Presentation is loading. Please wait.

Presentation is loading. Please wait.

Anderson School of Management University of New Mexico.

Similar presentations


Presentation on theme: "Anderson School of Management University of New Mexico."— Presentation transcript:

1 Anderson School of Management University of New Mexico

2 Trade offs in information security. Finding the balance between efficiency and effectiveness.

3 Introduction What is information security? Why is information security important today? Does information security only apply to organizations? The history and evolution of information security.

4 History WWII – need for communication code breaking 1960’s – ARPANET program developed 1970’s & 80’s – development of MUTLICS and the microprocessor 1990’s – Rise of the internet 2000 to Present – the internet now dominates every aspect of daily life

5 What is Information Security? Information security is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction. Information security is the ongoing process of defending and maintaining our information system as individuals and organizations.

6 What is Information Security? Information security ensures: Integrity Availability Accessibility Utility Confidentiality

7 Information System Hardware – routers, computers, servers, etc Software – programs & operating system Network – LAN, WAN, Internet, etc Data – stored, processed, communicated People Policy and procedures

8 What are we defending our information system from? Threats and Attacks!! Deliberate software attacks –Malicious code, viruses, worms, Trojan horses, etc Deviations in quality of service – denial of service attack, Trespassing/Espionage - hackers Forces of Nature – fire, flood, or any natural disaster Human error/sabotage/vandalism

9 Target Data Breach Up to 70 million individuals personal information was stolen Names, address, phone numbers, credit card numbers Malicious software on system Extended credit monitoring and identity theft protection to all guests

10 NSA Data Breach Snowden accessed unauthorized data Released confidential information Internal breach – lack of policy and procedures, maybe poor oversight

11 Anonymous Hacking Group Attacks governments, businesses, non profits and anybody on their agenda Denial service attacks Stolen data Lost revenues, reputation implications, service disruption, national security etc

12 Recent Threat and Attack Against APD By Anonymous Hacktivist group Anonymous had stated that they were going to attack APD’s online presence. Denial of Service Attack (shutting down their site for a few hours) Planned it for Sunday night (the least busy night)

13 Stole data, high ranking APD official’s home addresses and released to public Incited protestors to take to the streets

14

15 Small Scale Attack

16

17 Survey Results Many had learned something about information security Most realize the importance of keeping passwords secure Many realize that there are online predators looking to get information and are good about not giving it out.

18 Speed VS Security

19 Network only as strong as its weakest link

20 Password Security

21 How are these machines used by Police in the field

22 BCSO Bernalillo County Sherriff's Office –What systems are they using? –What security measures are in place? –Are they achieving their information security goals? –What do users think of the measures? –Can they do something different?

23 Deputies are Dispatched to calls through these machines The internal GPS relays their coordinates to dispatchers as well as giving them directions to calls Run plates through governmental sites Looking up individuals to see if they have outstanding warrants Write reports

24 What Security is in place Saved passwords to log onto a machine Verizon air card placed in a secure tunnel Dual authentication key generator Secure Virtual Private Network (VPN) Login to separate applications using other passwords Automatic logout times

25 Drawbacks Login time (3-5 min) The amount of passwords With so many passwords, some can be forgotten Long login process can lead to accidentally messing up in process and locking the user out Frustrated users

26 Thoughts? What do you think? Is it too much security, not enough?

27 Security Need Ability to see location of deputies and other first responders in live time Ability to access entire country’s network Mobility of laptop increases threat of unauthorized access due to theft or loss State and Federal guidelines require minimum security standards

28 Achieving the balance It is the job of everyone involved in information security to determine the trade offs Weigh the pros and cons and evaluate the importance of each The users and the system need to be evaluated together, to ensure that thorough analysis occurs. Should not evaluate separately.

29 Large Scale Attack

30

31 Pop Quiz (5 Questions)


Download ppt "Anderson School of Management University of New Mexico."

Similar presentations


Ads by Google