Lecture 16 & 17
Lecture 16 & 17
Securing Information
Systems
Management Information Systems
Chapter 8 Securing Information Systems
LEARNING OBJECTIVES
• Security:
The architecture of a Web-based application typically includes a Web client, a server, and corporate information
systems linked to databases. Each of these components presents security challenges and vulnerabilities.
Floods, fires, power failures, and other electrical problems can cause disruptions at any point in the network.
Figure 8-1
Management Information Systems
Chapter 8 Securing Information Systems
• Internet vulnerabilities
• E-mail attachments
• War driving
• Eavesdroppers drive by buildings and try to intercept network traffic
• When hacker gains access to SSID, has access to network’s resources
Management Information Systems
Chapter 8 Securing Information Systems
Figure 8-2
Many Wi-Fi networks can be
penetrated easily by intruders
using sniffer programs to obtain
an address to access the
resources of a network without
authorization.
Management Information Systems
Chapter 8 Securing Information Systems
• Computer crime
• Defined as “any violations of criminal law that involve a knowledge
of computer technology for their perpetration, investigation, or
prosecution”
• Computer may be target of crime, e.g.:
• Breaching confidentiality of protected computerized data
• Accessing a computer system without authority
• Computer may be instrument of crime, e.g.:
• Theft of trade secrets
• Using e-mail for threats or harassment
Management Information Systems
Chapter 8 Securing Information Systems
• Click fraud
• Individual or computer program clicks online ad without any intention of
learning more or making a purchase
• Global threats - Cyberterrorism and cyberwarfare
• Concern that Internet vulnerabilities and other networks make digital
networks easy targets for digital attacks by terrorists, foreign intelligence
services, or other groups
Management Information Systems
Chapter 8 Securing Information Systems
• Inside knowledge
• Sloppy security procedures
• User lack of knowledge
• Social engineering:
• Tricking employees into revealing their passwords by
pretending to be legitimate members of the company in
need of information
Management Information Systems
Chapter 8 Securing Information Systems
• Software vulnerability
• Commercial software contains flaws that create security vulnerabilities
• Hidden bugs (program code defects)
• Zero defects cannot be achieved because complete testing
is not possible with large programs
• Flaws can open networks to intruders
• Patches
• Vendors release small pieces of software to repair flaws
• However, amount of software in use can mean exploits created
faster than patches be released and implemented
Management Information Systems
Chapter 8 Securing Information Systems
• Electronic evidence
• Evidence for white collar crimes often found in digital form
• Data stored on computer devices, e-mail, instant messages, e-
commerce transactions
• Proper control of data can save time, money when responding to legal discovery
request
• Computer forensics:
• Scientific collection, examination, authentication, preservation, and
analysis of data from computer storage media for use as evidence in
court of law
• Includes recovery of ambient and hidden data
Management Information Systems
Chapter 8 Securing Information Systems
Figure 8-5
Management Information Systems
Chapter 8 Securing Information Systems