chapter 8. why systems are vulnerable when large amounts of data are stored in electronic form, they...
TRANSCRIPT
![Page 1: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/1.jpg)
SECURING INFORMATION SYSTEMS
CHAPTER 8
![Page 2: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/2.jpg)
WHY SYSTEMS ARE VULNERABLEWhen large amounts of data are stored in
electronic form , they are more vulnerable to threats
The potential for unauthorized access , abuse or fraud is not limited to a single location
CONTEMPORARY SECURITY CHALLENGESTechnical , organizational and environmental
factors.
![Page 3: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/3.jpg)
Contemporary Security Challenges and Vulnerabilities
Figure 8-1
![Page 4: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/4.jpg)
Internet vulnerabilities:Computers that are constantly connected to
internet by cable modems or DSL’s are more open to penetration by outsiders because they use fixed internet adresses where they can be easily identified.
Wireless Security Challenges: • Radio frequency bands are easy to scan
• The service set identifiers (SSID) identifying the access points broadcast multiple times
![Page 5: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/5.jpg)
HACKERS AND COMPUTER CRIMEA hacker is an individual who intends to gain
unauthorized access to a computer system.Within the hacking community ,the term
cracker is typically used to denote a hacker with criminal intent ,although in the public press, the terms hacker and cracker are used interchangeably.
![Page 6: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/6.jpg)
Spoofing and SniffingSpoofing also may involve redirecting a Web link to
an address different from the intended one, with the site masquerading as the intended destination.
For example, if hackers redirect customers to a fake Web site that looks almost exactly like the true site, they can then collect and process orders ,effectively stealing business as well as sensitive customer information from the true site.
A sniffer is a type of eavesdropping program that monitors information travelling over a network.
![Page 7: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/7.jpg)
DENIAL OF SERVICE ATTACKS• In a denial of service(DoS) attack, hackers
flood a network server or web server with many thousands of false communication or request for services to crash the network.
• A distributor denial of service (DDoS) attack uses numerous computers to inundate and overwhelm the network from numerous launch points.
![Page 8: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/8.jpg)
COMPUTER CRIMEAny violations of criminal law that involve a
knowledge of computer technology for their perpetration , investigation or prosecution.
Its a crime in which an imposter obtains key pieces of personal information such as social security identification numbers, driver license numbers, or credit card numbers to impersonate some one else.
IDENTITY THEFT
![Page 9: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/9.jpg)
CLICK FRAUDIt occurs when a individual or computer program
fraudulently clicks on an online add without any intention of learning more about the advertiser or making a purchase
Cybercriminal activities - launching malware , denial of service attacks , and phishing probes are borderless.
These vulnerabilities make digital networks easy targets for digital attack by terrorists , foreign intelligence services , or other groups seeking wide spread disruption and harm
GLOBAL THREATS CYBER TERRORISM AND CYBER WARFARE
![Page 10: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/10.jpg)
INTERNAL THREATS:EMPLOYEESMany employees forget their passwords to
access the computer systems or allow co workers to use them ,which compromises the system. Malicious intruders seeking system access some times trick employees into revealing their passwords by pretending to be legitimate members of the company in need of information. This practice is called social engineering.
![Page 11: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/11.jpg)
SOFTWARE VULNERABILITYSoftware errors pose a constant threat to
information systems, causing untold losses in productivity .
Growing complexity and size of software programs coupled with demands for timely delivery to markets, have contributed to an increase in software flaws or vulnerability
A major problem with software is the presence of hidden bugs or programme code defects .
![Page 12: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/12.jpg)
ESTABLISHING A FRAME WORK FOR SECURITY AND CONTROL
![Page 13: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/13.jpg)
INFORMATION SYSTEMS CONTROLSGENERAL CONTROLS General controls
govern the design, security and use of computer programs and the security of data files in general throughout the organization’s information technology infrastructure
On the whole ,general controls apply to all computerized application and consists of combination of hardware ,software and manual procedures.
![Page 14: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/14.jpg)
Type of general control
Description
SOFTWARE CONROLS
Monitors the use of system software and prevents un authorized access of software programmes, system software and computer programmes.
HARDWARE CONTROLS
Ensures that computer hardware is physically secure and check for equipment malfunction. Organizations that are critically dependent on their computers also must make provisions for backup or continued operation to maintain constant service.
COMPUTER OPERATIONS CONROLS
Oversee the work of the computer department to ensure that programmed procedures are consistently and correctly applied to the storage and processing of data. They include controls over the setup of computer processing jobs and back up and recover procedures for processing that end abnormally.
![Page 15: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/15.jpg)
Type of general control Description
DATA SECURITY CONTROLS
Oversee the work of the computer department to ensure that programmed procedures are consistently and correctly applied to the storage and processing of data. They include controls over the setup of computer processing jobs and back up and recover procedures for processing that end abnormally.
IMPLEMENTATION CONROLS
Audit the systems development process at various points to ensure that the process is properly controlled and managed .
ADMINISTRATIVE CONTROLS
Formulize standard rules, procedures and control disciplines to ensure that the organizations general and application controls are properly executed and enforced.*
![Page 16: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/16.jpg)
INFORMATION SYSTEMS CONTROLSAPPLICATION CONTROLS Application
controls are specific controls unique to each computerized application such as pay role or order processing.
Application controls can be classified as Input controlsProcessing controlsOutput controls
![Page 17: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/17.jpg)
RISK ASSESMENTA risk assessment determines the level of risk
to the firm if a specific activity or process in not properly controlled.
![Page 18: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/18.jpg)
SECURITY PROFILES FOR PERSONNEL SYSETM
Figure 8-4
![Page 19: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/19.jpg)
DISASTER RECOVERY PLANNINGIt devises plans for the restoration of
computing and communication services after they have been disrupted.
Disaster recover plans focus primarily on the technical issues involved in keeping system up and running, such as which files to back up and the maintenance of back up computer systems or disaster recover services.
![Page 20: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/20.jpg)
BUSINESS CONTINUITY PLANNINGIf focuses on how company can restore
business operations after a disaster strikes. The business continuity plans identifies critical business processes and determines action plans for handling mission critical functions if systems go down
![Page 21: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/21.jpg)
ROLE OF AUDITINGAn MIS audit examines the firm's overall
security environment as well as controls governing individuals information systems.
The auditor should trace the flow of sample transactions through the system and perform tests using ,if appropriate, automated audit software.
![Page 22: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/22.jpg)
ACCESS CONTROLAccess control consists of all the policies and
procedure a company uses to prevent improper access to system by unauthorized insiders and outsiders. To gain access a user must be authorized and authenticated.
Authentication refers to the ability to know that a person is who he or she claims to be .Access control software is designed to allow only authorized users to use systems or to access data using some method for authentication.
![Page 23: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/23.jpg)
ACCESS CONTROLBiometric authentication uses system that
read and interpret individual human traits such as finger prints ,irises and voices in order to grant or deny access.
![Page 24: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/24.jpg)
FIREWALLS,INTRUSION DETECTION SYSTEM,AND ANTIVIRUS SOFTWAREFIREWALLS
Hardware and software controlling flow of incoming and outgoing network traffic
Network Address Translation (NAT) can provide another layer of protection when static packet filtering and stateful inspection are employed.
Application proxy filtering examines the application content of packets
![Page 25: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/25.jpg)
INTRUSION DETECTION SYSTEMSIntrusion detection systems feature full time
monitoring tools placed at the most vulnerable points or ‘hot spots’ of corporate networks to detect and deter intruders continuity.
![Page 26: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/26.jpg)
ANTIVIRUS AND ANTISPYWARE SOFTWARESAnti virus software is designed to check
computer systems and drives for the presence of computer viruses.
Often the software eliminates the virus from the infected area, however most antivirus software is effective only against viruses already known when the software was written.
![Page 27: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/27.jpg)
UNIFIED THREAT MANAGEMENT SYSTEMSCombination of various security tools
including firewalls ,virtual private networks, intrusion detection system ,web content filtering and antispam software in a single appliance.
Initially aimed at small and medium size business, UTM products are available for all sizes of networks.
![Page 28: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/28.jpg)
ENCRYPTION AND PUBLIC KEY INFRASTRUCTREEncryption is the process of transforming
plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver.
There are two methods for encrypting network traffic on the web.
Secure Sockets Layer(SSL)Secure Hypertext Transfer Protocol(S-HTTP)
![Page 29: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/29.jpg)
PUBLIC KEY ENCRYPTION
![Page 30: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/30.jpg)
ENSURING SYSTEM AVAILABILITYIn online transaction processing, transaction
entered online are immediately processed by the computer.
multitudinous changes to data bases, reporting and request for information occur each instant
![Page 31: CHAPTER 8. WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are more vulnerable to threats The potential for](https://reader038.vdocuments.net/reader038/viewer/2022110401/56649ddf5503460f94ad86e5/html5/thumbnails/31.jpg)
ENSURING SOFTWARE QUALITYGood testing begins before a software
programme is even written by using a walkthrough –a review of a specification or design document by a small group of people care fully selected based on the skills needed for the particular objectives being tested .