Destruction, Error, and Abuse.: Management Information Systems
Destruction, Error, and Abuse.: Management Information Systems
LEARNING OBJECTIVES
Boston Celtics Score Big Points Against Spyware System Vulnerability and Abuse
1
05-02-2013
2
05-02-2013
• Identity theft: Theft of personal Information (social security id, • Click fraud
driver’s license or credit card numbers) to impersonate someone
else • Individual or computer program clicks online ad
without any intention of learning more or making a
• Phishing: Setting up fake Web sites or sending e-mail
messages that look like legitimate businesses to ask users for purchase
confidential personal data.
• Global threats - Cyberterrorism and cyberwarfare
• Evil twins: Wireless networks that pretend to offer trustworthy
Wi-Fi connections to the Internet • Concern that Internet vulnerabilities and other
networks make digital networks easy targets for
• Pharming: Redirects users to a bogus Web page, even when
individual types correct Web page address into his or her browser digital attacks by terrorists, foreign intelligence
services, or other groups
3
05-02-2013
Business Value of Security and Control Business Value of Security and Control
• Lack of security, control can lead to • Legal and regulatory requirements for electronic
• Loss of revenue records management
• Failed computer systems can lead to significant or • Firms face new legal obligations for the retention
total loss of business function
and storage of electronic records as well as for
• Lowered market value: privacy protection
• Information assets can have tremendous value
• HIPAA: Medical security and privacy rules and procedures
• A security breach may cut into firm’s market value
almost immediately • Gramm-Leach-Bliley Act: Requires financial institutions to
ensure the security and confidentiality of customer data
• Legal liability
• Sarbanes-Oxley Act: Imposes responsibility on companies
• Lowered employee productivity and their management to safeguard the accuracy and integrity
• Higher operational costs of financial information that is used internally and released
externally
Business Value of Security and Control Establishing a Framework for Security and Control
Establishing a Framework for Security and Control Establishing a Framework for Security and Control
4
05-02-2013
Establishing a Framework for Security and Control Establishing a Framework for Security and Control
• Allow each user access only to those portions of system that system. Depending on
the security profile, a
user would have certain
person is permitted to enter, based on information established restrictions on access to
various systems,
by set of access rules, profile locations, or data in an
organization.
Establishing a Framework for Security and Control Establishing a Framework for Security and Control
• Maximum time systems can be down • Assesses financial and organizational impact of each threat
Establishing a Framework for Security and Control Technologies and Tools for Security
5
05-02-2013
Technologies and Tools for Security Technologies and Tools for Security
A Corporate Firewall
• Firewall: Hardware and/or software to prevent
unauthorized access to private networks
• Screening technologies
• Packet filtering
• Stateful inspection
• Network address translation (NAT)
• Application proxy filtering
• Intrusion detection systems: Monitor vulnerable
points on networks to detect and deter intruders
• Examines events as they are happening to discover attacks The firewall is placed between the firm’s private
in progress network and the public Internet or another
distrusted network to protect against
unauthorized traffic.
• Scans network to find patterns indicative of attacks Figure 8-5
Technologies and Tools for Security Technologies and Tools for Security
Technologies and Tools for Security Technologies and Tools for Security
• Symmetric key encryption uses it to encrypt a message. The message is sent in encrypted form over the Internet or a private network. When the
encrypted message arrives, the recipient uses his or her private key to decrypt the data and read the message.
6
05-02-2013
Technologies and Tools for Security Technologies and Tools for Security
Digital Certificates
• Digital certificate:
• Data file used to establish the identity of users and electronic
assets for protection of online transactions
• Uses a trusted third party, certification authority (CA), to
validate a user’s identity
• CA verifies user’s identity, stores information in CA server,
which generates encrypted digital certificate containing
owner ID information and copy of owner’s public key
• Public key infrastructure (PKI)
• Use of public key cryptography working with certificate
authority Figure 8-7
Digital certificates help
Technologies and Tools for Security Technologies and Tools for Security
Technologies and Tools for Security Technologies and Tools for Security
7
05-02-2013