Managing Information Systems: Seventh Canadian Edition
Managing Information Systems: Seventh Canadian Edition
CHAPTER 8
Securing Information Systems
• Security:
– Policies, procedures, and technical measures used to
prevent unauthorized access, alteration, theft, or
physical damage to information systems
• Controls:
– Methods, policies, and organizational procedures that
ensure safety of organization’s assets; accuracy and
reliability of its accounting records; and operational
adherence to management standards
Computer viruses:
• Rogue software programs that attach to other
programs in order to be executed, usually without
user knowledge or permission
Worms: programs with ill intent that can copy
themselves from one computer to another over
networks by exploiting security vulnerabilities
Trojan horses: software programs that appear to be
benign, but then does something unexpected
Spoofing
• masquerading as someone else, or redirecting a
Web link to an unintended address
Sniffing
• an eavesdropping program that
monitors
information travelling over a
network
Identity theft
•A crime in which the imposter obtains key pieces of
personal information
Phishing
•Setting up fake Web sites or sending email messages
that look legitimate, and using them to ask for
confidential data
Pharming
•Redirects users to a bogus web site
9
[INSERT TABLE 8.3]
Hackers:
• individuals who attempt to gain unauthorized
access to a computer system
• Cracker: a hacker with criminal intent
Cybervandalism:
• intentional disruption, defacement, or destruction of a
Web site or system
Click Fraud
• Bogus clicks to drive up pay-per-clicks
Cyberterrorism and Cyberwarfare
• Exploitation of systems by terrorists
Adware – any software package that automatically
downloads, displays, or plays advertisements to a
computer, often without the user’s permission in the
form of a pop-up
Spyware – software that secretly installs on a user’s
machine and collects information about the user
without their knowledge
Copyright © 2015 Pearson Canada Inc. 8-12
More
14
Implementation
Firewall
Provide authentication and access control
Example: packet filtering firewall, proxy firewall
Antivirus software
Provide data and system integrity, access control
Example: Norton, Trend Micro, AVG etc.
Hardware Controls
Provide authentication, access control, availability
Example: dedicated hardware, smartcard, fingerprint scan, retina scan, VPN
dongle, backup etc
Security software
Service provided depends on type of security software used (authentication,
confidentiality, integrity, access control etc.)
User awareness
Core of any implementation
15
Firewalls, Intrusion Detection Systems, and
Antivirus Software
Transformation
meet me after PHHW PH DIWHU
based on a key
the toga party WKH WRJD SDUWB
18
Brute Force Search
20
Image Source: http://techliberation.com/wp-content/uploads/2011/01/encryption.jpg
Digital Signature
Signed text
21
Image Source: https://tspace.library.utoronto.ca/html/1807/4637/jmir_v4i2e12_fig2.jpg
Digital Certificate
It bears the digital signature of certain certificate
authority whose identify is built into the
operating system/web browser
The OS can verity the legitimacy of the digital signature, hence the legitimacy of the
certificate, and hence the identify of the certificate holder
The certificate also contains the public key of the certificate holder
22
How to Secure online Conversation with
Strangers
eBay first creates a pair of keys, one public key and one private key
It then submits the public key to VeriSign to get a certificate
The certificate contains information about eBay and its public key
VeriSign is the biggest certificate authority
When Romeo contacts eBay to sign up for an account, eBay presents its
certificate to his web browser.
The process to verify a certificate is built into the browser.
The browser verifies that the certificate is valid and it belongs to eBay
This step proves that Romeo is indeed in contact with eBay, not an impersonator
The browser then extracts eBay’s public key from the certificate.
It then randomly generates a symmetric key and encrypts it using eBay’s public
key and sends it back to eBay.
Since it is encrypted with eBay’s public key, it can be decrypted only by eBay’s private key.
eBay then decrypts the systematic key with its private key.
Now Romeo and eBay shares a symmetric key and all subsequent conversation
can be encrypted using this symmetric key.
23
Steganography
24
System Vulnerability
Patches
• Small pieces of software to repair flaws
• Exploits often created faster than patches can be
released and implemented
26
Image source: http://en.wikipedia.org/wiki/Wardriving
Software vulnerability: the Other Side of the
Story
27
Business Value of Security and Control
28
Legal and Regulatory Requirements
29
Risk Assessment
Risk Assessment
• Determine level of risk to the firm in the case of
improper controls
Security policy
• Acceptable Use Policy (AUP)
• Authorization Policies
• Authorization Management systems
31
Security Profiles for a
Personnel System
Figure 8-4
32
Business Continuity Planning
33
Business Value of Security and Control
Continued …
CHAPTER 8
Securing Information Systems