Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Security Management Chapter 10. 10-2 “But How Do You Implement That Security?” Copyright © 2016 Pearson Education, Inc. Video conference with.

Similar presentations


Presentation on theme: "Information Security Management Chapter 10. 10-2 “But How Do You Implement That Security?” Copyright © 2016 Pearson Education, Inc. Video conference with."— Presentation transcript:

1 Information Security Management Chapter 10

2 10-2 “But How Do You Implement That Security?” Copyright © 2016 Pearson Education, Inc. Video conference with potential PRIDE promoter and advertiser, San Diego Sports PRIDE originally designed to store medical data. SDS wants to know if PRIDE systems provide acceptable level of security. Doesn’t want to be affiliated with company with major security problem. Criminals now focus attacks on inter-organizational systems.

3 10-3 PRIDE Design for Security Copyright © 2016 Pearson Education, Inc.

4 10-4 Study Questions Copyright © 2016 Pearson Education, Inc. Q1: What is the goal of information systems security? Q2: How big is the computer security problem? Q3: How should you respond to security threats? Q4: How should organizations respond to security threats? Q5: How can technical safeguards protect against security threats? Q6: How can data safeguards protect against security threats? Q7: How can human safeguards protect against security threats? Q8: How should organizations respond to security incidents? Q9: 2025?

5 10-5 Q1: What Is the Goal of Information Systems Security? Copyright © 2016 Pearson Education, Inc.

6 10-6 Examples of Threat/Loss Copyright © 2016 Pearson Education, Inc.

7 10-7 What Are the Sources of Threats? Copyright © 2016 Pearson Education, Inc.

8 10-8 What Types of Security Loss Exists? Copyright © 2016 Pearson Education, Inc. Unauthorized Data Disclosure Pretexting Phishing Spoofing –IP spoofing –Email spoofing Drive-by sniffers –Wardrivers Hacking Natural disasters

9 10-9 Incorrect Data Modification Copyright © 2016 Pearson Education, Inc. Procedures incorrectly designed or not followed Increasing a customer’s discount or incorrectly modifying employee’s salary Placing incorrect data on company Web site Improper internal controls on systems System errors Faulty recovery actions after a disaster

10 10-10 Faulty Service Copyright © 2016 Pearson Education, Inc. Incorrect data modification Systems working incorrectly Procedural mistakes Programming errors IT installation errors Usurpation Denial of service (unintentional) Denial-of-service attacks (intentional)

11 10-11 Loss of Infrastructure Copyright © 2016 Pearson Education, Inc. Human accidents Theft and terrorist events Disgruntled or terminated employee Natural disasters Advanced Persistent Threat (APT)Advanced Persistent Threat –Sophisticated, possibly long-running computer hack perpetrated by large, well-funded organizations

12 10-12 Goal of Information Systems Security Copyright © 2016 Pearson Education, Inc. Find appropriate trade-off between risk of loss and cost of implementing safeguards Use antivirus software Deleting browser cookies? Get in front of security problem by making appropriate trade-offs for your life and your business

13 10-13 Q2: How Big Is the Computer Security Problem? Copyright © 2016 Pearson Education, Inc. Computer Crime Costs per Organizational Respondent

14 10-14 Average Computer Crime Cost and Percent of Attacks by Type (5 Most Expensive Types) Copyright © 2016 Pearson Education, Inc.

15 10-15 Computer Crime Costs Copyright © 2016 Pearson Education, Inc.

16 10-16 Ponemon Study Findings (2013) Copyright © 2016 Pearson Education, Inc. No one knows exact cost of computer crime Cost of computer crime based on surveys Data loss single most expensive consequence of computer crime, accounting for 44% of costs in 2013 80% of respondents believe data on mobile devices poses significant risks.

17 10-17 Ponemon 2013 Studies Summary Copyright © 2016 Pearson Education, Inc. Median cost of computer crime increasing Malicious insiders increasingly serious security threat Data loss is principal cost of computer crime Survey respondents believe mobile device data a significant security threat Security safeguards work Ponemon Study 2014

18 10-18 Q3: How Should You Respond to Security Threats? Copyright © 2016 Pearson Education, Inc. Personal Security Safeguards

19 10-19 So What? The Latest from Black Hat Copyright © 2016 Pearson Education, Inc. Annual security conference caters to hackers, security professionals, corporations, and government entities Briefings on how things can be hacked Show how to exploit weaknesses in hardware, software, protocols, or systems from smartphones to ATMs Encourage companies to fix product vulnerabilities and serve as educational forum for hackers, developers, manufacturers, and government agencies

20 10-20 Q4: How Should Organizations Respond to Security Threats? Copyright © 2016 Pearson Education, Inc.

21 10-21 Security Policy Should Stipulate Copyright © 2016 Pearson Education, Inc. What sensitive data the organization will store How it will process that data Whether data will be shared with other organizations How employees and others can obtain copies of data stored about them How employees and others can request changes to inaccurate data What employees can do with their own mobile devices at work  As a new hire, seek out your employer’s security policy

22 10-22 Ethics Guide: Securing Privacy Copyright © 2016 Pearson Education, Inc. “The best way to solve a problem is not to have it.” –Resist providing sensitive data –Don’t collect data you don’t need Gramm-Leach-Bliley (GLB) Act, 1999 Privacy Act of 1974 Health Insurance Portability and Accountability Act (HIPAA), 1996 Australian Privacy Act of 1988 –Government, healthcare data, records maintained by businesses with revenues in excess of AU$3 million.

23 10-23 Ethics Guide: Securing Privacy: Wrap Up Copyright © 2016 Pearson Education, Inc. Business professionals have responsibility to consider legality, ethics, and wisdom when you request, store, or disseminate data Think carefully about email you open over public, wireless networks Use long, strong passwords

24 10-24 Q5: How Can Technical Safeguards Protect Against Security Threats? Copyright © 2016 Pearson Education, Inc.

25 10-25 Essence of https (SSL or TLS) Copyright © 2016 Pearson Education, Inc.

26 10-26 Use of Multiple Firewalls Copyright © 2016 Pearson Education, Inc.

27 10-27 Malware Protection Copyright © 2016 Pearson Education, Inc. 1.Antivirus and antispyware programs 2.Scan frequently 3.Update malware definitions 4.Open email attachments only from known sources 5.Install software updates 6.Browse only reputable Internet neighborhoods

28 10-28 Malware Types and Spyware and Adware Symptoms Copyright © 2016 Pearson Education, Inc. Viruses  Payload  Trojan horses  Worms  Beacons

29 10-29 Design for Secure Applications Copyright © 2016 Pearson Education, Inc. SQL injection attack –User enters SQL statement into a form instead of a name or other data –Accepted code becomes part of database commands issued –Improper data disclosure, data damage and loss possible –Well designed applications make injections ineffective

30 10-30 Q6: How Can Data Safeguards Protect Against Security Threats? Copyright © 2016 Pearson Education, Inc.

31 10-31 Q7: How Can Human Safeguards Protect Against Security Threats? Copyright © 2016 Pearson Education, Inc.

32 10-32 Q7: How Can Human Safeguards Protect Against Security Threats? (cont' d) Copyright © 2016 Pearson Education, Inc.

33 10-33 Account Administration Copyright © 2016 Pearson Education, Inc. Account Management –Standards for new user accounts, modification of account permissions, removal of unneeded accounts Password Management –Users should change passwords frequently Help Desk Policies

34 10-34 Sample Account Acknowledgment Form Copyright © 2016 Pearson Education, Inc.

35 10-35 Systems Procedures Copyright © 2016 Pearson Education, Inc.

36 10-36 Q8: How Should Organizations Respond to Security Incidents? Copyright © 2016 Pearson Education, Inc.

37 10-37 Security Wrap Up Copyright © 2016 Pearson Education, Inc. Be aware of threats to computer security as an individual, business professional and employee Know trade-offs of loss risks and cost of safeguards Ways to protect your computing devices and data Understand technical, data, and human safeguards Understand how organizations should respond to security incidents

38 10-38 Q9: 2025 Copyright © 2016 Pearson Education, Inc. APTs more common, inflicting serious damage Continued concern about balance of national security and data privacy Computer crimes targeting mobile devices leads to improved operating systems security Improved security procedures and employee training Criminals focus on less protected mid-sized and smaller organizations, and individuals Electronic lawlessness by organized gangs Strong local “electronic” sheriffs electronic border and enforce existing laws?

39 10-39 Guide: A Look through NSA’s PRISM Copyright © 2016 Pearson Education, Inc. Nine of the largest Internet services (Google, Microsoft, Yahoo!, Facebook, PalTalk, YouTube, Skype, AOL, and Apple) participate in PRISM program Dates when PRISM began collecting data from each of these services Types of data collected include email, videos, photos, video and voice chat, file transfers, VoIP, stored data, videoconferencing, login activity, social networking activity, and something called “special requests” How information flows from around the world could be collected How data flowed from service provider to NSA, CIA, or FBI http://www.wired.com/2013/06/snowden-powerpoint/#slideid-522485

40 10-40 Trade Offs Copyright © 2016 Pearson Education, Inc. Social trade off –“I prefer dangerous freedom over peaceful slavery.” –"Freedom is Slavery" (G. Orwell, 1984) Organizations struggle with security –Users frustrated with stringent password policies –Firewalls block users from remotely accessing certain resources –Managers can’t access certain data without special permission

41 10-41 Wrap Up Copyright © 2016 Pearson Education, Inc. 1.Understand inherent trade-off between security and freedom 2.Understand reach of government surveillance systems 3.Understand ethical considerations surrounding spying and monitoring

42 10-42 Guide: Phishing for Credit Cards, Identifying Numbers, Bank Accounts Copyright © 2016 Pearson Education, Inc. Phishing scams commonplace Target Corporation lost about 98 million user accounts to hackers in late 2013 –Attackers gained access to Target via a third- party vendor's credentials Examples of phishing scams at PhishTank.com and ConsumerFraudReporting.orgPhishTank.com ConsumerFraudReporting.org

43 10-43 Wrap Up Copyright © 2016 Pearson Education, Inc. 1.Phishing scams are popular and becoming more targeted. 2.You need to be able to identify and avoid phishing scams.

44 10-44 Active Review Copyright © 2016 Pearson Education, Inc. Q1: What is the goal of information systems security? Q2: How big is the computer security problem? Q3: How should you respond to security threats? Q4: How should organizations respond to security threats? Q5: How can technical safeguards protect against security threats? Q6: How can data safeguards protect against security threats? Q7: How can human safeguards protect against security threats? Q8: How should organizations respond to security incidents? Q9: 2025?

45 10-45 Case 10: Hitting the Target Copyright © 2016 Pearson Education, Inc. Lost 40 million credit and debit card numbers to attackers Less than a month later Target announced an additional 70 million customer accounts stolen that included names, emails, addresses, phone numbers, and so on About 98 million customers were affected –31% of 318 million people in US Stolen from point-of-sale (POS) systems at Target retail stores during the holiday shopping season

46 10-46 How Did They Do It? Spearphished malware to gather keystrokes, login credentials, and screenshots from Fazio users Attackers escalated privileges to gain access to Target’s internal network Trojan.POSRAM extracted data from POS terminals Copyright © 2016 Pearson Education, Inc.

47 10-47 Damage Copyright © 2016 Pearson Education, Inc. Attackers sold about 2 million credit cards for about $26.85 each for a total profit of $53.7 million Target forced to take a loss on merchandise purchased using stolen credit cards Upgraded payment terminals to support chip-and-PIN enabled cards, increased insurance premiums, paid legal fees, settled with credit card processors, paid consumer credit monitoring, and paid regulatory fines

48 10-48 Damage (cont'd) Copyright © 2016 Pearson Education, Inc. Target loss of customer confidence and drop in revenues (46% loss for quarter). Analysts put direct loss to Target as high at $450 million CIO resigned, CEO paid $16 million to leave Cost credit unions and banks more than $200 million to issue new cards Insurers demand higher premiums, stricter controls, and more system auditing Consumers must watch their credit card statements, and fill out paperwork if fraudulent charges appear

49 10-49 Copyright © 2016 Pearson Education, Inc.


Download ppt "Information Security Management Chapter 10. 10-2 “But How Do You Implement That Security?” Copyright © 2016 Pearson Education, Inc. Video conference with."

Similar presentations


Ads by Google