Ethics and Information Security. 10 주차 - 경영정보론 Spring 2014

Similar documents
MIS 300 Exam 2 Spring 2011

Discovering Computers Living in a Digital World

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Define information security Define security as process, not point product.

God is in the Small Stuff and it all matters. .In the Small Stuff. Security and Ethical Challenges. Introduction to Information Systems Chapter 11

Securing Information Systems

Chapter 10: Security and Ethical Challenges of E-Business

Access Controls. CISSP Guide to Security Essentials Chapter 2

E-Commerce Security Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al.

Guide to Network Security First Edition. Chapter One Introduction to Information Security

Unit 2 Assignment 2. Software Utilities?

CHAPTER 8 SECURING INFORMATION SYSTEMS

Securing Information Systems

CYBER SECURITY AND MITIGATING RISKS

Securing Information Systems

Technology in Action 12/11/2014. Cybercrime and Identity Theft (cont.) Cybercrime and Identity Theft (cont.) Chapter Topics

ECDL / ICDL IT Security. Syllabus Version 2.0

CHAPTER 3. Information Systems: Ethics, Privacy, and Security

SECURE USE OF IT Syllabus Version 2.0

Chapter 12. Information Security Management

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright Chapter 12 1

A Review Paper on Network Security Attacks and Defences

e-commerce Study Guide Test 2. Security Chapter 10

Online Threats. This include human using them!

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

Certified Ethical Hacker

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats

Computer Security. Assoc. Prof. Pannipa Phaiboonnimit. Adapted for English Section by Kittipitch Kuptavanich and Prakarn Unachak

4 Information Security

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

Network Security Issues and Cryptography

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model

Language-Based Protection

NETWORK THREATS DEMAN

Securing Information Systems

Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015

Security Policies and Procedures Principles and Practices

Chapter 19 Security. Chapter 19 Security

Acceptable Use Policy

2. INTRUDER DETECTION SYSTEMS

II.C.4. Policy: Southeastern Technical College Computer Use

Chapter 4. Network Security. Part I

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

Chapter 1 Ethical Hacking Overview. Revised

Acceptable Use Policy

Chapter 6 Network and Internet Security and Privacy

INTERNET SAFETY IS IMPORTANT

Cyber Criminal Methods & Prevention Techniques. By

Ethical Hacking and Countermeasures: Attack Phases, Second Edition. Chapter 1 Introduction to Ethical Hacking

The Tension. Security vs. ease of use: the more security measures added, the more difficult a site is to use, and the slower it becomes

Guest Wireless Policy

Certified Cyber Security Specialist

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Home Computer and Internet User Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 1 Introduction to Security

The Need for Biometric Authentication

Cyber Security Practice Questions. Varying Difficulty

Future-ready security for small and mid-size enterprises

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture

Unit 2 Essentials of cyber security

Threat Control and Containment in Intelligent Networks. Philippe Roggeband - Product Manager, Security, Emerging Markets

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

Threat analysis. Tuomas Aura CS-C3130 Information security. Aalto University, autumn 2017

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 1 Introduction to Security

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Cyber Security Panel Discussion Gary Hayes, SVP & CIO Technology Operations. Arkansas Joint Committee on Energy March 16, 2016

Investigative Response Case Metrics Initiative Preliminary findings from 700+ data compromise investigations

Principles of Information Security, Fourth Edition. Chapter 2 The Need for Security

Curso: Ethical Hacking and Countermeasures

A Security Model for Space Based Communication. Thom Stone Computer Sciences Corporation

Chapter 15: Security. Operating System Concepts 8 th Edition,

Chapter 1 B: Exploring the Network

Certified Ethical Hacker (CEH)

The Honest Advantage

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

CS System Security 2nd-Half Semester Review

Information Security Management System ISO/IEC 27001:2013

Ethical Hacking and Prevention

SECURING INFORMATION SYSTEMS

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

PROTECTING INFORMATION ASSETS NETWORK SECURITY

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

itexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공

Analyzing and Specifying Reusable Security Requirements

CompTIA Security+ (Exam SY0-401)

Cybersecurity glossary. Please feel free to share this.

Checklist: Credit Union Information Security and Privacy Policies

# ROLE DESCRIPTION / BENEFIT ISSUES / RISKS

IT ACCEPTABLE USE POLICY

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Policy. London School of Economics & Political Science. Remote Access Policy. IT Services. Jethro Perkins. Information Security Manager.

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

The Learner can: 1.1 Describe the common types of security breach that can affect the organisation, such as:

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

Systems and Principles Unit Syllabus

The Security Problem

Transcription:

Ethics and Information Security 10 주차 - 경영정보론 Spring 2014

Ethical issue in using ICT? Learning Outcomes E-policies in an organization relationships and differences between hackers and viruses relationship between information security policies and an information security plan an example of each of the three primary security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response

Ethics Information ethics The principles and standards that guide our behavior toward other people Information ethics Govern the ethical and moral issues arising from the development and use of ICTs, as well as the creation, collection, duplication, distribution, and processing of information itself Business issues related to information ethics Intellectual property Copyright Pirated software Counterfeit software Digital rights management

Privacy Information ethics The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent Confidentiality the assurance that messages and information are available only to those who are authorized to view them Information Does Not Have Ethics, People Do

Tools to prevent information misuse Information management Information governance Information compliance Ediscovery

Information management policies Ethical computer use policy Contains general principles to guide computer user behavior ensures all users are informed of the rules and, by agreeing to use the system on that basis, consent to abide by the rules Information privacy policy Contains general principles regarding information privacy Acceptable use policy (AUP) Requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet Nonrepudiation A contractual stipulation to ensure that ebusiness participants do not deny their online actions Internet use policy Contains general principles to guide the proper use of the Internet

Information management policies Email Privacy Policy mitigate the risks of email and instant messaging communication tools by implementing and adhering to an email privacy policy Details the extent to which email messages may be read by others

Information management policies Social media policy Outlines the corporate guidelines or principles governing employee online communications

Workplace Monitoring Policy concern for many employees some people feel that monitoring employees is unethical Organizations can be held financially responsible for their employees actions an organization is placing itself at risk if it fails to monitor its employees Information technology monitoring Tracks people s activities by such measures as number of keystrokes, error rate, and number of transactions processed Employee monitoring policy Explicitly state how, when, and where the company monitors its employees

Workplace Monitoring Policy Common monitoring technologies Key logger or key trapper software Hardware key logger Cookie Adware Spyware Web log Clickstream

Protecting Intellectual assets Organizational information is intellectual capital it must be protected Information security The protection of information from accidental or intentional misuse by persons inside or outside an organization Downtime Refers to a period of time when a technical system is unavailable How Much Will Downtime Cost Your Business?

Protecting Intellectual assets Sources of Unplanned Downtime

Hacker Security Threats Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge Black-hat hacker Cracker Cyberterrorist Hactivist Script kiddies or script bunnies White-hat hacker

Virus Security Threats Software written with malicious intent to cause annoyance or damage Backdoor program Denial-of-service attack (DoS) Distributed denial-of-service attack (DDoS) Polymorphic virus Trojan-horse virus Worm

To ebusiness Elevation of privilege Hoaxes Malicious code Packet tampering Sniffer Spoofing Splogs Spyware Security Threats

The first line of defense-people The biggest issue surrounding information security is not a technical issue, but a people issue Insiders Social engineering Dumpster diving combat insider issues develop information security policies and an information security plan Information security policies identify the rules required to maintain information security Information security plan details how an organization will implement the information security policies

The second line of defense - technology primary IT security areas People Data Authentication and authorization Prevention and resistance Attacks Detection and response

Authentication and Authorization Authentication A method for confirming users identities Authorization The process of giving someone permission to do or have something type of authentication 1. Something the user knows 2. Something the user has 3. Something that is part of the user Biometrics The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting

Downtime cost Prevention and Resistance from $100 to $1 million per hour Technologies 1. Content filtering 2. Encryption 3. Firewalls

Content filtering Prevention and Resistance Prevents emails containing sensitive information from transmitting and stops spam and viruses from spreading Encryption Public key encryption (PKE) Certificate authority Digital certificate Firewall Hardware and/or software that guards a private network by analyzing the information leaving and entering the network

Detection and Response to mitigate the damage Intrusion detection software Features full-time monitoring tools that search for patterns in network traffic to identify intruders