Module V – Management Challenges Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Security and Ethical Challenges Real World Cases KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-1 Learning Objectives Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END 1. Identify several ethical issues in how the use of information technologies in business affects employment, individuality, working conditions, privacy crime, health, and solutions to societal problems. 2. Identify several types of security management strategies and defences, and explain how they can be used to ensure the security of business applications of information technology. 3. Propose several ways that business managers and professionals can help to lessen the harmful effects and increase the beneficial effects of the use of information technology. Copyright 2005, McGraw-Hill/Irwin, Inc. 11-2 Security and Ethics Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT • Major Security Challenges • Serious Ethical Questions • Threats to Business and Individuals • Real World Case 1- F-Secure, Microsoft, GM, and Verizon: The Business Challenge of Click to go to Computer Viruses Case 1 END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-3 Security and Ethics Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Business/IT Security, Ethics, and Society Privacy Employment Business/IT Security Ethics and Society Health Crime Real World Cases KEY TERMS BACK NEXT END Individuality Copyright 2005, McGraw-Hill/Irwin, Inc. Working Conditions 11-4 Security and Ethics Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Ethical Responsibility • Business Ethics • Stockholder Theory • Social Contract Theory • Stakeholder Theory Real World Cases KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-5 Security and Ethics Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Ethical Responsibility Real World Cases KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-6 Security and Ethics Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Technology Ethics Real World Cases KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-7 Security and Ethics Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Ethical Guidelines Real World Cases KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-8 Security and Ethics Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Enron Corporation: Failure in Business Ethics • Drove Stock Prices Higher Never Mentioning Any Weaknesses • Promised Much – Delivered Little • Finally Admitted Overstated Earnings by $586 Million in 1997 • 1998 Third Quarter Loss $638 Million – Filed Bankruptcy • Greed and Mismanagement Destroyed a Potentially Successful Business Plan Copyright 2005, McGraw-Hill/Irwin, Inc. 11-9 Security Management Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END • Security is 6 to 8% of IT Budget in Developing Countries • 63% Have or Plan to Have Position of Chief Privacy or Information Officer in the Next Two Years • 40% Have a Chief Privacy Officer and Another 6% Intend One in the Next Two Years • 39% Acknowledge that their Systems Have Been Compromised in the Past Year • 24% Have Cyber Risk Insurance and 5% Intend to Acquire Such Coverage Copyright 2005, McGraw-Hill/Irwin, Inc. 11-10 Security Management Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Security Technology Used Antivirus 96% Virtual Private Networks 86% Intrusion-Detection Systems 85% Content Filtering/Monitoring 77% Public-Key Infrastructure 45% Real World Cases Smart Cards 43% KEY TERMS BACK NEXT Biometrics 19% END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-11 Security Management Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END PayPal, Inc. Cybercrime on the Internet • Online Payment Processing Company • Observed Questionable Accounts Being Opened • Froze Accounts Used to Buy Expensive Goods For Purchasers in Russia • Used Sniffer Software and Located Users Capturing PayPal Ids and Passwords • More than $100,000 in Fraudulent Charges • Crooks Arrested by FBI Copyright 2005, McGraw-Hill/Irwin, Inc. 11-12 Security Management Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Computer Crime • Hacking • Cyber Theft • Unauthorized Use of Work • Piracy of Intellectual Property • Computer Viruses and Worms Copyright 2005, McGraw-Hill/Irwin, Inc. 11-13 Security Management Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Examples of Common Hacking Real World Cases KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-14 Security Management Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Recourse Technologies: Insider Computer Crime • Link Between Company Financial Difficulty and Insider Computer Crimes • Use of “Honey Pots” Filled with Phony Data to Attract Hackers • Software Catches Criminal Activity in Seconds • Crime Exposed and Stopped Copyright 2005, McGraw-Hill/Irwin, Inc. 11-15 Security Management Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Internet Abuses in the Workplace Real World Cases KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-16 Security Management Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Network Monitoring Software Real World Cases KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-17 Security Management Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END AGM Container Controls: Stealing Time and Resources • The Net Contains Many Productivity Distractions • Remedies Include Monitoring Internet Use and Blocking Sites Unrelated to Work • Importance of Telling Employees About Monitoring • Use of Software Monitoring Provided Rebuttal Answers To Web Use Discussions Copyright 2005, McGraw-Hill/Irwin, Inc. 11-18 Security Management Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Copying Music CDs: Intellectual Property Controversy • RIAA Crack Down on Music Piracy • Web Sites Fighting Back • 140 Million Writable Drives In Use • Billions of Blank CDs Sold While Music CD Sales Are Going Down • Pirates Reluctant to Go Away Copyright 2005, McGraw-Hill/Irwin, Inc. 11-19 Security Management Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Facts About Recent Computer Viruses and Worms Real World Cases KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-20 Security Management Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END University of Chicago: The Nimda Worm • Nimda Worm Launch Sept. 18, 2001 Mass Mailing of Malicious Code Attacking MS-Windows • Took Advantage of Back Doors Previously Left Behind • In Four Hours the University of Chicago’s Web Servers were Scanned by 7,000 Unique IP Addresses Looking for Weaknesses • Many Servers Had to Be Disconnected Copyright 2005, McGraw-Hill/Irwin, Inc. 11-21 Privacy Issues Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Right to Privacy Privacy on the Internet Acxiom, Inc. Challenges to Consumer Privacy • Acxiom – 30 Years Amassing Massive Database • Sells Data to Subscribers • Use by Telemarketers and Credit Firms Copyright 2005, McGraw-Hill/Irwin, Inc. 11-22 Privacy Issues Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Right to Privacy • Computer Profiling • Computer Matching • Privacy Laws • Computer Libel and Censorship • Spamming • Flaming Copyright 2005, McGraw-Hill/Irwin, Inc. 11-23 Privacy Issues Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT Other Challenges • Employment Challenges • Working Conditions • Individuality Issues • Health Issues END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-24 Privacy Issues Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Ergonomics Real World Cases KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-25 Privacy Issues Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Ergonomics • Job Stress • Cumulative Trauma Disorders (CTDs) • Carpal Tunnel Syndrome • Human Factors Engineering • Societal Solutions Copyright 2005, McGraw-Hill/Irwin, Inc. 11-26 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Security Management of Information Technology • Business Value of Security Management • Protection for all Vital Business Elements Real World Case 2Geisinger Health Systems and Du Pont: Security Management of Data Resources and Process Click to go to Case 2 Control Networks Copyright 2005, McGraw-Hill/Irwin, Inc. 11-27 Security Management of Information Technology Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Tools of Security Management Real World Cases KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-28 Security Management of Information Technology Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Providence Health and Cervalis: Security Management Issues • Need for Security Management Caused by Increased Use of Links Between Business Units • Greater Openness Means Greater Vulnerabilities • Better Use of Identifying, Authenticating Users and Controlling Access to Data • Theft Should Be Made as Difficult as Possible Copyright 2005, McGraw-Hill/Irwin, Inc. 11-29 Security Management of Information Technology Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Internetworked Security Defenses •Encryption –Public Key –Private Key Graphically… Real World Cases KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-30 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Security Management of Information Technology Encryption Real World Cases KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-31 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Security Management of Information Technology Firewalls 1 External Firewall Blocks Outsiders 3 4 Intranet Server 5 Host System Firewall Router Router 3 Use of Passwords and Browser Security 4 Performs Authentication and Encryption 5 Careful Network Interface Design Internet Firewall 4 KEY TERMS BACK NEXT Internal Firewall Blocks Restricted Materials 1 2 Real World Cases 2 Intranet Server END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-32 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Security Management of Information Technology Barry Nance: Testing PC Firewall Security • Worldwide Search for Active IP Addresses • Sophisticated Probes Scan Any Home or Work Location • Personal Firewalls Help Block Intruders • Firewalls Generally Good at Protecting Computers from Most Hacking Efforts Copyright 2005, McGraw-Hill/Irwin, Inc. 11-33 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Security Management of Information Technology MTV Networks: Denial of Service Defenses • MTV.com Website Targeted for Distributed Denial of Service (DDOS) Attacks During Fall Peak Periods • Some People Try to Crash MTV Sites • Parent Viacom Installed Software to Filter out DDOS Attacks • Website Downtime Reduced Copyright 2005, McGraw-Hill/Irwin, Inc. 11-34 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Security Management of Information Technology Defending Against Denial of Service Attacks Real World Cases KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-35 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Security Management of Information Technology Sonalysts, Inc.: Corporate eMail Monitoring • e-Sniff Monitoring Device Searches e-Mail by Key Word or Records of Web Sites Visited • 82% of Businesses Monitor Web Use • Close to 100% of Workers Register Some Improper Use Copyright 2005, McGraw-Hill/Irwin, Inc. 11-36 Security Management of Information Technology Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END TrueSecure and 724 Inc.: Limitations of Antivirus Software • Much Software Was Unable to Stop Nimda Worm • Software Alone is Often Not Enough to Clean System • Until Better Software is Developed, A Complete System Disconnect and Purge May Be the Only Solution Copyright 2005, McGraw-Hill/Irwin, Inc. 11-37 Security Management of Information Technology Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Example Security Suite Interface Real World Cases KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-38 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Security Management of Information Technology Other Security Measures • Security Codes • Multilevel Password System –Smart Cards • Backup Files –Child, Parent, Grandparent Files • System Security Monitors • Biometric Security Copyright 2005, McGraw-Hill/Irwin, Inc. 11-39 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Security Management of Information Technology Example Security Monitor Real World Cases KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-40 Security Management of Information Technology Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Evaluation of Biometric Security Real World Cases KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-41 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Security Management of Information Technology Computer Failure Controls •Fault Tolerant Systems –Fail-Over –Fail-Safe –Fail-Soft •Disaster Recovery Copyright 2005, McGraw-Hill/Irwin, Inc. 11-42 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Security Management of Information Technology Methods of Fault Tolerance Real World Cases KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-43 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Security Management of Information Technology Visa International: Fault Tolerant Systems • Only 100% Uptime is Acceptable • Only 98 Minutes of Downtime in 12 Years • 1 Billion Transactions Worth $2 Trillion in Transactions a Year • 4 Global Processing Centers • Multiple Layers of Redundancy and Backup • Software Testing and Art Form Copyright 2005, McGraw-Hill/Irwin, Inc. 11-44 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Systems Controls and Audits • Information System Controls • Garbage-In, GarbageOut (GIGO) • Auditing IT Security • Audit Trails • Control Logs Copyright 2005, McGraw-Hill/Irwin, Inc. 11-45 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Systems Controls and Audits Processing Controls Input Controls Security Codes Encryption Data Entry Screens Error Signals Control Totals Output Controls Security Codes Encryption Control Totals Control Listings End User Feedback Storage Controls Real World Cases Security Codes Encryption Backup Files Library Procedures Database Administration KEY TERMS BACK NEXT Software Controls Hardware Controls Firewalls Checkpoints END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-46 Summary Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END • Ethical and Societal Dimensions • Ethical Responsibility in Business • Security Management Copyright 2005, McGraw-Hill/Irwin, Inc. 11-47 KEY TERMS Antivirus software Ethical foundations Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Audit trail Auditing business systems Backup files Biometric security Business ethics Computer crime Computer matching Computer monitoring Computer virus Denial of service Disaster recovery Encryption Ergonomics Ethical and Societal Impacts of business/IT a. Employment b. Health c. Individuality d. Societal Solutions e. Working Conditions Copyright 2005, McGraw-Hill/Irwin, Inc. Fault tolerant Firewall Flaming Hacking Information system controls Intellectual property piracy Passwords Privacy issues Responsible professional Security management Software piracy Spamming System security monitor Unauthorized use 11-48 Optional Case Studies Real World Case 1 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END F-Secure – Microsoft GM and Verizon: The Business Challenge of Computer Viruses Click to go to Case 1 Real World Case 2 Geisinger Health Systems and DuPont: Security Management of Data Resources and Process Control Networks Click to go to Case 2 Real World Case 3 Banner Health – Arlington County and Others: Security Management of Windows Software Click to go to Case 3 Real World Case 4 Online Resources – Lehman Brothers and Others: Managing Network Security Systems Copyright 2005, McGraw-Hill/Irwin, Inc. Click to go to Case 4 11-49 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Enterprise and Global Management of Information Technology Real World Cases Chapter 12 KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-50 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases F-Secure – Microsoft GM and Verizon: The Business Challenge of Computer Viruses 1- What security measures should companies, business professionals, and consumers take to protect their systems from being damaged by computer worms and viruses? Return to Chapter 11 KEY TERMS BACK NEXT Return to Cases Page END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-51 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END F-Secure – Microsoft GM and Verizon: The Business Challenge of Computer Viruses Discussion Points Would Include: • Businesses Should – “Get Serious” About Cyber Security – Stop Relying on Microsoft 's Backbone • Businesses Need Better Procedures for Security Updating • Businesses Should Update Security Defenses Copyright 2005, McGraw-Hill/Irwin, Inc. 11-52 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases F-Secure – Microsoft GM and Verizon: The Business Challenge of Computer Viruses 2- What is the business and ethical responsibility of Microsoft in helping to prevent the spread of computer viruses? Have they met this responsibility? Why or why not? KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-53 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END F-Secure – Microsoft GM and Verizon: The Business Challenge of Computer Viruses Discussion Points Would Include: Microsoft (95% Market Share) Must Ensure Software is Hostile to Hackers Must Write Better Software Microsoft and Others Must make Security Higher Priority The Responsibility of Security is the User Not Bender Copyright 2005, McGraw-Hill/Irwin, Inc. 11-54 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits F-Secure – Microsoft GM and Verizon: The Business Challenge of Computer Viruses 3- What are several possible reasons why some companies (like GM) were seriously affected by computer viruses, while others (like Verizon) were not? Return to Chapter 11 Real World Cases KEY TERMS BACK NEXT Return to Cases Page END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-55 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases F-Secure – Microsoft GM and Verizon: The Business Challenge of Computer Viruses Reasons Would Include: • Undue Dependence on Microsoft for Quality Software • GM Ignored Security until It was Too Late • Companies Paid More Attention to Bottom Line than Security Return to Chapter 11 KEY TERMS BACK NEXT Return to Cases Page END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-56 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END F-Secure – Microsoft GM and Verizon: The Business Challenge of Computer Viruses Reasons Would Include: • Undue Dependence on Microsoft for Quality Software • GM Ignored Security until It was Too Late • Companies Paid More Attention to Bottom Line than Security • Inadequate Planning for Improving Security Return to Chapter 11 Return to Cases Page Copyright 2005, McGraw-Hill/Irwin, Inc. 11-57 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Geisinger Health Systems and DuPont: Security Management of Data Resources and Process Control Networks 1- What are several possible reasons why some companies (like GM) were seriously affected by computer viruses, while others (like Verizon) were not? Return to Chapter 11 Real World Cases KEY TERMS BACK NEXT Return to Cases Page END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-58 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Geisinger Health Systems and DuPont: Security Management of Data Resources and Process Control Networks Discussion Points Would Include: • Key Components of a Security System: – Understanding Workflow – Assessing Risk – Educating Users • MvChart needed Installed on Hardware Separate from EMK system Copyright 2005, McGraw-Hill/Irwin, Inc. 11-59 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Geisinger Health Systems and DuPont: Security Management of Data Resources and Process Control Networks Discussion Points Would Include: • Biometric and Proximity Devices Streamline Secure Network Access • Requiring Caregivers Access to Patient Information via the Internet Using: – Electronic Token Identification – A Virtual Private Network • Other Encryption Methods Copyright 2005, McGraw-Hill/Irwin, Inc. 11-60 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Geisinger Health Systems and DuPont: Security Management of Data Resources and Process Control Networks 2- What security measures is Du Pont taking to protect their process control networks? Are these measures adequate? Explain your evaluation. Real World Cases KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-61 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Geisinger Health Systems and DuPont: Security Management of Data Resources and Process Control Networks Discussion Points Would Include: • Du Pont Co.-The Critical Manufacturing Processes, will Isolate Process Systems from Business systems by: – Not Connecting our Networks, – Or it will Add Firewalls to Control Access Copyright 2005, McGraw-Hill/Irwin, Inc. 11-62 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Geisinger Health Systems and DuPont: Security Management of Data Resources and Process Control Networks Discussion Points Would Include: • A Team-IT Staffers, Process-Control Engineers, and Manufacturing Employees was Established to: – Discern Control Devices Critical to Manufacturing, Safety and Continuity of Production – Identify Assets of – Hardware, Data, and Software Applications – Testing Fixes and Workarounds for Specific Machines – Recognizing Precise Vulnerabilities Differ by Environment – Determining how to Separate Networks Copyright 2005, McGraw-Hill/Irwin, Inc. 11-63 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Geisinger Health Systems and DuPont: Security Management of Data Resources and Process Control Networks 3- What are several other steps Geisinger and Du Pont could take to increase the security of their data and network resources? Explain the value of your proposals. Return to Chapter 11 Real World Cases KEY TERMS BACK NEXT Return to Cases Page END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-64 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases Geisinger Health Systems and DuPont: Security Management of Data Resources and Process Control Networks Discussion Points Would Include: Include the Concepts Presented in the Chapter Material and Additional Considerations That You Have Located on the Internet Return to Chapter 11 KEY TERMS BACK NEXT Return to Cases Page END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-65 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Banner Health Arlington County and Others: Security Management of Windows Software 1- What security problems are typically remedied by Microsoft’s security patches for Windows? Why do such problems arise in the first place? Real World Cases KEY TERMS BACK NEXT Return to Cases Page END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-66 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Banner Health Arlington County and Others: Security Management of Windows Software Discussion Points Would Include: • Vulnerability to Computer Viruses (Worms) • Microsoft’s Push to Deliver New Versions – That have not been tested and/or • Designed Properly to Reduce Vulnerability Copyright 2005, McGraw-Hill/Irwin, Inc. 11-67 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Banner Health Arlington County and Others: Security Management of Windows Software 2- What challenges does the process of applying Windows patches pose for many businesses? What are some limitations of the patching process? Real World Cases KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-68 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Banner Health Arlington County and Others: Security Management of Windows Software Discussion Points Would Include: • Patching Required Companies to Drop Everything with Finite Resources • Larger Companies Need Time to Properly Test • Companies Faced with Limited Scope for Downtime Copyright 2005, McGraw-Hill/Irwin, Inc. 11-69 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Banner Health Arlington County and Others: Security Management of Windows Software 3- Does the business value of applying Windows patches outweigh its costs, limitations, and the demands it places on the IT function? Why or why not? Real World Cases KEY TERMS BACK NEXT Return to Cases Page END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-70 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases Banner Health Arlington County and Others: Security Management of Windows Software Discussion Points Would Include: • Exploit-Proof Code Patching is Best Strategy • Microsoft’s Windows Update Patch Management Program – Has a Critical Shortcoming – Could Fool Users-They have Been Properly Patched – Users are Really Vulnerable-Patch not Fixed • Users have Reported Patches don't Always Deploy Properly KEY TERMS BACK NEXT Return to Cases Page END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-71 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Banner Health Arlington County and Others: Security Management of Windows Software Discussion Points Would Include: • Exploit-Proof Code Patching is Best Strategy • Microsoft’s Windows Update Patch Management Program – Has a Critical Shortcoming – Could Fool Users-They have Been Properly Patched – Users are Really Vulnerable-Patch not Fixed • Users have Reported Patches don't Always Deploy Properly Return to • Microsoft Patches have Serious Cases Page Security Vulnerability Copyright 2005, McGraw-Hill/Irwin, Inc. 11-72 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases Online Resources – Lehman Brothers and Others: Managing Network Security Systems 1- What is the function of each of the network security tools identified in this case? Visit the websites of security firms Check Point and NetForensics to help you answer. KEY TERMS BACK NEXT Return to Cases Page END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-73 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Online Resources – Lehman Brothers and Others: Managing Network Security Systems Discussion Points Would Include: • • • • Network Intrusion-Detection Systems Firewalls Anti-Virus Tools Automating the Process – – – – Gathering Consolidating Correlating Prioritizing Data from Security Event • Collecting Data from Individual Security Systems • “Normalizing” Data to Quickly Identify Potential Attacks Copyright 2005, McGraw-Hill/Irwin, Inc. 11-74 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Online Resources – Lehman Brothers and Others: Managing Network Security Systems 2- What is the value of security information management software to a company? Use the companies in this case as examples. Real World Cases KEY TERMS BACK NEXT END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-75 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Online Resources – Lehman Brothers and Others: Managing Network Security Systems Discussion Points Would Include: • Provides a Single Place To Get Information • Automated Gathering, Consolidating, and Correlating Data – Into a Usable Format to Analyze – Used to Establish Priorities • Permits Businesses to React Faster to Activity • Reduces the Number of False Alerts • Allows Companies to Drill Down into Attach Details Copyright 2005, McGraw-Hill/Irwin, Inc. 11-76 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT Online Resources – Lehman Brothers and Others: Managing Network Security Systems 3- What can smaller firms who cannot afford the cost of such software do to properly manage and use the information about security from their network security systems? Give several examples. Return to Cases Page END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-77 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases Online Resources – Lehman Brothers and Others: Managing Network Security Systems Discussion Points Would Include: • Plan for Having Periodic Audits of IT Security • Review/Update Regularly Control Features of IT • Regularly Change Passwords-To Access System • Develop a Backup Plan and Implement KEY TERMS BACK NEXT Return to Cases Page END Copyright 2005, McGraw-Hill/Irwin, Inc. 11-78 Security, Ethical, and Societal Challenges of IT Ethical Responsibility of Business Professionals Computer Crime Privacy Issues Health Issues Section II Tools of Security Management Internetworked Security Defenses System Controls and Audits Real World Cases KEY TERMS BACK NEXT END Online Resources – Lehman Brothers and Others: Managing Network Security Systems Discussion Points Would Include: • Plan for Having Periodic Audits of IT Security • Review/Update Regularly Control Features of IT • Regularly Change Passwords-To Access System • Develop a Backup Plan and Implement • Develop Plan for Disaster Recovery Return to Cases Page Copyright 2005, McGraw-Hill/Irwin, Inc. 11-79