108 Malpractice
108 Malpractice
. Chapter 10 Describe the possible weak points within information technology systems. Chapter 11 -
online systems, storage medium, theft or duplication, compromising electronic emanations (tempest), viruses Describe the measures that can be taken to protect information technology systems against internal and external threats. - Clerical procedures, passwords, levels of access, writeprotect, back-up, restoration and recovery. Describe the access levels required for on-line files Describe the particular issues surrounding access to, and use of the Internet; e.g. censorship, security, ethics. THE CONSEQUENCES OF MALPRACTICE AND CRIME ON INFORMATION SYSTEMS http://www.met.police.uk/computercrime/ http://news.bbc.co.uk/1/hi/business/2264508.stm http://www.trusecure.com/ Theft or corruption of data etc. can prove fatal to businesses and to life itself e.g. 80% of companies go bust within 18 months of disaster. Sinking of HMS Sheffield in Falklands war - inability of anti-missile radar to function when a telephone call was being made to London on the same frequency. Air crashes resulting from errors in flight data stored in airborne computer. Case Study Heathcote P.50 NHSNet is the system used by the NHS to store patients' records. Staff can access the system with a swipe card and there is a firewall between the computer system and the Internet. The NHS says that the system will only be accessed by authorised people who have a clear need to use it and that all operations on the system will be monitored. Others suggest that the sheer number of people who will be using the system will mean that the swipe card system is not a sufficient level of security. Heathcote lists groups of people who might want to steal data from the NHS: Insurance companies Anti abortionists Blackmailers Stalkers Lawyers (the ambulance chasing variety) Companies marketing drugs Funeral parlours POSSIBLE WEAK POINTS WITHIN AN ICT SYSTEM. 1. Dishonest employees who use the computer system to commit crime e.g. fraud Bogus data entry e.g. changing or inventing data so improper data is produced
http://www.nchadderton.zen.co.uk/front.htm Page 1 of 17
4. Hardware failure e.g. a hard disk failure could render the data inaccessible Disc Crashes
5. Malpractice Faulty procedures (e.g. poorly trained employees who don't know how to use the system properly) Backup procedures not being followed (e.g. by an employee using a laptop outside the office)
6. Acts of God i.e.. Natural disasters e.g. fire, flood, earthquake 7. IP Spoofing A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted
http://www.nchadderton.zen.co.uk/front.htm Page 2 of 17
http://www.nchadderton.zen.co.uk/front.htm Page 3 of 17
MEASURES TO PROTECT ICT SYSTEMS FROM INTERNAL AND EXTERNAL THREATS. See the diagram in Heathcote p.249 Improve network security Maintenance contracts Uninterruptible Power Supply (UPS) Using tape-streamers Training Staff Employing security staff Using disk mirroring Staff training p.52 http://www.fast.org.uk/ So that staff know how to use the system and do not, therefore, do accidental damage To be aware of legislation see Data Protection Act, Computer Misuse Act, Health and Safety, Copyright. Be aware of safe procedures see BS7799 Be aware of the company Code of Conduct. BS7799 BS 7799 (ISO17799) is comprehensive in its coverage of security issues, containing a significant number of control requirements. Compliance with it is consequently a far from trivial task, even for the most security conscious of organizations. http://www.thewindow.to/bs7799/ Set up an Audit Trail P51 http://www.guardian.co.uk/online/story/0,3605,390973,00.html A record showing who has accessed a computer system and what operations he or she has performed during a given period of time. Audit trails are useful both for maintaining security and for recovering lost transactions. Most accounting systems and database management systems include an audit trail component. In addition, there are separate audit trail software products that enable network administrators to monitor use of network resources. Timestamping of files to aid the audit trail. Backup Procedures p.52
Maintain the generational system of backups (Grandfather-Father-Son) p.247. Online Backup is a system by which all data is stored onto three separate disks (if one disk
fails, the transaction is still processed).
Periodic Backup means backing up at specified intervals (e.g. every day). For extra
security, the backup tape is often moved to a secure location e.g. a fireproof safe or a completely different building. In the case of a laptop, it could be given a "boot lock" and sensitive data on the computer could be encrypted.
http://www.nchadderton.zen.co.uk/front.htm Page 4 of 17
Physical Protection p.51 ID badges for employees an entry control system to the IT department keycards Voiceprints Retina scans Checks on prospective employees to combat techno-terrorism Never use original program disc Asset register Caution CCTV Smartcards Password Protection There should be frequent updates of passwords, read p.252 about handshaking and the use of one-time passwords. A Hierarchy of passwords is often used (see below) Callback Software Terminal Identification measures include lockouts - e.g. three tries at a password and the use of Callback software via modem. Encryption p.51 http://computer.howstuffworks.com/encryption.htm http://www.learnthenet.com/english/animate/encrypt.html The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it Examples of information that would be encrypted are: Credit-card information Social Security numbers Private correspondence Personal details Sensitive company information Bank-account information Virus Protection p.52 Virus protection software and routines (p.253) What is a virus? How might it be introduced? What measures should be taken to minimise the risks?
http://www.nchadderton.zen.co.uk/front.htm Page 5 of 17
RAID, Redundant servers Access Rights and Access Levels Access rights may typically be set to Read-Only, Read/Write, or No Access. This ensures that users within a company can only change data they are authorised to do so. On the school network, different access levels exist: 1. 2. ICT Technician s (full accessrights) Teachers (have access to shared folders and their student work) 3. Students 4. Basic Group Why is it important to control access in this way? On a hospital network, the access levels might be: 1. No Access (receptionists will not be allowed any access to patients records) 2. Read Only (junior nursing staff would be allowed to read records but not to change them) 3. Read and Copy (a doctor from another hospital might be allowed to take a copy of a patient record) 4. Read and Update (only the patients own doctor would be allowed to update a record) Problems still exist. For example, people can leave terminals logged on (terminals could be set to shut down after a specified period e.g. 10 minutes). Technical support staff could have access to sensitive data when they are repairing computers). Firewall http://computer.howstuffworks.com/firewall.htm A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. Contingency Plans/Disaster Recovery Plans Insurance Secure Power Supplies Verification/Validation Checks Internet monitoring http://safety.ngfl.gov.uk/schools/?INDEX=ALL
Some companies and schools use the Internet through a "firewall" that controls what is accessible on the Internet e.g. a school may have a filtering system so that students cannot access undesirable material. Businesses also have the incentive to stop employees wasting work time by surfing the Internet for their own amusement. Managers are also worried that employees might be downloading pornography or using the company Email system improperly. There is also a fear of litigation,
http://www.nchadderton.zen.co.uk/front.htm Page 6 of 17
http://www.nchadderton.zen.co.uk/front.htm Page 7 of 17
EXAMINATION QUESTIONS 1996 (6 marks) The illegal use of computer systems is sometimes known as computer-related crime. Give three distinct examples of computer related crime Give three steps that can be taken to help prevent computer-related crime ANSWERS a any from: hacking to gain access to, or modify data deliberate introduction of viruses to destroy data techno-terroism theft of data or any examples in context modification of data/code to perpetuate fraud b any from physical security of systems and rooms do not leave terminals active and unattended document security hardware security and identification devices levels of passwords-do not reveal passwords audit procedures encryption dismissed staff leave premises immediately or any examples in context 1991 (16 marks) There are three ways in which the security of data within a large company database may be compromised. The data could be read, altered or destroyed by persons not authorised to do so. Give five examples of how unauthorised access to data might occur and how you could prevent them. (10) Give three examples of how data might be altered or destroyed and the way each example could be prevented or controlled. (6)
http://www.nchadderton.zen.co.uk/front.htm Page 8 of 17
Access to registered users to areas for which they have no access rights.
Data could be read directly from the screen if the screen is facing the window Data could be read from the screen by a radio device outside the building tuned to receive emissions from the screen. The ID and password of an authorised user can be stolen. Discs could be stolen and read elsewhere. Data might be left on the screen and read by a passer by. Unauthorised access to rooms where terminals are sited Data could be read via access from a remote, unauthorised terminal. b Any three from to control altering data. where read access to the data has to be allowed, if volatile data is corrupted or destroyed by a power failure, control access to room where large scale magnetic storage is used to avoid sabotage by a large magnet. in case of fire destroying equipment or data,
Make everyone register and be given Personal Identity Number before they can log-on to the system. User would also have a private password. Make access to other areas impossible by forcing them to use a menu driven system tailored to their legitimate needs. In a time sharing situation, make access to other users directories by a further password Re-site the screen. Fit the terminal or the room with a screen which absorbs those emissions. Do not write it down or lend your password Lock them up. Re-site the terminal to make users log-off before doing something else. Computer could automatically log them off after a few minutes of inactivity could be controlled by smart cards or keys Terminal hardware must identify itself.
Have a menu system which does not give update facilities to everyone have an extra password necessary to allow alterations. make sure recent back-up or roll-back facility
http://www.nchadderton.zen.co.uk/front.htm Page 9 of 17
1995 (20 marks) Criminal activity and malpractice in connection with the use of Information Technology Systems is one of the fastest growing areas of crime, but many organisations are loath to admit there is a problem. Excluding the area of viruses discuss this statement. Include in your discussion: at least three specific examples of areas of criminal activity specific examples of the types of people who may get involved possible reasons why organisations are loath to admit there is a problem at least three specific examples of countermeasures which can be taken to minimise the threats.
http://www.nchadderton.zen.co.uk/front.htm Page 10 of 17
hardware security
software security:
Tempest: Comms and network security Computer Misuse Act DP Act is relevant in a general sense: Paragraph 6: Conclusion
1994 (15 marks) A local group of electrical retailers uses a computerised system to assist in the administration of its business. The manager of the group becomes concerned about software copyright and the potential dangers of viruses but does not fully understand the issues involved. A. Describe three different types of software licensing agreement which are currently offered by software producers. (6) B. Explain what is meant by a virus (3) C. Describe two different methods of protecting the organisation against viruses. (6) a Treat as book One copy in use at a time being passed to another user Multi-user Usually one/half the number of master discs with agreement to copy onto a specified number of machines for multiple use at any one time Network license Normally software resides on host with a specified number of stations on that single network being given access at any one time Site license License extends to cover all machines within that institution b A software routine which once introduced into a system replicates itself whenever the program to which it is attached is run on some flag e,g, time, date or when copied
http://www.nchadderton.zen.co.uk/front.htm Page 12 of 17
1996 A multi-national organisation maintains an information technology system which holds a large amount of vital and sensitive data. Describe THREE steps which should be taken to protect the data against deliberate theft or corruption. (6) Describe THREE steps which should be taken to protect the data against accidental loss. (6) 1997 A common way of permitting different levels of access to on-line files is the use of passwords. Once a password has been input the user may be allowed to perform a number of different actions upon the data within the files, dependent on the level of access given by that password. Describe FOUR of these possible actions. (4 marks) 1994 (20 marks) Society, organisations and individuals are now so dependent on IT systems that the consequences if these systems were to fail would be catastrophic. Discuss the major threats to, or possible causes of failure, of an IT system and explain what steps can be taken to minimise them or their consequences. MARK ALLOCATION 5 points on threats/causes of failure, 5 for minimise risk in context of threat, 5 minimise consequences of failure, 5 for presentation and argument Paragraph 1: Introduction - What have you been asked to do? How will you answer? Paragraph 2: A discussion of at least four of the Threats or causes of failure Physical Fire, flood, power failure, rats eating cables, coffee Hardware failure Processor failure, disc crash Telecommunications failure Cable faults, data corruption, gateway down Data control failure Data inaccurate e.g. Rounding, incorrect codes Software failure Bugs, unsuited to task Invalid data User errors, undiscovered corruption e.g. Upgrade, processing cycle fault Computer crime/abuse Hacking, viruses System design failure Failure to build into the design the appropriate measures e.g. London ambulance service or european airbus Paragraph 3: A discussion of what Steps can be made to minimise the effects of failure Physical Regular maintenance, uninterrupted power supplies, duplicate systems, keyboard protectors, human restrictions (explain) Hardware Restricted access/usage, backup systems, duplicate systems, reputable suppliers Telecomms Regular maintenance, installation of
http://www.nchadderton.zen.co.uk/front.htm Page 13 of 17
Data Control Software Invalid Data Computer Crime/Abuse System Design Failure Redundant/Departing Staff Lead Off Premises Or Disciplinary Measures As AntiVirus/Password Offence
Paragraph 4: A discussion of the Steps to minimise consequences i.e. how to recover if it does fail. THIS IS OFTEN MISSED OUT BY WEAK STUDENTS!!! Physical Duplicate systems, standby systems Hardware failure As above plus backup files and roll-back Comms failure Alternative gateway links, alternative node points Software failure Maintain sequential backups, hot line system support contracts, PC Anywhere links with support supplier Invalid data Journal logs and incremental backup procedures with roll-back Computer crime/abuse As above + toolkits giving disc recovery System design failure Failsafe systems, manual override (if feasible), duplicate command systems e.g. 5 voting cpus Paragraph 5: Conclusion June 2001.11. Explain, with reasons, two levels of access that could be given to different categories of users of an on-line stock control system. 4 marks Examples Stock managerread/write access (1)- ability to add delete and amend records of stock e.g. add a new product, delete a product out of stock, change prices (1). Sales staff read/write access (1) need to be able to see details about stock and to change data as sales are made (1) Store manager read/view only access (1) - needs to be able to view(read) data but not change it(1) Any 2 2 marks 2nd mark dependant on first. This question is about the types of access that can be given not how it is controlled and so nothing on passwords, etc gains credit. Allow Full Access rights: 1 mark terms plus 1 for explanation Read Read/Write Amend Delete Add/Delete/Write/Append
http://www.nchadderton.zen.co.uk/front.htm Page 14 of 17
January 2002.5. Information Systems need to be protected from both internal and external threats. (a) Explain, using examples, the differences between an internal and an external threat to an Information System. 4 marks (b) For each of the following, describe a measure that a company can take to protect his or her Information System from: (i) Internal threats; 2 marks (ii) External threats. 2 marks a) 2 2 marks Internal threats are from within the company or organisation / caused by own staff(1) example (1). Can accept theft of components as an example. External threats come from outside the company or organisation/ caused by people from outside the organisation (1) example (1). Accept Natural Disasters Power failure. NB Examples may only be used once e.g. hacking is either internal or external but not both. b) (i) Internal: 1 mark for measure and 1 mark for explanation of how measure prevents threat Examples Procedures for using disks/virus checking/ (1) prevents employees introducing virus onto network (1) Auto save/ confirmation of delete/ other software functions (1) designed to prevent loss/corruption of data from careless mistakes (1) Passwords & Ids/Access levels (1) to prevent unauthorised modification.(1) Guidelines on working practice (1) to prevent health and safety issues with employees/ loss of staff from illness etc Good pay/benefits (1) prevent loss of experienced/vital staff (1) Code of conduct (1) to prevent(1) Training of staff (1) to prevent misuse/accidental mistakes (1) Security cameras/CCTV etc must explain how it prevents (2 or 0) (ii) External: 1 mark for measure and 1 mark for explanation of how measure prevents threat. Examples Audit trails/Backups MUST explain how they protect (so either 2 or 0) Firewalls (1) prevent access to/corruption of data from external sources (1) Encryption (1) used to prevent misuse of data if intercepted during transfer (1) Physical measures locks/guards/ CCTV (1) prevent unauthorised access by non employees (1) UPS (1)-prevent loss of data when power lost (1).
http://www.nchadderton.zen.co.uk/front.htm Page 15 of 17
http://www.nchadderton.zen.co.uk/front.htm Page 16 of 17
http://www.nchadderton.zen.co.uk/front.htm Page 17 of 17