Chapter 12 PPT

advertisement
Chapter 12
Information
Security Management
Study Questions
Q1: What is the goal of information systems security?
Q2: How big is the computer security problem?
Q3: How should you respond to security threats?
Q4: How should organizations respond to security threats?
Q5: How can technical safeguards protect against security
threats?
Q6: How can data safeguards protect against security threats?
Q7: How can human safeguards protect against security threats?
Q8: How should organizations respond to security incidents?
12-4
Q1: What Is the Goal of Information
Systems Security?
12-5
Examples of Threat/Loss
12-6
What Are the Sources of Threats?
12-7
Unauthorized Data Disclosure
Unauthorized data disclosure—inadvertent release of data
in violation of policy
Pretexting—pretending to be someone else via phone call
Phishing—pretexting using email; email spoofing
Spoofing—disguising as a different IP address or different
email sender, web spoofing
IP spoofing—impersonating another computing system
Drive-by Sniffing—intercepting computer communications
Email spoofing—synonym for phishing
Hacking, natural disasters, etc.
12-8
Incorrect Data Modification
• Procedures not followed or incorrectly designed
procedures
• Increasing a customer’s discount or incorrectly
modifying employee’s salary
• Placing incorrect data on company Web site
• Improper internal controls on systems
• System errors
• Faulty recovery actions after a disaster
12-9
Faulty Service
• Incorrect data modification
• Systems working incorrectly
• Procedural mistakes
• Programming errors
• IT installation errors
• Usurpation
• Denial of service (unintentional)
• Denial-of-service attacks (intentional)
12-10
Loss of Infrastructure
• Human accidents
• Theft and terrorist events
• Disgruntled or terminated employee
• Natural disasters
• Advanced Persistent Threat (APT) or
cyberwarfare
12-11
Mobile Security
•
•
•
•
•
•
155% increase in mobile malware apps from
2010 to 2011
Apps for snooping – track location, record phone
calls, save and display chats and messages.
“jailbreak” targeted at App Store of iPhone
Sniffer programs to access Wi-Fi networks
unauthorized.
Kaspersky, Lookout, DroidSecurity, Sandboxing
Performing a remote wipe of offending apps
12-12
Q2: How Big Is the Computer Security
Problem?
12-13
Verizon–Secret Service Findings 2011
• Number of data-loss security incidents
reached all-time high, but number of data
records lost fell dramatically for second year
in a row
• Data theft most successful at small and
medium-sized businesses
12-14
Verizon–Secret Service Findings 2011
(cont'd)
Four most frequent computer crimes
1. Criminal activity against servers
2. Viruses
3. Code insertion
4. Data loss on user computer
12-15
Types of Attacks Experienced
12-16
Intrusion Detection System (IDS)
• Computer program that senses when
another computer is attempting to scan disk
or otherwise access a computer
• “When I run an IDS on a computer on the
public Internet,... I get more than 1,000
attempts, mostly from foreign countries.
There is nothing you can do about it except
use reasonable safeguards.”
12-17
Q3: How Should You Respond to
Security Threats?
12-18
Q4: How Should Organizations Respond
to Security Threats?
• Establish a company-wide security policy
– What sensitive data to store
– How it will process that data
– Will data be shared with other
organizations
– How employees and others can obtain
copies of data stored about them
12-19
Q4: How Should Organizations Respond
to Security Threats? (cont'd)
– How employees and others can request
changes to inaccurate data
– What employees can do with their own
mobile devices at work
– What non-organizational activities
employees can take with employee-owned
equipment
12-20
Security Safeguards as They Relate to
the Five IS Components
12-21
Q5: How Can Technical Safeguards
Protect Against Security Threats?
12-22
Identification and Authentication (Access)
Authentication
methods
• Password
• Smart card
• Biometric
Smart cards
• Microchip embedded with identifying data
• Authentication by PIN
Biometric
authentication
• Fingerprints, face scans, retina scans
• See http://searchsecurity.techtarget.com
Single sign-on for
multiple systems
• Authenticate to network and other servers
12-23
Encryption Terminology
Encryption algorithms (DES, 3DES, AES, blowfish, idea)
Key—a number used to encrypt the data
Symmetric encryption
Asymmetric encryption—public/private key
HTTPS (HTTP + SSL/TLS)
Secure Sock Layer (SSL) (Predecessor of TLS)
Transport Layer Security (TLS) (DC, Privacy, PKE)
12-24
Encryption: Essence of HTTPS (SSL or
TLS)
12-25
Firewalls
12-26
Malware Types and Spyware and
Adware Symptoms
• Viruses
 Payload
 Trojan horses
 Worms
 Beacons
Spyware & Adware Symptoms
12-27
Malware Safeguards
1.
2.
3.
4.
Install antivirus and antispyware programs
Scan frequently
Update malware definitions
Open email attachments only from known
sources
5. Install software updates from legitimate
sources
6. Browse only reputable Internet neighborhoods
12-28
Q6: How Can Data Safeguards Protect
Against Security Threats?
12-31
Q7:
How can
Human
Safeguards
Protect Against
Security
Threats?
12-32
Account Administration
• Account Management
 Standards for new user accounts,
modification of account permissions,
removal of unneeded accounts
• Password Management
 Users should change passwords
frequently
• Help Desk Policies
12-33
Sample Account Acknowledgment Form
12-34
Systems Procedures
Data recovery; online recovery - the process of salvaging data from
damaged, failed, corrupted, or inaccessible secondary storage media
when it cannot be accessed normally.
12-35
Security Monitoring Functions
•Firewall logs
Activity log analyses •DBMS log-in records
•Web server logs
Security testing
•In-house and external security professionals
Investigation of
incidents
•How did the problem occur?
Learn from
incidences
•Indication of potential vulnerability and
needed corrective actions
Review and update security and safeguard policies
12-36
What Is Necessary for Disaster Preparedness?
•
Disaster
― Substantial loss of infrastructure
caused by acts of nature, crime,
or terrorism
•
Appropriate location
― Avoid places prone to floods,
earthquakes, tornadoes,
hurricanes, avalanches,
car/truck accidents
― Not in unobtrusive buildings,
basements, backrooms, physical
perimeter
― Fire-resistant buildings
12-37
Google’s Data Center in Finland
•
•
•
•
Hamina Data Center
http://www.google.co
m/about/datacenters
/locations/hamina/
http://www.youtube.c
om/watch?v=VChOEv
KicQQ
High-tech cooling
system
12-38
What Is Necessary for Disaster preparedness?
(cont’d)
Backup processing centers in geographically removed
site
Create backups for critical resources
Contract with “hot site” or “cold site” provider
• Hot site provides all equipment needed to continue operations
there
• Cold site provides space but you set up and install equipment
• www.ragingwire.com/managed_services?=recovery
Periodically train and rehearse cutover of operations
Cloud Backup: a service that provides users with a system for the
backup and storage of computer files. A form of cloud computing
12-39
Q8: How Should Organizations
Respond to Security Incidents?
12-40
How Does the Knowledge in this
Chapter Help You?
• Aware of threats to computer security as an
individual, business professional and employee
• Know trade-offs of loss risks and cost of
safeguards
• Ways to protect your computing devices and data
• Understand technical, data, and human
safeguards
• Understand how organizations should respond to
security incidents
12-41
Download