance Portability and Accountability Act (HIPAA), 1996 Australian Privacy Act of 1988 –Government, healthcare data, records maintained by businesses with revenues in excess of AU$3 million.
23
10-23 Ethics Guide: Securing Privacy: Wrap Up Copyright © 2016 Pearson Education, Inc. Business professionals have responsibility to consider legality, ethics, and wisdom when you request, store, or disseminate data Think carefully about email you open over public, wireless networks Use long, strong passwords
24
10-24 Q5: How Can Technical Safeguards Protect Against Security Threats? Copyright © 2016 Pearson Education, Inc.
25
10-25 Essence of https (SSL or TLS) Copyright © 2016 Pearson Education, Inc.
26
10-26 Use of Multiple Firewalls Copyright © 2016 Pearson Education, Inc.
27
10-27 Malware Protection Copyright © 2016 Pearson Education, Inc. 1.Antivirus and antispyware programs 2.Scan frequently 3.Update malware definitions 4.Open email attachments only from known sources 5.Install software updates 6.Browse only reputable Internet neighborhoods
28
10-28 Malware Types and Spyware and Adware Symptoms Copyright © 2016 Pearson Education, Inc. Viruses Payload Trojan horses Worms Beacons
29
10-29 Design for Secure Applications Copyright © 2016 Pearson Education, Inc. SQL injection attack –User enters SQL statement into a form instead of a name or other data –Accepted code becomes part of database commands issued –Improper data disclosure, data damage and loss possible –Well designed applications make injections ineffective
30
10-30 Q6: How Can Data Safeguards Protect Against Security Threats? Copyright © 2016 Pearson Education, Inc.
31
10-31 Q7: How Can Human Safeguards Protect Against Security Threats? Copyright © 2016 Pearson Education, Inc.
32
10-32 Q7: How Can Human Safeguards Protect Against Security Threats? (cont' d) Copyright © 2016 Pearson Education, Inc.
33
10-33 Account Administration Copyright © 2016 Pearson Education, Inc. Account Management –Standards for new user accounts, modification of account permissions, removal of unneeded accounts Password Management –Users should change passwords frequently Help Desk Policies
34
10-34 Sample Account Acknowledgment Form Copyright © 2016 Pearson Education, Inc.
35
10-35 Systems Procedures Copyright © 2016 Pearson Education, Inc.
36
10-36 Q8: How Should Organizations Respond to Security Incidents? Copyright © 2016 Pearson Education, Inc.
37
10-37 Security Wrap Up Copyright © 2016 Pearson Education, Inc. Be aware of threats to computer security as an individual, business professional and employee Know trade-offs of loss risks and cost of safeguards Ways to protect your computing devices and data Understand technical, data, and human safeguards Understand how organizations should respond to security incidents
38
10-38 Q9: 2025 Copyright © 2016 Pearson Education, Inc. APTs more common, inflicting serious damage Continued concern about balance of national security and data privacy Computer crimes targeting mobile devices leads to improved operating systems security Improved security procedures and employee training Criminals focus on less protected mid-sized and smaller organizations, and individuals Electronic lawlessness by organized gangs Strong local “electronic” sheriffs electronic border and enforce existing laws?
39
10-39 Guide: A Look through NSA’s PRISM Copyright © 2016 Pearson Education, Inc. Nine of the largest Internet services (Google, Microsoft, Yahoo!, Facebook, PalTalk, YouTube, Skype, AOL, and Apple) participate in PRISM program Dates when PRISM began collecting data from each of these services Types of data collected include email, videos, photos, video and voice chat, file transfers, VoIP, stored data, videoconferencing, login activity, social networking activity, and something called “special requests” How information flows from around the world could be collected How data flowed from service provider to NSA, CIA, or FBI http://www.wired.com/2013/06/snowden-powerpoint/#slideid-522485
40
10-40 Trade Offs Copyright © 2016 Pearson Education, Inc. Social trade off –“I prefer dangerous freedom over peaceful slavery.” –"Freedom is Slavery" (G. Orwell, 1984) Organizations struggle with security –Users frustrated with stringent password policies –Firewalls block users from remotely accessing certain resources –Managers can’t access certain data without special permission
41
10-41 Wrap Up Copyright © 2016 Pearson Education, Inc. 1.Understand inherent trade-off between security and freedom 2.Understand reach of government surveillance systems 3.Understand ethical considerations surrounding spying and monitoring
42
10-42 Guide: Phishing for Credit Cards, Identifying Numbers, Bank Accounts Copyright © 2016 Pearson Education, Inc. Phishing scams commonplace Target Corporation lost about 98 million user accounts to hackers in late 2013 –Attackers gained access to Target via a third- party vendor's credentials Examples of phishing scams at PhishTank.com and ConsumerFraudReporting.orgPhishTank.com ConsumerFraudReporting.org
43
10-43 Wrap Up Copyright © 2016 Pearson Education, Inc. 1.Phishing scams are popular and becoming more targeted. 2.You need to be able to identify and avoid phishing scams.
44
10-44 Active Review Copyright © 2016 Pearson Education, Inc. Q1: What is the goal of information systems security? Q2: How big is the computer security problem? Q3: How should you respond to security threats? Q4: How should organizations respond to security threats? Q5: How can technical safeguards protect against security threats? Q6: How can data safeguards protect against security threats? Q7: How can human safeguards protect against security threats? Q8: How should organizations respond to security incidents? Q9: 2025?
45
10-45 Case 10: Hitting the Target Copyright © 2016 Pearson Education, Inc. Lost 40 million credit and debit card numbers to attackers Less than a month later Target announced an additional 70 million customer accounts stolen that included names, emails, addresses, phone numbers, and so on About 98 million customers were affected –31% of 318 million people in US Stolen from point-of-sale (POS) systems at Target retail stores during the holiday shopping season
46
10-46 How Did They Do It? Spearphished malware to gather keystrokes, login credentials, and screenshots from Fazio users Attackers escalated privileges to gain access to Target’s internal network Trojan.POSRAM extracted data from POS terminals Copyright © 2016 Pearson Education, Inc.
47
10-47 Damage Copyright © 2016 Pearson Education, Inc. Attackers sold about 2 million credit cards for about $26.85 each for a total profit of $53.7 million Target forced to take a loss on merchandise purchased using stolen credit cards Upgraded payment terminals to support chip-and-PIN enabled cards, increased insurance premiums, paid legal fees, settled with credit card processors, paid consumer credit monitoring, and paid regulatory fines
48
10-48 Damage (cont'd) Copyright © 2016 Pearson Education, Inc. Target loss of customer confidence and drop in revenues (46% loss for quarter). Analysts put direct loss to Target as high at $450 million CIO resigned, CEO paid $16 million to leave Cost credit unions and banks more than $200 million to issue new cards Insurers demand higher premiums, stricter controls, and more system auditing Consumers must watch their credit card statements, and fill out paperwork if fraudulent charges appear
49
10-49 Copyright © 2016 Pearson Education, Inc.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.