Security in ERP Systems By Jason Rhodewalt & Marcel Gibson.

Slides:



Advertisements
Similar presentations
Database Security Policies and Procedures and Implementation for the Disaster Management Communication System Presented By: Radostina Georgieva Master.
Advertisements

Woodland Hills School District Computer Network Acceptable Use Policy.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Information Systems Audit Program. Benefit Audit programs are necessary to perform an effective and efficient audit. Audit programs are essentially checklists.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Security Controls – What Works
Chapter 17 Controls and Security Measures
Security+ Guide to Network Security Fundamentals
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Chapter 3 Ethics, Privacy & Security
Incident Response Updated 03/20/2015
Securing Information Systems
Storage Security and Management: Security Framework
Intrusion Detection MIS ALTER 0A234 Lecture 11.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
IT Security for Users By Matthew Moody.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Protecting Your Information Assets
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security considerations for mobile devices in GoRTT
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
Information Systems Security Operational Control for Information Security.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Note1 (Admi1) Overview of administering security.
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Chapter 2 Securing Network Server and User Workstations.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Network Security & Accounting
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
Chap1: Is there a Security Problem in Computing?.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Woodland Hills School District Computer Network Acceptable Use Policy.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
MANAGING INCIDENT RESPONSE By: Ben Holmquist. 2 Outline Key Terms and Understanding Personnel and Plan Preparation Incident Detection Incident Response.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.
Information Security and Privacy in HRIS
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Securing Information Systems
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Recommending a Security Strategy
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Chapter 3: IRS and FTC Data Security Rules
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
I have many checklists: how do I get started with cyber security?
County HIPAA Review All Rights Reserved 2002.
Bethesda Cybersecurity Club
Designing IIS Security (IIS – Internet Information Service)
Woodland Hills School District
Anatomy of a Common Cyber Attack
Presentation transcript:

Security in ERP Systems By Jason Rhodewalt & Marcel Gibson

Why is ERP Security Important? All of the business's vital data All of the business's vital data Employee/customer personal data Employee/customer personal data Social Security Numbers Social Security Numbers Credit Card Numbers Credit Card Numbers Addresses Addresses

Background of Security Problem Hacking began in the ‘70s Hacking began in the ‘70s Simple wiretaps or “blue boxes” Simple wiretaps or “blue boxes” Today, complex malicious programs Today, complex malicious programs Estimated that 1 and 4 US computers infected with a virus Estimated that 1 and 4 US computers infected with a virus Signs that viruses are becoming professionally made for monetary/ political incentives Signs that viruses are becoming professionally made for monetary/ political incentives

Background of Security Problem

Legal Considerations Sarbanes-Oxely Sarbanes-Oxely CEO liability CEO liability  External tampering  Internal tampering Auditing Auditing

Legal Considerations – cont. California Civil Act SB 1386 California Civil Act SB 1386 Companies must notify customers of compromised data Companies must notify customers of compromised data  Applies even to companies not incorporated in California Notification must be in a timely matter Notification must be in a timely matter

Legal Considerations – cont. McLaren v Microsoft Corp (1999) McLaren v Microsoft Corp (1999) Suspended employee has personal data on work machine and password protected Suspended employee has personal data on work machine and password protected Microsoft access files – employee sues for right to privacy Microsoft access files – employee sues for right to privacy Employee looses Employee looses  Work computer and work are Microsofts property

ERP System Authentication Not only employees need access Not only employees need access Customers, suppliers, and 3 rd party software developers Customers, suppliers, and 3 rd party software developers Local and remote access Local and remote access

Passwords User names and passwords User names and passwords Don't use SSN! Don't use SSN!  Custom user names are like 2 nd password Strong passwords Strong passwords  Combination of uppercase/lower case words and numbers

Encryption Algorithms Encrypting data protects it from unauthorized viewing Encrypting data protects it from unauthorized viewing Blowfish Algorithm (1993) Blowfish Algorithm (1993) RC4 Algorithm(1987) RC4 Algorithm(1987)

Unauthorized Access Easiest method: Guess a password Easiest method: Guess a password Use random user names and strong passwords Use random user names and strong passwords Try all the combinations Try all the combinations Limit log on attempts Limit log on attempts Only allow access from certain IP addresses Only allow access from certain IP addresses  Tough to implement with remote access Phishing Phishing Educate the end users Educate the end users

Unauthorized Access – cont. Phishing Phishing Educate end- users Educate end- users Key-logging software Key-logging software Limit installation privileges on public machines Limit installation privileges on public machines

Auditing and Monitoring Authorization and authentication protocols allow ERP systems to keep a detailed account of system events Authorization and authentication protocols allow ERP systems to keep a detailed account of system events Auditing required by statute Can be very costly and time consuming.

Auditing and Monitoring –cont. Steps to prepare for audits: Steps to prepare for audits: 1. Ask the auditors what they are looking for before an audit. Ask them for their audit objectives, if any pre-audit checklists. 2. Make sure to list perceived risks. Sort them in descending order with the highest risks at the top, along with the controls you created to mitigate them. 3. Document your preventative controls, and have detective controls in place to show they work. Document the change management process. 4. Keep a current and accurate asset inventory of hardware and software. 5. Document all internal audit procedures.

RFID Technology Used to track parts and products through supply chain Used to track parts and products through supply chain Passive electronics Passive electronics Included in shipments and/or product packaging Included in shipments and/or product packaging

RFID Technology –cont.

Using RF ID Data Immediate decisions Immediate decisions Will we be on time this week? Will we be on time this week? Executive decisions Executive decisions Should we build this part first? Should we build this part first? Should we build this product? Should we build this product?  Cash-To-Cash time

What to do in case of a breach!!! 1. Asses the situation/ level of breach 2. Report the breach to proper authorities FBI FBI Management Management Person effected Person effected 3. Track/ investigate the breach 4. Seal breach and rectify the problem

Disaster Recovery The purpose of disaster recovery is to ensure that in the event of a disaster, all business operations can continue relatively smoothly, including security. The purpose of disaster recovery is to ensure that in the event of a disaster, all business operations can continue relatively smoothly, including security. Plan ahead: a good plan might save the entire company. Plan ahead: a good plan might save the entire company.

Disaster Recovery –cont. 1. Setup a secondary site 2. Mirror content in real time at secondary site 3. Implement Disaster Recovery Plan 4. Test, rehearse, and test some more 5. Continuously update plan 6. Be aware, disasters will happen!

Image Reference Enron picture Enron picture RF ID RF ID Phishing Phishing Encryption Encryption