IS Today: Managing in a Digital World 9/17/12

Similar documents
Securing Information Systems

Information Security in Corporation

Securing Information Systems

Securing Information Systems

Chapter 10: Security and Ethical Challenges of E-Business

CHAPTER 8 SECURING INFORMATION SYSTEMS

Introduction to Computing

Chapter 6 Network and Internet Security and Privacy

Securing Information Systems

Cyber Criminal Methods & Prevention Techniques. By

Keys to a more secure data environment

God is in the Small Stuff and it all matters. .In the Small Stuff. Security and Ethical Challenges. Introduction to Information Systems Chapter 11

The Cyber War on Small Business

Personal Cybersecurity

Discovering Computers Living in a Digital World

Securing Information Systems

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

716 West Ave Austin, TX USA

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

Chapter 4 Network and Internet Security

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

Checklist: Credit Union Information Security and Privacy Policies

University of Pittsburgh Security Assessment Questionnaire (v1.7)

CHAPTER 3. Information Systems: Ethics, Privacy, and Security

Cybercrime Criminal Law Definitions and Concepts

Introduction to Information Security Dr. Rick Jerz

A practical guide to IT security

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Gujarat Forensic Sciences University

Cyber Crime Update. Mark Brett Programme Director February 2016

4 Information Security

Securing Information Systems Barbarians at the Gateway

QuickBooks Online Security White Paper July 2017

Keep the Door Open for Users and Closed to Hackers

Chapter 12. Information Security Management

Certified Cyber Security Analyst VS-1160

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable?

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents

CONTROL AUDIT AND SECURITY OF INFORMATION SYSTEM

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 1 Introduction to Security

Information Technology Cyber Security Policy. Convergint Technologies, LLC

FRAUD-RELATED INTERNAL CONTROLS

Securing the Distributed Enterprise

II.C.4. Policy: Southeastern Technical College Computer Use

Computer Security. Assoc. Prof. Pannipa Phaiboonnimit. Adapted for English Section by Kittipitch Kuptavanich and Prakarn Unachak

What can the OnBase Cloud do for you? lbmctech.com

2005 E-Crime Watch Survey Survey Results Conducted by CSO magazine in cooperation with the U.S. Secret Service and CERT Coordination Center

Security Policies and Procedures Principles and Practices

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored

Cybersecurity and Hospitals: A Board Perspective

E-Commerce Security Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al.

Securing Information Systems

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

SECURITY & PRIVACY DOCUMENTATION

Projectplace: A Secure Project Collaboration Solution

Chapter 9 Security and Privacy

Apex Information Security Policy

Employee Security Awareness Training

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 1 Introduction to Security

Recommendations for Implementing an Information Security Framework for Life Science Organizations

CYBER SECURITY AND MITIGATING RISKS

Securing Information Systems

PROVIDING INVESTIGATIVE SOLUTIONS

The Honest Advantage

AUTOMATED PENETRATION TESTING PRODUCTS Justification and Return on Investment (ROI)

Online Threats. This include human using them!

Internet of Things Toolkit for Small and Medium Businesses

Risky Business. How Secure is Your Dealership s Information? By Robert Gibbs

Governance Ideas Exchange

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Whitepaper on AuthShield Two Factor Authentication with SAP

An Overview of the Gramm-Leach-Bliley (GLB) Act and the Safeguards Rule

Cybersecurity, safety and resilience - Airline perspective

Information Security Is a Business

itexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Chapter 1 B: Exploring the Network

Writer Corporation. Data Protection Policy

Regulation P & GLBA Training

How Secured2 Uses Beyond Encryption Security to Protect Your Data

Why you MUST protect your customer data

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Information Technology General Control Review

Cyber Security Practice Questions. Varying Difficulty

CTS performs nightly backups of the Church360 production databases and retains these backups for one month.

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services.

e-commerce Study Guide Test 2. Security Chapter 10

Evolution of Spear Phishing. White Paper

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright Chapter 12 1

June 2 nd, 2016 Security Awareness

Subject: University Information Technology Resource Security Policy: OUTDATED

Certified Cyber Security Specialist

Nine Steps to Smart Security for Small Businesses

Cyber Insurance: What is your bank doing to manage risk? presented by

Preventing Corporate Espionage: Investigations, Data Analyses and Business Intelligence

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center

PRIVACY POLICY Let us summarize this for you...

Electronic Network Acceptable Use Policy

Transcription:

IS Today: Managing in a Digital World Chapter 10 Securing Information Systems Worldwide losses due to software piracy in 2005 exceeded $34 billion. Business Software Alliance, 2006 Accessories for war driving can be easily built using simple parts. 10-1 Worldwide losses due to software piracy in 2008 exceeded $50 billion. Business Software Alliance, 2009 Worldwide losses due to software piracy in 2010 exceeded $59 billion. Business Software Alliance, 2011 10-3 Primary Threats to Information Systems Security Natural disasters Power outages, hurricanes, floods, and so on Accidents Power outages, cats walking across keyboards Employees and consultants Links to outside business contacts Travel between business affiliates Outsiders Viruses 10-4 Computer Crime 10-5 Computer crime The act of using a computer to commit an illegal act. Targeting a computer while committing an offense. Using a computer to commit an offense. Using computers to support a criminal activity. Overall trend for computer crime has been declining over the past several years (CSI, 2009). Many incidents are never reported. Types of Computer Crimes and Financial Losses What do you think happens to a company s stock price if they report that their systems have been compromised? Would you report it if you didn t have to? 6 1

IS Today: Managing in a Digital World Computer Virus Attacks Financial impact of virus attacks, 1995 2006, and beyond. Source: Based on: http://www.computereconomics.com. 10-7 Federal and State Laws The two main federal laws against computer crime are: Computer Fraud and Abuse Act of 1986 Stealing or compromising data about national defense, foreign relations, atomic energy, or other restricted information Violating data belonging to banks or other financial institutions Intercepting or otherwise intruding on communications between states or foreign countries Threatening to damage computer systems in order to extort money or other valuables from persons, businesses, or institutions Electronic Communications Privacy Act of 1986 makes it a crime to break into any electronic communications service, including telephone services prohibits the interception of any type of electronic communications 10-8 Patent protection U.S. Copyright Act Other Federal Laws amended in 1980 for computer software Financial Privacy Act protects information: credit card, credit reporting, bank loan applications Enforcement responsibilities FBI espionage, terrorism, banking, organized crime, and threats to national security Secret Service crimes against U.S. Treasury Department computers and against violations of the Right to Financial Privacy Act 10-9 Hacking and Cracking Which one is the bad guy? Hackers Crackers Hacktivists 10-10 Types of Criminals Computer Viruses and Other Destructive Code No clear profile as to who commits computer crimes Four groups of computer criminals 1. Current or former employees 10-11 85 95% of theft from businesses comes from the inside 2. People with technical knowledge committing crimes for personal gain 3. Career criminals using computers to assist them in crimes 4. Outside crackers hoping to find information of value About 12 percent of cracker attacks cause damage What is your favorite virus? 10-12 2

IS Today: Managing in a Digital World Denial of Service Attack Cybersquatting Attackers prevent legitimate users from accessing services. Zombie computers Created by viruses or worms Attack Web sites Servers crash under increased load. MyDoom attack on Microsoft s Web site 10-13 10-14 The practice of registering a domain name and later reselling it. Some of the victims include: Eminem Panasonic Hertz Avon Anti-Cybersquatting Consumer Protection Act in 1999 Fines as high as $100,000 Some companies pay the cybersquatters to speed up the process of getting the domain. Cyber Harassment, Stalking, and Bullying Cyber harassment Crime that broadly refers to the use of a computer to communicate obscene, vulgar, or threatening content. Cyber stalking Making false accusations that damage reputation of another Gaining information on a victim by monitoring online activities Using the Internet to encourage others to harass a victim Attacking data and equipment of a victim by sending e-mail viruses or other destructive code Using the Internet to place false orders for goods or services 10-15 10-16 Cyberterrorism 10-18 3

IS Today: Managing in a Digital World Information Systems Security Technological Safeguards All systems connected to a network are at risk. Internal threats External threats 10-19 Information systems security Precautions to keep IS safe from unauthorized access and use Increased need for good computer security with increased use of the Internet Physical access restrictions Authentication Use of passwords Photo ID cards, smart cards Keys to unlock a computer Combination Authentication dependent on Something you have Something you know Something you are 10-20 Biometrics Wireless LAN Control Form of authentication Fingerprints Retinal patterns Facial features and so on Fast authentication High security 10-21 Wireless LAN cheap and easy to install Use on the rise Signal transmitted through the air Susceptible to being intercepted Drive-by hacking 10-22 Connection constructed dynamically within an existing network Virtual Private Networks 10-23 Firewalls Firewall A system designed to detect intrusion and prevent unauthorized access Implementation Hardware, software, mixed 10-24 Tunneling Send private data over public network Encrypted information 4

IS Today: Managing in a Digital World Encryption 10-25 Message encoded before sending Message decoded when received Cryptography the science of encryption. It requires use of a key for decoding. Certificate authority manages distribution of keys on a busy Web site. Secure Sockets Layer (SSL) popular public key encryption method. Virus Monitoring and Prevention Virus prevention 10-26 Purchase and install antivirus software. Update frequently. Do not download data from unknown sources. Flash drives, disks, Web sites Delete (without opening) e-mails from unknown sources. Do not blindly open e-mail attachments Even if they come from a known source. Report any viruses to the IT department. Specialized facilities are important. Technical Requirements Power Cooling How do organizations reliably protect themselves from threats? Secure Data Centers 10-27 High-availability facilities To ensure uninterrupted service Self-sufficient Backup cooling systems Raised floors (to more easily reconfigure systems) Built to withstand storms Collocation facilities UPS servers need 24/7/365 reliability Ensuring Availability 10-28 Securing the Facilities Infrastructure 10-29 Backups Secondary storage devices Regular intervals Backup sites Cold backup site Hot backup site Redundant data centers Different geographic areas Closed-circuit television (CCTV) Monitoring for physical intruders Video cameras display and record all activity Digital video recording Uninterruptible power supply (UPS) Protection against power surges What is Computer Forensics? 5

IS Today: Managing in a Digital World Managing Information Systems Security 10-31 Non-technical safeguards Management of people s use of IS Acceptable use policies Trustworthy employees Well-treated employees 10-32 Disaster Planning Disasters can t be completely avoided. Need to be prepared. Business continuity plan describes how a business resumes operation after a disaster Disaster recovery plan Subset of business continuity plan Procedures for recovering from systems-related disasters Two types of objectives Recovery time objectives (Maximum time allowed to recover) Recovery point objectives (How current should the backup material be?) 10-33 Responding to a Security Breach Restore lost data. Perform new risk audit. 10-34 Implement additional safeguards. Contact law enforcement. Computer Emergency Response Team Coordination Center (Federal government center of Internet security expertise) 10-35 Hierarchy of IS Controls 10-36 6

IS Today: Managing in a Digital World Policies Define aim and objectives. Standards Types of IS Controls 10-37 Support the requirements of policies. Organization and management Define the lines of reporting. Physical and environmental controls Protect the organization s IS assets. Types of IS Controls (cont d) 10-38 Systems software controls Enable applications and users to utilize the systems. Systems development and acquisition controls Ensure systems meet the organization s needs. Application-based controls Ensures correct input, processing, storage, and output of data; maintain record of data as it moves through the system. Information Systems audit IS Auditing 10-39 Performed by external auditors to help organizations assess the state of their IS controls. To determine necessary changes To assure the IS availability, confidentiality, and integrity Risk assessment Determine what type of risks the IS infrastructure faces. Computer-Assisted Auditing Tools (CAAT) Specific software to test applications and data, using test data or simulations. The Sarbanes-Oxley Act Help organizations to maximize the benefits from their IS infrastructure Establish appropriate controls 10-40 The Sarbanes-Oxley Act was formed as a reaction to largescale accounting scandals. WorldCom, Enron It primarily addresses the accounting side of organizations. Companies have to demonstrate that: controls are in place to prevent misuse and fraud, controls are in place to detect potential problems, and measures are in place to correct problems COBIT (Control Objectives for Information and Related Technology) Set of best practices 7