0% found this document useful (0 votes)
4 views

Chapter 5

Chapter 8 discusses the vulnerabilities of information systems to destruction, error, and abuse, emphasizing the importance of security policies and controls. It outlines various threats such as hardware and software problems, internet vulnerabilities, and malicious software, as well as the business value of maintaining security to prevent revenue loss and legal liabilities. Additionally, it highlights the need for a structured framework for security and control, including risk assessment and disaster recovery planning.

Uploaded by

nm453060
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Chapter 5

Chapter 8 discusses the vulnerabilities of information systems to destruction, error, and abuse, emphasizing the importance of security policies and controls. It outlines various threats such as hardware and software problems, internet vulnerabilities, and malicious software, as well as the business value of maintaining security to prevent revenue loss and legal liabilities. Additionally, it highlights the need for a structured framework for security and control, including risk assessment and disaster recovery planning.

Uploaded by

nm453060
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 20

Chapter 5

Securing Information
Systems

8.1 © 2010 by Prentice Hall


Management Information Systems
Chapter 8 Securing Information Systems

LEARNING OBJECTIVES

• Explain why information systems are vulnerable to


destruction, error, and abuse.
• Assess the business value of security and control.
• Identify the components of an organizational
framework for security and control.
• Evaluate the most important tools and technologies
for safeguarding information resources.

8.2 © 2010 by Prentice Hall


Management Information Systems
Chapter 8 Securing Information Systems

System Vulnerability and Abuse

• Security:
• Policies, procedures and technical measures used to prevent
unauthorized access, alteration, theft, or physical damage to
information systems

• Controls:
• Methods, policies, and organizational procedures that ensure
safety of organization’s assets; accuracy and reliability of its
accounting records; and operational adherence to
management standards

8.3 © 2010 by Prentice Hall


Management Information Systems
Chapter 8 Securing Information Systems

System Vulnerability and Abuse

• Why systems are vulnerable


• Hardware problems
• Breakdowns, configuration errors, damage from improper
use or crime
• Software problems
• Programming errors, installation errors, unauthorized
changes)
• Disasters
• Power failures, flood, fires, etc.
• Use of networks and computers outside of
firm’s control
• E.g., with domestic or offshore outsourcing vendors

8.4 © 2010 by Prentice Hall


Management Information Systems
Chapter 8 Securing Information Systems

System Vulnerability and Abuse

• Internet vulnerabilities
• Network open to anyone

• Size of Internet means abuses can have wide impact

• Use of fixed Internet addresses with permanent


connections to Internet eases identification by hackers

• E-mail attachments

• E-mail used for transmitting trade secrets

8.5 © 2010 by Prentice Hall


Management Information Systems
Chapter 8 Securing Information Systems

System Vulnerability and Abuse

• Wireless security challenges


• Radio frequency bands easy to scan
• SSIDs (service set identifiers)
• Identify access points
• Broadcast multiple times
• War driving
• Eavesdroppers drive by buildings and try to intercept network traffic
• When hacker gains access to SSID, has access to network’s
resources
• WEP (Wired Equivalent Privacy)
• Security standard for 802.11
• Basic specification uses shared password for both users and access
point
• Users often fail to use security features

8.6 © 2010 by Prentice Hall


Management Information Systems
Chapter 8 Securing Information Systems

System Vulnerability and Abuse

Wi-Fi Security Challenges

Figure 8-2
Many Wi-Fi networks can be
penetrated easily by intruders
using sniffer programs to obtain
an address to access the
resources of a network without
authorization.

8.7 © 2010 by Prentice Hall


Management Information Systems
Chapter 8 Securing Information Systems

System Vulnerability and Abuse

The Worst Data Theft Ever?


• Read the Interactive Session: Organizations and then
discuss the following questions:
• List and describe the security control weaknesses at TJX
Companies
• What management, organization, and technology factors
contributed to these weaknesses?
• What was the business impact of TJX’s data loss on TJX,
consumers, and banks?
• How effectively did TJX deal with these problems?
• Who should be held liable for the losses caused by the use of
fraudulent credit cards in this case? The banks issuing the
cards or the consumers? Justify your answer.
• What solutions would you suggest to prevent the problems?

8.8 © 2010 by Prentice Hall


Management Information Systems
Chapter 8 Securing Information Systems

System Vulnerability and Abuse

• Malicious software (malware)


• Viruses: Rogue software program that attaches itself to other
software programs or data files in order to be executed
• Worms: Independent computer programs that copy themselves from
one computer to other computers over a network
• Trojan horses: Software program that appears to be benign but
then does something other than expected

• Spyware: Small programs install themselves surreptitiously on


computers to monitor user Web surfing activity and serve up
advertising

• Key loggers: Record every keystroke on computer to steal


serial numbers, passwords, launch Internet attacks

8.9 © 2010 by Prentice Hall


Management Information Systems
Chapter 8 Securing Information Systems

System Vulnerability and Abuse

• Hackers and computer crime


• Hackers vs. crackers
• Activities include
• System intrusion
• Theft of goods and information
• System damage
• Cybervandalism
• Intentional disruption, defacement,
destruction of Web site or corporate
information system
8.10 © 2010 by Prentice Hall
Management Information Systems
Chapter 8 Securing Information Systems

System Vulnerability and Abuse

• Spoofing
• Misrepresenting oneself by using fake e-mail addresses or
masquerading as someone else
• Redirecting Web link to address different from intended one,
with site masquerading as intended destination
• Sniffer: Eavesdropping program that monitors information
traveling over network
• Denial-of-service attacks (DoS): Flooding server with
thousands of false requests to crash the network
• Distributed denial-of-service attacks (DDoS): Use of
numerous computers to launch a DoS
• Botnets: Networks of “zombie” PCs infiltrated by bot malware

8.11 © 2010 by Prentice Hall


Management Information Systems
Chapter 8 Securing Information Systems

System Vulnerability and Abuse

• Computer crime
• Defined as “any violations of criminal law that involve a
knowledge of computer technology for their perpetration,
investigation, or prosecution”
• Computer may be target of crime, e.g.:
• Breaching confidentiality of protected computerized data
• Accessing a computer system without authority
• Computer may be instrument of crime, e.g.:
• Theft of trade secrets
• Using e-mail for threats or harassment

8.12 © 2010 by Prentice Hall


Management Information Systems
Chapter 8 Securing Information Systems

System Vulnerability and Abuse

• Identity theft: Theft of personal Information (social security id,


driver’s license or credit card numbers) to impersonate someone
else
• Phishing: Setting up fake Web sites or sending e-mail
messages that look like legitimate businesses to ask users for
confidential personal data.
• Evil twins: Wireless networks that pretend to offer trustworthy
Wi-Fi connections to the Internet
• Pharming: Redirects users to a bogus Web page, even when
individual types correct Web page address into his or her browser

8.13 © 2010 by Prentice Hall


Management Information Systems
Chapter 8 Securing Information Systems

System Vulnerability and Abuse

• Click fraud
• Individual or computer program clicks online ad
without any intention of learning more or making a
purchase.

8.14 © 2010 by Prentice Hall


Management Information Systems
Chapter 8 Securing Information Systems

System Vulnerability and Abuse

• Software vulnerability
• Commercial software contains flaws that create
security vulnerabilities
• Hidden bugs (program code defects)
• Zero defects cannot be achieved because complete
testing is not possible with large programs
• Flaws can open networks to intruders
• Patches
• Vendors release small pieces of software to repair flaws
• However, amount of software in use can mean exploits
created faster than patches be released and implemented

8.15 © 2010 by Prentice Hall


Management Information Systems
Chapter 8 Securing Information Systems

Business Value of Security and Control

• Lack of security, control can lead to


• Loss of revenue
• Failed computer systems can lead to significant or
total loss of business function
• Lowered market value:
• Information assets can have tremendous value
• A security breach may cut into firm’s market value
almost immediately
• Legal liability
• Lowered employee productivity
• Higher operational costs

8.16 © 2010 by Prentice Hall


Management Information Systems
Chapter 8 Securing Information Systems

Business Value of Security and Control

• Electronic evidence
• Evidence for white collar crimes often found in
digital form
• Data stored on computer devices, e-mail, instant messages,
e-commerce transactions
• Proper control of data can save time, money when
responding to legal discovery request
• Computer forensics:
• Scientific collection, examination, authentication, preservation,
and analysis of data from computer storage media for use as
evidence in court of law
• Includes recovery of ambient and hidden data

8.17 © 2010 by Prentice Hall


Management Information Systems
Chapter 8 Securing Information Systems

Establishing a Framework for Security and Control

• Application controls
• Specific controls unique to each computerized application,
such as payroll or order processing
• Include both automated and manual procedures
• Ensure that only authorized data are completely and
accurately processed by that application
• Types of application controls:
• Input controls
• Processing controls
• Output controls

8.18 © 2010 by Prentice Hall


Management Information Systems
Chapter 8 Securing Information Systems

Establishing a Framework for Security and Control

• Risk assessment
• Determines level of risk to firm if specific activity or process is
not properly controlled
• Types of threat
• Probability of occurrence during year
• Potential losses, value of threat
• Expected annual loss

EXPOSURE PROBABILITY LOSS RANGE (AVERAGE) EXPECTED


ANNUAL LOSS

Power failure 30% $5K - $200K ($102,500) $30,750

Embezzlement 5% $1K - $50K ($25,500) $1,275

User error 98% $200 - $40K ($20,100) $19,698

8.19 © 2010 by Prentice Hall


Management Information Systems
Chapter 8 Securing Information Systems

Establishing a Framework for Security and Control

• Disaster recovery planning: Devises plans for


restoration of disrupted services
• Business continuity planning: Focuses on restoring
business operations after disaster
• Both types of plans needed to identify firm’s most
critical systems and business processes
• Business impact analysis to determine impact of an outage
• Management must determine
• Maximum time systems can be down
• Which systems must be restored first

8.20 © 2010 by Prentice Hall

You might also like