Chapter 5 Information Systems Security. Presentation Outline I.An Overview of Systems Security II.Active Threats and Computer Networks III.Controls for.

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Crime and Security in the Networked Economy Part 4.
Auditing Computer-Based Information Systems
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
9 - 1 Computer-Based Information Systems Control.
4/15: Security & Controls in IS Systems Vulnerabilities Controls: what to use to guard against vulnerabilities –General controls –Application controls.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
© 2003, Educational Institute Chapter 12 Systems and Security Maintenance Managing Technology in the Hospitality Industry Fourth Edition (469T or 469)
Chapter 12 Information Security Management © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Concepts of Database Management Seventh Edition
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Securing Information Systems
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Concepts of Database Management Sixth Edition
Your Interactive Guide to the Digital World Discovering Computers 2012.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.
What does “secure” mean? Protecting Valuables
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Concepts of Database Management Eighth Edition
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
C8- Securing Information Systems
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
Information Systems Security Operational Control for Information Security.
Chapter 9 Enhancing Information/Computer Security.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
SESSION 14 INFORMATION SYSTEMS SECURITY AND CONTROL.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Topic 5: Basic Security.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
MBA 664 Database Management Dave Salisbury ( )
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
 2013 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood Chapter 6 6 – 1 Information Security.
CONTROLLING INFORMATION SYSTEMS
Storage, Communication & Disposal of data & information Threats to data & Information Deliberate, accidental & technical failure.
Chapter 3-Auditing Computer-based Information Systems.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Information Security Crisis Management Daryl Goodwin.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Information Systems Security
Securing Network Servers
INFORMATION SYSTEMS SECURITY AND CONTROL.
CompTIA Security+ Study Guide (SY0-401)
Chapter 17 Risks, Security and Disaster Recovery
CHAPTER 4 Information Security.
INFORMATION SYSTEMS SECURITY and CONTROL
Presentation transcript:

Chapter 5 Information Systems Security.

Presentation Outline I.An Overview of Systems Security II.Active Threats and Computer Networks III.Controls for Active Threats IV.Passive Threats to Computer Networks V.Disaster Risk Management

I. An Overview of Systems Security A.Problems and Risks of Computerized Information Networks B.Development of a Computer Security System C.Analyzing Vulnerabilities and Threats

A. Problems and Risks of Computerized Information Networks Business interruption Loss of software Loss of data Loss of hardware Loss of facilities Loss of service and personnel

B. Development of a Computer Security System As with the development of any information system, a computer security system requires the use of a life cycle approach. 1.Systems analysis 2.Systems design 3.Systems implementation 4.Systems operation, evaluation, and control

1. Systems Analysis Analyze system vulnerabilities in terms of relevant threats and their associated loss exposures. Loss of data.

2. Systems Design Design security measures and contingency plans to control the identified loss exposures. Recovery Plan

3. Systems Implementation Implement the security measures as designed.

4. Systems Operation, Evaluation, and Control Operate the system and assess its effectiveness and efficiency. Make changes as circumstances require.

C. Analyzing Vulnerabilities and Threats Quantitative Approach Each loss exposure is computed as the product of the cost of an individual loss times the likelihood of its occurrence. (See Figure 5.1 on p. 157) Qualitative Approach This approach simply lists out the system’s vulnerabilities and threats, subjectively ranking them in order of their contribution to the company’s total loss exposures.

II. Active Threats and Computer Networks A.The White-Collar Criminal B.Computer Fraud and Abuse Act of 1986 C.Groups Posing a Potential Threat D.Examples of Active Threats E.The Control Environment Active threats include information systems fraud and computer sabotage. Statistics have shown that corporate losses due to fraud and embezzlement exceed total losses due to bribery, burglary, and shoplifting by a wide margin.

A. The White-Collar Criminal It is not possible to rigorously identify the white-collar criminal. Managers tend to shy away from public prosecution that would result in negative publicity. So it was you! You’re making a big mistake!

B. Computer Fraud and Abuse Act of 1986 It is a federal crime to knowingly and with intent fraudulently gain unauthorized access to data stored in the computers of financial institutions, computers owned or used by the federal government, or computers operating in interstate commerce.

C. Groups Posing a Potential Threat  Computer systems personnel include computer maintenance persons, programmers, operators, information systems administrative personnel, and data control clerks.  Users of the computer system are outside the functional area of data processing. They have access to sensitive data and may control important computer inputs.  Intruders who attach information systems for fun and challenge are known as hackers. Other intruders include unnoticed intruders, wiretappers, piggybackers, impersonating intruders, and eavesdroppers.

D. Examples of Active Threats 1.Input Manipulation 2.Program Alteration 3.Direct File Alteration 4.Data Theft 5.Sabotage 6.Misappropriation of Computer Resources

1. Input Manipulation Manipulating input to intentionally achieve an incorrect result.  Misappropriate assets  Conceal an embezzlement Note: Most frequently used method of computer fraud. May be attributable to the fact that it requires the least amount of technical skill.

2. Program Alteration Program code is improperly manipulated to intentionally achieve a certain result. Programmers should not be allowed unauthorized access to programs. Access Denied Note: Least frequently used method of computer fraud. May be attributable to the fact that it requires technical skills that are only possessed by a limited number of people.

3. Direct File Alteration Inputting data into a computer system while bypassing the normal process. Transfer company funds to my personal account.

4. Data Theft Data theft involves stealing a competitors information. For example, allows large amounts of information to be transmitted in a few minutes time.

5. Sabotage Destroying some aspect of computer processing. Logic bomb – Dormant piece of code activated by a specific later event. Trojan horse = Destructive program masquerading as a legitimate one (See note below). Worm – A virus that spreads over a computer network. Note: A virus program is similar to a Trojan horse but can spread itself to other programs, “infecting” them with the same virus.

6. Misappropriation of Computer Resources One type of misappropriation of computer resources exists when employees use computer resources for their own business

E. The Control Environment  Since no security system is infallible, an atmosphere conducive to security must be created.  Accounting and computing functions should be separated.  The board of directors should appoint an audit committee who should approve the appointment of the internal audit director.  Budgets help control spending on equipment.  System security should be thoroughly test.  The duties of computer users and systems personnel should be separated.  Access privileges should be cancelled immediately when employees are fired.  There should be a well-documented internal policy against software piracy.

III. Controls for Active Threats A.Site-access Controls B.System-access Controls C.File-access Controls A layered approach can be used to separate perpetrators from their potential targets.

A. Site-access Controls Site-access controls physically separate individuals from computer resources. Examples include:  Biometric hardware authentication  Isolated and hard to find locations  Restrictions on loading new software Computer Room

B. System-access Controls System-access controls authenticate users by means such as account numbers, passwords, firewalls, and encryption. Password

C. File-access Controls File-access controls prevent unauthorized access to both data and program files. Programmers should not be permitted access to programs without written permission. In addition, all important programs should be kept in locked files so they can be run, but not looked at or altered. Programmers should only be allowed to change copies of active programs. Upon completion, these should be tested and approved before being used. Locked file

IV. Passive Threats to Computer Networks A.Fault-tolerant Systems B.File Backups Passive threats include problems like power and hardware failures. Controls for passive threats include:

A. Fault-tolerant Systems If one part of the system fails, a redundant part immediately takes over with little or no interruption in operations. Fault-tolerance can be applied at five different levels: Network communications (duplicate communication paths) CPU processors (watchdog processor) Direct-access storage devices or DASDs (disk mirroring or disk shadowing) Power supply (battery backup) Individual transactions (rollback processing & database shadowing)

B. File Backups A prior version of data is used to recover lost data. Examples include:  Full backups – Backs up all files on a given disk. Archive bit set to zero during backup process.  Incremental backup – Backs up only those files that have been modified since the last full or incremental backup (files with archive bit set to one). Archive bit is set to zero after backup.  Differential backup – Incremental backup that does not set archive bits back to zero.

V. Disaster Risk Management A.Preventing Disaster B.Implementing a Disaster Recovery Plan C.Alternate Processing Arrangements

A. Preventing Disaster Concentrations of computer equipment should be located in areas least exposed to natural disaster and sabotage. Studies have shown the following frequency of disaster causes:  Natural disaster 30%  Deliberate actions45%  Human error25%

B. Implementing a Disaster Recovery Plan Three steps of implementation include:  Obtain senior management support and set up a planning committee.  Plan should be thoroughly documented and approved by the planning committee.  Include appropriate components in contingency plan. Three components of contingency plan include:  Assess the company’s critical needs regarding people, areas, equipment, records.  List priorities of recovery – Meet critical needs first.  Determine recovery strategies and procedures:  What to do  Who should do it  How to do it  How long it will take

C. Alternate Processing Arrangements The most important part of a disaster recovery plan is the specification of a backup site. Alternatives include: 1.Purchased Alternatives 2.Contract Alternatives

1. Purchased Alternatives Cold Site – Computing site with computer wiring but no equipment. Hot Site – Computing site with both computer wiring and equipment. Flying-start Site – Computing site with computer wiring, equipment, and a recent backup of data and software.

2. Contract Alternatives Service Bureau – Provides data processing to companies who do not process their own data. Viable for small companies with simple data processing. Commercial Vendor of Disaster Service – Leases hot sites for a monthly fee. Shared Contingency or Reciprocal Disaster Agreement – Two companies agree to help each other if the need arises. May involve joint ownership of a common hot site.

Summary 1.Environment – Risks, system development, white collar criminal, audit committee. 2.Layered approach for active threats: site- access, system-access, and file-access controls 3.Fault-tolerant systems and backups 4.Purchased processing – cold, hot, flying start 5.Contract processing – service bureau, commercial vendor, shared contingency agreement.