Week 6 Monday, February 27 • IT Infrastructure • Reliability and Security of IT Services • Security R. Ching, Ph.D. • MIS Area • California State University, Sacramento 1 IT Infrastructure, Another View… R. Ching, Ph.D. • MIS Area • California State University, Sacramento 2 IT Architecture and Advances in IT • Era I - Mainframe (1950’s - 1970s) – IT paradigm • Centralized computing • Automated functions – Information management • Focus on data (i.e., data processing and efficiency) • Fixed reporting • File-based R. Ching, Ph.D. • MIS Area • California State University, Sacramento 3 IT Architecture and Advances in IT • Era II - PC (1970’s - 1980s) – IT paradigm • Microcomputer • Decentralized, end-user developed computing – Information management • Focus on information (i.e., specialized applications) • Specialized and personal software (i.e., electronic spreadsheets, word processing, file management) • Islands of information R. Ching, Ph.D. • MIS Area • California State University, Sacramento 4 IT Architecture and Advances in IT • Era III - Network (1990’s - present) – IT paradigm • Client/server (fat and thin clients) • Internet, intranet (within the organization), extranet (between the organization and its suppliers/partners) • End-user computing – Information management • Focus on knowledge (i.e., OLAP tools, data warehousing/mining) • Relational and OO database (centralized data repository) R. Ching, Ph.D. • MIS Area • California State University, Sacramento 5 Infrastructure Delivering the right information to the right people at the right time • Delivering IT resources to support users throughout the organization • Four layer infrastructure (Weill and Broadbent) – IT components – Human IT infrastructure – Shared IT services – services that users can draw upon and share to conduct business – Shared and standard IT applications – stable applications that change less frequently R. Ching, Ph.D. • MIS Area • California State University, Sacramento 6 Structure of the IT Infrastructure Local applications IT infrastructure Shared and standard IT applications Shared IT services Human IT infrastructure IT components R. Ching, Ph.D. • MIS Area • California State University, Sacramento 7 Three Views of IT Infrastructure • Economies of scale (utility) – providing IT/IS as a service to the business to facilitate operations – Emphasis on reducing costs • Support for business programs (dependent) – IT tied to business plan and value-added initiatives • Flexibility to meet changes in the marketplace (enabling) – IT planning tied to business strategic plan – Co-alignment between business strategy and IT strategy – Strategic IT and strategic IT planning R. Ching, Ph.D. • MIS Area • California State University, Sacramento 8 Strategic Grid: Placing Infrastructure Planning and Management in Perspective High Factory Operational IT Impact of Existing IT applications Support Basic elements Low Less critical Low Mission Critical Strategic Strategic IT plan, initiatives Turnaround Gradual adoption Impact of Future IT applications High How we view reliability and security depends on where the organization lies on the strategic grid. R. Ching, Ph.D. • MIS Area • California State University, Sacramento 9 Reliability and Availability of the Infrastructure R. Ching, Ph.D. • MIS Area • California State University, Sacramento 10 Infrastructure Reliability • Ensuring continuous operations in support of the organization – 27 x 7 operation (if important) – Redundancy of components – Cost of maintaining continuous operations vs. cost of failure – Threats and countermeasures R. Ching, Ph.D. • MIS Area • California State University, Sacramento 11 Availability 100% Component 1 98% availability Component 2 98% availability Component 3 98% availability Component 4 98% availability Component 5 98% availability .98 x .98 x .98 x .98 x .98 = .9039 Availability Overall service availability Complexity of the system increases as the number of components increase 0% Number of components R. Ching, Ph.D. • MIS Area • California State University, Sacramento 12 Availability Component 1 98% availability Component 2 98% availability Component 3 98% availability Component 4 98% availability Component 5 98% availability .98 x .98 x .98 x .98 x .98 = .9039 Component 1 98% availability Component 2 98% availability Component 3 98% availability Component 4 98% availability Component 5 98% availability Redundancy: If each component has a failure rate of .02, then a complete failure of the system is .02 x .02 x .02 x .02 x .02 = .000000032 Components running in parallel (i.e., each component is capable of doing all functions) R. Ching, Ph.D. • MIS Area • California State University, Sacramento 13 Making a High-Availability Facility • • • • • Uninterruptible electric power delivery Physical security Climate control and fire suppression Network connectivity N+1 and N+N redundancy of mission critical components R. Ching, Ph.D. • MIS Area • California State University, Sacramento 14 Malicious Threats and Defensive Measures • Types of threats: – External attacks – denial of service (DoS) – Intrusion – access via the IT infrastructure – Viruses and worms • Defensive measures – Security policies – defines security by recognizing IT as a resource – Firewalls – Authentication – Encryption – Patching and change management – Intrusion detection and network monitoring R. Ching, Ph.D. • MIS Area • California State University, Sacramento 15 Risk Management • Risk of failure or a breach of security • Must be classified (i.e., critical, not critical, etc.) • Addressed in proportion to their likelihood and potential consequences • Management action to mitigate risks – Costs vs. potential benefits – Expected loss (probability of a threat occurring x cost) R. Ching, Ph.D. • MIS Area • California State University, Sacramento 16 Prioritization of Risks High Fire Hacking Earthquake Consequences Intrusion Critical Threats Corporate espionage Construction Minor Threats Flooding Lightning Low 0 Probability R. Ching, Ph.D. • MIS Area • California State University, Sacramento 1 17 Managing Threats and Risks • • • • • Sound infrastructure design Disciplined execution of operating procedures Careful documentation Established crisis management procedures Rehearsing incident response – Security audit • Recovery procedures R. Ching, Ph.D. • MIS Area • California State University, Sacramento 18 Another View of Security and Threats… R. Ching, Ph.D. • MIS Area • California State University, Sacramento 19 Threats • Any situation or event, whether intentional or unintentional, that will adversely affect a system and consequently the organization. – Tangible losses (hardware, software, data) – Intangible losses (credibility, confidentiality) Countermeasures and Contingency Plans R. Ching, Ph.D. • MIS Area • California State University, Sacramento 20 Threats and Countermeasures • Initiate countermeasures to overcome threats – Consider the types of threat and their impact on the organization • Cost-effectiveness • Frequency • Severity R. Ching, Ph.D. • MIS Area • California State University, Sacramento 21 Threats and Countermeasures • Objective is to achieve a balance between a reasonable secure operation, which does not unduly hinder users, and the costs of maintaining it. Secured Operations Costs Risks • Risks are independent of the countermeasures R. Ching, Ph.D. • MIS Area • California State University, Sacramento 22 Countermeasures • Computer-based vs. Non-computer-based Implemented through the operating system and/or DBMS Management policies and procedures R. Ching, Ph.D. • MIS Area • California State University, Sacramento 23 Computer-Based Controls • • • • • • Authorization Backup (and recovery) Journaling Integrity controls Encryption Associated procedures R. Ching, Ph.D. • MIS Area • California State University, Sacramento 24 Noncomputer-Based Controls • • • • • • • • • Security policy and contingency plans Personnel controls Securing positioning of equipment Secure data and software Escrow agreements Maintenance agreements Physical access controls Building controls Emergency arrangements R. Ching, Ph.D. • MIS Area • California State University, Sacramento Managementoriented 25 Non-Computer-Based Controls: Countermeasures • Security policy and contingency plan – Security - covers the operations of the database – Contingency plan - addresses plans for catastrophic events • Procedures to follow • Line of command • Personal controls – Assessing and monitoring employees – Training – Responsibilities - sharing and splitting – Job controls R. Ching, Ph.D. • MIS Area • California State University, Sacramento 26 Non-Computer-Based Controls: Countermeasures • Securing: – Hardware – Data and software • Physical access controls – Internal and external • Emergency arrangements – Cold, warm and hot sites R. Ching, Ph.D. • MIS Area • California State University, Sacramento 27 Non-Computer-Based Controls: Countermeasures • Risk analysis – Identify assets – Identify threats and risks – Establish their costs relative to losses – Determine countermeasure • Establish effectiveness of the countermeasure • Establish cost of implementing the countermeasure – Examine cost/benefit of countermeasure – Make recommendation R. Ching, Ph.D. • MIS Area • California State University, Sacramento 28