Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and...

Post on 01-Apr-2015

216 views 3 download

Tags:

Transcript of Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and...

Information

Security Management

Chapter 12

12-4

Study Questions

Q1: What is the goal of information systems security?

Q2: How big is the computer security problem?

Q3: How should you respond to security threats?

Q4: How should organizations respond to security threats?

Q5: How can technical safeguards protect against security threats?

Q6: How can data safeguards protect against security threats?

Q7: How can human safeguards protect against security threats?

Q8: How should organizations respond to security incidents?

12-5

Q1: What Is the Goal of Information Systems Security?

12-6

Examples of Threat/Loss

12-7

What Are the Sources of Threats?

Unauthorized data disclosure—inadvertent release of data in violation of policy

Pretexting—pretending to be someone else via phone callPhishing—pretexting using email; email spoofing

Spoofing—disguising as a different IP address or different email sender, web spoofing

IP spoofing—impersonating another computing system

Email spoofing—synonym for phishing

Drive-by Sniffing—intercepting computer communications

Unauthorized Data Disclosure

12-8

Hacking, natural disasters, etc.

12-9

Incorrect Data Modification

• Procedures not followed or incorrectly designed procedures

• Increasing a customer’s discount or incorrectly modifying employee’s salary

• Placing incorrect data on company Web site

• Improper internal controls on systems

• System errors

• Faulty recovery actions after a disaster

12-10

Faulty Service

• Incorrect data modification

• Systems working incorrectly

• Procedural mistakes

• Programming errors

• IT installation errors

• Usurpation

• Denial of service (unintentional)

• Denial-of-service attacks (intentional)

12-11

Loss of Infrastructure

• Human accidents

• Theft and terrorist events

• Disgruntled or terminated employee

• Natural disasters

• Advanced Persistent Threat (APT) or cyberwarfare

• 155% increase in mobile malware apps from 2010 to 2011

• Apps for snooping – track location, record phone calls, save and display chats and messages.

• “jailbreak” targeted at App Store of iPhone

• Sniffer programs to access Wi-Fi networks unauthorized.

• Kaspersky, Lookout, DroidSecurity, Sandboxing

• Performing a remote wipe of offending apps

Mobile Security

12-12

12-13

Q2: How Big Is the Computer SecurityProblem?

12-14

Verizon–Secret Service Findings 2011

• Number of data-loss security incidents reached all-time high, but number of data records lost fell dramatically for second year in a row

• Data theft most successful at small and medium-sized businesses

12-15

Verizon–Secret Service Findings 2011 (cont'd)

Four most frequent computer crimes

1. Criminal activity against servers

2. Viruses

3. Code insertion

4. Data loss on user computer

12-16

Types of Attacks Experienced

12-17

Intrusion Detection System (IDS)

• Computer program that senses when another computer is attempting to scan disk or otherwise access a computer

• “When I run an IDS on a computer on the public Internet,... I get more than 1,000 attempts, mostly from foreign countries. There is nothing you can do about it except use reasonable safeguards.”

12-18

Q3: How Should You Respond to Security Threats?

12-19

Q4: How Should Organizations Respond to Security Threats?

• Establish a company-wide security policy– What sensitive data to store– How it will process that data– Will data be shared with other

organizations– How employees and others can obtain

copies of data stored about them

12-20

Q4: How Should Organizations Respond to Security Threats? (cont'd)

– How employees and others can request changes to inaccurate data

– What employees can do with their own mobile devices at work

– What non-organizational activities employees can take with employee-owned equipment

12-21

Security Safeguards as They Relate to the Five IS Components

12-22

Q5: How Can Technical Safeguards Protect Against Security Threats?

• Password• Smart card• Biometric

Authentication methods

• Microchip embedded with identifying data

• Authentication by PINSmart cards

• Fingerprints, face scans, retina scans

• See http://searchsecurity.techtarget.com

Biometric authentication

• Authenticate to network and other serversSingle sign-o

n for multiple systems

Identification and Authentication (Access)

12-23

Encryption algorithms (DES, 3DES, AES, blowfish, idea)

Key—a number used to encrypt the data

Symmetric encryptionAsymmetric encryption—public/private keyHTTPS (HTTP + SSL/TLS)Secure Sock Layer (SSL) (Predecessor of TLS)Transport Layer Security (TLS) (DC, Privacy, PKE)

Encryption Terminology

12-24

12-25

Encryption: Essence of HTTPS (SSL or TLS)

12-26

Firewalls

12-27

Malware Types and Spyware and Adware Symptoms

• Viruses Payload Trojan horses Worms Beacons

Spyware & Adware Symptoms

12-28

Malware Safeguards

1. Install antivirus and antispyware programs

2. Scan frequently

3. Update malware definitions

4. Open email attachments only from known sources

5. Install software updates from legitimate sources

6. Browse only reputable Internet neighborhoods

12-31

Q6: How Can Data Safeguards ProtectAgainst Security Threats?

12-32

Q7: How can Human SafeguardsProtect Against Security Threats?

12-33

Account Administration

• Account Management Standards for new user accounts,

modification of account permissions, removal of unneeded accounts

• Password Management Users should change passwords frequently

• Help Desk Policies

12-34

Sample Account Acknowledgment Form

12-35

Systems Procedures

Data recovery; online recovery - the process of salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally.

•Firewall logs•DBMS log-in records•Web server logs

Activity log analyses

• In-house and external security professionalsSecurity testing

•How did the problem occur? Investigation of incidents

• Indication of potential vulnerability and needed corrective actions

Learn from incidences

Review and update security and safeguard policies

Security Monitoring Functions

12-36

12-37

What Is Necessary for Disaster Preparedness?

• Disaster― Substantial loss of

infrastructure caused by acts of nature, crime, or terrorism

• Appropriate location― Avoid places prone to

floods, earthquakes, tornadoes, hurricanes, avalanches, car/truck accidents

― Not in unobtrusive buildings, basements, backrooms, physical perimeter

― Fire-resistant buildings

What Is Necessary for Disaster preparedness? (cont’d)

12-39

Backup processing centers in geographically removed site

Create backups for critical resources

Contract with “hot site” or “cold site” provider• Hot site provides all equipment needed to continue

operations there• Cold site provides space but you set up and install

equipment• www.ragingwire.com/managed_services?=recovery

Periodically train and rehearse cutover of operations

Cloud Backup: a service that provides users with a system for the backup and storage of computer files. A form of cloud computing

12-40

Q8: How Should OrganizationsRespond to Security Incidents?

12-41

How Does the Knowledge in thisChapter Help You?

• Aware of threats to computer security as an individual, business professional and employee

• Know trade-offs of loss risks and cost of safeguards

• Ways to protect your computing devices and data• Understand technical, data, and human

safeguards• Understand how organizations should respond to

security incidents