Laudon Emis12e Inppt 08 0
Laudon Emis12e Inppt 08 0
Securing Information
Systems
Learning Tracks
1.The Booming Job Market in IT Security
2.The Sarbanes Oxley Act
3.Computer Forensics
4.General and Application Controls for Information Systems
5.Management Challenges of Security and Control
6.Software Vulnerability and Reliability
Video Cases
Case 1: Stuxnet and Cyberwarfare
Case 2: Cyberespionage: The Chinese Threat
Case 3: IBM Zone Trusted Information Channel (ZTIC)
Instructional Video 1: Sony PlayStation Hacked; Data Stolen from 77 Million Users
Instructional Video 2: Zappos Working to Correct Online Security Breach
Instructional Video 3: Meet the Hackers: Anonymous Statement on Hacking SONY
• Problem
– Security breach infects government computers in
over 20 European countries
– Leak of geopolitical intelligence
– Fragmented approach to cybersecurity in the EU
leads to disjointed and disparate policies, and
unequal levels of protection.
• Controls:
• Methods, policies, and organizational procedures that ensure
safety of organization’s assets; accuracy and reliability of its
accounting records; and operational adherence to
management standards
Figure 8.1
• Internet vulnerabilities
• Network open to anyone
Figure 8.2
Many Wi-Fi
networks can be
penetrated easily
by intruders using
sniffer programs to
obtain an address
to access the
resources of a
network without
authorization.
Software Vulnerability
• Commercial software contains flaws that create
security vulnerabilities.
• Hidden bugs (program code defects)
• Zero defects cannot be achieved because complete testing
is not possible with large programs
• Flaws can open networks to intruders
• Zero-day Vulnerabilities
• Can’t protect against malware you don’t know about
• Surprise: there’s new malware everyday
• Anti-malware and virus programs always behind
8.22 Copyright © 2017 Pearson Education Ltd.
Essentials of Management Information Systems
Chapter 8 Securing Information Systems
• Hardware controls
• Implementation controls
• Administrative controls
• Application controls
• Specific controls unique to each computerized
application, such as payroll or order processing.
• Include both automated and manual procedures.
• Ensure that only authorized data are completely
and accurately processed by that application.
• Include:
• Input controls
• Processing controls
• Output controls
• Risk assessment
• Determines level of risk to firm if specific activity or process is
not properly controlled
• Types of threat
• Probability of occurrence during year
• Potential losses, value of threat
• Expected annual loss
• Security policy
• Ranks information risks
• Identifies acceptable security goals
• Identifies mechanisms for achieving these goals
• Drives other policies
• Acceptable use policy (AUP)
• Authorization policies
• Provisions for identity management
• Identity management
• Business process and technologies for
identifying valid users of system
• Creates different levels or roles of system user
and access
• Allows each user access only to those
portions of system that user role
Figure 8.3
These two examples
represent two security
profiles or data security
patterns that might be
found in a personnel
system. Depending on the
security profile, a user
would have certain
restrictions on access to
various systems,
locations, or data in an
organization.
What are the most important tools and technologies for safeguarding
information resources?
• Authentication
• Password systems
• Tokens
• Smart cards
• Biometric authentication
• Fingerprints, irises, voices
A Corporate Firewall
Figure 8.5
The firewall is
placed between
the firm’s private
network and the
public Internet
or another
distrusted
network to
protect against
unauthorized
traffic.
• Encryption:
• Transforming text or data into cipher text that
cannot be read by unintended recipients
• Two methods for encryption on networks
• Secure Sockets Layer (SSL) and successor
Transport Layer Security (TLS)
• Secure Hypertext Transfer Protocol (S-HTTP)
A public key encryption system can be viewed as a series of public and private keys
that lock data when they are transmitted and unlock the data when they are received.
The sender locates the recipient’s public key in a directory and uses it to encrypt a
message. The message is sent in encrypted form over the Internet or a private
network. When the encrypted message arrives, the recipient uses his or her private
key to decrypt the data and read the message.
Figure 8.6
8.45 Copyright © 2017 Pearson Education Ltd.
Essentials of Management Information Systems
Chapter 8 Securing Information Systems
• Digital certificate:
• Data file used to establish the identity of users and electronic
assets for protection of online transactions
• Uses certification authority (CA) to validate a user’s identity
• CA verifies user’s identity, stores information in CA server,
which generates encrypted digital certificate containing
owner ID information and copy of owner’s public key
• Public key infrastructure (PKI)
• Use of public key cryptography working with certificate
authority
• Widely used in e-commerce
Digital Certificates
Figure 8.7
Digital certificates
help establish the
identity of people or
electronic assets.
They protect online
transactions by
providing secure,
encrypted, online
communication.
• Recovery-oriented computing
• Designing systems that recover quickly with capabilities to
help operators pinpoint and correct faults in multicomponent
systems
• Controlling network traffic
• Deep packet inspection (DPI) (video and music blocking)
• Security outsourcing
• Managed security service providers (MSSPs)
• Cloud computing
• Highly distributed computing, difficult to
track unauthorized activities
• Cloud users should ask for proof of
security and privacy procedures,
including encryption
• Service level agreements (SLAs)
• Mobile platforms
• Mobile device management tools for
authorization and inventory
• Data loss prevention technology
• Mobile security policies: platform, software,
procedures, security products
• Encryption
• BYOD
• Mobile protective software products