Chapter 3
Chapter 3
Reynolds
Chapter 3
Securing Information
Systems
• Common causes
– Unclear expectations
– Inadequate training and feedback
– Program development that contains errors
– Incorrect input by a data-entry clerk
– 期望不明确
– 培训和反馈不足
– 程序开发包含错误
– 数据录入员输入错误
© 2016 Cengage Learning®. All Rights Reserved. May not be
scanned, copied
Preventing Computer-Related Waste and
Mistakes
• Involves:
– Establishing policies and procedures
– Implementing policies and procedures
– Monitoring policies and procedures
– Reviewing policies and procedures
• Questions to be answered
– Do current policies cover existing practices
adequately?
– Does the organization plan any new activities
in the future? Who will handle them and what
must be done?
– Are contingencies and disasters covered?
• ATM-skimming
– Ploutus (also called “Plotos”) is malware
designed to steal money directly from ATM
machines
• A “brick attack” involves attackers infecting
the servers that store customer data and
rendering them completely useless,
unable to be turned on “ 砖头攻击”是指攻击者感染存
储客户数据的服务器,使其完全失效,无法启动
© 2016 Cengage Learning®. All Rights Reserved. May not be
scanned, copied
The Computer as a Tool to Fight Crime
• JusticeXchange
– A Web-based data sharing system
– Provides information about offenders held in
participating jails across the United States
• Offender Watch
– Web-based system used to track registered
sex offenders
– Stores the registered offender’s address,
physical description, and vehicle information
– The public can access the database at
www.communitynotification.com
• Phishing
– The perpetrator sends an email that looks as
if it came from a legitimate institution 犯罪
者发送了一封看起来像是来自合法机构的电子邮件
– The recipient is asked to provide personal
identification information, e.g., a pin number and
password
• Financial services firms and retail/service
firms are common targets of phishing
attacks
© 2016 Cengage Learning®. All Rights Reserved. May not be
scanned, copied
Computer-Related Scams (cont’d.)
• 配置服务器以防入侵
• 每个应用程序专用一台服务器
• 打开审计跟踪
• 在公司网络和 Internet 之间安装公司防火墙
• 定期进行 IS 安全审计
© 2016 Cengage Learning . All Rights Reserved. May not be
®
• Identity theft
– Consumers should regularly check credit
reports with major credit bureaus
• Malware attacks
– Antivirus programs should be run to protect
your computer and to prevent spreading
malware to your friends and coworkers
• RFID tags
– Microchips with antenna
– Embedded in many of the products we buy,
e.g., medicine containers, clothing, computer
printers, car keys, library books, tires
– Generate radio transmissions that, if
appropriate measures are not taken, can lead
to potential privacy concerns
• Occupational stress
• Seated immobility thromboembolism (SIT)
• Repetitive strain injury (RSI)
– Carpal tunnel syndrome (CTS)