Lecture 12 Information Security and Confidentiality (Chapter 12) http://www.csun.edu/~dn58412/IS531/IS531_SP16.html Learning Objectives 1. Privacy, confidentiality, information privacy, and information security and the relationships among them. 2. How information system security affects privacy, confidentiality, and security. 3. The significance of security for information integrity 4. Potential threats to system security and information. 5. Security measures to protect information IS 531 : Lecture 12 2 Security Concern • Information security and confidentiality of personal information represent major concerns in today’s society amidst growing reports of stolen and compromised information. • Globalization and increased use of internet • Evolving technology and intrusion techniques • Information must be protected through a combination of electronic and manual methods IS 531 : Lecture 12 3 Information Security • The protection of information against threats to its integrity, inadvertent disclosure, or availability determines the survivability of a system IS 531 : Lecture 12 4 Privacy • Freedom from intrusion, or control over the exposure of self or of personal information • The right to determine what information is collected, how it is used, and the ability to review collected information for accuracy and security IS 531 : Lecture 12 5 Confidentiality • The protection of healthcare information is mandated by the Health Insurance Portability and Accountability Act (HIPAA) and the Joint Commission requirements. • Must not disclose patient-related information without consent • Share info only with the parties requiring it for client treatment • Mostly due to careless communication in a public area or with appropriate person IS 531 : Lecture 12 6 Information/Data Privacy • The storage and disclosure/dissemination of personally identifiable information • The right to choose the conditions and extent to which information and beliefs are shared • The right to ensure accuracy of information collected IS 531 : Lecture 12 7 Consent • The process by which an individual authorizes healthcare personnel to process his or her information based on an informed understanding of how this information will be used • Entails making the individual aware of risks to privacy and measures to protect it IS 531 : Lecture 12 8 Information System Security • Ongoing protection of both information stored in the system and the system itself from threats or disruption • Primary goals : – Protection of client confidentiality – Protection of information integrity – Timely availability of information when needed IS 531 : Lecture 12 9 Security Planning • Safeguard against: – Downtime – Breeches in confidentiality – Loss of consumer confidence – Cybercrime – Liability – Lost productivity • Ensure compliance with HIPAA IS 531 : Lecture 12 10 Steps to Security • • • • Assessment of risks and assets An organizational plan A “culture” of security The establishment and enforcement of policies IS 531 : Lecture 12 11 Threats to System Security and Information • Human threats – Thieves – Hackers and crackers – Denial of service attacks – Terrorists – Viruses, worms – Revenge attacks – Pirated Web sites IS 531 : Lecture 12 12 Threats to System Security and Information … • On-site threats – Poor password management – Compromised device – Human error – Unauthorized insider access – Flooding site – Power fluctuations • Fires and natural disasters IS 531 : Lecture 12 13 Security Measures • Firewalls—barrier created from software and hardware • Antivirus and spyware detection • User sign-on and passwords or other means of identity management • Access on a need-to-know basis • Automatic sign-off • Physical restrictions to system access IS 531 : Lecture 12 14 Authentication • Process of determining whether someone is who he or she claims to be • Methods: – access codes, – logon passwords, – digital certificates, – public or private keys used for encryption – biometric measures IS 531 : Lecture 12 15 Password • String of alphanumeric characters to type in for system access • Inexpensive but not the most effective means of authentication • Do: – Choose 8-12 character passwords – Avoid obvious passwords – Using the first characters of your favorites verses / sayings. – Including special characters, lower and upper cases, numbers . IS 531 : Lecture 12 16 Password … • Don’t: – Post or write down passwords. – Leave computers or applications running when not in use. – Re-use the same password for different systems. – Use the browser “save password” feature. • Never share passwords. • Change password frequently IS 531 : Lecture 12 17 Biometrics • Identification based on a unique biological trait – fingerprint – voice – iris pattern / retinal scan – hand geometry / palmprint – face recognition – etc… IS 531 : Lecture 12 18 Antivirus Software • Computer programs that can locate and eradicate viruses and other malicious programs from memory sticks, storage devices, individual computers, and networks • Detect and eliminate malwares / spywares that install themselves without the user’s permission to collect passwords, PIN numbers, account numbers then send them to another party IS 531 : Lecture 12 19 Antivirus Software Source : http://anti-virus-software-review.toptenreviews.com/ IS 531 : Lecture 12 20 Proper Handling and Disposal Acceptable uses Audit trails to monitor access Encourage review for accuracy Establish controls for information use after-hours and off-site • Shred or use locked receptacles for the disposal of items containing personal health information • • • • IS 531 : Lecture 12 21 Implications for Mobile Computing • Shared responsibility for information and information system security • Devices are easily stolen. • Devices should require authentication and encryption to safeguard information security. • Devices should never be left where information may be seen by unauthorized viewers. • Verify wireless networks before use. IS 531 : Lecture 12 22 Firewall IS 531 : Lecture 12 23 Physical vs. Logical Access / Controls IS 531 : Lecture 12 24 Encryption Binary Codes ASCII (American Standard Code for Information Interchange) : 8 bits EBCDIC (Extended Binary-Coded Decimal Interchange Code ) : 16 bits Unicode : 32 bits and more I S 5 3 1 01001001 01010011 00110101 00110011 00110001 10010101 00110011 01010011 00110011 00010100 01101010 11001100 10101100 11001100 11101011 IS 531 : Lecture 12 25 Encoding Normal sequence : A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Encoded sequence : F G H I J K L M N O P Q R S T U V W X Y Z A B C D E Message : DROPBOX TONIGHT Encoded message : IWTUGTC YTSNLMY IS 531 : Lecture 12 26 Public Keys IS 531 : Lecture 12 27 References • CMU - Security 101 (2011) http://www.cmu.edu/iso/aware/presentation/sec urity101-v2.pdf • CMU - Governing for Enterprise Security (2005) https://resources.sei.cmu.edu/asset_files/Technic alNote/2005_004_001_14513.pdf IS 531 : Lecture 12 28