Information Security EDU 5815 1. IT Security Terms EDU 5815 2.

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

Ethics, Privacy and Information Security
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
Ch.5 It Security, Crime, Compliance, and Continuity
Lecture 1: Overview modified from slides of Lawrie Brown.
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
Security+ Guide to Network Security Fundamentals
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Introducing Computer and Network Security
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Chapter 151 Information Technology For Management 4 th Edition Turban, McLean, Wetherbe John Wiley & Sons, Inc. Managing Information Resources and Security.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
BUSINESS B1 Information Security.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Information Security EDU IT Security Terms EDU
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Information Security What is Information Security?
Topic 5: Basic Security.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Chap1: Is there a Security Problem in Computing?.
Computer Skills and Applications Computer Security.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
CONTROLLING INFORMATION SYSTEMS
Management Information Systems The Islamia University of Bahawalpur Delivered by: Tasawar Javed Lecture 16.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Chapter 151 Information Technology For Management 5 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by A. Lekacos, Stony Brook University John.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Safe’n’Sec IT security solutions for enterprises of any size.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Overview of Database Security Introduction Security Problems Security Controls Designing Database Security.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Information Security and Privacy in HRIS
Securing Information Systems
Information Systems Security
CS457 Introduction to Information Security Systems
Securing Information Systems
Management Information Systems
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Network Security Basics: Malware and Attacks
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Securing Information Systems
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
INFORMATION SYSTEMS SECURITY and CONTROL
Faculty of Science IT Department By Raz Dara MA.
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

Information Security EDU

IT Security Terms EDU

BackupAn extra copy of the data and/or programs, kept in a secure location(s). DecryptionTransformation of scrambled code into readable data after transmission. EncryptionTransformation of data into scrambled code after transmission. ExposureThe harm, loss, or damage that can result if something has gone wrong in an information system. Fault toleranceThe ability of an information system to continue to operate (usually for a limited time and/or at a reduced level) when failure occurs. Information system controls The procedures, devices, or software that attempt to ensure that the system performs as planned. Integrity (of data)A guarantee of the accuracy, completeness, and reliability of data. System integrity is provided by the integrity of its components and their integrations. RiskThe likelihood that a threat will materialized. Threats (or hazards) The various dangers to which a system may be exposed. VulnerabilityGiven that a threat exists, the susceptibility of the system to harm caused by the threat. MalwareGeneral term for software that enables malicious acts against a computing system. EDU

Organizational needs for security and control Importance of keeping all of the resources, virtual as well as physical, secure from both inside and outside threats Two critical issues must be addressed: ▫Security vs. individual rights ▫Security vs. availability EDU

Security vs. individual rights Implement adequate security and control measures that do not infringe on the individual rights guaranteed by the constitution EDU

Security vs. availability Prominent in the medical area Concerns over the privacy of the individuals’ records are receiving attention EDU

Objective of Information Security Confidentiality Availability Integrity EDU

Confidentiality The organization seek to protect its data and information from disclosure to unauthorized persons. Executive information systems, human resources information systems, and such transaction processing systems as payroll, accounts receivable, purchasing, and accounts payable are especially critical in this regard. EDU

Availability The purpose of the organization’s information infrastructure is to make its data and information available to those who are authorized to used it. This objective is especially important to information-oriented systems such as human resources information systems EDU

Integrity All the information systems should provide an accurate representation of the physical systems that they represent. EDU

System Vulnerability EDU  A universal vulnerability is a state in a computing system which either: allows an attacker to execute commands as another user; allows an attacker to access data that is contrary to the access restrictions for that data; allows an attacker to pose as another entity; or allows an attacker to conduct a denial of service.  An exposure is a state in a computing system (or set of systems) which is not a universal vulnerability, but either: allows an attacker to conduct information gathering activities; allows an attacker to hide activities; includes a capability that behaves as expected, but can be easily compromised; is a primary point of entry that an attacker may attempt to use to gain access to the system or data; and is considered a problem according to some reasonable security policy.

System Vulnerability Continued These threats can be classified as: ▫Unintentional  Human errors  Environmental hazards  Computer system failures ▫Intentional  Theft of data  Inappropriate use of data  Theft of mainframe computer time  Theft of equipment and/or programs EDU The vulnerability of information systems is increasing as we move to a world of networked and especially wireless computing. Theoretically, there are hundreds of points in a corporate information system that can be subject to some threats.

System Vulnerability Continued ▫Intentional continued  Deliberate manipulation in handling  Entering data  Processing data  Transferring data  Programming data  Labor strikes  Riots  Sabotage  Malicious damage to computer resources  Destruction from viruses and similar attacks  Miscellaneous computer abuses  Internet fraud.  Terrorists ’ attack EDU

Threats An information security threat is a person, organization, mechanism, or event that has potential to inflict harm on the organization’s information resources. Threats can be internal as well as external, and they can be accidental as well as intentional. EDU

Type of threats A virus is one example of a type of software that bears the name malicious software Malicious software or malware consists of complete programs or segments of code that can invade a system and perform functions not intended by the system owners In addition to viruses, there are worms, Trojan horses, adware, and spyware EDU

Type of threats A virus is a computer program that can replicate itself without being observable and embed copies of itself in other programs and boot sectors A worm cannot replicate itself within a system, but it can transmit its copies by means of EDU

Type of threats A Trojan horse can neither replicate nor distribute itself; users distributes it as utility. When the utility is used, it produced unwanted changes in the system’s functionality. EDU

Type of threats Adware generates intrusive advertising messages Spyware gathers data from the user’s machine EDU

EDU

Risks Information security risk is a potential undesirable outcome of a breach of information security by an information security threat All risks represent unauthorized acts EDU

Four type of risks 1.Unauthorized Disclosure and Theft ▫When the database and software library are made available to persons not entitled to have access ▫The result can be the loss of information or money 2.Unauthorized Use – When persons who are not ordinarily entitled to use the organization’s resources are able to do so – hacker EDU

Four type of risks 3.Unauthorized Destruction and Denial of Service – Individuals can damage or destroy hardware or software, causing the organization’s computer operation to shut down 4.Unauthorized Modification – Changes been made to the data, information and software. – Changes go unnoticed and cause the users of the system outputs to make the wrong decisions EDU

Challenges and Ethics of IT Application of IT ▫Customer relationship management ▫Human resources management ▫Business intelligence systems Potential Harm ▫Infringements on privacy ▫Inaccurate information ▫Collusion EDU

Challenges and Ethics of IT Possible Responses EDU

Protecting Information Resources Aligned. The program must be aligned with organizational goals. Enterprisewide. Everyone in the organization must be included. Continuous. The program must be operational all the time. Proactive. Use innovative, preventive, and protective measures. Validated. The program must be tested to ensure it works. Formal. It must include authority, responsibility & accountability. EDU Information security problems are increasing rapidly, causing damage to many organizations. Protection is expensive and complex. Therefore, companies must not only use controls to prevent and detect security problems, they must do so in an organized manner. An approach similar to TQM (total quality management) would have the following characteristics:

Difficulties – Protecting (discussion) EDU

Defense Strategy - Protecting The major objectives of a defense strategy are: 1.Prevention and deterrence. 2.Detection. 3.Limitation of damage. 4.Recovery. 5.Correction 6.Awareness and compliance EDU

Defense Strategy - Controls EDU Any defense strategy involves the use of several controls. These controls are divided into two categories general controls that protect the system regardless of the specific application and application controls that safeguard specific applications. General Application

Defense Strategy – Internet Security EDU Security Layers The major objective of border security is access control. Then authentication or proof of identity and finally authorization which determine the action or activities a user is allowed to perform.

Ethical Responsibilities What uses of IT might be considered improper or harmful to other individuals or society? What is the proper use of the Internet or organization's IT resources? How can you protect yourself from computer crime? EDU