SlideShare ist ein Scribd-Unternehmen logo
1 von 42
Downloaden Sie, um offline zu lesen
Chapter 8




      Securing Information
            Systems




8.1
Management Information Systems
                        Chapter 8 Securing Information Systems

                               LEARNING OBJECTIVES



      • Explain why information systems are vulnerable to
        destruction, error, and abuse.
      • Assess the business value of security and control.
      • Identify the components of an organizational
        framework for security and control.
      • Evaluate the most important tools and technologies
        for safeguarding information resources.




8.2
Management Information Systems
                            Chapter 8 Securing Information Systems

                        Boston Celtics Score Big Points Against Spyware


      • Problem: Spyware infecting laptops during team travel
        affecting accessibility and performance of proprietary
        system
      • Solutions: Deploy security software to reduce spyware.
      • Mi5 Network’s Webgate security appliance tool sits
        between corporate firewall and network to prevent
        spyware entering network or infected computers
        connecting to network
      • Demonstrates IT’s role in combating malicious software
      • Illustrates digital technology’s role in achieving security
        on the Web


8.3
Management Information Systems
                              Chapter 8 Securing Information Systems

                                 System Vulnerability and Abuse


      • Security:
         • Policies, procedures and technical measures used to prevent
           unauthorized access, alteration, theft, or physical damage to
           information systems

      • Controls:
         • Methods, policies, and organizational procedures that ensure
           safety of organization’s assets; accuracy and reliability of its
           accounting records; and operational adherence to
           management standards




8.4
Management Information Systems
                           Chapter 8 Securing Information Systems

                               System Vulnerability and Abuse


      • Why systems are vulnerable
        • Hardware problems
           • Breakdowns, configuration errors, damage from improper
             use or crime
        • Software problems
           • Programming errors, installation errors, unauthorized
             changes)
        • Disasters
           • Power failures, flood, fires, etc.
        • Use of networks and computers outside of
          firm’s control
           • E.g., with domestic or offshore outsourcing vendors

8.5
Management Information Systems
                                            Chapter 8 Securing Information Systems

                                                  System Vulnerability and Abuse

      Contemporary Security Challenges and Vulnerabilities




           The architecture of a Web-based application typically includes a Web client, a server, and corporate information
           systems linked to databases. Each of these components presents security challenges and vulnerabilities.
           Floods, fires, power failures, and other electrical problems can cause disruptions at any point in the network.


                                                        Figure 8-1
8.6
Management Information Systems
                           Chapter 8 Securing Information Systems

                              System Vulnerability and Abuse


      • Internet vulnerabilities
         • Network open to anyone

         • Size of Internet means abuses can have wide impact

         • Use of fixed Internet addresses with permanent
           connections to Internet eases identification by hackers

         • E-mail attachments

         • E-mail used for transmitting trade secrets

         • IM messages lack security, can be easily intercepted



8.7
Management Information Systems
                               Chapter 8 Securing Information Systems

                                   System Vulnerability and Abuse


      • Wireless security challenges
         • Radio frequency bands easy to scan
         • SSIDs (service set identifiers)
            •   Identify access points
            •   Broadcast multiple times
         • War driving
            •   Eavesdroppers drive by buildings and try to intercept network traffic
            •   When hacker gains access to SSID, has access to network’s
                resources
         • WEP (Wired Equivalent Privacy)
            •   Security standard for 802.11
            •   Basic specification uses shared password for both users and access
                point
            •   Users often fail to use security features

8.8
Management Information Systems
                                       Chapter 8 Securing Information Systems

                                          System Vulnerability and Abuse

                                   Wi-Fi Security Challenges




Figure 8-2
Many Wi-Fi networks can be
penetrated easily by intruders
using sniffer programs to obtain
an address to access the
resources of a network without
authorization.


8.9
Management Information Systems
                             Chapter 8 Securing Information Systems

                                System Vulnerability and Abuse

                      The Worst Data Theft Ever?
       • Read the Interactive Session: Organizations and then
         discuss the following questions:
          • List and describe the security control weaknesses at TJX
            Companies
          • What management, organization, and technology factors
            contributed to these weaknesses?
          • What was the business impact of TJX’s data loss on TJX,
            consumers, and banks?
          • How effectively did TJX deal with these problems?
          • Who should be held liable for the losses caused by the use of
            fraudulent credit cards in this case? The banks issuing the
            cards or the consumers? Justify your answer.
          • What solutions would you suggest to prevent the problems?

8.10
Management Information Systems
                              Chapter 8 Securing Information Systems

                                 System Vulnerability and Abuse


   • Malicious software (malware)
       • Viruses: Rogue software program that attaches itself to other
         software programs or data files in order to be executed
       • Worms: Independent computer programs that copy themselves from
         one computer to other computers over a network
       • Trojan horses: Software program that appears to be benign but
         then does something other than expected
       • Spyware: Small programs install themselves surreptitiously on
         computers to monitor user Web surfing activity and serve up
         advertising

           • Key loggers: Record every keystroke on computer to steal
              serial numbers, passwords, launch Internet attacks


8.11
Management Information Systems
                         Chapter 8 Securing Information Systems

                            System Vulnerability and Abuse


       • Hackers and computer crime
         • Hackers vs. crackers
         • Activities include
            • System intrusion
            • Theft of goods and information
            • System damage
            • Cybervandalism
               • Intentional disruption, defacement,
                 destruction of Web site or corporate
                 information system
8.12
Management Information Systems
                              Chapter 8 Securing Information Systems

                                  System Vulnerability and Abuse


       • Spoofing
          • Misrepresenting oneself by using fake e-mail addresses or
            masquerading as someone else
          • Redirecting Web link to address different from intended one,
            with site masquerading as intended destination
       • Sniffer: Eavesdropping program that monitors information
         traveling over network
       • Denial-of-service attacks (DoS): Flooding server with
         thousands of false requests to crash the network
       • Distributed denial-of-service attacks (DDoS): Use of
         numerous computers to launch a DoS
          • Botnets: Networks of “zombie” PCs infiltrated by bot malware


8.13
Management Information Systems
                             Chapter 8 Securing Information Systems

                                System Vulnerability and Abuse


       • Computer crime
         • Defined as “any violations of criminal law that involve a
           knowledge of computer technology for their perpetration,
           investigation, or prosecution”
         • Computer may be target of crime, e.g.:
             • Breaching confidentiality of protected computerized data
             • Accessing a computer system without authority
         • Computer may be instrument of crime, e.g.:
             • Theft of trade secrets
             • Using e-mail for threats or harassment



8.14
Management Information Systems
                                Chapter 8 Securing Information Systems

                                   System Vulnerability and Abuse


       • Identity theft: Theft of personal Information (social security id,
          driver’s license or credit card numbers) to impersonate someone
          else
       • Phishing: Setting up fake Web sites or sending e-mail
          messages that look like legitimate businesses to ask users for
          confidential personal data.
       • Evil twins: Wireless networks that pretend to offer trustworthy
          Wi-Fi connections to the Internet
       • Pharming: Redirects users to a bogus Web page, even when
          individual types correct Web page address into his or her browser




8.15
Management Information Systems
                            Chapter 8 Securing Information Systems

                               System Vulnerability and Abuse


       • Click fraud
          • Individual or computer program clicks online ad
            without any intention of learning more or making a
            purchase
       • Global threats - Cyberterrorism and cyberwarfare
          • Concern that Internet vulnerabilities and other
            networks make digital networks easy targets for
            digital attacks by terrorists, foreign intelligence
            services, or other groups


8.16
Management Information Systems
                            Chapter 8 Securing Information Systems

                               System Vulnerability and Abuse


       • Internal threats – Employees
          • Security threats often originate inside an
            organization
             • Inside knowledge
             • Sloppy security procedures
                • User lack of knowledge
             • Social engineering:
                • Tricking employees into revealing their passwords by
                  pretending to be legitimate members of the company
                  in need of information


8.17
Management Information Systems
                             Chapter 8 Securing Information Systems

                                System Vulnerability and Abuse


       • Software vulnerability
          • Commercial software contains flaws that create
            security vulnerabilities
             • Hidden bugs (program code defects)
                 • Zero defects cannot be achieved because complete
                   testing is not possible with large programs
             • Flaws can open networks to intruders
          • Patches
             • Vendors release small pieces of software to repair flaws
             • However, amount of software in use can mean exploits
               created faster than patches be released and implemented

8.18
Management Information Systems
                            Chapter 8 Securing Information Systems

                            Business Value of Security and Control


       • Lack of security, control can lead to
          • Loss of revenue
             • Failed computer systems can lead to significant or
               total loss of business function
          • Lowered market value:
             • Information assets can have tremendous value
             • A security breach may cut into firm’s market value
               almost immediately
          • Legal liability
          • Lowered employee productivity
          • Higher operational costs

8.19
Management Information Systems
                              Chapter 8 Securing Information Systems

                              Business Value of Security and Control


       • Legal and regulatory requirements for electronic
         records management
          • Firms face new legal obligations for the retention
            and storage of electronic records as well as for
            privacy protection
          • HIPAA: Medical security and privacy rules and procedures
          • Gramm-Leach-Bliley Act: Requires financial institutions to
            ensure the security and confidentiality of customer data
          • Sarbanes-Oxley Act: Imposes responsibility on companies
            and their management to safeguard the accuracy and integrity
            of financial information that is used internally and released
            externally

8.20
Management Information Systems
                               Chapter 8 Securing Information Systems

                               Business Value of Security and Control


       • Electronic evidence
          • Evidence for white collar crimes often found in
            digital form
          • Data stored on computer devices, e-mail, instant messages,
            e-commerce transactions
       • Proper control of data can save time, money when
         responding to legal discovery request
       • Computer forensics:
          • Scientific collection, examination, authentication, preservation,
            and analysis of data from computer storage media for use as
            evidence in court of law
          • Includes recovery of ambient and hidden data

8.21
Management Information Systems
                                Chapter 8 Securing Information Systems

                          Establishing a Framework for Security and Control



       • Information systems controls
         • General controls
            • Govern design, security, and use of computer programs
              and data throughout organization’s IT infrastructure
            • Combination of hardware, software, and manual
              procedures to create overall control environment
            •   Types of general controls
                 •   Software controls
                 •   Hardware controls
                 •   Computer operations controls
                 •   Data security controls
                 •   Implementation controls
                 •   Administrative controls


8.22
Management Information Systems
                              Chapter 8 Securing Information Systems

                         Establishing a Framework for Security and Control


       • Application controls
          • Specific controls unique to each computerized application,
            such as payroll or order processing
          • Include both automated and manual procedures
          • Ensure that only authorized data are completely and
            accurately processed by that application
          • Types of application controls:
              • Input controls
              • Processing controls
              • Output controls



8.23
Management Information Systems
                                   Chapter 8 Securing Information Systems

                             Establishing a Framework for Security and Control


       • Risk assessment
         • Determines level of risk to firm if specific activity or process is
           not properly controlled
             •    Types of threat
             •    Probability of occurrence during year
             •    Potential losses, value of threat
             •    Expected annual loss

             EXPOSURE        PROBABILITY   LOSS RANGE (AVERAGE)     EXPECTED
                                                                    ANNUAL LOSS

             Power failure   30%           $5K - $200K ($102,500)   $30,750

             Embezzlement    5%            $1K - $50K ($25,500)     $1,275

             User error      98%           $200 - $40K ($20,100)    $19,698




8.24
Management Information Systems
                               Chapter 8 Securing Information Systems

                          Establishing a Framework for Security and Control


       • Security policy
          • Ranks information risks, identifies acceptable security goals,
            and identifies mechanisms for achieving these goals
          • Drives other policies
              • Acceptable use policy (AUP): Defines acceptable uses
                of firm’s information resources and computing equipment
              • Authorization policies: Determine differing levels of user
                access to information assets

       • Authorization management systems
          • Allow each user access only to those portions of system that
            person is permitted to enter, based on information established
            by set of access rules, profile
8.25
Management Information Systems
                                       Chapter 8 Securing Information Systems

                                  Establishing a Framework for Security and Control

                            Security Profiles for a Personnel System




Figure 8-3
These two examples
represent two security
profiles or data security
patterns that might be
found in a personnel
system. Depending on
the security profile, a
user would have certain
restrictions on access to
various systems,
locations, or data in an
organization.


8.26
Management Information Systems
                              Chapter 8 Securing Information Systems

                         Establishing a Framework for Security and Control


       • Disaster recovery planning: Devises plans for
         restoration of disrupted services
       • Business continuity planning: Focuses on restoring
         business operations after disaster
       • Both types of plans needed to identify firm’s most
         critical systems and business processes
          • Business impact analysis to determine impact of an outage
          • Management must determine
             • Maximum time systems can be down
             • Which systems must be restored first


8.27
Management Information Systems
                             Chapter 8 Securing Information Systems

                        Establishing a Framework for Security and Control


       • MIS audit
         • Examines firm’s overall security environment as well as
           controls governing individual information systems
         • Reviews technologies, procedures, documentation, training,
           and personnel
         • May even simulate disaster to test response of technology, IS
           staff, other employees
         • Lists and ranks all control weaknesses and estimates
           probability of their occurrence
         • Assesses financial and organizational impact of each threat




8.28
Management Information Systems
                                         Chapter 8 Securing Information Systems

                                    Establishing a Framework for Security and Control

                      Sample Auditor’s List of Control Weaknesses




Figure 8-4
This chart is a sample page from
a list of control weaknesses that
an auditor might find in a loan
system in a local commercial
bank. This form helps auditors
record and evaluate control
weaknesses and shows the
results of discussing those
weaknesses with management,
as well as any corrective actions
taken by management.


8.29
Management Information Systems
                             Chapter 8 Securing Information Systems

                              Technologies and Tools for Security


       • Access control: Policies and procedures to prevent
         improper access to systems by unauthorized
         insiders and outsiders
          • Authorization
          • Authentication
             • Password systems
             • Tokens
             • Smart cards
             • Biometric authentication



8.30
Management Information Systems
                                 Chapter 8 Securing Information Systems

                                   Technologies and Tools for Security



   • Firewall: Hardware and/or software to prevent
     unauthorized access to private networks
       • Screening technologies
          •   Packet filtering
          •   Stateful inspection
          •   Network address translation (NAT)
          •   Application proxy filtering
   • Intrusion detection systems: Monitor vulnerable
     points on networks to detect and deter intruders
       • Examines events as they are happening to discover attacks
         in progress
       • Scans network to find patterns indicative of attacks


8.31
Management Information Systems
                                      Chapter 8 Securing Information Systems

                                         Technologies and Tools for Security

                                 A Corporate Firewall




       The firewall is placed between the firm’s private
       network and the public Internet or another
       distrusted network to protect against
       unauthorized traffic.

       Figure 8-5


8.32
Management Information Systems
                                Chapter 8 Securing Information Systems

                                  Technologies and Tools for Security



       • Antivirus and antispyware software:
          • Checks computers for presence of malware and can often
            eliminate it as well
          • Require continual updating
       • Unified threat management (UTM)
          • Comprehensive security management products
          • Tools include
             •   Firewalls
             •   Intrusion detection
             •   VPNs
             •   Web content filtering
             •   Antispam software


8.33
Management Information Systems
                              Chapter 8 Securing Information Systems

                                Technologies and Tools for Security



       • Securing wireless networks
         • WEP security can be improved:
            • Activating it
            • Assigning unique name to network’s SSID
            • Using it with VPN technology

         • Wi-Fi Alliance finalized WAP2 specification,
           replacing WEP with stronger standards
            • Continually changing keys
            • Encrypted authentication system with central server



8.34
Management Information Systems
                           Chapter 8 Securing Information Systems

                            Technologies and Tools for Security



       • Encryption:
         • Transforming text or data into cipher text that cannot
           be read by unintended recipients
         • Two methods for encrypting network traffic
            • Secure Sockets Layer (SSL) and successor Transport Layer
              Security (TLS)
            • Secure Hypertext Transfer Protocol (S-HTTP)
         • Two methods of encryption
            • Symmetric key encryption
            • Public key encryption

8.35
Management Information Systems
                                             Chapter 8 Securing Information Systems

                                                 Technologies and Tools for Security



                                      Public Key Encryption




       A public key encryption system can be viewed as a series of public and private keys that lock data when they are
       transmitted and unlock the data when they are received. The sender locates the recipient’s public key in a directory and
       uses it to encrypt a message. The message is sent in encrypted form over the Internet or a private network. When the
       encrypted message arrives, the recipient uses his or her private key to decrypt the data and read the message.




                                                          Figure 7-6
8.36
Management Information Systems
                               Chapter 8 Securing Information Systems

                                 Technologies and Tools for Security



       • Digital certificate:
          • Data file used to establish the identity of users and electronic
            assets for protection of online transactions
          • Uses a trusted third party, certification authority (CA), to
            validate a user’s identity
          • CA verifies user’s identity, stores information in CA server,
            which generates encrypted digital certificate containing
            owner ID information and copy of owner’s public key
       • Public key infrastructure (PKI)
          • Use of public key cryptography working with certificate
            authority
          • Widely used in e-commerce


8.37
Management Information Systems
                               Chapter 8 Securing Information Systems

                                 Technologies and Tools for Security

                               Digital Certificates




Figure 8-7
Digital certificates help
establish the identity of
people or electronic assets.
They protect online
transactions by providing
secure, encrypted, online
communication.


8.38
Management Information Systems
                            Chapter 8 Securing Information Systems

                              Technologies and Tools for Security



       • Ensuring system availability
          • Online transaction processing requires 100%
            availability, no downtime
          • Fault-tolerant computer systems
             • For continuous availability
             • Contain redundant hardware, software, and power
               supply components to provide continuous, uninterrupted
               service
          • High-availability computing
             • Helps recover quickly from crash
             • Minimizes, does not eliminate downtime
8.39
Management Information Systems
                              Chapter 8 Securing Information Systems

                               Technologies and Tools for Security



       • Recovery-oriented computing
          • Designing systems that recover quickly with capabilities to
            help operators pinpoint and correct of faults in multi-
            component systems
       • Controlling network traffic
          • Deep packet inspection (DPI)
       • Security outsourcing
          • Managed security service providers (MSSPs)




8.40
Management Information Systems
                            Chapter 8 Securing Information Systems

                             Technologies and Tools for Security

       Can Salesforce.com On-Demand Remain in Demand?

       • Read the Interactive Session: Technology and then
         discuss the following questions:
          • How did the problems experienced by Salesforce.com
            impact its business?
          • How did the problems impact its customers?
          • What steps did Salesforce.com take to solve the
            problems? Were these steps sufficient?
          • List and describe other vulnerabilities discussed in this
            chapter that might create outages at Salesforce.com and
            measures to safeguard against them.



8.41
Management Information Systems
                               Chapter 8 Securing Information Systems

                                 Technologies and Tools for Security


       • Ensuring software quality
          • Software Metrics: Objective assessments of system in
            form of quantified measurements
              • Number of transactions
              • Online response time
              • Payroll checks printed per hour
              • Known bugs per hundred lines of code
          • Testing: Early and regular testing
              • Walkthrough: Review of specification or design
                document by small group of qualified people
              • Debugging: Process by which errors are eliminated


8.42

Weitere ähnliche Inhalte

Was ist angesagt?

System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abusePrakash Raval
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Securing information system
Securing information systemSecuring information system
Securing information systemTanjim Rasul
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
MIS-CH01: Information Systems, Organization, and Strategy
MIS-CH01: Information Systems, Organization, and StrategyMIS-CH01: Information Systems, Organization, and Strategy
MIS-CH01: Information Systems, Organization, and StrategySukanya Ben
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep BadgujarVishwadeep Badgujar
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesMIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesSukanya Ben
 
ethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceraviteja reddy
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerceWisnu Dewobroto
 
Competing with information technology
Competing with information technologyCompeting with information technology
Competing with information technologyAmrit Banstola
 
07 E-commerce Advertising
07 E-commerce Advertising07 E-commerce Advertising
07 E-commerce Advertisingmonchai sopitka
 

Was ist angesagt? (20)

System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abuse
 
Enterprise Computing
Enterprise ComputingEnterprise Computing
Enterprise Computing
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Securing information system
Securing information systemSecuring information system
Securing information system
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
MIS Chapter 2
MIS Chapter 2MIS Chapter 2
MIS Chapter 2
 
CYBER CRIME ppt
CYBER CRIME pptCYBER CRIME ppt
CYBER CRIME ppt
 
MIS-CH01: Information Systems, Organization, and Strategy
MIS-CH01: Information Systems, Organization, and StrategyMIS-CH01: Information Systems, Organization, and Strategy
MIS-CH01: Information Systems, Organization, and Strategy
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesMIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging Technologies
 
ethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerce
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
 
MIS Chapter 4
MIS Chapter 4MIS Chapter 4
MIS Chapter 4
 
Competing with information technology
Competing with information technologyCompeting with information technology
Competing with information technology
 
07 E-commerce Advertising
07 E-commerce Advertising07 E-commerce Advertising
07 E-commerce Advertising
 
Chapter 5 MIS
Chapter 5 MISChapter 5 MIS
Chapter 5 MIS
 

Andere mochten auch

Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyProf. Othman Alsalloum
 
Chapter 8 management information system 12th edition 2012 laudon
Chapter 8 management information system 12th edition 2012 laudonChapter 8 management information system 12th edition 2012 laudon
Chapter 8 management information system 12th edition 2012 laudonYanick Iglesias
 
13 - Building Info Systems
13 -  Building Info Systems13 -  Building Info Systems
13 - Building Info SystemsHemant Nagwekar
 
7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless techHemant Nagwekar
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in misGurjit
 
E-commerce, digital markets, and digital goods
E-commerce, digital markets, and digital goodsE-commerce, digital markets, and digital goods
E-commerce, digital markets, and digital goodsJose G. Lepervanche, PhD
 
Advantages and Disadvantages of MIS
Advantages and Disadvantages of MISAdvantages and Disadvantages of MIS
Advantages and Disadvantages of MISNeeti Naag
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Laudon mis12 ppt01
Laudon mis12 ppt01Laudon mis12 ppt01
Laudon mis12 ppt01Norazila Mat
 
lecture 1 information systems and business strategy
lecture 1  information systems and business strategylecture 1  information systems and business strategy
lecture 1 information systems and business strategyNorazila Mat
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)Navneet Jingar
 
Cloud 101: The Basics of Cloud Computing
Cloud 101: The Basics of Cloud ComputingCloud 101: The Basics of Cloud Computing
Cloud 101: The Basics of Cloud ComputingHostway|HOSTING
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 

Andere mochten auch (20)

Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
 
Chapter 9 MIS
Chapter 9 MISChapter 9 MIS
Chapter 9 MIS
 
Chapter 8 management information system 12th edition 2012 laudon
Chapter 8 management information system 12th edition 2012 laudonChapter 8 management information system 12th edition 2012 laudon
Chapter 8 management information system 12th edition 2012 laudon
 
9 - Security
9 - Security9 - Security
9 - Security
 
13 - Building Info Systems
13 -  Building Info Systems13 -  Building Info Systems
13 - Building Info Systems
 
Chapter 2 MIS
Chapter 2 MISChapter 2 MIS
Chapter 2 MIS
 
7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech
 
Chapter 3 MIS
Chapter 3 MISChapter 3 MIS
Chapter 3 MIS
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
E-commerce, digital markets, and digital goods
E-commerce, digital markets, and digital goodsE-commerce, digital markets, and digital goods
E-commerce, digital markets, and digital goods
 
Advantages and Disadvantages of MIS
Advantages and Disadvantages of MISAdvantages and Disadvantages of MIS
Advantages and Disadvantages of MIS
 
Information security management
Information security managementInformation security management
Information security management
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Laudon mis12 ppt01
Laudon mis12 ppt01Laudon mis12 ppt01
Laudon mis12 ppt01
 
lecture 1 information systems and business strategy
lecture 1  information systems and business strategylecture 1  information systems and business strategy
lecture 1 information systems and business strategy
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)
 
Cloud 101: The Basics of Cloud Computing
Cloud 101: The Basics of Cloud ComputingCloud 101: The Basics of Cloud Computing
Cloud 101: The Basics of Cloud Computing
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Ähnlich wie 8 - Securing Info Systems

Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Session 7 - Management challenges in Information security.ppt
Session 7 - Management challenges in Information security.pptSession 7 - Management challenges in Information security.ppt
Session 7 - Management challenges in Information security.pptENRIQUE EGLESIAS
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information SystemSatya P. Joshi
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iotST_World
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docxalinainglis
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxAmardeepKumar621436
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for businessDaniel Thomas
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsBilalMehmood44
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityGeevarghese Titus
 

Ähnlich wie 8 - Securing Info Systems (20)

Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Session 7 - Management challenges in Information security.ppt
Session 7 - Management challenges in Information security.pptSession 7 - Management challenges in Information security.ppt
Session 7 - Management challenges in Information security.ppt
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Web security 2012
Web security 2012Web security 2012
Web security 2012
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
 
dccn ppt-1.pptx
dccn ppt-1.pptxdccn ppt-1.pptx
dccn ppt-1.pptx
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
IoT-Device-Security.pptx
IoT-Device-Security.pptxIoT-Device-Security.pptx
IoT-Device-Security.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 

Kürzlich hochgeladen

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Kürzlich hochgeladen (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

8 - Securing Info Systems

  • 1. Chapter 8 Securing Information Systems 8.1
  • 2. Management Information Systems Chapter 8 Securing Information Systems LEARNING OBJECTIVES • Explain why information systems are vulnerable to destruction, error, and abuse. • Assess the business value of security and control. • Identify the components of an organizational framework for security and control. • Evaluate the most important tools and technologies for safeguarding information resources. 8.2
  • 3. Management Information Systems Chapter 8 Securing Information Systems Boston Celtics Score Big Points Against Spyware • Problem: Spyware infecting laptops during team travel affecting accessibility and performance of proprietary system • Solutions: Deploy security software to reduce spyware. • Mi5 Network’s Webgate security appliance tool sits between corporate firewall and network to prevent spyware entering network or infected computers connecting to network • Demonstrates IT’s role in combating malicious software • Illustrates digital technology’s role in achieving security on the Web 8.3
  • 4. Management Information Systems Chapter 8 Securing Information Systems System Vulnerability and Abuse • Security: • Policies, procedures and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems • Controls: • Methods, policies, and organizational procedures that ensure safety of organization’s assets; accuracy and reliability of its accounting records; and operational adherence to management standards 8.4
  • 5. Management Information Systems Chapter 8 Securing Information Systems System Vulnerability and Abuse • Why systems are vulnerable • Hardware problems • Breakdowns, configuration errors, damage from improper use or crime • Software problems • Programming errors, installation errors, unauthorized changes) • Disasters • Power failures, flood, fires, etc. • Use of networks and computers outside of firm’s control • E.g., with domestic or offshore outsourcing vendors 8.5
  • 6. Management Information Systems Chapter 8 Securing Information Systems System Vulnerability and Abuse Contemporary Security Challenges and Vulnerabilities The architecture of a Web-based application typically includes a Web client, a server, and corporate information systems linked to databases. Each of these components presents security challenges and vulnerabilities. Floods, fires, power failures, and other electrical problems can cause disruptions at any point in the network. Figure 8-1 8.6
  • 7. Management Information Systems Chapter 8 Securing Information Systems System Vulnerability and Abuse • Internet vulnerabilities • Network open to anyone • Size of Internet means abuses can have wide impact • Use of fixed Internet addresses with permanent connections to Internet eases identification by hackers • E-mail attachments • E-mail used for transmitting trade secrets • IM messages lack security, can be easily intercepted 8.7
  • 8. Management Information Systems Chapter 8 Securing Information Systems System Vulnerability and Abuse • Wireless security challenges • Radio frequency bands easy to scan • SSIDs (service set identifiers) • Identify access points • Broadcast multiple times • War driving • Eavesdroppers drive by buildings and try to intercept network traffic • When hacker gains access to SSID, has access to network’s resources • WEP (Wired Equivalent Privacy) • Security standard for 802.11 • Basic specification uses shared password for both users and access point • Users often fail to use security features 8.8
  • 9. Management Information Systems Chapter 8 Securing Information Systems System Vulnerability and Abuse Wi-Fi Security Challenges Figure 8-2 Many Wi-Fi networks can be penetrated easily by intruders using sniffer programs to obtain an address to access the resources of a network without authorization. 8.9
  • 10. Management Information Systems Chapter 8 Securing Information Systems System Vulnerability and Abuse The Worst Data Theft Ever? • Read the Interactive Session: Organizations and then discuss the following questions: • List and describe the security control weaknesses at TJX Companies • What management, organization, and technology factors contributed to these weaknesses? • What was the business impact of TJX’s data loss on TJX, consumers, and banks? • How effectively did TJX deal with these problems? • Who should be held liable for the losses caused by the use of fraudulent credit cards in this case? The banks issuing the cards or the consumers? Justify your answer. • What solutions would you suggest to prevent the problems? 8.10
  • 11. Management Information Systems Chapter 8 Securing Information Systems System Vulnerability and Abuse • Malicious software (malware) • Viruses: Rogue software program that attaches itself to other software programs or data files in order to be executed • Worms: Independent computer programs that copy themselves from one computer to other computers over a network • Trojan horses: Software program that appears to be benign but then does something other than expected • Spyware: Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising • Key loggers: Record every keystroke on computer to steal serial numbers, passwords, launch Internet attacks 8.11
  • 12. Management Information Systems Chapter 8 Securing Information Systems System Vulnerability and Abuse • Hackers and computer crime • Hackers vs. crackers • Activities include • System intrusion • Theft of goods and information • System damage • Cybervandalism • Intentional disruption, defacement, destruction of Web site or corporate information system 8.12
  • 13. Management Information Systems Chapter 8 Securing Information Systems System Vulnerability and Abuse • Spoofing • Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else • Redirecting Web link to address different from intended one, with site masquerading as intended destination • Sniffer: Eavesdropping program that monitors information traveling over network • Denial-of-service attacks (DoS): Flooding server with thousands of false requests to crash the network • Distributed denial-of-service attacks (DDoS): Use of numerous computers to launch a DoS • Botnets: Networks of “zombie” PCs infiltrated by bot malware 8.13
  • 14. Management Information Systems Chapter 8 Securing Information Systems System Vulnerability and Abuse • Computer crime • Defined as “any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution” • Computer may be target of crime, e.g.: • Breaching confidentiality of protected computerized data • Accessing a computer system without authority • Computer may be instrument of crime, e.g.: • Theft of trade secrets • Using e-mail for threats or harassment 8.14
  • 15. Management Information Systems Chapter 8 Securing Information Systems System Vulnerability and Abuse • Identity theft: Theft of personal Information (social security id, driver’s license or credit card numbers) to impersonate someone else • Phishing: Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data. • Evil twins: Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet • Pharming: Redirects users to a bogus Web page, even when individual types correct Web page address into his or her browser 8.15
  • 16. Management Information Systems Chapter 8 Securing Information Systems System Vulnerability and Abuse • Click fraud • Individual or computer program clicks online ad without any intention of learning more or making a purchase • Global threats - Cyberterrorism and cyberwarfare • Concern that Internet vulnerabilities and other networks make digital networks easy targets for digital attacks by terrorists, foreign intelligence services, or other groups 8.16
  • 17. Management Information Systems Chapter 8 Securing Information Systems System Vulnerability and Abuse • Internal threats – Employees • Security threats often originate inside an organization • Inside knowledge • Sloppy security procedures • User lack of knowledge • Social engineering: • Tricking employees into revealing their passwords by pretending to be legitimate members of the company in need of information 8.17
  • 18. Management Information Systems Chapter 8 Securing Information Systems System Vulnerability and Abuse • Software vulnerability • Commercial software contains flaws that create security vulnerabilities • Hidden bugs (program code defects) • Zero defects cannot be achieved because complete testing is not possible with large programs • Flaws can open networks to intruders • Patches • Vendors release small pieces of software to repair flaws • However, amount of software in use can mean exploits created faster than patches be released and implemented 8.18
  • 19. Management Information Systems Chapter 8 Securing Information Systems Business Value of Security and Control • Lack of security, control can lead to • Loss of revenue • Failed computer systems can lead to significant or total loss of business function • Lowered market value: • Information assets can have tremendous value • A security breach may cut into firm’s market value almost immediately • Legal liability • Lowered employee productivity • Higher operational costs 8.19
  • 20. Management Information Systems Chapter 8 Securing Information Systems Business Value of Security and Control • Legal and regulatory requirements for electronic records management • Firms face new legal obligations for the retention and storage of electronic records as well as for privacy protection • HIPAA: Medical security and privacy rules and procedures • Gramm-Leach-Bliley Act: Requires financial institutions to ensure the security and confidentiality of customer data • Sarbanes-Oxley Act: Imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally 8.20
  • 21. Management Information Systems Chapter 8 Securing Information Systems Business Value of Security and Control • Electronic evidence • Evidence for white collar crimes often found in digital form • Data stored on computer devices, e-mail, instant messages, e-commerce transactions • Proper control of data can save time, money when responding to legal discovery request • Computer forensics: • Scientific collection, examination, authentication, preservation, and analysis of data from computer storage media for use as evidence in court of law • Includes recovery of ambient and hidden data 8.21
  • 22. Management Information Systems Chapter 8 Securing Information Systems Establishing a Framework for Security and Control • Information systems controls • General controls • Govern design, security, and use of computer programs and data throughout organization’s IT infrastructure • Combination of hardware, software, and manual procedures to create overall control environment • Types of general controls • Software controls • Hardware controls • Computer operations controls • Data security controls • Implementation controls • Administrative controls 8.22
  • 23. Management Information Systems Chapter 8 Securing Information Systems Establishing a Framework for Security and Control • Application controls • Specific controls unique to each computerized application, such as payroll or order processing • Include both automated and manual procedures • Ensure that only authorized data are completely and accurately processed by that application • Types of application controls: • Input controls • Processing controls • Output controls 8.23
  • 24. Management Information Systems Chapter 8 Securing Information Systems Establishing a Framework for Security and Control • Risk assessment • Determines level of risk to firm if specific activity or process is not properly controlled • Types of threat • Probability of occurrence during year • Potential losses, value of threat • Expected annual loss EXPOSURE PROBABILITY LOSS RANGE (AVERAGE) EXPECTED ANNUAL LOSS Power failure 30% $5K - $200K ($102,500) $30,750 Embezzlement 5% $1K - $50K ($25,500) $1,275 User error 98% $200 - $40K ($20,100) $19,698 8.24
  • 25. Management Information Systems Chapter 8 Securing Information Systems Establishing a Framework for Security and Control • Security policy • Ranks information risks, identifies acceptable security goals, and identifies mechanisms for achieving these goals • Drives other policies • Acceptable use policy (AUP): Defines acceptable uses of firm’s information resources and computing equipment • Authorization policies: Determine differing levels of user access to information assets • Authorization management systems • Allow each user access only to those portions of system that person is permitted to enter, based on information established by set of access rules, profile 8.25
  • 26. Management Information Systems Chapter 8 Securing Information Systems Establishing a Framework for Security and Control Security Profiles for a Personnel System Figure 8-3 These two examples represent two security profiles or data security patterns that might be found in a personnel system. Depending on the security profile, a user would have certain restrictions on access to various systems, locations, or data in an organization. 8.26
  • 27. Management Information Systems Chapter 8 Securing Information Systems Establishing a Framework for Security and Control • Disaster recovery planning: Devises plans for restoration of disrupted services • Business continuity planning: Focuses on restoring business operations after disaster • Both types of plans needed to identify firm’s most critical systems and business processes • Business impact analysis to determine impact of an outage • Management must determine • Maximum time systems can be down • Which systems must be restored first 8.27
  • 28. Management Information Systems Chapter 8 Securing Information Systems Establishing a Framework for Security and Control • MIS audit • Examines firm’s overall security environment as well as controls governing individual information systems • Reviews technologies, procedures, documentation, training, and personnel • May even simulate disaster to test response of technology, IS staff, other employees • Lists and ranks all control weaknesses and estimates probability of their occurrence • Assesses financial and organizational impact of each threat 8.28
  • 29. Management Information Systems Chapter 8 Securing Information Systems Establishing a Framework for Security and Control Sample Auditor’s List of Control Weaknesses Figure 8-4 This chart is a sample page from a list of control weaknesses that an auditor might find in a loan system in a local commercial bank. This form helps auditors record and evaluate control weaknesses and shows the results of discussing those weaknesses with management, as well as any corrective actions taken by management. 8.29
  • 30. Management Information Systems Chapter 8 Securing Information Systems Technologies and Tools for Security • Access control: Policies and procedures to prevent improper access to systems by unauthorized insiders and outsiders • Authorization • Authentication • Password systems • Tokens • Smart cards • Biometric authentication 8.30
  • 31. Management Information Systems Chapter 8 Securing Information Systems Technologies and Tools for Security • Firewall: Hardware and/or software to prevent unauthorized access to private networks • Screening technologies • Packet filtering • Stateful inspection • Network address translation (NAT) • Application proxy filtering • Intrusion detection systems: Monitor vulnerable points on networks to detect and deter intruders • Examines events as they are happening to discover attacks in progress • Scans network to find patterns indicative of attacks 8.31
  • 32. Management Information Systems Chapter 8 Securing Information Systems Technologies and Tools for Security A Corporate Firewall The firewall is placed between the firm’s private network and the public Internet or another distrusted network to protect against unauthorized traffic. Figure 8-5 8.32
  • 33. Management Information Systems Chapter 8 Securing Information Systems Technologies and Tools for Security • Antivirus and antispyware software: • Checks computers for presence of malware and can often eliminate it as well • Require continual updating • Unified threat management (UTM) • Comprehensive security management products • Tools include • Firewalls • Intrusion detection • VPNs • Web content filtering • Antispam software 8.33
  • 34. Management Information Systems Chapter 8 Securing Information Systems Technologies and Tools for Security • Securing wireless networks • WEP security can be improved: • Activating it • Assigning unique name to network’s SSID • Using it with VPN technology • Wi-Fi Alliance finalized WAP2 specification, replacing WEP with stronger standards • Continually changing keys • Encrypted authentication system with central server 8.34
  • 35. Management Information Systems Chapter 8 Securing Information Systems Technologies and Tools for Security • Encryption: • Transforming text or data into cipher text that cannot be read by unintended recipients • Two methods for encrypting network traffic • Secure Sockets Layer (SSL) and successor Transport Layer Security (TLS) • Secure Hypertext Transfer Protocol (S-HTTP) • Two methods of encryption • Symmetric key encryption • Public key encryption 8.35
  • 36. Management Information Systems Chapter 8 Securing Information Systems Technologies and Tools for Security Public Key Encryption A public key encryption system can be viewed as a series of public and private keys that lock data when they are transmitted and unlock the data when they are received. The sender locates the recipient’s public key in a directory and uses it to encrypt a message. The message is sent in encrypted form over the Internet or a private network. When the encrypted message arrives, the recipient uses his or her private key to decrypt the data and read the message. Figure 7-6 8.36
  • 37. Management Information Systems Chapter 8 Securing Information Systems Technologies and Tools for Security • Digital certificate: • Data file used to establish the identity of users and electronic assets for protection of online transactions • Uses a trusted third party, certification authority (CA), to validate a user’s identity • CA verifies user’s identity, stores information in CA server, which generates encrypted digital certificate containing owner ID information and copy of owner’s public key • Public key infrastructure (PKI) • Use of public key cryptography working with certificate authority • Widely used in e-commerce 8.37
  • 38. Management Information Systems Chapter 8 Securing Information Systems Technologies and Tools for Security Digital Certificates Figure 8-7 Digital certificates help establish the identity of people or electronic assets. They protect online transactions by providing secure, encrypted, online communication. 8.38
  • 39. Management Information Systems Chapter 8 Securing Information Systems Technologies and Tools for Security • Ensuring system availability • Online transaction processing requires 100% availability, no downtime • Fault-tolerant computer systems • For continuous availability • Contain redundant hardware, software, and power supply components to provide continuous, uninterrupted service • High-availability computing • Helps recover quickly from crash • Minimizes, does not eliminate downtime 8.39
  • 40. Management Information Systems Chapter 8 Securing Information Systems Technologies and Tools for Security • Recovery-oriented computing • Designing systems that recover quickly with capabilities to help operators pinpoint and correct of faults in multi- component systems • Controlling network traffic • Deep packet inspection (DPI) • Security outsourcing • Managed security service providers (MSSPs) 8.40
  • 41. Management Information Systems Chapter 8 Securing Information Systems Technologies and Tools for Security Can Salesforce.com On-Demand Remain in Demand? • Read the Interactive Session: Technology and then discuss the following questions: • How did the problems experienced by Salesforce.com impact its business? • How did the problems impact its customers? • What steps did Salesforce.com take to solve the problems? Were these steps sufficient? • List and describe other vulnerabilities discussed in this chapter that might create outages at Salesforce.com and measures to safeguard against them. 8.41
  • 42. Management Information Systems Chapter 8 Securing Information Systems Technologies and Tools for Security • Ensuring software quality • Software Metrics: Objective assessments of system in form of quantified measurements • Number of transactions • Online response time • Payroll checks printed per hour • Known bugs per hundred lines of code • Testing: Early and regular testing • Walkthrough: Review of specification or design document by small group of qualified people • Debugging: Process by which errors are eliminated 8.42