Chapter 8
Chapter 8
SYSTEMS
CHAPTER 8
WHY SYSTEMS ARE VULNERABLE
When large amounts of data are stored in electronic
form , they are more vulnerable to threats
The potential for unauthorized access , abuse or fraud
is not limited to a single location
CONTEMPORARY SECURITY CHALLENGES
Technical , organizational and environmental factors.
Contemporary Security Challenges and Vulnerabilities
Figure 8-1
Internet vulnerabilities:
Computers that are constantly connected to internet by
cable modems or DSL’s are more open to penetration by
outsiders because they use fixed internet adresses where
they can be easily identified.
Wireless Security Challenges:
Radio frequency bands are easy to scan
IDENTITY THEFT
Its a crime in which an imposter obtains key pieces of
personal information such as social security
identification numbers, driver license numbers, or
credit card numbers to impersonate some one else.
CLICK FRAUD
It occurs when a individual or computer program
fraudulently clicks on an online add without any intention
of learning more about the advertiser or making a purchase
Figure 8-4
DISASTER RECOVERY PLANNING
It devises plans for the restoration of computing and
communication services after they have been
disrupted.
Disaster recover plans focus primarily on the technical
issues involved in keeping system up and running,
such as which files to back up and the maintenance of
back up computer systems or disaster recover services.
BUSINESS CONTINUITY PLANNING
If focuses on how company can restore business
operations after a disaster strikes. The business
continuity plans identifies critical business processes
and determines action plans for handling mission
critical functions if systems go down
ROLE OF AUDITING
An MIS audit examines the firm's overall security
environment as well as controls governing individuals
information systems.
The auditor should trace the flow of sample
transactions through the system and perform tests
using ,if appropriate, automated audit software.
ACCESS CONTROL
Access control consists of all the policies and
procedure a company uses to prevent improper access
to system by unauthorized insiders and outsiders. To
gain access a user must be authorized and
authenticated.
Authentication refers to the ability to know that a
person is who he or she claims to be .Access control
software is designed to allow only authorized users to
use systems or to access data using some method for
authentication.
ACCESS CONTROL
Biometric authentication uses system that read and
interpret individual human traits such as finger
prints ,irises and voices in order to grant or deny
access.
FIREWALLS,INTRUSION DETECTION
SYSTEM,AND ANTIVIRUS SOFTWARE
FIREWALLS
Hardware and software controlling flow of incoming and
outgoing network traffic
Network Address Translation (NAT) can provide
another layer of protection when static packet filtering
and stateful inspection are employed.
Application proxy filtering examines the application
content of packets
INTRUSION DETECTION SYSTEMS
Intrusion detection systems feature full time
monitoring tools placed at the most vulnerable points
or ‘hot spots’ of corporate networks to detect and
deter intruders continuity.
ANTIVIRUS AND ANTISPYWARE SOFTWARES
Anti virus software is designed to check computer
systems and drives for the presence of computer
viruses.
Often the software eliminates the virus from the
infected area, however most antivirus software is
effective only against viruses already known when the
software was written.
UNIFIED THREAT MANAGEMENT SYSTEMS
Combination of various security tools including
firewalls ,virtual private networks, intrusion detection
system ,web content filtering and antispam software in
a single appliance.
Initially aimed at small and medium size business,
UTM products are available for all sizes of networks.
ENCRYPTION AND PUBLIC KEY
INFRASTRUCTRE
Encryption is the process of transforming plain text or
data into cipher text that cannot be read by anyone
other than the sender and the intended receiver.
There are two methods for encrypting network traffic
on the web.
Secure Sockets Layer(SSL)
Secure Hypertext Transfer Protocol(S-HTTP)
PUBLIC KEY ENCRYPTION
ENSURING SYSTEM AVAILABILITY
In online transaction processing, transaction entered
online are immediately processed by the computer.
multitudinous changes to data bases, reporting and
request for information occur each instant
ENSURING SOFTWARE QUALITY
Good testing begins before a software programme is
even written by using a walkthrough –a review of a
specification or design document by a small group of
people care fully selected based on the skills needed
for the particular objectives being tested .