BUSINESS DRIVEN TECHNOLOGY

Slides:



Advertisements
Similar presentations
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
Advertisements

CHAPTER OVERVIEW SECTION 4.1 – Ethics
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
BUSINESS PLUG-IN B6 Information Security.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B6 Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
4-1 Chapter Four Overview SECTION ETHICS –Ethics –Information Ethics –Developing Information Management Policies –Ethics in the Workplace SECTION.
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
CSUN Information Systems IS312 Information Systems for Business Lecture 9 Ethic & Information Security.
CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B6 Information Security.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Information Systems Design and Development Security Precautions Computing Science.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Technical Implementation: Security Risks
Securing Information Systems
Security Issues in Information Technology
Chapter 40 Internet Security.
Securing Information Systems
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Add video notes to lecture
Information Security and Malicious Programs
CHAPTER FOUR OVERVIEW SECTION ETHICS
Network Security Basics: Malware and Attacks
IT Security  .
Network security threats
Fundamentals of Information Systems
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Answer the questions to reveal the blocks and guess the picture.
Securing Information Systems
Tool Server Workstation Router Universal
Security in Networking
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
INFORMATION SYSTEMS SECURITY and CONTROL
Faculty of Science IT Department By Raz Dara MA.
– Communication Technology in a Changing World
CHAPTER FOUR OVERVIEW SECTION ETHICS
Securing Windows 7 Lesson 10.
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Chapter # 3 COMPUTER AND INTERNET CRIME
Chapter Goals Discuss the CIA triad
Network Security Mark Creighton GBA 576 6/4/2019.
Protection Mechanisms in Security Management
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

BUSINESS DRIVEN TECHNOLOGY Business Plug-In B1 Information Security

LEARNING OUTCOMES Describe the relationship between information security policies and an information security plan Summarize the five steps to creating an information security plan Provide an example of each of the three primary security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response Describe the relationships and differences between hackers and viruses

INTRODUCTION Information security – a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization This plug-in discusses how organizations can implement information security lines of defense through people first and technology second

The First Line of Defense - People Organizations must enable employees, customers, and partners to access information electronically The biggest issue surrounding information security is not a technical issue, but a people issue 33% of security incidents originate within the organization Insiders – legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident

The First Line of Defense - People The first line of defense an organization should follow to help combat insider issues is to develop information security policies and an information security plan Information security policies – identify the rules required to maintain information security Information security plan – details how an organization will implement the information security policies

The First Line of Defense - People Five steps to creating an information security plan: Develop the information security policies Communicate the information security policies Identify critical information assets and risks Firewall – hardware and/or software that guards a private network by analyzing the information leaving and entering the network Intrusion detection software (IDS) – searches out patterns in network traffic to indicate attacks and quickly respond to prevent harm Test and reevaluate risks Obtain stakeholder support

The First Line of Defense - People Hackers frequently use “social engineering” to obtain password Social engineering – using one’s social skills to trick people into revealing access credentials or other information valuable to the attacker

The First Line of Defense - People

The Second Line of Defense - Technology Three primary information security areas: Authentication and authorization Prevention and resistance Detection and response

AUTHENTICATION AND AUTHORIZATION Authentication – a method for confirming users’ identities The most secure type of authentication involves a combination of the following: Something the user knows such as a user ID and password Something the user has such as a smart card or token Something that is part of the user such as a fingerprint or voice signature

Something the User Knows such as a User ID and Password This is the most common way to identify individual users and typically contains a user ID and a password This is also the most ineffective form of authentication Over 50 percent of help-desk calls are password related

Something the User Knows such as a User ID and Password

Something the User Has such as a Smart Card or Token Smart cards and tokens are more effective than a user ID and a password Tokens – small electronic devices that change user passwords automatically Smart card – a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing

Unfortunately, this method can be costly and intrusive Something That Is Part of the User such as a Fingerprint or Voice Signature This is by far the best and most effective way to manage authentication Biometrics – the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting Unfortunately, this method can be costly and intrusive

PREVENTION AND RESISTANCE Downtime can cost an organization anywhere from $100 to $1 million per hour Technologies available to help prevent and build resistance to attacks include: Content filtering Encryption Firewalls

Content Filtering Organizations can use content filtering technologies to filter e-mail and prevent e-mails containing sensitive information from transmitting and stop spam and viruses from spreading. Content filtering – occurs when organizations use software that filters content to prevent the transmission of unauthorized information Spam – a form of unsolicited e-mail

ENCRYPTION If there is an information security breach and the information was encrypted, the person stealing the information would be unable to read it Encryption – scrambles information into an alternative form that requires a key or password to decrypt the information

FIREWALLS One of the most common defenses for preventing a security breach is a firewall Firewall – hardware and/or software that guards a private network by analyzing the information leaving and entering the network

FIREWALLS Sample firewall architecture connecting systems located in Chicago, New York, and Boston

DETECTION AND RESPONSE If prevention and resistance strategies fail and there is a security breach, an organization can use detection and response technologies to mitigate the damage Antivirus software is the most common type of detection and response technology

DETECTION AND RESPONSE Some of the most damaging forms of security threats to e-business sites include: Malicious code – includes a variety of threats such as viruses, worms, and Trojan horses Hoaxes – attack computer systems by transmitting a virus hoax, with a real virus attached Spoofing – the forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender Sniffer – a program or device that can monitor data traveling over a network

DETECTION AND RESPONSE Hackers

DETECTION AND RESPONSE Viruses

Closing Case One Thinking Like the Enemy The Intense School offers several security courses, including the five-day “Professional Hacking Boot Camp” and “Social Engineering in Two Days” Main philosophy of the Intense School is “To Know Thy Enemy” The school is taught by several notorious hackers

Closing Case One Questions Describe how an organization can benefit from attending one of the courses offered at the Intense School Explain the two primary lines of security defense and how organizational employees can use the information taught by the Intense School when drafting an information security plan Determine the difference between the two primary courses offered at the Intense school, “Professional Hacking Boot Camp” and “Social Engineering in Two Days.” Explain which course is more important for organizational employees to attend

Closing Case Two Homeland Security The issue of homeland security is more paramount today than ever before, for all nations around the world Government agencies and corporations today are making tremendous strides in working together to deploy systems to help build strong homeland security

Closing Case Two Questions Determine a few of the information security policies that might be implemented along with Gresham’s new Firehouse system Identify how an information security plan can help the Newport Beach Police Department’s vehicle location system be more successful How can the Texas Health Network use prevention and resistance technologies to assist in preventing a crisis?

Closing Case Two Questions Explain how Orange County California’s Emergency Operations Center (EOC) might use authentication and authorization technologies to ensure the center’s information security Research and identify an area of homeland security, not discussed in this case, that uses detection and response technologies to assist in protecting intellectual capital