Management Information Systems: Managing The Digital Firm: Fifteenth Edition
Management Information Systems: Managing The Digital Firm: Fifteenth Edition
Chapter 8
Securing Information
Systems
• 8-3 What are the components of an organizational framework for security and control?
• 8-4 What are the most important tools and technologies for safeguarding information
resources?
• Solutions
– Cyber-hygiene practices to secure devices
– New national cyber-security strategy
– New Cybersecurity Act
• Controls
– Methods, policies, and organizational procedures that ensure
safety of organization’s assets; accuracy and reliability of its
accounting records; and operational adherence to management
standards
• War driving
– Eavesdroppers drive by buildings and try to detect SSID and gain
access to network and resources
– Once access point is breached, intruder can gain access to
networked drives and files
• Click fraud
• Cyberterrorism
• Cyberwarfare
• Patches
– Small pieces of software to repair flaws
– Exploits often created faster than patches can be released and
implemented
• Gramm-Leach-Bliley Act
– Requires financial institutions to ensure the security and
confidentiality of customer data
• Sarbanes-Oxley Act
– Imposes responsibility on companies and their management to
safeguard the accuracy and integrity of financial information that is
used internally and released externally
• Computer forensics
– Scientific collection, examination, authentication, preservation, and
analysis of data from computer storage media for use as evidence
in court of law
– Recovery of ambient data
• Application controls
– Controls unique to each computerized application
– Input controls, processing controls, output controls
• Identity management
– Identifying valid users
– Controlling access
• Security audits
– Review technologies, procedures, documentation, training, and personnel
– May even simulate disaster to test responses
• Authentication
– Password systems
– Tokens
– Smart cards
– Biometric authentication
– Two-factor authentication
• WPA2 specification
– Replaces WEP with stronger standards
– Continually changing, longer encryption keys
Two methods for encrypting network traffic on the Web are SSL and S-HTTP. Secure Sockets Layer (SSL)
and its successor Transport Layer Security (TLS) enable client and server computers to manage encryption
and decryption activities as they communicate with each other during a secure Web session. Secure
Hypertext Transfer Protocol (S-HTTP) is another protocol used for encrypting data flowing over the Internet,
but it is limited to individual messages, whereas SSL and TLS are designed to establish a secure connection
between two computers.