Week 6 Monday, February 27 • IT Infrastructure

advertisement
Week 6
Monday, February 27
• IT Infrastructure
• Reliability and Security of IT Services
• Security
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
1
IT Infrastructure, Another View…
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
2
IT Architecture and Advances in IT
• Era I - Mainframe (1950’s - 1970s)
– IT paradigm
• Centralized computing
• Automated functions
– Information management
• Focus on data (i.e., data processing and efficiency)
• Fixed reporting
• File-based
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
3
IT Architecture and Advances in IT
• Era II - PC (1970’s - 1980s)
– IT paradigm
• Microcomputer
• Decentralized, end-user developed computing
– Information management
• Focus on information (i.e., specialized applications)
• Specialized and personal software (i.e., electronic
spreadsheets, word processing, file management)
• Islands of information
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
4
IT Architecture and Advances in IT
• Era III - Network (1990’s - present)
– IT paradigm
• Client/server (fat and thin clients)
• Internet, intranet (within the organization),
extranet (between the organization and its
suppliers/partners)
• End-user computing
– Information management
• Focus on knowledge (i.e., OLAP tools, data
warehousing/mining)
• Relational and OO database (centralized data
repository)
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
5
Infrastructure
Delivering the right information to the right people at the right time
• Delivering IT resources to support users throughout the
organization
• Four layer infrastructure (Weill and Broadbent)
– IT components
– Human IT infrastructure
– Shared IT services – services that users can draw
upon and share to conduct business
– Shared and standard IT applications – stable
applications that change less frequently
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
6
Structure of the IT Infrastructure
Local applications
IT infrastructure
Shared and standard
IT applications
Shared IT services
Human IT infrastructure
IT components
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
7
Three Views of IT Infrastructure
• Economies of scale (utility) – providing IT/IS as a service
to the business to facilitate operations
– Emphasis on reducing costs
• Support for business programs (dependent) – IT tied to
business plan and value-added initiatives
• Flexibility to meet changes in the marketplace (enabling)
– IT planning tied to business strategic plan
– Co-alignment between business strategy and IT
strategy
– Strategic IT and strategic IT planning
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
8
Strategic Grid: Placing Infrastructure
Planning and Management in Perspective
High
Factory
Operational IT
Impact of
Existing IT
applications
Support
Basic elements
Low Less critical
Low
Mission Critical
Strategic
Strategic IT plan,
initiatives
Turnaround
Gradual adoption
Impact of Future IT applications
High
How we view reliability and security depends on where the
organization lies on the strategic grid.
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
9
Reliability and Availability of the
Infrastructure
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
10
Infrastructure Reliability
• Ensuring continuous operations in support of the
organization
– 27 x 7 operation (if important)
– Redundancy of components
– Cost of maintaining continuous operations
vs. cost of failure
– Threats and countermeasures
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
11
Availability
100%
Component 1
98%
availability
Component 2
98%
availability
Component 3
98%
availability
Component 4
98%
availability
Component 5
98%
availability
.98 x .98 x .98 x .98 x .98 = .9039
Availability
Overall service availability
Complexity of the system increases as
the number of components increase
0%
Number of components
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
12
Availability
Component 1
98%
availability
Component 2
98%
availability
Component 3
98%
availability
Component 4
98%
availability
Component 5
98%
availability
.98 x .98 x .98 x .98 x .98 = .9039
Component 1
98%
availability
Component 2
98%
availability
Component 3
98%
availability
Component 4
98%
availability
Component 5
98%
availability
Redundancy:
If each component has a failure rate of .02,
then a complete failure of the system is
.02 x .02 x .02 x .02 x .02 = .000000032
Components running in parallel
(i.e., each component is capable
of doing all functions)
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
13
Making a High-Availability Facility
•
•
•
•
•
Uninterruptible electric power delivery
Physical security
Climate control and fire suppression
Network connectivity
N+1 and N+N redundancy of mission critical
components
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
14
Malicious Threats and Defensive Measures
• Types of threats:
– External attacks – denial of service (DoS)
– Intrusion – access via the IT infrastructure
– Viruses and worms
• Defensive measures
– Security policies – defines security by recognizing IT
as a resource
– Firewalls
– Authentication
– Encryption
– Patching and change management
– Intrusion detection and network monitoring
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
15
Risk Management
• Risk of failure or a breach of security
• Must be classified (i.e., critical, not critical, etc.)
• Addressed in proportion to their likelihood and potential
consequences
• Management action to mitigate risks
– Costs vs. potential benefits
– Expected loss (probability of a threat occurring x cost)
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
16
Prioritization of Risks
High
Fire
Hacking
Earthquake
Consequences
Intrusion
Critical
Threats
Corporate espionage
Construction
Minor
Threats
Flooding
Lightning
Low
0
Probability
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
1
17
Managing Threats and Risks
•
•
•
•
•
Sound infrastructure design
Disciplined execution of operating procedures
Careful documentation
Established crisis management procedures
Rehearsing incident response
– Security audit
• Recovery procedures
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
18
Another View of Security and Threats…
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
19
Threats
• Any situation or event, whether intentional or
unintentional, that will adversely affect a system and
consequently the organization.
– Tangible losses (hardware, software, data)
– Intangible losses (credibility, confidentiality)
Countermeasures and Contingency Plans
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
20
Threats and Countermeasures
• Initiate countermeasures to overcome threats
– Consider the types of threat and their impact on the
organization
• Cost-effectiveness
• Frequency
• Severity
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
21
Threats and Countermeasures
• Objective is to achieve a balance between a reasonable
secure operation, which does not unduly hinder users,
and the costs of maintaining it.
Secured
Operations
Costs
Risks
• Risks are independent of the countermeasures
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
22
Countermeasures
• Computer-based vs. Non-computer-based
Implemented
through the
operating system
and/or DBMS
Management
policies and
procedures
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
23
Computer-Based Controls
•
•
•
•
•
•
Authorization
Backup (and recovery)
Journaling
Integrity controls
Encryption
Associated procedures
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
24
Noncomputer-Based Controls
•
•
•
•
•
•
•
•
•
Security policy and contingency plans
Personnel controls
Securing positioning of equipment
Secure data and software
Escrow agreements
Maintenance agreements
Physical access controls
Building controls
Emergency arrangements
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
Managementoriented
25
Non-Computer-Based Controls:
Countermeasures
• Security policy and contingency plan
– Security - covers the operations of the database
– Contingency plan - addresses plans for catastrophic
events
• Procedures to follow
• Line of command
• Personal controls
– Assessing and monitoring employees
– Training
– Responsibilities - sharing and splitting
– Job controls
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
26
Non-Computer-Based Controls:
Countermeasures
• Securing:
– Hardware
– Data and software
• Physical access controls
– Internal and external
• Emergency arrangements
– Cold, warm and hot sites
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
27
Non-Computer-Based Controls:
Countermeasures
• Risk analysis
– Identify assets
– Identify threats and risks
– Establish their costs relative to losses
– Determine countermeasure
• Establish effectiveness of the countermeasure
• Establish cost of implementing the countermeasure
– Examine cost/benefit of countermeasure
– Make recommendation
R. Ching, Ph.D. • MIS Area • California State University, Sacramento
28
Download