SHIS-ws1

advertisement
School of Computer and Information Science
Secure and High Integrity System
(INFT 3002)
Workshop 1
Tutor: William Yeoh
gingsun.yeoh@UniSA.edu.au
Workshop 1: Outline




Group project details
Harvard referencing
Hints on Q1 & Q2
Group discussion
Group project details





Form a group of 3 by Wednesday (18 Sept)
Report due on 7 November, 5pm (Friday)
You must pass this assessment to pass the course
3000-5000 words
You may decide the company’s name, location
(not necessary Australia), etc.
Harvard referencing (author-date system)
Book
 Watt, J., Mizuno, B., & Lee, H., 1999, Data on the web:
from relations to semistructured data and XML, Prentice
Hall, San Francisco.

Networking essentials plus, 2000, 3rd edn, Wiley Press,
Washington.
Journal
• Middleton, A., 2002, ‘Who needs a killer application’,
Journal of research in IT , vol. 41, no. 12, pp. 28-29.
Harvard referencing (author-date system)
Websites

Alcohol and Drug Studies, 1998, viewed 15 Sept. 2003,
<http://www.mindef.org/reports/drug.pdf>
• COA (Commonwealth of Australia), 1994, Creative Nation:
Commonwealth Cultural Policy, October 1994, viewed 15 Jan.
2003,
<http://www.nla.gov.au/creative.nation/preamble.html>
• Thomas, S 1997, ‘Guide to personal efficiency’,
Adelaide University, viewed 14 Nov. 2002,
<http://library.unisa.edu.au/~sthomas/papers.html>
Harvard referencing (author-date system)
Conference paper
 Hills, J., 2000, ‘Relative timing of deformation’ in Proceedings
of the 14th Australian Universities Earth Sciences Conference,
Geological Society of Australia, Melbourne, pp. 38-42.
Government periodical
 ABS (Australian Bureau of Statistics), 2001, Catalogue of
publications and products, ABS, Canberra.
In-text referencing

Poor quality information can have significant social and
business impacts (Strong, Lee & Wang 1997). There is strong
evidence that data quality problems are becoming increasingly
prevalent in practice (Ali & Redman 2004; Cameron 1996).

Dianne (Tan 2001, p. 71) stated that most organisations have
experienced the adverse effects of decisions based on
information of inferior quality.

Most organisations have experienced the adverse effects of
decisions based on information of inferior quality (Dianne cited
by Tan 2001, p.71).
Task: Your group is a small newly formed IT
Security Consultancy and recently have been
employed on your first case

Abraham is a health administrator (MD) but he has no modern
technical understanding of IT security issues.

Abraham has had no problems with IT Security until very recently
when the Hospital’s network was subject to a series of attacks. In the
period of 3 days, the Hospital’s website was defaced, a serious virus
infected the Hospital’s e-mail and large quantities of data were
corrupted

Abraham wonders why this is happening and he questions whether
there is a link to his company’s partnership with a large Health
Insurance Company. He is also concerned to find out who might be
attacking his network and why.

He is very anxious to grow his business and knows that he needs
quickly to implement some security measures so as to pass an external
audit (he has had nothing more than some proprietary and outdated
anti-virus software until now).
Organisation Structure
Abraham Wong
MD
Warren Chan
Executive assistant
Douglas Brown
Chief Information Officer
Luigi Rossi
Chief Medical Officer
Mubarak
Chief Admin Officer
Senior Sys Admin
Chief Nursing Officer
Finance manager
HR Manager
Junior Sys Admin
Medical and Nursing staff
Finance officer
Admin officer
The issues Abraham is asking for advice on are:
1. What risks do you think he is facing as he gears up
his business and how can he manage these risks?
2. How can he develop a suitable security policy (given
the company structure above)? Supply a security policy
as Appendix 1 (you may use all the resources in the
Resources for Module 2 and adapt these as necessary)
3. Does he need to implement some cryptographic protection
of data? How?
4. What is a “trusted” system, why might he need one
anyway, and can he implement this within her Windows NT
network?
The issues Abraham is asking for advice on are:
5. How can he protect his network? Currently it is a simple
LAN, some databases, a mail server and a web server but
he wants to add some E-Commerce functionality very
soon. What will happen when his staff use wireless
enabled PDA’s for the collection of patient data?
6. Why might hackers be attacking his network; why would
they be interested in his company?
7. Is there any legislation to help him if his network is hacked
into again?
8. What kind of legal or ethical issues will he herself face if
the data in his databases or files is lost or damaged?
Today’s task
1. What risks do you think he is facing as he gears up his
business and how can he manage these risks?
2. How can he develop a suitable security policy (given the
company structure above)? Supply a security policy as
Appendix 1 (you may use all the resources in the
Resources for Module 2 and adapt these as necessary)
Hints for
Q1. What risks do you think he is facing as he gears
up his business and how can he manage these risks?
Risk identification, analysis & management
1. Hardware
Database server, mail server, web server, staff’s PC/laptop
Overloaded, theft, fail to function
Housekeeping should be done on all servers, backup, monitor
2. Software
Web page, internal hospital system, firewall, commercial off-theshelf security software
Unauthorised copying, no authentication, no trace log, anti-virus
not updated
Encryption, update anti-virus, trace log, password
Hints for
Q1. What risks do you think he is facing as he gears up his
business and how can he manage these risks?
3. Data
Customer personal data, staff data, etc
Inference problem, no transaction security
VPN, encryption
4. People
System administrator, operator and end-users.
Ex-staff’s ID, system administrator fails to define new sensitive data,
system operator neglects the physical security, end-users lack of pc
knowledge
Staff training, change password periodically, create sensitive data def
5. Documentation
Sensitive data, eg invoice
How to dispose sensitive doc, exposal to third party
Proper report handling procedure
Hints for:
Q2: How can he develop a suitable security policy (given the company
structure above)?

Organisational domain/ stakeholders
- who are they?

Corporate hierarchy
- multilevel vs multi lateral

Methodologies of protection
- all related issues
Hints for:
Q2: How can he develop a suitable security policy (given the company
structure above)?







Informational security policy
Personnel security policy
Database security
Physical & environmental
Computer & network
System development & maintenance
Etc.
group
discussion
Download