Chapter 8: Securing Information Systems 8.1 System Vulnerability and Abuse Security: policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft or physical damage to information systems Controls: methods, policies and organizational procedures that ensure the safety of the organization’s assets, accuracy & reliability of records, and operational adherence to management standards Why Systems are Vulnerable Large amounts of data in electronic form are more vulnerable to threats In a client/server environment, users at the client level may introduce errors or by accessing systems without authorization while data is being transferred Radiation (i.e. accessible) Denial-of-service attacks or malicious software Systems malfunction Domestic or offshore partnering information resides in places outside the firm’s control Internet Vulnerabilities Internet is more susceptible to hackers because it is connected to the computer via a cable model or DSL which means you have a fixed Internet address where they can be easily identified Emails & file sharing attachments of harmful viruses Wireless Security Challenges Radio frequency bands are easy to scan Both Bluetooth and Wi-Fi are susceptible to cracking by eavesdroppers Poor wireless security has enabled criminals to break into corporate systems to steal major retailers’ credit card numbers and personal data Service set identifiers (SSID) identifying Wi-Fi access points are broadcast multiple times and can be picked up fairly easily by intruders through a sniffer program o Sniffer program will obtain an address to access the network resources with authorization War driving: eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic An intruder that has identified the correct SSID is able to access other resources on the network o Intruders can access computer with Windows OS through rogue access point Malicious Software: Viruses, Worms, Trojan Horses, and Spyware Malware: malicious software programs o Viruses, worms, Trojan horses Computer virus: rogue software program that attaches itself to other software programs or data files in order to be executed, usually without user knowledge or permission o Viruses deliver a “payload” which may be benign (picture or message) to being highly destructive (destroying programs, clogging computer memory, programs run improperly) o Usually transferred when humans take action such as sending out an email attachment Worms: independent computer programs that copy themselves from one computer to another over a network o Unlike viruses, can operate on their own without attaching to files and also need less human interaction to spread from computer to computer o Worms destroy data and programs and disrupt the operation of computer networks o Email worms are currently the most problematic Mobile device users pose threat to enterprise computing because so many wireless devices are linked to corporate information systems Web 2.0 has emerged as new challenges for malware or spyware Trojan horse: software program that appears to be benign but then does something unexpected o Not a virus because it doesn’t duplicate but is often a way for other viruses to introduce itself onto the computer o E.g. using electronic greeting cards in emails and tricks Windows users to launch a program that will deliver malware programs to infect their machine Spyware: programs that install themselves repeatedly on computers to monitor user web surfing activity and serve up advertisements o Slow computer performance by taking up too much memory o 92% of companies have spyware on their networks Keyloggers record every keystroke to obtain serial numbers for software, passwords, personal information, etc. Hackers and Computer Crime Hacker: individual that intends on gaining unauthorized access to a computer system Cracker: hacker with criminal intent Both gain access by finding weaknesses in the security protection employed by websites and computer systems Cybervandalism: intentional disruption, defacement, or even destruction of a website or corporate information system Spoofing and Sniffing Spoofing: misrepresentation of the hacker’s true identity and may involve redirecting a web link to an address different from the intended one and collecting sensitive customer information Sniffer: eavesdropping program that monitors information travelling over a network o When used legitimately it can identify potential trouble but when used for criminal purposes it can be difficult to detect o Sniffers enable hackers to steal information from networks Denial-of-Service Attacks Denial-of-service (DoS) attacks: when hackers flood a network server with many thousands of false communications or requests for services to crash the network Distributed denial-of-service (DDoS) attack: uses numerous computers to inundate and overwhelm the network from numerous launch points Goal is to shut down the website so it is impossible for legitimate users to access the site Botnet: group of computers that have been infected with bot malware without users’ knowledge, enabling a hacker to use the amassed resources of the computers to launch DDoS attacks, phishing campaigns or spam (“zombie PCs”) Computer Crimes Computer crime: any criminal activity involving the copy of, use of, removal of, interference with, access to, manipulation of computer systems, and/or their related functions, data or programs Many go unreported because employees involved or companies don’t want to hurt reputation Identity Theft Identity theft: crime in which an imposter obtains key pieces of personal information (SIN, license, credit card) to impersonate someone else E-commerce sites are sources of customer personal information and criminals are able to assume new identities and establish new credit for their own purposes Phishing: setting up fake websites or sending email messages to look like legitimate businesses to ask users for confidential information Evil twins: wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet to capture passwords Pharming: phishing technique that redirects users to a bogus web page which is done when criminals gain access to the IP address information stored by the ISP Click Fraud Click fraud: when an individual or company program fraudulently clicks on an online ad without any intent of learning more about the advertiser (usually the competitor) Goal is to weaken the company by driving up advertising costs Global Threats: Cyberterrorism and Cyberwarfare Concern about digital attacks by terrorists, foreign intelligence services, or other groups seeking to create widespread disruption and harm Internal Threats: Employees Lack of user knowledge is the single greatest cause of network security breaches Social engineering: when intruders trick employees into revealing their passwords by pretending to be legitimate members of the company in need of information Software Vulnerability Software vulnerabilities revolve around hidden bugs = program code defects Complexity of decision-making code and zero defects cannot be achieved in large programs Flaws in commercial software impede performance and create security vulnerabilities Patches: small pieces of software that repairs flaws in software without disturbing the proper operation of the software 8.2 Business Value of Security and Control When the security of a firm is compromised, the company loses around 2.1% of its market value within 2 days of the security breach (avg. $1.65billion in stock market value) Inadequate security and control may result in serious legal liability o E.g. businesses must protect the information of their suppliers and customers and failure to do so could result in litigation Strong security and control also increase employee productivity and lower operational costs C-SOX: Act passed by Parliament that imposes responsibility on companies and their managements to safeguard the accuracy and integrity of financial information that is used internally and released externally o In response to Sarbanes-Oxley Act Computer forensics: scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law 8.3 Establishing a Framework for Security and Control Information Systems Control General controls: controls that govern the design, security, and use of computer programs and the security of data files throughout the organization’s IT infrastructure o Apply to all computerized applications and consist of a combination of hardware, software and manual procedures that create an overall control environment Application controls: controls that are unique to each computerized application (e.g. payroll or order processing) o Input controls check data for accuracy and completeness when entered in to the system o Process controls establish that data are complete and accurate during updating o Output controls ensure that the results of computer processing are accurate, compete and properly distributed Risk Assessment Risk assessment: determination of the level of risk to the firm if a specific activity or process is not properly controlled Once the risks have been assessed, system developers will concentrate on the control points for the greatest vulnerability for potential loss Security Policy Security policy: includes statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals Acceptable-use policy (AUP) Authorization policies: different levels of access to information assets for different levels of users o Authorization management systems: systems that establish where and when a user is permitted to access certain parts of a website or corporate website Disaster Recovery Planning Disaster recovery planning: planning for the restoration of computing and communications services after they have been disrupted o Which files to back up and the maintenance of backup computer systems or disaster recovery services Business continuity planning: how the company can restore business operations after a disaster strikes o Identifies critical business processes and action plans for mission-critical functions Plans must be tested to make sure they work The Role of Auditing MIS audit: examination of the firm’s overall security environment as well as controls governing individual information systems Security audits review technologies, procedures, documentation, training and personnel o Audit will simulate an attack to test the response of the technology, staff and business employees 8.4 Technologies and Tools for Safeguarding Information Resources Access Control Access control: all the policies and procedures a company uses to prevent improper access to systems by authorized insiders and outsiders o Authorization: ability to know that a person is who they claim they are (use of passwords) o Token: physical device, similar to an identification card, that is designed to prove the identity of a single user o Smart card: device about the size of a credit card that contains a chip formatted with access permission (a reader will interpret the data and allow or deny the card) o Biometric authentication: uses systems that read and interpret individual human traits (i.e. fingerprints, irises, voices) Firewalls, Intrusion Detection Systems, and Antivirus Software Firewalls Firewall: combination of hardware and software that controls the flow of incoming and outgoing network traffic o Prevents unauthorized users from accessing private networks by examining each user’s credentials before access is granted to a network Packet filtering examines selected fields in the headers of data packets flowing back and forth between the trusted network and the Internet Stateful inspection provides additional security by determining whether packets are part of an ongoing dialogue between sender and receiver Network Address Translation (NAT) conceals the IP addresses of the organization’s internal host computer(s) to prevent sniffer programs outside the firewall from ascertaining them and using that information to penetrate internal systems Application proxy filtering a proxy server stops data packets originating outside the organization, inspects them, and passes a proxy to the other side of the firewall Intrusion Detection Systems Intrusion detection systems: tools to monitor the most vulnerable points in a network to detect and deter unauthorized intruders Antivirus and Antispyware Software Antivirus software: software designed to detect, and often eliminate, computer viruses from an information system Unified Threat Management Systems Unified threat management (UTM): comprehensive security management tool that combines multiple security tools, including firewalls, virtual private networks (VPNs), intrusion detection systems, and Web content filtering and anti-spam software Securing Wireless Networks WEP (Wired Equivalent Privacy) Assign a unique name to network’s SSID and instruct router not to broadcast it Use Wi-Fi in conjunction with VPNs June 2004 Wi-Fi Protected Access 2 (WPA2) Encryption and Public Key Infrastructure Encryption: process of transforming plan text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver Two methods for encrypting network traffic on the Web o Secure Sockets Layer (SSL): encryption enabling client and server computers to manage encryption and decryption activities as they communicate with each other during a secure Web session Successor Transport Layer Security (TLS) o Secure Hypertext Transfer Protocol (S-HTTP): another protocol used for encrypting data flowing over the Internet, but limited to individual messages SSL and TLS are designed to establish a secure connection between 2 computers Two alternative methods of encryption: o Symmetric key encryption single encryption key and sending to the receiver so both sender & receiver share the same key But this means the key has to be shared somehow between sender and receiver which exposes the key to outsiders who may to able to intercept and decrypt it o Public key encryption: uses two keys one shared (or public) and one private Public key is used to encrypt the message (sender) Private key is used to decrypt the data (receiver) Digital certificates: data files used to establish the identity of users and electronic assets for protection of online transactions o Trusted third party = certificate authority (CA) Ensuring System Availability Minimize downtime o Fault-tolerant computer systems o Redundant hardware, software and power supply High-availability computing Backup servers, distribution of processing across multiple services, high-capacity storage, good disaster recovery and business continuity plans Recovery-oriented computing: includes designing systems that recover quickly and pinpoint sources of fault in multi-component systems and easily correct their mistakes Deep-packet inspection (DPI): examines data files and sorts out low-priority online material while assigning higher priority to business-critical files Managed security service providers (MSSPs): outsourced companies that monitor network activity and perform vulnerability testing and intrusion detection Ensuring Software Quality Software metrics Rigorous testing o Walkthrough o Debugging