Presentation is loading. Please wait.

Presentation is loading. Please wait.

ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.

Similar presentations


Presentation on theme: "ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan."— Presentation transcript:

1 ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan

2 LEARNING OBJECTIVES Why are information systems vulnerable to destruction, error, and abuse? What is the business value of security and control? What are the components of an organizational framework for security and control? What are the most important tools and technologies for safeguarding information resources?

3 SYSTEM VULNERABILITY & ABUSE Security: – Policies, procedures and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems Controls: – Methods, policies, and organizational procedures that ensure safety of organization’s assets; accuracy and reliability of its accounting records; and operational adherence to management standards

4 SYSTEM VULNERABILITY & ABUSE Why systems are vulnerable? Vulnerable – weaknesses in information systems, policies and procedures Electronic data vulnerable to more types of threats than manual data Vulnerable exists at each layer and between layers and creates risk Examples : user error, viruses, hackers, radiation, disaster, hardware or software failure, theft

5 SYSTEM VULNERABILITY & ABUSE Malicious Software (Malware) Many of the vulnerabilities that exist today are related to the advancement of technology Software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems It can appear in the form of code, scripts, active content, and other software

6 SYSTEM VULNERABILITY & ABUSE Malware includes :- – Virus Rogue software program that attaches itself to other software programs or data files in order to be executed – Worms Independent computer programs that copy themselves from one computer to other computers over a network. – Trojan horse Software program that appears to be benign but then does something other than expected.

7 SYSTEM VULNERABILITY & ABUSE – SQL injection attacks Hackers submit data to Web forms that exploits site’s unprotected software and sends rogue SQL query to database – Spyware Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising – Key loggers Record every keystroke on computer to steal serial numbers, passwords, launch Internet attacks

8 SYSTEM VULNERABILITY & ABUSE Hackers and Computer Crime Hacker is someone who seeks and exploits weaknesses in a computer system or computer network Hacker activities :  Cyber vandalism - Intentional disruption, defacement, destruction of Web site or corporate information system  Spoofing - misrepresenting oneself by using fake e- mail addresses or masquerading as someone else  Sniffing – spy program that monitors information traveling over network  Denial of service attacks - flooding server with thousands of false requests to crash the network

9 SYSTEM VULNERABILITY & ABUSE Computer Crime Computer crime or cybercrime refers to any crime that involves a computer and a network The computer may have been used in the commission of a crime, or it may be the target Activities such as :-  Identity theft - Theft of personal Information (social security id, driver’s license or credit card numbers) to impersonate someone else  Phishing - Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data.  Fraud - Occurs when individual or computer program fraudulently clicks on online ad without any intention of learning more about the advertiser or making a purchase  Global threats : cyber terrorism and cyber warfare

10 BUSINESS VALUE OF SECURITY & CONTROL Why need to secure ?  ensure the information remains confidential  make sure the information is available when needed  protect from the unauthorized access or modification

11 BUSINESS VALUE OF SECURITY & CONTROL Electronic Records Management (ERM) Policies, procedures, and tools for managing retention, destruction, and storage of electronic records Legal and regulatory requirements for ERM HIPAA Outlines medical security and privacy rules and procedures Gramm-Leach-Bliley Act Requires financial institutions to ensure security and confidentiality of customer data Sarbanes-Oxley Act Imposes responsibility on companies and their management to safeguard accuracy and integrity of financial information used internally and released externally

12 BUSINESS VALUE OF SECURITY & CONTROL Electronic evidence Legal cases today increasingly rely on evidence represented as digital data E-mail most common electronic evidence Courts impose severe financial, even criminal penalties for improper destruction of electronic documents, failure to produce records, and failure to store records properly

13 BUSINESS VALUE OF SECURITY & CONTROL Computer forensics Scientific collection, examination, authentication, preservation, and analysis of data on computer storage media so that it can be used as evidence in a court Awareness of computer forensics should be incorporated into firm’s contingency planning process

14 ESTABLISHING FRAMEWORK Information systems controls  General controls – software, physical hardware, computer operations, data security, administrative  Application controls – include automated and manual procedures Risk assessment - determines level of risk to firm if specific activity or process is not properly controlled Security policy - statements ranking information risks, identifying acceptable security goals, and identifying mechanisms for achieving these goals

15 ESTABLISHING FRAMEWORK Disaster recovery planning - Restoring computing and communication services after earthquake, flood, etc. Business continuity planning - Focuses on restoring business operations after disaster

16 ESTABLISHING FRAMEWORK Auditing MIS audit: Examines firm’s overall security environment as well as controls governing individual information systems Security audit: Reviews technologies, procedures, documentation, training, and personnel Audits: List and rank all control weaknesses Estimate probability of occurrence Assess financial and organizational impact of each threat

17 TECHNOLOGIES AND TOOLS Identity management and authentication Access control Policies and procedures used to prevent improper access to systems by unauthorized insiders and outsiders Users must be authorized and authenticated Authentication Typically established by password systems New authentication technologies Tokens Smart cards Biometric authentication

18 TECHNOLOGIES AND TOOLS Firewalls, and antivirus software Combination of hardware and software controlling flow of incoming and outgoing network traffic Prevents unauthorized access Screening technologies Packet filtering Stateful inspection Network address translation (NAT) Application proxy filtering

19 TECHNOLOGIES AND TOOLS A CORPORATE FIREWALL The firewall is placed between the firm’s private network and the public Internet or another distrusted network to protect against unauthorized traffic.

20 TECHNOLOGIES AND TOOLS Intrusion detection systems Full-time, real-time monitoring tools Placed at most vulnerable points of corporate networks to detect and deter intruders Scanning software looks for patterns such as bad passwords, removal of important files, and notifies administrators

21 TECHNOLOGIES AND TOOLS Antivirus and antispyware systems Antivirus software: Checks computer systems and drives for presence of computer viruses To remain effective, antivirus software must be continually updated Antispyware software tools: Many leading antivirus software vendors include protection against spyware Standalone tools available (Ad-Aware, Spybot)

22 TECHNOLOGIES AND TOOLS Securing wireless networks WEP: Provides some measure of security if activated VPN technology: Can be used by corporations to help security 802.11i specification: Tightens security for wireless LANs

23 TECHNOLOGIES AND TOOLS Encryption Transforming message into cipher text, using encryption key Receiver must decrypt encoded message Two methods of encryption : Secure Sockets Layer (SSL) and Secure Hypertext Transfer Protocol (S- HTTP)

24 TECHNOLOGIES AND TOOLS Public Key Infrastructure Two keys, one shared/public and one private Messages encrypted with recipient’s public key but can only be decoded with recipient’s private key

25 TECHNOLOGIES AND TOOLS Digital certificate: – Data file used to establish the identity of users and electronic assets for protection of online transactions – Uses a trusted third party, certification authority (CA), to validate a user’s identity – CA verifies user’s identity, stores information in CA server, which generates encrypted digital certificate containing owner ID information and copy of owner’s public key

26 TECHNOLOGIES AND TOOLS DIGITAL CERTIFICATES Digital certificates help establish the identity of people or electronic assets. They protect online transactions by providing secure, encrypted, online communication.

27 THANK YOU


Download ppt "ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan."

Similar presentations


Ads by Google