INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.

Slides:



Advertisements
Similar presentations
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Advertisements

E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
CHAPTER OVERVIEW SECTION 4.1 – Ethics
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 9: Privacy, Crime, and Security
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
BUSINESS PLUG-IN B6 Information Security.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B6 Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS
Security+ Guide to Network Security Fundamentals
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
4-1 Chapter Four Overview SECTION ETHICS –Ethics –Information Ethics –Developing Information Management Policies –Ethics in the Workplace SECTION.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
CSUN Information Systems IS312 Information Systems for Business Lecture 9 Ethic & Information Security.
CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Securing Information Systems
Protecting People and Information: Threats and Safeguards
Computer Crime and Information Technology Security
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B6 Information Security.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Topic 5: Basic Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Introduction to Security Dr. John P. Abraham Professor UTPA.
Security and Ethics Safeguards and Codes of Conduct.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Computer threats, Attacks and Assets upasana pandit T.E comp.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Information Systems Design and Development Security Precautions Computing Science.
Technical Implementation: Security Risks
Information Systems Security
Securing Information Systems
BUSINESS DRIVEN TECHNOLOGY
Add video notes to lecture
CHAPTER FOUR OVERVIEW SECTION ETHICS
Fundamentals of Information Systems
CHAPTER 4 Information Security.
Teaching Computing to GCSE
Security in Networking
Sarbanes-Oxley: Where Information Technology, Finance, and Ethics Meet
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
County HIPAA Review All Rights Reserved 2002.
INFORMATION SYSTEMS SECURITY and CONTROL
Faculty of Science IT Department By Raz Dara MA.
– Communication Technology in a Changing World
CHAPTER FOUR OVERVIEW SECTION ETHICS
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Chapter Goals Discuss the CIA triad
Network Security Mark Creighton GBA 576 6/4/2019.
Presentation transcript:

INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer Fundamentals and Programming I

Protecting Intellectual Assets Organizational information is intellectual capital and must be protected Health Insurance Portability Act (HIPA) is one example of information security in action

People are the first line of defense Insiders account for 33% of security incidents in an organization Information security policies – identify the rules required to maintain information security Information security plan – details how an organization will implement the information security policies.

Steps for creating an Information Security Plan Develop the information security policies Designate responsibility and accountability to individual to follow the security plans 2. Communicate the information security policies Training employees to follow security policies and communicate consequences for not following those policies.

Steps for creating an Information Security Plan 3. Identify critical information assets and risks Require user IDs, passwords and anti-virus software. Implement firewalls and Intrusion Detection Software. 4. Test and reevaluate risks Continually perform security reviews, audits, background checks, and security assessments.

Steps for creating an Information Security Plan Obtain Stakeholder support Gain the approval and support of the board of directors and stakeholders concerning the security

Second line of Defense-Technology Authentication and Authorization Prevention and Resistance Detection and Response

Authentication and Authorization Authentication – method for confirming users identities Authorization – process of giving someone permission to do or have something

Authentication and Authorization Something the user knows – user IDs and passwords. Identity theft – forging of someone’s identity for the purpose of fraud. Phishing – an online form of identity theft, commonly through e-mail. B. Something the user has – Smart Card – a device the size of a credit card that can store small amount of information. Tokens – small electronic devices that change user passwords automatically.

Authentication and Authorization C. Something that is part of the user – fingerprint or voice signature 1. Biometrics – the identification of a user based on a physical characteristics, such as finger print, iris, face, voice or handwriting.

Prevention and Resistance Content filtering – occurs when software is used that filters content to prevent the transmission of unauthorized information. Encryption – scrambles information into an alternative form that requires a key or password to decrypt the information. Firewall – hardware and/or software that guards a private network by analyzing the information leaving and entering the network.

Detection and Response If prevention and resistance strategies fail an organization can use detection and response technologies to minimize and correct any damage. The most common being anti virus software, software that scans the system for potential threats to that system.

Detection and Response Hacker – people very knowledgeable about computers who use their knowledge to invade other people’s computers. White-hat hacker Black-hat hacker Hactivists Script kiddies or Script bunnies Cracker Cyberterrorists

Detection and Response Virus – software written with malicious intent to cause annoyance or damage. Worm Denial-of-service Attack (DoS) Distributed Denial-of-service Attack (DDoS) Trojan horse virus Backdoor program Polymorphic virus and worm

END