170 likes | 275 Views
More?. Blog Wiki Social Media Semantic web. And …. Bluetooth 802.15 wireless network standard 10 meter range, up to 8 devices Wimax RFID. homework. 2 Decision Problems Discussion question 2. BUS 290: Chapter 8. Securing Information Systems. System Vulnerability. Security
E N D
More? • Blog • Wiki • Social Media • Semantic web
And … • Bluetooth • 802.15 wireless network standard • 10 meter range, up to 8 devices • Wimax • RFID
homework • 2 Decision Problems • Discussion question 2
BUS 290: Chapter 8 Securing Information Systems
System Vulnerability • Security • Policies & procedures • Technical measures to prevent • Unauthorized access • Alteration • Theft • Physical Damage • Controls • Safety of assets • Accuracy & reliability of data • Adherence to managerial standards
Why systems are vulnerable Depends on the system part: Client: unauthorized access, errors Communication: tapping, sniffing, theft/fraud, message alteration Servers: Hacking, Viruses, theft/fraud, vandalism, denial of service Corp. Systems: Data theft, Copying, Alteration, H/W & S/W failure
Malicious Acts • Infections – viruses, Trojan horses, worms • Unauthorized S/W – spyware, adware, keyloggers • Unauthorized uses of computers • Theft, sabotage, or destruction of hardware • Denial of service attacks • Passwords (capitals, numbers) • Website/server attacks/spoofing • Electronic theft or sabotage of electronic data • Financial fraud
Who? • Employees • “idiots”, suckers & angry people • Hackers • Terrorists • Competitors
Other Concepts • Bugs • Patches • PITA … time, downtime & cost • Personal Information Protection & Electronic Documents Act
Controls • Preventive, detective and corrective measures • 2 categories of controls • General • Applications • Guided by company strategy, policies and procedures
General Controls Common across all applications • Security management • Physical & logical access controls … • System Acquisition & Development controls • System maintenance & change controls • Operations control • Business continuity controls …
Physical & Logical Access • Physical • Access to servers, tape storage etc. • Security features like cameras, alarms, etc. • Logical • ID’s, Passwords, Biometrics • CAPTCHA • Firewalls (double walls?) • Intrusion detection systems (false positives)
Business Continuity Plan How do we handle a system problem? Includes a disaster recovery plan addressing .. • Listing of potential disasters • Roles & responsibilities • Scripts, contact lists • Critical processing priorities • Backup plans, location and access • Power requirements, backups • Rebuilding procedures, timelines
Application Controls Needed for the 4 basic areas: • Input • Check digits • Processing • Logs, control totals, hash, time stamping • Output • Distribution, access, printer use • Storage • Logical access to databases etc. Access requests
And.. • Intrusion detection systems • Password errors • Files modified or removed • Encryption • HTTPS • Symmetric Key encryption (single key) • Public & private keys • Digital certificates (proof of ID) • Secure, encrypted online communication • Third party (Certification Authority) • Public Key Infrastructure
Odds & Ends • Cloud security • Who looks after security • Software metrics
Homework • Management Decision Problem #1 • Spreadsheet problem Page 275 • Midterm … Chapters 4 – 8 • 10-12 Short answer questions