Chapter 8 - Securing Information Systems
Chapter 8 - Securing Information Systems
Securing Information
Systems
1
10/29/2014
• Security:
• Policies, procedures and technical measures used to prevent
unauthorized access, alteration, theft, or physical damage to
information systems
• Controls:
• Methods, policies, and organizational procedures that ensure
safety of organization’s assets; accuracy and reliability of its
accounting records; and operational adherence to
management standards
2
10/29/2014
• E-mail attachments
3
10/29/2014
4
10/29/2014
1-10
5
10/29/2014
1-11
6
10/29/2014
•Malware (cont.)
• Spyware
• Small programs install themselves surreptitiously on
computers to monitor user Web surfing activity and serve
up advertising
• Key loggers
• Record every keystroke on computer to steal serial numbers,
passwords, launch Internet attacks
• Other types:
• Reset browser home page
• Redirect search requests
• Slow computer performance by taking up memory
7
10/29/2014
Cookies
• Cookie – a small file that contains information about you and
your Web activities, which a Web site places on your computer
• Handle cookies by using
• Web browser cookie management option
• Buy a program that manages cookies
• Not executable, cannot deliver a virus or other malicious code
• Only web server that delivered it can read it
• Your computer can store cookies from many web sites
• May be a security risk if it is implemented poorly on site that you
have shared personal information with and rely on cookies to
access it
• Anyone who can access the cookie on your hard drive can now access that
personal information
• Most reputable sites to not rely on cookies for authentication alone.
8-15
8
10/29/2014
•Spoofing
–Misrepresenting oneself by using fake e-mail addresses or
masquerading as someone else
–Redirecting Web link to address different from intended
one, with site masquerading as intended destination
•Sniffer
–Eavesdropping program that monitors information
traveling over network
–Enables hackers to steal proprietary information such as e-
mail, company files, and so on
• use your debit card information to purchase items illegally.
• steal your logon and passwords for various accounts.
• assume your identity.
9
10/29/2014
•Computer crime
• Defined as “any violations of criminal law that involve
a knowledge of computer technology for their
perpetration, investigation, or prosecution”
• Computer may be target of crime, for example:
• Breaching confidentiality of protected computerized data
• Accessing a computer system without authority
• Computer may be instrument of crime, for example:
• Theft of trade secrets
• Using e-mail for threats or harassment
10
10/29/2014
•Identity theft
• Theft of personal Information (social security ID,
driver’s license, or credit card numbers) to
impersonate someone else
•Phishing
• Setting up fake Web sites or sending e-mail messages
that look like legitimate businesses to ask users for
confidential personal data.
•Evil twins
• Wireless networks that pretend to offer trustworthy
Wi-Fi connections to the Internet
•Pharming
–Redirects users to a bogus Web page, even when
individual types correct Web page address into his or
her browser
•Click fraud
–Occurs when individual or computer program
fraudulently clicks on online ad without any intention
of learning more about the advertiser or making a
purchase
•Cyberterrorism and Cyberwarfare
11
10/29/2014
12
10/29/2014
•Software vulnerability
–Commercial software contains flaws that create
security vulnerabilities
• Hidden bugs (program code defects)
– Zero defects cannot be achieved because complete testing is not
possible with large programs
• Flaws can open networks to intruders
–Patches
• Small pieces of software to repair flaws
• Exploits often created faster than patches can be released
and implemented
13
10/29/2014
•Electronic evidence
–Evidence for white collar crimes often in digital form
• Data on computers, e-mail, instant messages, e-
commerce transactions
–Proper control of data can save time and money when
responding to legal discovery request
•Computer forensics:
–Scientific collection, examination, authentication,
preservation, and analysis of data from computer
storage media for use as evidence in court of law
–Includes recovery of ambient and hidden data
14
10/29/2014
• Application controls
• Specific controls unique to each computerized application,
such as payroll or order processing
• Include both automated and manual procedures
• Ensure that only authorized data are completely and
accurately processed by that application
• Types of application controls:
• Input controls - input authorization, data conversion, data
editing, and error handling
• Processing controls - establish that data are complete and
accurate during updating
• Output controls - ensure that the results of computer
processing are accurate, complete, and properly distributed
15
10/29/2014
•Security policy
• Ranks information risks, identifies acceptable security
goals, and identifies mechanisms for achieving these
goals
• Drives other policies
• Acceptable use policy (AUP)
• Defines acceptable uses of firm’s information resources and
computing equipment
• Authorization policies
• Determine differing levels of user access to information assets
16
10/29/2014
•Identity management
–Business processes and tools to identify valid users
of system and control access
• Identifies and authorizes different categories of users
• Specifies which portion of system users can access
• Authenticating users and protects identities
–Identity management systems
• Captures access rules for different levels of users
17
10/29/2014
18
10/29/2014
FIGURE 8-4
19
10/29/2014
•Firewall:
–Combination of hardware and software that
prevents unauthorized users from accessing
private networks
–Firewalls can deter, but not completely
prevent, network penetration by outsiders
and should be viewed as one element in an
overall security plan
A CORPORATE FIREWALL
20
10/29/2014
21
10/29/2014
•Encryption:
–Transforming text or data into cipher text
that cannot be read by unintended
recipients
–Two methods for encryption on networks
•Secure Sockets Layer (SSL) and successor
Transport Layer Security (TLS)
•Secure Hypertext Transfer Protocol (S-
HTTP)
22
10/29/2014
23
10/29/2014
•Digital certificate:
• Data file used to establish the identity of users and
electronic assets for protection of online transactions
• Uses a trusted third party, certification authority (CA), to
validate a user’s identity
• CA verifies user’s identity, stores information in CA server,
which generates encrypted digital certificate containing
owner ID information and copy of owner’s public key
•Public key infrastructure (PKI)
• Use of public key cryptography working with certificate
authority
• Widely used in e-commerce
DIGITAL CERTIFICATES
24
10/29/2014
Hot Site
• A hot site is a commercial disaster recovery service that allows a business to
continue computer and network operations in the event of a computer or
equipment disaster.
• If an firm’s data center becomes inoperable it can move all data processing
operations to a hot site.
• A hot site is a duplicate of the original site of the organization, with full
computer systems as well as near-complete backups of user data.
• The site has all the equipment needed for the enterprise to continue
operation, including office space and furniture, telephone jacks and
computer equipment.
• Real time synchronization between the two sites may be used to completely
mirror the data environment of the original site.
• Following a disruption to the original site, the hot site exists so that the
organization can relocate with minimal losses to normal operations.
• Ideally, a hot site will be up and running within a matter of hours or even less.
• Example – Hurricane Katrina - oil company hot sites
25
10/29/2014
• Recovery-oriented computing
• Designing systems that recover quickly with capabilities to
help operators pinpoint and correct of faults in multi-
component systems
• Controlling network traffic- enables a network to sort low-
priority data packets from high-priority ones in order to improve
performance for business critical communication
• Deep packet inspection (DPI) - enables a network to sort low-
priority data packets from high-priority ones in order to
improve performance for business critical communication.
• Security outsourcing
• Managed security service providers (MSSPs)
26
10/29/2014
27
10/29/2014
28