Information Security Management

Slides:



Advertisements
Similar presentations
1
Advertisements

Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
Myra Shields Training Manager Introduction to OvidSP.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Create an Application Title 1A - Adult Chapter 3.
Process a Customer Chapter 2. Process a Customer 2-2 Objectives Understand what defines a Customer Learn how to check for an existing Customer Learn how.
Custom Statutory Programs Chapter 3. Customary Statutory Programs and Titles 3-2 Objectives Add Local Statutory Programs Create Customer Application For.
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
1 Social / Ethics NCDesk Societal and Ethical Issues.
Chapter 8 Copyright © 2014 Pearson Education, Inc.Chapter Writing Negative Messages.
© SafeNet Confidential and Proprietary Administering SafeNet StorageSecure Smart Card Module 3: Lesson 5 SafeNet StorageSecure Storage Security Course.
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
PP Test Review Sections 6-1 to 6-6
Bright Futures Guidelines Priorities and Screening Tables
Information Systems Development
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
IPM THEORY CHALLENGE QUIZ NUMBER 3 Unit 3 Outcome 3.
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Let’s Talk About Cyber Security
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Synthetic.
Development Processes
Analyzing Genes and Genomes
Speak Up for Safety Dr. Susan Strauss Harassment & Bullying Consultant November 9, 2012.
Information Security Management by David Kroenke
Chapter 12 Working with Forms Principles of Web Design, 4 th Edition.
Essential Cell Biology
Information Security Management Chapter “We Have to Design It for Privacy and Security.” Copyright © 2014 Pearson Education, Inc. Publishing.
Information Security Management Chapter “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.
PSSA Preparation.
Essential Cell Biology
Immunobiology: The Immune System in Health & Disease Sixth Edition
Energy Generation in Mitochondria and Chlorplasts
Lesson 30 Computer Safety and Ethics
User Security for e-Post Applications Dr Chandana Gamage University of Moratuwa.
Information Systems Management Chapter “I Don’t Know Anything About Doing Business in India.” Copyright © 2015 Pearson Education, Inc. PRIDE.
Information Security Management Chapter “We Have to Design It for Privacy and Security. ” Tension between Maggie and Ajit regarding terminology.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Information Security Management
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 12 Information Security Management © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter 12 Information Security Management.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter 12 Information Security Management.
Information Security Management Chapter “But How Do You Implement That Security?” Copyright © 2016 Pearson Education, Inc. Video conference with.
IT security By Tilly Gerlack.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Information Security Management
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Cybercrime What is it, what does it cost, & how is it regulated?
Privacy, Security and Ethics
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Instructor Materials Chapter 7 Network Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Information Systems Management
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Presentation transcript:

Information Security Management Chapter 12 Information Security Management

“We Have to Design It for Privacy ... and Security.” Tension between Maggie and Ajit regarding terminology to use with Dr. Flores. Overly technical communication is a common problem for techies when talking with business professionals. Maggie and Ajit discuss security design later. GOALS Illustrate the meaning of design for privacy and security. Illustrate the use for knowledge of cardinality. Set up a class discussion about how much technical language to use in management/ IS professional meetings. Using the N:M relationship: Let’s go back to Chapter 5. What is an N:M relationship? Give me several examples of N:M relationship in business. How is an N:M relationship represented in a database? Explain why the relationship between patients and doctors is N:M. Using Figure 7-18, How is that relationship represented in the PRIDE database? Copyright © 2015 Pearson Education, Inc.

PRIDE Design for Security M:N tables with Person as intersecting security table. Copyright © 2015 Pearson Education, Inc.

Copyright © 2015 Pearson Education, Inc. Study Questions Q1: What is the goal of information systems security? Q2: How big is the computer security problem? Q3: How should you respond to security threats? Q4: How should organizations respond to security threats? Q5: How can technical safeguards protect against security threats? Q6: How can data safeguards protect against security threats? Q7: How can human safeguards protect against security threats? Q8: How should organizations respond to security incidents? Q9: 2024? This chapter provides an overview of the major components of information systems security. Copyright © 2015 Pearson Education, Inc.

Q1: What Is the Goal of Information Systems Security? Threat/Loss Scenario: Major elements of IS security Threat – person or organization seeks to obtain data or other assets illegally, without owner’s permission and often without owner’s knowledge. Vulnerability – opportunity for threats to gain access to individual or organizational assets; for example, when you buy online, you provide your credit card data, and as data is transmitted over Internet, it is vulnerable to threats. Safeguard – measures individuals or organizations take to block threat from obtaining an asset; not always effective as some threats achieve their goal in spite of safeguards. Target – asset desired by threat. Copyright © 2015 Pearson Education, Inc.

Examples of Threat/ Loss Copyright © 2015 Pearson Education, Inc.

What Are the Sources of Threats? Sources of security threats: Human error examples: (1) employee misunderstands operating procedures and accidentally deletes customer records; (2) employee inadvertently installs an old database on top of current one while doing backing up; (3) physical accidents, such as driving a forklift through the wall of a computer room. Computer crime – intentional destruction or theft of data or other system components. Natural disasters – fires, floods, hurricanes, earthquakes, tsunamis, avalanches, other acts of nature; includes initial loss of capability and service, and losses caused due to recovery costs. Copyright © 2015 Pearson Education, Inc.

What Types of Security Loss Exists? Unauthorized Data Disclosure Drive-by sniffers Pretexting Hacking Phishing Natural disasters Spoofing IP spoofing Email spoofing These are common threats associated with unauthorized data disclosure. Copyright © 2015 Pearson Education, Inc.

Incorrect Data Modification Procedures incorrectly designed or not followed. Increasing a customer’s discount or incorrectly modifying employee’s salary. Placing incorrect data on company the Web site. Improper internal controls on systems. System errors. Faulty recovery actions after a disaster. Copyright © 2015 Pearson Education, Inc.

Copyright © 2015 Pearson Education, Inc. Faulty Service Incorrect data modification Usurpation Systems working incorrectly Denial of service (unintentional) Procedural mistakes Denial-of-service attacks (intentional) Programming errors IT installation errors Faulty service – problems caused by incorrect system operation include: Usurpation – occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones that shut down legitimate application and substitute their own processing to spy, steal and manipulate data, or for other purposes. Denial of service – humans inadvertently shut down a Web server or corporate gateway router by starting a computationally intensive application. Denial-of-service attacks – (1) malicious hacker intentionally floods a Web server with millions of bogus service requests; (2) user unintentionally shuts down Web server or corporate gateway router by starting computationally intensive application. Copyright © 2015 Pearson Education, Inc.

Loss of Infrastructure Human accidents. Theft and terrorist events. Disgruntled or terminated employee. Natural disasters. Advanced Persistent Threat (APT) Sophisticated, possibly long-running computer hack perpetrated by large, well-funded organizations. Examples – bulldozer cutting a conduit of fiber-optic cables or floor buffer crashing into a rack of Web servers. APT – sophisticated, possibly long-running, computer hack perpetrated by large, well funded organizations like governments. Cyberwarfare examples – Stuxnet and Flame. Stuxnet reputed to have been used to set back Iranian nuclear program by causing Iranian centrifuges to malfunction. Flame is a large and complex computer program reputed to have hacked into computers and operate as a cyber spy, capturing screen images, email and text messages, and searching nearby smartphones using Bluetooth communication. Copyright © 2015 Pearson Education, Inc.

Goal of Information Systems Security Find an appropriate trade-off between the risk of loss and the cost of implementing safeguards. Use a good antivirus software. Delete browser cookies. Get in front of the security problem by making appropriate trade-offs for your life and your business. Copyright © 2015 Pearson Education, Inc.

Q2: How Big Is the Computer Security Problem? Computer Crime Costs per Organizational Respondent Figure 12-5, from Ponemon study, shows average cost and percent of total incidents of the five most expensive types of attack. Copyright © 2015 Pearson Education, Inc.

Copyright © 2015 Pearson Education, Inc. Average Computer Crime Cost and Percent of Attacks by Type (5 Most Expensive Types) Copyright © 2015 Pearson Education, Inc.

Ponemon Study Findings (2012) It is difficult to estimate the exact cost of a computer crime. Cost of computer crime is usually based on surveys. Data loss is the single most expensive consequence of computer crime, accounting for 44% of costs in 2012. 80% of respondents believe data on mobile devices poses significant risks. Warn students that many computer crime studies are based on dubious sampling techniques, and some seem to be written to promote a particular safeguard product or point of view. Copyright © 2015 Pearson Education, Inc.

Ponemon 2012 Studies Summary Median cost of computer crime increasing. Malicious insiders increasingly serious security threat. Data loss is principal cost of computer crime. Survey respondents believe mobile device data a significant security threat. Security safeguards work Copyright © 2015 Pearson Education, Inc.

Q3: How Should You Respond to Security Threats? Personal Security Safeguards Copyright © 2015 Pearson Education, Inc.

Copyright © 2015 Pearson Education, Inc. Using MIS InClass Exercise 12: Phishing for Credit Cards, Identifying Numbers, Bank Accounts Assume, you and a group of other students will investigate phishing attacks. Search the Web for phishing, beware that your search may bring the attention of an active phisher. Do not give any data to any site you visit as part of this exercise! Goal: To learn the fundamentals of phishing. To learn some precautionary measures you can take in an attempt to reduce the potential of being conned by phishing scams. Lessons Never click on hyperlinks within email messages Use anti-spam filter software Use anti-virus software Use a personal firewall Keep software updated (especially operating systems and browsers) Copyright © 2015 Pearson Education, Inc.

Q4: How Should Organizations Respond to Security Threats? Security safeguards as they relate to the five components. Copyright © 2015 Pearson Education, Inc.

Security Policy Should Stipulate What sensitive data the organization will store. How it will process that data. Whether data will be shared with other organizations. How employees and others can obtain copies of data stored about them. How employees and others can request changes to inaccurate data. What employees can do with their own mobile devices at work As a new hire, seek out your employer’s security policy. Specific policy depends on whether organization is governmental or nongovernmental, on whether it is publically held or private, on the organization’s industry, on the relationship of management to employees, and on other factors. Copyright © 2015 Pearson Education, Inc.

Ethics Guide: Securing Privacy “The best way to solve a problem is not to have it.” Resist providing sensitive data. Don’t collect data you don’t need. Gramm-Leach-Bliley (GLB) Act, 1999 Privacy Act of 1974 Health Insurance Portability and Accountability Act (HIPAA), 1996 Australian Privacy Act of 1988 Government, healthcare data, records maintained by businesses with revenues in excess of AU$3 million. GOALS Understand the legal requirements, ethical considerations, and business consequences of data acquisition, storage, and dissemination. Use the knowledge of this class to demonstrate two possible ways that data could be stolen at a coffee shop. Help students formulate personal principles with regard to data acquisition, storage, and dissemination. Copyright © 2015 Pearson Education, Inc.

Ethics Guide: Securing Privacy: Wrap Up As a business professional, you have the responsibility to consider legality, ethics, and wisdom when you request, store, or disseminate data. Think carefully about emails that you open over public wireless networks. Use long and strong passwords. Copyright © 2015 Pearson Education, Inc.

Q5: How Can Technical Safeguards Protect Against Security Threats? Technical safeguards involve the hardware and software components of an information system. Single Sign-on for Multiple Systems Copyright © 2015 Pearson Education, Inc.

Essence of https (SSL or TLS) Summary of how SSL/TLS works when you communicate securely with a Web site: 1. Your computer obtains public key of the Web site to which it will connect. 2. Your computer generates a key for symmetric encryption. 3. Your computer encodes key using Web site’s public key, then sends encrypted symmetric key to Web site. 4. Web site decodes symmetric key using its private key. 5. Now, your computer and Web site communicate using symmetric encryption. Note: With asymmetric encryption, two keys are used; one key encodes the message, and the other key decodes the message. Symmetric encryption is simpler and much faster than asymmetric encryption. Copyright © 2015 Pearson Education, Inc.

Use of Multiple Firewalls Organizations normally use multiple firewalls. Perimeter firewall sits outside organizational network; is first device that Internet traffic encounters. Packet-filtering firewall examines each part of a message and determines whether to let that part pass. To make this decision, it examines source address, destination address(es), and other data. Packet-filtering firewalls can prohibit outsiders from starting a session with any user behind firewall, prohibit traffic from legitimate, but unwanted, addresses, such as competitors’ computers, and filter outbound traffic. Copyright © 2015 Pearson Education, Inc.

Copyright © 2015 Pearson Education, Inc. Malware Protection Antivirus and antispyware programs. Scan frequently. Update malware definitions. Open email attachments only from known sources. Install software updates. Browse only reputable Internet neighborhoods. Copyright © 2015 Pearson Education, Inc.

Malware Types and Spyware and Adware Symptoms Viruses Payload Trojan horses Worms Beacons Payload is a program code that causes unwanted activity. It can delete programs or data, or modify data in undetected ways. Beacons are tiny files that gather demographic information, use a single code to identify users by age, gender, location, likely income, and online activity. A beacon code can contain your favorite movies, whether you read online news, your shopping habits, your online dating habits, and what type of research you conduct on your computer. Copyright © 2015 Pearson Education, Inc.

Design for Secure Applications SQL injection attack User enters SQL statement into a form instead of a name or other data. Accepted code becomes part of database commands issued. Improper data disclosure, data damage, and loss possible. Well designed applications make injections ineffective. Ajit and Maggie are designing PRIDE with security in mind. Copyright © 2015 Pearson Education, Inc.

Q6: How Can Data Safeguards Protect Against Security Threats? When organizations store databases in the cloud, all of the safeguards should be part of the service contract. Trusted party should have a copy of encryption key - called key escrow. Copyright © 2015 Pearson Education, Inc.

Q7: How Can Human Safeguards Protect Against Security Threats? Development of human safeguards for employees. Copyright © 2015 Pearson Education, Inc.

Q7: How Can Human Safeguards Protect Against Security Threats? Development of human safeguards for employees. Copyright © 2015 Pearson Education, Inc.

Account Administration Account Management Standards for new user accounts, modification of account permissions, and removal of accounts that are not needed. Password Management Users should change passwords frequently. Help Desk Policies Account management Create new user accounts, modify existing account permissions, remove accounts that are not needed. Improve your relationship with IS personnel by providing early and timely notification of needed account changes. Password management Users should change passwords every 3 months or less. Help desk management Set policy for means of authenticating a user. Copyright © 2015 Pearson Education, Inc.

Sample Account Acknowledgment Form Employees required to sign statements similar to this. Copyright © 2015 Pearson Education, Inc.

Copyright © 2015 Pearson Education, Inc. Systems Procedures Definition and use of standardized procedures reduces likelihood of computer crime and other malicious activity by insiders. It also ensures system’s security policy is enforced. Copyright © 2015 Pearson Education, Inc.

Q8: How Should Organizations Respond to Security Incidents? Copyright © 2015 Pearson Education, Inc.

Copyright © 2015 Pearson Education, Inc. Security Wrap Up Be aware of threats to computer security as an individual, business professional, or an employee. Know trade-offs of loss risks and the cost of safeguards. Ways to protect your computing devices and data. Understand technical, data, and human safeguards. Understand how organizations should respond to security incidents. Helps you by making you aware of the threats to computer security both for you as an individual, business professional, and any organization in which you work. Copyright © 2015 Pearson Education, Inc.

Copyright © 2015 Pearson Education, Inc. Q9: 2024 APTs more common, inflicting serious damage Continued concern about balance of national security and data privacy. Computer crimes targeting mobile devices leads to improved operating systems security. Improved security procedures and employee training. Criminals focus on less protected mid-sized and smaller organizations, and individuals. Electronic lawlessness by organized gangs. Strong local “electronic” sheriffs electronic border and enforce existing laws? Copyright © 2015 Pearson Education, Inc.

Copyright © 2015 Pearson Education, Inc. Guide: Metasecurity What are the security problems? What are the managers’ responsibilities for controls over the security system? All major software vendors are obvious targets for security attacks against their networks. What do these companies do to prevent this? What extra precautions can you take when you hire and manage employees such as white-hat hackers? GOALS Sensitize students to problems of securing security. Emphasize the importance of managers’ responsibilities for controls over the security system. WRAP UP As a manager, you may have control responsibilities for the security system. If so, take those responsibilities seriously. Securing security is a challenging, interesting, difficult, and important problem. It could make a great career! Copyright © 2015 Pearson Education, Inc.

Guide: The Final, Final Word Routine work will migrate to countries with lower labor costs. Be a symbolic-analytic worker Abstract thinking How to experiment Systems thinking Collaboration The best is yet to come! What you do with it is up to you. GOAL Inspire students to use their learning from this class to find, create, and manage innovative applications of information systems and technology. Copyright © 2015 Pearson Education, Inc.

Copyright © 2015 Pearson Education, Inc. Active Review Q1: What is the goal of information systems security? Q2: How big is the computer security problem? Q3: How should you respond to security threats? Q4: How should organizations respond to security threats? Q5: How can technical safeguards protect against security threats? Q6: How can data safeguards protect against security threats? Q7: How can human safeguards protect against security threats? Q8: How should organizations respond to security incidents? Q9: 2024 Copyright © 2015 Pearson Education, Inc.

Case 12: Will You Trust FIDO? One-third of all people record passwords somewhere, whether on a sticky note or in a computer file. Malicious code searches for files that include "password" or some variant. Many web sites offer to authenticate you using your Facebook or other common credentials. Use credentials only at site where created. Copyright © 2015 Pearson Education, Inc.

Alternatives to Passwords Biometric: Fingerprints, retinal scans, keystroke rhythm Picture password in Windows 8 User makes three gestures over a photo. Asking user to name people in group photo or provide facts about people in photo. One defect: If user’s authentication compromised once, it is compromised for all sites where that authentication method used. Copyright © 2015 Pearson Education, Inc.

Fast Identity OnLine (FIDO) After a user has been authenticated, a plug-in to user’s browser will use the private key data to generate a one-time password (OTP; this means the password is used just for one session with a Web site) and send it to the Web site. Copyright © 2015 Pearson Education, Inc.

Will You Trust FIDO? Probably FIDO does not eliminate need to send private data over the Internet, but substantially reduces it. Password or PIN never sent over a network. Forming open standards and asking the community to find holes and problems long before standard is implemented. Support of major, well-funded organizations. Copyright © 2015 Pearson Education, Inc.