Chapter 7 - Securing Information System
Chapter 7 - Securing Information System
Use of networks/computers
Hardware problems outside of firm’s control
Hacker Cracker
individual who intends to gain used to denote a hacker with
unauthorized access to a criminal intent, although in
computer system public press.
ACTIVITIES
System Intrusion
System Damage
Cybervandalism - Intentional disruption, defacement,
destruction of Web site or corporate information
system
Hackers and Computer Crime
Spoofing Sniffing
Misrepresenting oneself by using fake e-mail Eavesdropping program that monitors
addresses or masquerading as someone else information traveling over network
Redirecting Web link to address different from Enables hackers to steal proprietary
intended one, with site masquerading as information such as e-mail, company files,
intended destination and so on
Hackers and Computer Crime
Denial-of-service attacks (DoS) Distributed denial-of-service attacks (DDoS)
Flooding server with thousands of false Use of numerous computers to launch a DoS
requests to crash the network
CLICK FRAUD
EVIL TWINS
Cyberterrorism
cyber criminal activities – launching malware, DoS attacks & phishing probes – are
borderless
China, the U.S, South Korea, Russia & Taiwan are currently the sources of most of the
world’s malware
The global nature of the Internet makes it possible for cybercriminals to operate- and
to do harm – anywhere in the world
Cyberwarfare
State-sponsored activity designed to cripple & defeat another state or nation by
penetrating its computers or networks for the purposes of causing damage & disruption
Social engineering
Computer forensics
• Scientific collection, examination, authentication, preservation, and
analysis of data from computer storage media for use as evidence in
court of law
• Includes recovery of ambient and hidden data
Organizational Frameworks for Security and Control
General Control Computer
Hardware
Software Control Operation
Govern design, security, and use of computer Control
programs and security of data files in general
Control
throughout organization’s information
technology infrastructure
Apply to all computerized applications
Data Security Implementation Administrative
Control Control Control
Information System
Control
Output Controls
Types of threat
Determines level of risk to firm if specific Probability of occurrence during year
Risk Assessment Potential losses, value of threat
activity or process is not properly controlled
Expected annual loss
Security policy Ranks information risks, identifies acceptable Acceptable use policy (AUP)
security goals, and identifies mechanisms for Defines acceptable uses of firm’s information
achieving these goals resources and computing equipment
Identity management
Disaster Devises plans for restoration of Business processes and tools to identify valid users of
Recovery disrupted services system and control access
Planning •Identifies and authorizes different categories
of users
Business Focuses on restoring business operations •Specifies which portion of system users can
Continuity after disaster access
•Authenticating users and protects identities
Planning
Information Examines firm’s overall security environment as well as controls governing individual information systems
systems audit Reviews technologies, procedures, documentation, training, and personnel
May even simulate disaster to test response of technology, IS staff, other employees
Lists and ranks all control weaknesses and estimates probability of their occurrence
Assesses financial and organizational impact of each threat
Tools and Technologies for Safeguarding Information
Resources
Identity management software
Password systems
Tokens
Biometric authentication
Two-factor authentication
Firewalls
Antivirus and Antispyware System
Combination of hardware and software that prevents
unauthorized users from accessing private networks Checks computers for presence of malware and can often
eliminate it as well
Requires continual updating
Static packet Stateful
filtering inspection
Enable client & server computers to manage encryption & decryption activities; so
Encryption they communicate with each other during a secure web session.