Information Security Management

Slides:



Advertisements
Similar presentations
Let’s Talk About Cyber Security
Advertisements

Information Security Management Chapter “We Have to Design It for Privacy and Security.” Copyright © 2014 Pearson Education, Inc. Publishing.
© Pearson Prentice Hall Using MIS 2e Chapter 12 Information Security Management If you don’t do security right, nothing else matters. David Kroenke.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Information Security Management Chapter “We Have to Design It for Privacy and Security. ” Tension between Maggie and Ajit regarding terminology.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
© Pearson Prentice Hall Using MIS 2e Chapter 12 Information Security Management David Kroenke.
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
© 2007 Prentice Hall, Inc.1 Using Management Information Systems David Kroenke Information Security Management.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 12 Information Security Management
Security+ Guide to Network Security Fundamentals
Lecture 10 Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 Management Information Systems Information Security Management Chapter 12.
1 Using Management Information Systems David Kroenke Information Security Management Chapter 11.
Chapter 12 Information Security Management © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Chapter 19 Security.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Our Digital World Second Edition
Securing Information Systems
Information Security Technological Security Implementation and Privacy Protection.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
David Kroenke Information Security Management Chapter 11 © 2007 Prentice Hall, Inc. 1.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter 12 Information Security Management.
PART THREE E-commerce in Action Norton University E-commerce in Action.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter 12 Information Security Management.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Information Security Management
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Information Security Management
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
C8- Securing Information Systems
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Types of Electronic Infection
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
CONTROLLING INFORMATION SYSTEMS
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.
Securing Information Systems
Network Security (the Internet Security)
Using MIS 2e Chapter 12 Information Security Management
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
برنامج أمن أنظمة الحاسب
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

Information Security Management Chapter 11 Information Security Management

Agenda Security Threats Security Program Sources Problems Senior Management’s Security Role Technical Safeguard Data Safeguard Human Safeguard Disaster Preparedness Incident Response

Sources of Security Threats Human error and mistakes Employees and non-employees Accidental problems Poorly written application programs Poorly designed procedures Malicious human activity Employees, former employees, hackers, and outside criminals Intentionally destroy data or other systems components Steal for financial gain Terrorism Natural events and disasters Acts of nature Loss of capability, service, and recovery

Problems of Security Threats Unauthorized data disclosure Incorrect data modification Faulty service Denial of service Loss of infrastructure

Unauthorized Data Disclosure Pretexting: someone pretending to be someone else Phishing: someone pretending a legitimate company and obtaining confidential data by email Spoofing: IP spoofing and Email spoofing Sniffing: intercepting computer communication Drive-by sniffers: intercepting unprotected wireless network

Incorrect Data Modification Human error employees follow procedures incorrectly procedures have been incorrectly designed Hacking

Faulty Service Incorrect system operation Usurpation Human procedure mistake Usurpation Unauthorized program in a computer system

Denial of Service Human error Malicious hacker Natural disasters

Loss of Infrastructure Human accidents Theft and terrorist events Natural disasters

Security Program Senior management involvement Security policy Cost and benefit analysis Safeguards of various kinds Technical protection: hardware and software Data protection: data Human protection: people and procedure Incident response Program response to security incident

Security Elements By National Institute of Standards and Technology (NIST) Support the mission of the organization An integral element of sound management Cost effective Explicit security responsibilities and accountability Comprehensive and integrated approach Periodically reassessing Constrained by social factor

Senior Management Role Security policy General policy: goals and assets Issue-specific policy: computer and email usage System-specific policy: specific information systems Risk management and assessment Assets and vulnerability Threats Likelihood of an adverse occurrence Consequences Safeguard and cost Probable loss

Technical Safeguard Identification and authentication Encryption Digital signature Firewall Malware protection Design secure application

Identification and Authentication User name Authentication Pass word (what you know) Smart card (what you have) Biometric authentication: fingerprints, facial features, retinal scans (what you are) Single sign-on for multiple systems (Kerberos) Wireless: WPA (Wi-Fi Protected Access) and WPA2

Encryption Symmetric encryption: one key Asymmetric encryption: public key and private key Secure Socket Layer (SSL) and Transport Layer Security (TLS): only client verify true Web site Digital signature Hashing Message digest (check digits) Digital certificate and certificate authorities

Firewall Definition Device Type A computing device to prevent unauthorized network access Device A special-purpose computer A program on a general-purpose computer or on a router Type Perimeter firewall Internal firewall Packet-filtering firewall Access control list (ACL)

Use of Multiple Firewalls

Malware Malware: viruses, worms, Trojan horses, spyware, and adware Spyware: programs installed without the user’s knowledge for spying Adware: installed without the user’s permission for observing user behavior and popping up ads

Spyware and Adware Symptoms Slow system start up Sluggish system performance Many pop-up ads Browser homepage changes, taskbar, and other interfaces Unusual hard disk activity

Malware Safeguard Install antivirus and antispyware programs Scan computer frequently Update malware definitions Open email attachments only from known sources Promptly install software updates from legitimate sources Browse only in reputable Internet neighborhoods

Data Safeguard Specifying user rights and responsibilities User account and password Store sensitive data in encrypted form Regular backup and practice recovery Backup copy at remote location Reside in locked, controlled-access facilities

Human Safeguard for Employee Position definition Job tasks and responsibilities Least possible privilege Documenting security sensitivity for each position Hiring and Screening Interviews, references, and background investigations Dissemination and enforcement Security policies, procedures, and responsibilities awareness Training Security responsibility, accountability, and compliance Termination Termination policies and procedures Remove accounts and passwords Recover keys for encrypted data

Human Safeguard for Non Employee Temporary personnel, vendors, partner personnel, and the public Require vendors and partners to perform appropriate screening and security training Harden (extraordinary measures to reduce a system’s vulnerability) the Web site or other facility against attack

Account Administration User accounts Creation of new user accounts, modification of existing account permissions, and removal of unneeded accounts Password Change password Use proper password Help-desk policies and procedures for user’s forgetting password

Systems Procedures Users and operations personnel Procedures for normal, backup, and recovery operations

Systems Monitoring Log analysis Security testing Investigating and learning from security incident In-house IT personal and outside security consultants Updating security: new technology and requirement

Disaster Preparedness Locate infrastructure in safe location Identify mission-critical systems Identify resources needed to run those systems Prepare remote backup facility Hot sites: providing remote processing centers run by commercial disaster-recovery services Cold site: providing office space, but customers themselves provide and install the equipment needed to continue operations Train and rehearse

Incident Response Have a plan Critical personnel and off-hours contact information Centralized reporting Prepare specific response for speed Practice

Discussion Ethic guide (343a-b) Problem solving (351a-b) Address the proper ethic issues of a online retailer related to its customer’s information. Problem solving (351a-b) Address the security issues of hiring a white hat hacker. Security guide (357a-b) Address the meta security issues of any organization. Reflection guide (361a-b) Address the future of IT and IS five years latter.

Case Study Case 11-1 Antiphishing Tactics (365-366): 2 only

Points to Remember Security Threats Security Program Sources Problems Senior Management’s Security Role Technical Safeguard Data Safeguard Human Safeguard Disaster Preparedness Incident Response