0% found this document useful (0 votes)
17 views23 pages

Chapter 8

Uploaded by

Islam Babiker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views23 pages

Chapter 8

Uploaded by

Islam Babiker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Essentials of Management Information

Systems
Thirteenth Edition

Chapter 8
Securing Information
Systems

Copyright © 2019 Pearson Education Ltd.


Why Systems are Vulnerable (1 of 2)

• Security
– Policies, procedures, and technical measures used to
prevent unauthorized access, alteration, theft, or
physical damage to information systems
• Controls
– Methods, policies, and organizational procedures that
ensure safety of organization’s assets; accuracy and
reliability of its accounting records; and operational
adherence to management standards

Copyright © 2019 Pearson Education Ltd.


Why Systems are Vulnerable (2 of 2)

• Accessibility of networks
• Hardware problems (breakdowns, configuration errors,
damage from improper use or crime)
• Software problems (programming errors, installation
errors, unauthorized changes)
• Disasters
• Use of networks/computers outside of firm’s control
• Loss and theft of portable devices

Copyright © 2019 Pearson Education Ltd.


Figure 8.1 Contemporary Security
Challenges and Vulnerabilities

Copyright © 2019 Pearson Education Ltd.


Internet Vulnerabilities

• Network open to anyone


• Size of Internet means abuses can have wide impact
• Use of fixed Internet addresses with cable / DSL modems
creates fixed targets for hackers
• Unencrypted VOIP
• Email, P2P, IM
– Interception
– Attachments with malicious software
– Transmitting trade secrets

Copyright © 2019 Pearson Education Ltd.


Wireless Security Challenges

• Radio frequency bands easy to scan


• SSIDs (service set identifiers)
– Identify access points, broadcast multiple times,
can be identified by sniffer programs
• War driving
– Eavesdroppers drive by buildings and try to detect
SSID and gain access to network and resources
– Once access point is breached, intruder can gain
access to networked drives and files
• Rogue access points
Copyright © 2019 Pearson Education Ltd.
Figure 8.2 Wi-Fi Security Challenges

Copyright © 2019 Pearson Education Ltd.


Malicious Software: Viruses, Worms,
Trojan Horses, and Spyware (1 of 2)
• Malware (malicious software)

• Viruses

Rogue software program that attaches itself to other software programs or data files in order to be
executed

• Worms

Independent computer programs that copy themselves from one computer to other computers over
a network

• Worms and viruses spread by


– Downloads and drive-by downloads
– Email, I M attachments

• Mobile device malware

• Social network malware

Copyright © 2019 Pearson Education Ltd.


Malicious Software: Viruses, Worms,
Trojan Horses, and Spyware (2 of 2)
• Trojan horse

Software program that appears to be benign but then does something other than expected.

• S Q L injection attacks

• Ransomware

• Spyware(Small programs install themselves surreptitiously on computers to monitor user Web


surfing activity and serve up advertising)
– Key loggers (Record every keystroke on computer to steal serial numbers, passwords,
launch Internet attacks)
– Other types
▪ Reset browser home page
▪ Redirect search requests
▪ Slow computer performance by taking up memory

Copyright © 2019 Pearson Education Ltd.


Hackers and Computer Crime (1 of 3)

• Hackers v s. crackers
er su

• Activities include:
– System intrusion
– System damage
– Cybervandalism
▪ Intentional disruption, defacement, destruction of
website or corporate information system

Copyright © 2019 Pearson Education Ltd.


•Spoofing
•Misrepresenting oneself by using fake e-mail addresses or
masquerading as someone else
•Redirecting Web link to address different from intended one, with
site masquerading as intended destination

•Sniffer
•Eavesdropping program that monitors information traveling over
network
•Enables hackers to steal proprietary information such as e-mail,
company files, and so on

Copyright © 2019 Pearson Education Ltd.


Hackers and Computer Crime (2 of 3)

•Denial-of-service attacks (DoS)


•Flooding server with thousands of false requests to crash the
network.

•Distributed denial-of-service attacks (DDoS)


•Use of numerous computers to launch a DoS
•Botnets
•Networks of “zombie” PCs infiltrated by bot malware

Copyright © 2019 Pearson Education Ltd.


• Spam
•Computer crime
•Any violations of criminal law that involve a knowledge of
computer technology for their perpetration, investigation, or
prosecution
•Computer may be target of crime:
•Breaching confidentiality of protected computerized data
•Accessing a computer system without authority
•Computer may be instrument of crime:
•Theft of trade secrets
•Using e-mail for threats or harassment
Copyright © 2019 Pearson Education Ltd.
Hackers and Computer Crime (3 of 3)

• Identity theft
– Phishing(Setting up fake Web sites or sending e-mail messages that look
like legitimate businesses to ask users for confidential personal data)

– Evil twins(Wireless networks that pretend to offer trustworthy Wi-Fi


connections to the Internet)

– Pharming(Redirects users to a bogus Web page, even when individual


types correct Web page address into his or her browser)

• Click fraud (Fraudulent clicks on online ads)

• Cyberterrorism
• Cyberwarfare

Copyright © 2019 Pearson Education Ltd.


Internal Threats: Employees

• Security threats often originate inside an organization


• Inside knowledge
• Sloppy security procedures
– User lack of knowledge
• Social engineering(Tricking employees into revealing their passwords by
pretending to be legitimate members of the company in need of information)

• Both end users and information systems specialists are


sources of risk.

Copyright © 2019 Pearson Education Ltd.


Software Vulnerability

• Commercial software contains flaws that create security


vulnerabilities
– Bugs (program code defects)
– Zero defects cannot be achieved
– Flaws can open networks to intruders
• Zero-day vulnerabilities
• Can’t protect against malware you don’t know about

• Surprise: there’s new malware everyday

• Anti-malware and virus programs always behind

Copyright © 2019 Pearson Education Ltd.


• Patches
• Small pieces of software to repair flaws

• Patch management

Copyright © 2019 Pearson Education Ltd.


Encryption and Public Key
Infrastructure (1 of 3)

• Encryption
– Transforming text or data into cipher text that cannot
be read by unintended recipients
– Two methods for encryption on networks
▪ Secure Sockets Layer (SSL) and successor
Transport Layer Security (TLS)
▪ Secure Hypertext Transfer Protocol (S-HTTP)

Copyright © 2019 Pearson Education Ltd.


Encryption and Public Key
Infrastructure (2 of 3)

• Two methods of encryption of messages


– Symmetric key encryption
▪ Sender and receiver use single, shared key
– Public key encryption
▪ Uses two, mathematically related keys: public key
and private key
▪ Sender encrypts message with recipient’s public
key
▪ Recipient decrypts with private key

Copyright © 2019 Pearson Education Ltd.


Figure 8.6 Public Key Encryption

A public key encryption system can be viewed as a series of public and private keys that lock data when
they are transmitted and unlock the data when they are received. The sender locates the recipient’s public
key in a directory and uses it to encrypt a message. The message is sent in encrypted form over the
Internet or a private network. When the encrypted message arrives, the recipient uses his or her private key
to decrypt the data and read the message.

Copyright © 2019 Pearson Education Ltd.


Encryption and Public Key
Infrastructure (3 of 3)
• Digital certificate
– Data file used to establish the identity of users and
electronic assets for protection of online transactions
– Uses a trusted third party, certification authority (CA), to
validate a user's identity
– CA verifies user’s identity, stores information in CA server,
which generates encrypted digital certificate containing
owner ID information and copy of owner’s public key
• Public key infrastructure (PKI)
– Use of public key cryptography working with certificate
authority
– Widely used in e-commerce
Copyright © 2019 Pearson Education Ltd.
Figure 8.7 Digital Certificates

Digital certificates help


establish the identity of
people or electronic
assets. They protect
online transactions by
providing secure,
encrypted, online
communication.

Copyright © 2019 Pearson Education Ltd.


Ensuring System Availability

• Online transaction processing requires 100% availability


• Fault-tolerant computer systems
– Contain redundant hardware, software, and power
supply components that create an environment that
provides continuous, uninterrupted service
• Deep packet inspection
• Security outsourcing
– Managed security service providers (MSSPs)

Copyright © 2019 Pearson Education Ltd.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy