Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Privacy, Security, Confidentiality, and Legal Issues
PIPA PRESENTATION PERSONAL INFORMATION PROTECTION ACT.
Confidentiality and Privacy Controls
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Security Controls – What Works
Chapter 17 Controls and Security Measures
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senn’s Information Technology, 3 rd Edition Chapter 14 Issues in Information.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter 9 1.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
INTERNET and CODE OF CONDUCT
Information Systems Controls for System Reliability -Information Security-
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Service Organization Control (SOC) Reporting Options and Information
HIPAA PRIVACY AND SECURITY AWARENESS.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
CIS 450 – Network Security Chapter 8 – Password Security.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Cryptography, Authentication and Digital Signatures
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
ISO/IEC 27001:2013 Annex A.8 Asset management
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 4: Laws, Regulations, and Compliance
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Encryption Name : Maryam Mohammed Alshami ID:H
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Chapter 17 Risks, Security and Disaster Recovery
Confidentiality and Privacy Controls
CompTIA Security+ Study Guide (SY0-401)
Session 1 – Introduction to Information Security
Presentation transcript:

Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 9-1

Learning Objectives  Identify and explain controls designed to protect the confidentiality of sensitive corporate information.  Identify and explain controls designed to protect the privacy of customers’ personal information.  Explain how the two basic types of encryption systems work. Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 9-2

Trust Services Framework  Security (Chapter 8)  Access to the system and its data is controlled and restricted to legitimate users.  Confidentiality (Chapter 8)  Sensitive organizational information (e.g., marketing plans, trade secrets) is protected from unauthorized disclosure.  Privacy  Personal information about customers is collected, used, disclosed, and maintained only in compliance with internal policies and external regulatory requirements and is protected from unauthorized disclosure.  Processing Integrity (Chapter 10)  Data are processed accurately, completely, in a timely manner, and only with proper authorization.  Availability (Chapter 10)  System and its information are available to meet operational and contractual obligations. Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 9-3

Intellectual Property (IP)  Strategic plans  Trade secrets  Cost information  Legal documents  Process improvements  All need to be secured Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 9-4

Steps in Securing IP Identification and Classification Encryption Controlling Access Trainingj Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 9-5 Where is the information, who has access to it? Classify value of information The process of obscuring information to make it unreadable without special knowledge, key files, or passwords. Information rights management: control who can read, write, copy, delete, or download information. Most important! Employees need to know what can or can’t be read, written, copied, deleted, or downloaded

Privacy  Deals with protecting customer information vs. internal company information  Same controls  Identification and classification  Encryption  Access control  Training Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 9-6

Privacy Concerns  SPAM  Unsolicited that contains either advertising or offensive content  CAN-SPAM (2003)  Criminal and civil penalties for spamming  Identity Theft  The unauthorized use of someone’s personal information for the perpetrator’s benefit.  Companies have access to and thus must control customer’s personal information. Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 9-7

Privacy Regulatory Acts  Health Insurance Portability and Accountability Act (HIPAA)  Health Information Technology for Economic and Clinical Health Act (HITECH)  Financial Services Modernization Act Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 9-8

Generally Accepted Privacy Principles 1.Management  Procedures and policies  Assignment of responsibility 2.Notice  To customers of policies 3.Choice and Consent  Allow customers consent over information provided, stored 4.Collection  Only what is necessary and stated in policy 5.Use and Retention  Based on policy and only for as long as needed for the business 6.Access  Customers should be capable of reviewing, editing, deleting information 7.Disclosure to 3 rd Parties  Based on policy and only if 3 rd party has same privacy policy standard 8.Security  Protection of personal information 9.Quality  Allow customer review  Information needs to be reasonably accurate 10.Monitor and Enforce  Ensure compliance with policy Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 9-9

Encryption  Preventive control  Process of transforming normal content, called plaintext, into unreadable gibberish  Decryption reverses this process Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 9-10

Encryption Strength  Key length  Number of bits (characters) used to convert text into blocks  256 is common  Algorithm  Manner in which key and text is combined to create scrambled text  Policies concerning encryption keys  Stored securely with strong access codes Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 9-11

Types of Encryption  Symmetric  One key used to both encrypt and decrypt  Pro: fast  Con: vulnerable  Asymmetric  Different key used to encrypt than to decrypt  Pro: very secure  Con: very slow  Hybrid Solution  Use symmetric for encrypting information  Use asymmetric for encrypting symmetric key for decryption Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 9-12

Hashing  Converts information into a “hashed” code of fixed length.  The code can not be converted back to the text.  If any change is made to the information the hash code will change, thus enabling verification of information. Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 9-13

Digital Signature  Hash of a document  Using document creators key  Provides proof:  That document has not been altered  Of the creator of the document Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 9-14

Digital Certificate  Electronic document that contains an entity’s public key  Certifies the identity of the owner of that particular public key  Issued by Certificate Authority Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 9-15

Virtual Private Network (VPN)  Private communication channels, often referred to as tunnels, which are accessible only to those parties possessing the appropriate encryption and decryption keys. Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 9-16