270 likes | 375 Views
Chapter 6. Assuring Reliable and Secure IT Services. Reliability. How will your business be affected by downtime? What can be quantified in terms of losses? What can not be quantified? Attributions may play into this. Reliability = Service Availability.
E N D
Chapter 6 Assuring Reliable and Secure IT Services
Reliability • How will your business be affected by downtime? • What can be quantified in terms of losses? • What can not be quantified? • Attributions may play into this
Reliability = Service Availability • Decreases with number of components
As the Number of Components Increases… 15 components = 25% downtime!
Redundancy • Helps achieve desired level of availability
Availability Decisions • Uninterruptible Electric Power Delivery • Physical Security • Climate Control and Fire Suppression • Network Connectivity • On Site Monitoring • Help Desk and Incident Response Procedures
Redundancy of Mission-Critical Components • N+1 level • Service level in 99-99.9% range • N+N level • Service level in 99.999-99.9999% range • Decisions re: design of IT infrastructure • Which elements to make redundant? • Availability vs. Cost
Security and Employees • Main threat? • From “inside the walls” • White-collar crime costs $400 billion per year • Average non-managerial embezzlement is $60,000 • Average managerial embezzlement is $250,000 • Two-thirds of insider fraud is not reported • 2 out of 5 businesses suffered 5+ fraud losses • One quarter of those cost more than $1 million
Security and Employees • Computer-aided fraud • Vendor fraud • Writing payroll checks to fictitious employees • Claiming expense reimbursements for costs not incurred • Stealing security codes, credit card numbers, proprietary files • Stealing intellectual property • 10% completely honest, 10% will steal, 80% depends on circumstances • Theft committed by those strapped for cash, who have access to poorly protected funds, perceive low risk of getting caught
Security and Employees • Triggers to unethical employee behavior • Efforts to balance work and family • Poor internal communications • Poor leadership • Work hours, work load • Lack of management support • Need to meet sales, budget, or profit goals • Little or no recognition of achievements • Company politics • Personal financial worries • Insufficient resources
Security and Collaboration Partners • Increasingly internetworked infrastructures: • Need for concern about partners’, suppliers’, distributors’, customers’ computer security (and your own)
Security and Outside Threats • In 2003, 90% of firms detected breaches in last 12 months • 75% acknowledged losses ($400K per company) • Hacking: unauthorized access to computers and computer information
Types of Cyber Crime • Virus: software written with malicious intent to cause annoyance or damage • Benign or malicious • Worms are most prevalent type of virus • Spreads itself, from file to file, computer to computer via email and other Internet traffic • Love Bug worm and its variants: affected 300,000 Internet host computers, millions of individual PC users • File damage, lost time, high cost emergency repairs costing $8.7 billion • Klez, Nimda, Sircam
Types of Cyber Crime • Denial-of-service attack (DoS): floods a web site with so many request for service that it slows down or crashes • Objective is to prevent legitimate customers from accessing target site • E*Trade, Yahoo!, Amazon.com have all been victims • Virus hoaxes • Sent to frighten people about a virus threat that is bogus • Panic, loss of time, loss of productivity • Computer professionals spend time looking for ‘non problem’
What Viruses Can’t Do • Hurt your hardware (monitor, processor) • Hurt any files they weren’t designed to attack (designed for MS Outlook, won’t affect Eudora or other e-mail application) • Infect files on write-protected disks
Security Precautions • Risk management • Identification of risks or threats • Implementation of security measures • Monitoring of those measures for effectiveness • Risk assessment • What can go wrong? • How likely is it to go wrong? • What are the possible consequences if it does go wrong? • Implementing right amount and type of security is a critical, but not an easy, matter • Backup procedures, anti-virus software, firewalls, access authentication, intrusion-detection software, system auditing
Security Precautions • Backups • Process of making a copy of the information stored on a computer • Employee carelessness or ignorance cause 2/3 of the financial cost of lost or damaged information • Backups should be made methodically and regularly (at least once a week) • Anti-virus software • Detects and removes or quarantines computer viruses • Should be able to get rid of virus without destroying the software or information it came with • Needs to be updated frequently (new viruses every day)
Security Precautions • Firewalls – keep outsiders out • Hardware and/or software that protects a computer or network from intruders • Examines each message as it seeks entrance to the network – only those with ‘right’ markings gain access • Can also detect computer communicating with the Internet without approval • Access Authentication – keep insiders out • Protects computer systems from unauthorized employees • Proving access rights: • What you know: password • What you have: ATM card • What you look like: biometrics (use of physical characteristics)
Security Precautions • Encryption • Scrambles the contents of a file, which can’t be read without having the right decryption key • Public key encryption: use of 2 keys (1 public, 1 private) • Intrusion-detection software • Looks for people on the network who shouldn’t be there or who are acting suspiciously • Security-auditing software • Checks out computer or network for potential weaknesses
Security Management Framework • Make deliberate security decisions • Security – a moving target (hire an attacker; check CERT) • Practice disciplined change management • Educate users • Use multilevel technical measures
Why so expensive to defend/protect IS against threats? • Hundreds of potential threats exist. • Computing resources may be widely distributed. • Many individuals are involved and control assets. • Crimes are often hard to detect. • Technology changes so fast that some controls can become obsolete quickly. • Prevention and detection technology is expensive.
Incident Management • Pre-crisis practices • Sound infrastructure design: recoverability and tolerance for failures • Disciplined execution of operating procedures • Accurate and up-to-date documentation • Established crisis management procedures • Rehearsing incident response
Incident Management • During an incident • Technical difficulties AND psychological obstacles • Emotional responses (fear, denial, panic, confusion) • Wishful thinking and groupthink • Political maneuvering, diving for cover, ducking responsibility • Jumping to conclusions • PR inhibition
Incident Management • After an incident • Infrastructure needs to be rebuilt – either partially or fully • Carefully documented procedures facilitates this process • To avert another attack: need to understand cause of incident • Can be a lengthy and arduous task, but it is necessary