Chapter 8
Chapter 8
Systems
Thirteenth Edition
Chapter 8
Securing Information
Systems
• Security
– Policies, procedures, and technical measures used to
prevent unauthorized access, alteration, theft, or
physical damage to information systems
• Controls
– Methods, policies, and organizational procedures that
ensure safety of organization’s assets; accuracy and
reliability of its accounting records; and operational
adherence to management standards
• Accessibility of networks
• Hardware problems (breakdowns, configuration errors,
damage from improper use or crime)
• Software problems (programming errors, installation
errors, unauthorized changes)
• Disasters
• Use of networks/computers outside of firm’s control
• Loss and theft of portable devices
• Viruses
Rogue software program that attaches itself to other software programs or data files in order to be
executed
• Worms
Independent computer programs that copy themselves from one computer to other computers over
a network
Software program that appears to be benign but then does something other than expected.
• S Q L injection attacks
• Ransomware
• Hackers v s. crackers
er su
• Activities include:
– System intrusion
– System damage
– Cybervandalism
▪ Intentional disruption, defacement, destruction of
website or corporate information system
•Sniffer
•Eavesdropping program that monitors information traveling over
network
•Enables hackers to steal proprietary information such as e-mail,
company files, and so on
• Identity theft
– Phishing(Setting up fake Web sites or sending e-mail messages that look
like legitimate businesses to ask users for confidential personal data)
• Cyberterrorism
• Cyberwarfare
• Patch management
• Encryption
– Transforming text or data into cipher text that cannot
be read by unintended recipients
– Two methods for encryption on networks
▪ Secure Sockets Layer (SSL) and successor
Transport Layer Security (TLS)
▪ Secure Hypertext Transfer Protocol (S-HTTP)
A public key encryption system can be viewed as a series of public and private keys that lock data when
they are transmitted and unlock the data when they are received. The sender locates the recipient’s public
key in a directory and uses it to encrypt a message. The message is sent in encrypted form over the
Internet or a private network. When the encrypted message arrives, the recipient uses his or her private key
to decrypt the data and read the message.