CHAPTER 4 Information Security. Key Information Security Terms Information Security refers to all of the processes and policies designed to protect an.

Slides:



Advertisements
Similar presentations
4 Information Security.
Advertisements

Ethics, Privacy and Information Security
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Security+ Guide to Network Security Fundamentals
CHAPTER 3 Ethics, Privacy and Information Security.
CHAPTER 4 Information Security
CHAPTER 4 Information Security. Announcements Project 2 – due today before midnight Tuesday Class Quiz 1 – Access Basics Questions/Comments.
CHAPTER 4 Information Security. Announcements Friday Class Quiz 1 Review Monday Class Quiz 1 – Access Basics Questions/Comments.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Ethics, Privacy and Information Security
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Chapter 3 Ethics, Privacy & Security
Our Digital World Second Edition
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Securing Information Systems
Information Security Technological Security Implementation and Privacy Protection.
Information Systems: Ethics, Privacy and Information Security
CHAPTER 4 Information Security
CHAPTER 3 Ethics, Privacy and Information Security.
CHAPTER 6 Information Security
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
C8- Securing Information Systems
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
7 Information Security.
Management Information Systems Chapter Eight Securing Information Systems Md. Golam Kibria Lecturer, Southeast University.
Types of Electronic Infection
Network Security Management Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
Topic 5: Basic Security.
7 Information Security.
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
Chapter 161 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
1 PROTECTING ORGANIZATION VALUABLE ASSET CASE STUDY: PT XYZ SYSTEM INFORMATION TECHNOLOGY Group Member :  Adhitya Trisnanda  Dini Dieny  Firmando Satryo.
Privacy, Security and Ethics
Security and Ethics Safeguards and Codes of Conduct.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Chapter 7 Information Security. Chapter Outline 7.1 Introduction to Information Security 7.2 Unintentional Threats to Information Systems 7.3 Deliberate.
CHAPTER 7 Information Security. 1.Introduction to Information Security 2.Unintentional Threats to Information Systems 3.Deliberate Threats to Information.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Securing Information Systems
Securing Information Systems
CHAPTER 4 Information Security.
CHAPTER 4 Information Security.
Securing Information Systems
4 Information Security 70 slides.
CHAPTER 4 Information Security
Chapter 9 E-Commerce Security and Fraud Protection
CHAPTER 4 Information Security
INFORMATION SYSTEMS SECURITY and CONTROL
Presentation transcript:

CHAPTER 4 Information Security

Key Information Security Terms Information Security refers to all of the processes and policies designed to protect an organization’s information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Threat any danger to which a system may be exposed. Exposure the harm, loss or damage that can result if a threat compromises that resource. Vulnerability the possibility that the system will suffer harm by a threat.

Five Factors Increasing the Vulnerability of Information Resources 1.Today’s interconnected, interdependent, wirelessly- networked business environment 2.Smaller, faster, cheaper computers and storage devices 3.Decreasing skills necessary to be a hacker 4.Organized crime taking over cybercrime 5.Lack of management support

Security Threats

Human Errors Carelessness with laptops and portable computing devices Opening questionable s Careless Internet surfing Poor password selection and use And more (see table 4.1) Most Dangerous Employees HUMAN RESOURCE MIS

Social Engineering Social engineering is an attack where the attacker uses social skills to trick a legitimate employee into providing confidential company information such as passwords. Two examples Tailgating Shoulder surfing © Purestock/Age Fotostock America, Inc

Deliberate Threats to Information Systems Espionage or Trespass Information extortion Sabotage or vandalism Theft of equipment or information (dumpster diving) Identity theft Compromises to intellectual property Soft ware attacks Alien soft ware Supervisory control and data acquisition (SCADA) attacks Cyberterrorism and cyberwarfare

Compromises to intellectual property Intellectual property. Property created by individuals or corporations which is protected under trade secret, patent, and copyright laws. Trade secret. Intellectual work, such as a business plan, that is a company secret and is not based on public information. Patent. Document that grants the holder exclusive rights on an invention or process for 20 years. Copyright. Statutory grant that provides creators of intellectual property with ownership of the property for life of the creator plus 70 years.

Software attacks A virus is a segment of computer code that performs malicious actions by attaching to another computer program. A worm is a segment of computer code that spreads by itself and performs malicious actions without requiring another computer program. A Trojan horse is a software program that hides in other computer programs and reveal its designed behavior only when it is activated. A logic bomb is a segment of computer code that is embedded within an organization’s existing computer programs and is designed to activate and perform a destructive action at a certain time and date. Distributed denial-of-service attacks the attacker first takes over many computers. These computers are called zombies or bots. Together, these bots form a botnet. See botnet demonstrationdemonstration

Phishing slideshowslideshow Phishing quizquiz Phishing exampleexample Phishing exampleexample Phishing attacks

Deliberate Threats (continued) Alien Software Spyware (see video) collects personal information about users without consent like keystroke loggers and screen scrapers.video Spamware Cookies Supervisory control and data acquisition (SCADA) attacks Links the physical and electronic world example power outages like one in 2003 © Manfred Grafweg/Age Fotostock America, Inc.

7.4 What Organizations Are Doing to Protect Themselves

Example of CAPTCHA

How Public Key Encryption Works

How Digital Certificates Work

Risk Management Risk. The probability that a threat will impact an information resource. Risk management. To identify, control and minimize the impact of threats. Risk analysis. To assess the value of each asset being protected, estimate the probability it might be compromised, and compare the probable costs of it being compromised with the cost of protecting it. Risk mitigation is when the organization takes concrete actions against risk. It has two functions: (1) implement controls to prevent identified threats from occurring, and (2) developing a means of recovery should the threat become a reality. © Youri van der Schalk/Age Fotostock America, Inc.

Risk Mitigation Strategies Risk Acceptance. Accept the potential risk, continue operating with no controls, and absorb any damages that occur. Risk limitation. Limit the risk by implementing controls that minimize the impact of threat. Risk transference. Transfer the risk by using other means to compensate for the loss, such as purchasing insurance.

7.5 Information Security Controls Physical controls Access controls Communications (network) controls Virtual private networking Secure Socket Layer (now transport layer security) Employee monitoring systems

Access Controls Authentication - Major objective is proof of identity. Something the User Is - Also known as biometrics, these access controls examine a user's innate physical characteristics. Something the User Has - These access controls include regular ID cards, smart cards, and tokens. Something the User Does - These access controls include voice and signature recognition. Something the User Knows - These access controls include passwords and passphrases. A password is a private combination of characters that only the user should know. A passphrase is a series of characters that is longer than a password but can be memorized easily.

Communications Controls Firewalls. System that enforces access-control policy between two networks. Anti-malware systems (also called antivirus software) are software packages that attempt to identify and eliminate viruses, worms, and other malicious software. The logos show three well-known anti-malware companies. Clicking on the link will take you to each company’s homepage, respectively. Whitelisting is a process in which a company identifies the software that it will allow to run and does not try to recognize malware. Blacklisting is a process in which a company allows all software to run unless it is on the blacklist. Encryption. Process of converting an original message into a form that cannot be read by anyone except the intended receiver.

Business Continuity Planning, Backup, and Recovery Hot Site is a fully configured computer facility, with all services, communications links, and physical plant operations. Warm Site provides many of the same services and options of the hot site, but it typically does not include the actual applications the company runs. Cold Site provides only rudimentary services and facilities and so does not supply computer hardware or user workstations.

Information Systems Auditing Types of Auditors and Audits Internal External IS Auditing Procedures Auditing around the computer Auditing through the computer Auditing with the computer