Ch-5 MIS Security
Ch-5 MIS Security
Outline
Introduction
Major Threats To Information System Security
Factors Contributing To Threat
Computer Crime
Managing Information System Security
1
Chapter IV
Introduction
Goals
Definition of IS Inadvertent act Strategy
Security Deliberate SW attack Policy
Dimensions of IS Virus, Hacking, Authentication
Security identity theft, Access control
Definition of IS cyber-harassment, Encryption
Security Threats war, crime Backup
Natural Disaster Firewall
Technical Failure IDS
Management failure Physical security
3
Chapter IV
2
Definition of Information System Security
Security is defined as “the quality/state of being secured –
to be secured from danger”
Information security – practice of defending digital
information from unauthorized:
Access
Use
Recording
Disruption
Modification
Destruction
5
Availability:
Ensuring that legitimate users can access the system
Integrity
Preventing unauthorized manipulations of data and systems
Confidentiality
Protecting data from unauthorized access
Accountability
Ensuring that actions can be traced
3
Dimensions of Information Security
Information is:
Stored on computer hardware
Manipulated by software
4
Chapter IV
Communication error
10
5
FACTORS CONTRIBUTING TO THREAT
DELEBERATE SOFTWARE ATTACKS
Deliberate action aimed to violate/ compromise a system’s security
through the use of software:
Use of malware
Password Cracking
Spoofing
Sniffing
Man-in-the-Middle
Phishing
Pharming
11
NATURAL DISASTER
Dangerous - unexpected and occur without very little warning
Avoid
12
6
FACTORS CONTRIBUTING TO THREAT
TECHNICAL FAILURE
Two Types:
Technical Hardware Failure
Equipment distributed with flaws that may be known or
unknown to the manufacturer
Technical Software Failure
Cause the system to perform in an undesirable or
unexpected way may be unrecoverable
13
MANAGEMENT FAILURE
Managers:
Update themselves about recent developments and technology
Develop proper plan for good protection of the information
Committed to upgrade the existing system to the latest
technology (assisted by IT professionals)
14
7
Computer Crime
What is computer crime?
Using a computer to commit an illegal act
Targeting a computer while committing an offense
15
Computer Crime
16
8
Types of Computer Crimes
Identity
Hacking & Cracking
Theft
Computer
Viruses
Cyber harassment,
Cyberstalking, Piracy
Cyberbullying
17
Crackers
Individuals who break into computer systems with the intent
to commit crime or do damage
Hacktivists
Crackers who are motivated by political or ideological goals
and who use cracking to promote their interests
18
9
Computer Viruses
Perverse software which cause malicious activity (spread
destructive program routines)
Hindering execution of other programs
19
Computer Viruses
Type Description Way of Propagation/ Effect
spreading
Worms Stand-alone Replicates itself and Neither delete nor
program and spread from one computer change data/files
propagates to another Make multiple copies of
itself It doesn't need to be part itself and send the copies
automatically of another program to be on the network and
propagated congest disk drives
Useful for installation of
a network – to check its
presence at each node
10
Computer Viruses
Type Description Way of Propagation/ spreading Effect
21
Computer Viruses
Reasons for perverse activity:
For gaining publicity
Revenge on company/person
Act of maniac
22
11
Computer Viruses
Commonly transmitted through:
The Internet and online services:
Infects files with extension (.COM, .EXE, .OVR, .OVL, .SYS, .BIN)
23
Computer Viruses
24
12
Spyware, Spam, and Cookies
Spyware: software that monitors the computer use, such as the
Web sites visible or even the keystrokes of the user
25
Denial-of-Service (DoS)
A denial-of-service attack seeks to overload
servers, typically using a network of hacked
computers that are controlled remotely, by
sending too many requests or messages to the
server for it to handle.
26
13
Spoofing
Insertion of forged (but trusted) IP addresses into IP packets in
order to gain access to networks/components
Ingress filtering – ISP discard packet with IP address not belonging to
any of the networks connected to the ISP
27
Sniffing
Use of a program or device that can monitor data traveling
over a network
28
14
Phishing
It is an attempt to gain sensitive personal information by
posing as a legitimate entity
E.g. an e-mail is sent to the victim informing them of a problem
and asking them to provide their username, password, etc.
29
Identity Theft
Stealing Social Security, credit card, bank account
numbers and information
Thieves even withdraw money directly from victims’ bank
accounts
Organizations keep information about individuals in accessible
databases
15
Cyber-harassment, Cyberstalking, and
Cyberbullying
Communicating offensive, ill-mannered, or threatening
content
31
Software Piracy
Unauthorized copying of computer programs, which is intellectual
property protected by copy right law.
Using software that isn’t properly licensed and paid for, such as by
purchasing one copy of a product and then using it on multiple
computers.
16
Privacy Issue
Violation of Privacy
Unauthorized access of individuals’ private email conversations
and computer records (personal files)
33
34
17
Cyberwar and Cyber-terrorism
35
Cyber-terrorism
Attacks by individuals and organized groups (not by the
government)
36
18
Cyberwar and Cyber-terrorism
37
Chapter IV
38
19
Developing IS Security Strategy
Options for addressing information security risks
Risk Reduction
Actively installing countermeasures
Risk Acceptance
Accepting any losses that occur
Risk Transference
Have someone else absorb the risk (insurance,
outsourcing)
Risk Avoidance
40
20
Developing IS Security Strategy
IS Security Mechanisms:
Developing Information System Security Policy
Access control
Back-ups
Firewalls
Physical Security
41
42
21
Authentication Mechanism
43
Access Control
Which users are authorized to read, write, modify, add,
delete after login through password
44
22
Chapter V
Physical Security
Locked doors
Environmental monitoring
Monitoring temperature, humidity, airflow for servers and
other high value equipment
45
Chapter V
Antivirus
Used to prevent, detect and remove malware
46
23
Thank you !!!!
47
24