Download presentation
Presentation is loading. Please wait.
Published byBritney Barker Modified over 9 years ago
1
C8- Securing Information Systems Facebook Virus Update your Adobe Flash! Security and Control ***
2
The Security Challenge
3
Security Vs. Control Security: the policies, procedures and technical measures used to prevent unauthorized access, alteration, threat or physical damage to information systems Controls: methods to ensure the safety of assets, reliability of records and adherence to standards
4
The potential for unauthorized access, abuse, or fraud is not limited to a single location but can occur at any access point in the network. 8-5 Security- Vulnerabilities Smart Phones
5
8-6 System Vulnerability and Abuse Internet vulnerabilities Vulnerable to outside attacks Abuses can have widespread impact E-mail increases system vulnerability Fixed IP Address- they know where you are! VOIP Service Vulnerabilities
6
Wireless security challenges Many Wi-Fi networks can be penetrated easily by intruders using sniffer programs to obtain an address to access the resources of a network without authorization. Using the rogue access points!!!
7
8-8 Malicious Software (Malware) Computer viruses: –Rogue software programs that attach to other programs in order to be executed, usually without user knowledge or permission –Deliver a “payload” –Can spread by email attachments Worms: –Programs that copy themselves from one computer to another over networks- rely less on human to spread –Can destroy data, programs, and halt operation of computer networks Trojan Horse: A software program that appears to be benign, but then does something unexpected Often “transports” a virus into a computer system System Vulnerability and Abuse
10
Malware … SQL injection attacks Spyware –install themselves surreptitiously to monitor user Web surfing activity/ serve advertising. –Keyloggers
11
8-11 Hackers & Cybervandalism Hackers: individuals who attempt to gain unauthorized access to a computer system Cracker: a hacker with criminal intent System intrusion, theft of goods and information, system damage and cybervandalism –Cybervandalism: intentional disruption, defacement, or destruction of a Web site or system System Vulnerability and Abuse
12
8-12 Spoofing and Sniffing Spoofing –masquerading as someone else, or redirecting a Web link to an unintended address Sniffing –an eavesdropping program that monitors information travelling over a network System Vulnerability and Abuse
13
8-13 DoS Attacks Denial of Service Hackers flood a server with false communications in order to crash the system System Vulnerability and Abuse Use thousands of “zombie” PCs infected with malicious software without their owners’ knowledge and organized into a botnet.
14
8-16 Computers As Targets Of Crime Breaching the confidentiality of protected computerized data Accessing a computer system without authority Knowingly accessing a protected computer to commit fraud Intentionally accessing a protected computer and causing damage, negligently or deliberately Knowingly transmitting a program, program code or command that causes damage to it Threatening to cause damage to a computer
15
Computers As Instruments Of Crime Theft of trade secrets Unauthorized copying of software or copyrighted intellectual property,s uch as articles, books, music, and video Schemes to defraud Using e-mail for threats or harassment Intentionally attempting to intercept electronic communication Illegally accessing e-mail and voice mail Transmitting or possessing child pornography
16
8-16 Computer Crime Identity theft –A crime in which the imposter obtains key pieces of personal information –Phishing- Setting up fake Web sites or sending email messages that look legitimate, and using them to ask for confidential data –Eviltwins are wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet, such as those in airport lounges, hotels, or coffee shops. –Pharming redirects users to a bogus Web page, even when the individual types the correct Web page address into his or her browser.
17
8-16 Computer Crime … Click Fraud Cyberterrorism and Cyberwarfare –Exploitation of systems by terrorists Internal Threats: Employees –lack of knowledge is the single greatest cause of network security breaches Software vulnerability –bugs or program code defects- virtually impossible to eliminate all bugs from large programs. –Patches- To correct software flaws vendor creates small pieces of software called patches
18
Phishing
19
8-18 Business Value of Security and Control Different govt. regulations/acts Protect own information assets and customers, employees, and business partner legal liability –litigation for data exposure or theft A sound security and control framework= high return on investment
20
Computer forensics is the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law. –Recovering data from computers while preserving evidential integrity –Securely storing and handling recovered electronic data –Finding significant information in a large volume of electronic data –Presenting the information to a court of law
21
8-20 Establishing a Framework General controls –The design, security, and use of computer programs and the security of data files in throughout the organization’s IS infrastructure. –Include software controls, physical hardware controls, computer operations controls, data security controls, controls over implementation of system processes, and administrative controls. Application controls –unique to each application, like payroll –(1) input controls, (2) processing controls, and (3) output controls
22
8-20 Establishing a Framework … Risk Assessment –Determine level of risk to the firm in the case of improper controls Security policy –ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals. –Acceptable Use Policy (AUP) defines unacceptable and acceptable actions –Identity Management of business processes and software tools for identifying the valid users of a system and controlling their access to system resources. Chief Security Officer (CSO)
23
Two security profiles or data security patterns Access rules for different levels of users in the human resources function.
24
8-20 Establishing a Framework … Disaster recovery planning –duplicate computer center Business continuity planning –Fault-tolerant computer systems –High-availability computing –Recovery-oriented computing –Security outsourcing Auditing –An MIS audit examines the firm’s overall security environment as well as controls governing individual information systems.
25
Technologies And Tools Access controls –Consist of all the policies and procedures a company uses to prevent improper access to systems by unauthorized insiders and outsiders Authentication –ability to know that a person is who she or he claims to be Passwords, tokens, biometric authentication Biometric authentication uses systems that read and interpret individual human traits, such as fingerprints, irises, and voices, in order to grant or deny access.
26
Firewalls Firewalls: Hardware and software controlling flow of incoming and outgoing network traffic –Packet Filtering examines selected fields in the headers of data packets flowing back and forth from network and the Internet –Stateful inspection provides additional security by determining whether packets are part of an ongoing dialogue between a sender and receiver –Application proxy filtering- examines the application content of packets. A proxy server stops data packets originating outside the organization, inspects them, and passes a proxy to the other side of the firewall. ……………….
27
A Corporate Firewall
28
Intrusion Detection Systems, and Antivirus Intrusion Detection Systems –Full-time monitoring tools placed at the most vulnerable points of the corporate networks to detect and deter intruders Antivirus and Antispyware Unified Threat Management Systems –combined into a single appliance various security tools, including firewalls, virtual private networks, intrusion detection systems, and Web content filtering and antispam software. 8-27 Technologies And Tools For Security And Control
29
Improve Security Wi-Fi Network –Setting HTTPS- SSL/TLS- secure connection Mail/Message Encryption
30
Encryption Encryption-rmvtu[yopm-fodszqujpo –Coding and scrambling of messages to prevent unauthorized access to, or understanding of, the data being transmitted Public key encryption: –Uses two different keys, one private and one public. The keys are mathematically related so that data encrypted with one key can be decrypted using only the other key Public Key Infrastructure (PKI): –Use of public key cryptography working with a certificate authority Technologies And Tools For Security And Control
31
A public key encryption system can be viewed as a series of public and private keys that lock data when they are transmitted and unlock the data when they are received. 8-31 Technologies And Tools For Security And Control Public Key Encryption The sender locates the recipient’s public key in a directory and uses it to encrypt a message. The message is sent in encrypted form over the Internet or a private network. When the encrypted message arrives, the recipient uses his or her private key to decrypt the data and read the message.
32
Ensuring System Availability
33
Solution Guidelines Security and control must become a more visible and explicit priority and area of information systems investment Support and commitment from top management is required to show that security is indeed a corporate priority and vital to all aspects of the business Security and control should be the responsibility of everyone in the organization Management Opportunities, Challenges, And Solutions
35
8-35 Learning Objectives Analyze why information systems need special protection from destruction, error, and abuse. Assess the business value of security and control. Design an organizational framework for security and control. Evaluate the most important tools and technologies for safeguarding information resources.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.