Top Banner
Administering Security
40

Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

Dec 26, 2015

Download

Documents

Ursula Dalton
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

Administering Security

Page 2: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

Personal Computer Security Management

• Security problems for personal computers are more serious than on mainframe computers– people issues– hardware and software issues

• lack of sensitivity– users do not appreciate security risks associated with the

use of PCs

• lack of tools– hw and sw tools are fewer and less sophisticated than in the

mainframe environment

Page 3: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

Contributors to Security Problems

• Hardware vulnerabilities– limited protection of one memory space

– every user can execute every instruction

– can read and write every memory location

– the operating system may declare certain files as “system” files, but it can not prevent the user from accessing them

– operating system designers have failed to take advantage of hardware protection

Page 4: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

Contributors to Security Problems

• Low awareness of the problem– analogous to a calculator

• no unique responsibility– if the machine is shared, nobody takes full responsibility for

maintenance, supervision and control• few hw controls

– few PCs take advantage of hw features• no audit trail• environmental attacks• physical access

– unattended machines• care of media components

– diskettes, etc.

Page 5: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

Contributors to Security Problems

• No backups• questionable documentation• high portability• combination of duties

– lack of checks and balances

Page 6: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

Security MeasuresProcedures:• Do not leave PCs unattended in an exposed

environment if they contain sensitive info• do not leave printers unattended if they are printing

sensitive output• secure media as carefully as you would a

confidential report• perform periodic back-ups• practice separation of authority

Page 7: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

Security Measures

Hardware Controls:• Secure the equipment• consider using add-on security boards

Software Controls:• use all sw with full understanding of its potential threats• do not use sw from dubious resources• be suspicious of all results• maintain periodic complete backups of all system

resources

Page 8: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

Protection of Files

• Access control features• encryption• copy protection• no protection

Page 9: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

Access Control Mechanisms for PCs

Motivations for access control:• Outside interference• two users one machine• network access• errors• untrusted software• separation of applications

Page 10: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

Features of PC Access Control Systems

• Transparent encryption– some systems automatically encrypt files so that their

contents will not be evident

• time of day checking– allowing access during certain times

• automatic timeout– the system automatically terminates the session

• machine identification– unique serial no can be read by the application

Page 11: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

Risk Analysis

Page 12: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

RISK

• Possibility of suffering harm or loss, a factor, course or element involving uncertain danger

Page 13: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

OPPORTUNITY & THREAT

Page 14: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

THEORETICAL FRAMEWORK

• Important parameter in designing security systems is the COST

RISK ASSESSMENT

• Risk perception– psychological theory of risk: how the general public reacts to

uncertainities of danger, and how this general reaction affects individual behaviour.

– cultural theory of risk: Risk perception differs depending on the social group & belief system an individual belongs to (Douglas 1970)

Page 15: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

Reacting to Threats

RISK PERCEPTION

THREAT

RESPONSE

Passive Reaction

communication

Page 16: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

Reacting to Threats

RISK PERCEPTION

Organisation Structure

RISKMANAGEMENT

Externaldanger

Shared Meaning and Trust

Page 17: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

CULTURAL THEORY

• When we try to think of the individual in a social context, we normally think of the corporate group or groups to which they belong.

• Individuals also have constraining classifications within the group: hierarchy, kinship, race, gender, age...

Page 18: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

CULTURAL THEORY

Group (Social incorporation)

Grid (Individual)

B

Fatalists

C

Hierarchists

A

Individualist

D

Egalitarians

Four types of social environment and cultural biases (Douglas 1970)

Page 19: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

CULTURAL THEORY

A: competitive, control people, autonomy; see risks with opportunities

B: no voluntary risk taking, but accept it as a given, no personal autonomy

C: group is emphasised; division of labour, specialisation, segregation of duties. Take risks iff it is approved by experts; hierarchical authority

D: members get their support from the group; no formal delegation. The group dissolves in the absence of strong leadership

group

indi

vidu

al

Individualist

Fatalists Hierarchists

Egalitarians

B C

A D

Page 20: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

CULTURE AND RISK

• Risk behaviour is a function of how human beings, individually and in groups, perceive their place in the world.

• It is important to understand the role of culture in stakeholder interaction in order to understand cultural biases in risk perception.

Page 21: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

STAKEHOLDER MODEL

• Stakeholders– Users: information user

– Suppliers: information provider and systems developer

– Others: systems manager

• Each stakeholder group has a differing perceptions of same risk.

• Stakeholders can be grouped within themselves depending on the social groups they belong to rather than roles they assume.

Page 22: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

STAKEHOLDER MODEL

USERS SUPPLIERS OTHERS

Individualist

Fatalist Fatalist

Sectarians/Egalitarians

Sectarians/Egalitarians

Hierarchists HierarchistsHierarchists

Sectarians/Egalitarians

Fatalist

Individualist Individualist

Links stakeholder model with the cultural theory

Page 23: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

STAKEHOLDER MODEL

• Individuals have different cultural biases and have different perceptions of risk– computer privacy and security rules are different in

different countries

– Singapore, Japan, US, Canada

• Grouping stakeholders is not enough for designing IS.

Page 24: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

RISK COMMUNICATION

• It is important to know the cultural backgrounds of the stakeholders– how they perceive risks

– how they communicate risks

– risk communication theory

– risk communication model

Page 25: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

RISK COMMUNICATION

• Past:– risk communication as one way to general public from

government…

– efforts to improve risk communication

– to get the message across by describing the magnitude and balance of the attendant costs and benefits

Page 26: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

RISK COMMUNICATION

• The costs and benefits are equally distributed across a society

• People do not agree about which events or actions do the most harm or which benefits are more worth seeking.

Page 27: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

RISK COMMUNICATION

US National Research Counsil (1989)

Risk communication is an interactive process of exchange of information and opinion among individuals, groups and institutions. It involves multiple messages about the nature of the risk and other messages, not strictly about risk, that express concerns, opinions and reactions to risk messages or to legal and institutional arrangements for risk management.

Top-down definition of risk

Page 28: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

RISK COMMUNICATION

• Risk Communication– risks posed to stakeholders on the web are

technological hazards

– classical risk communication model:• sources

• transmitters

• receivers

Certain aspects of risks are intensified or attenuated

Page 29: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

CULTURE

Sources

Scientists

Agencies

Interest Groups

Eyewitnesses

Portrayal of Event with symbols, signals and

images by the Sources

Transmitters

Media

Institutions/Agencies

Interest Groups

Opinion Leaders

Receivers

General Public

Affected Organisations/Institutions

Social Groups

Other target audience

Risk

Event

feed

back

Two-way interaction

Page 30: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

Initial Information

HEARCULTURE

SOCIAL FASHIONPERSONAL VALUES

RELATED ATTITUDES

INFLUENCES

Appeal Do not Appeal

UNDERSTAND

BELIEVE

PERSONALIZE

RESPOND

New Information

Page 31: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

Communication

• The recipient hears the information and then screens it based on social fashion, personal values, attitudes under the influence from peer groups– cultural forces before understanding the message

• Believing involves acceptance that the understanding is correct – the risk is real

• Personalisation– the risk event will affect the receiver

• Response– decision to take action for protection from risk

Page 32: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

Communication

• Credibility of information sources and transmitters is a key issue in risk communication

Page 33: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

TRUST AND CONFIDENCE VS CREDIBILITY

• Trust is an important ingredient in any trade transaction

• Trust acts as the mitigating factor for the risks assumed by one party on the party in the trade

• As trust increases the risks either reduce or become manageable by the trusting party

• Existence of trust also reduces the transaction cost in a trade

Page 34: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

TRUST

Message generatedby the Person

Person orCommunicator

Institution wherePerson works

Social and EconomicEnvironment where

the Institution islocated

Trust in theMessage

Confidence inthe Person

Confidence inthe Institution

based onperception

Climate forTrust andCredibility

Confidence inthe Institution

based onInstitution’sperformance

How a Person createsand transmits a message

How a Person createsand transmits amessage

How a recipientsanalyses the message

For effective communication of risks it is critically important that receivers place trust on the sources and transmitters (Lee 1986)

Five levels of trust analysis framework

Page 35: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

INSTITUTIONAL CREDIBILITY

• Confidence in business and economic organisations depends on the perceived quality of their services, but also on the employment situation, the perception of power monopolies in business, the observation of allegedly unethical behaviour and the confidence in other institutions

• Confidence in political institutions depends on their performance record and openness, but in addition on the perception of a political crisis, the belief that the government is treating everyone fair and equally, the belief in functioning of checks and balances, the perception of hidden agendas, and the confidence in other institutions

Page 36: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

INSTITUTIONAL CREDIBILITY

• The more educated people are, the more they express confidence in the system, but the more they are also disappointed about the performance of the people representing the system

• Political conservatism correlates positively with confidence in business and negatively with government and public service

Page 37: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

INSTITUTIONAL CREDIBILITY

• The social climate pre-sets the conditions under which an institution has to operate to gain and maintain trust

• in a positive climate people invest more in trust institutions

• in a negative climate people tend to caution and seek to have more control

Page 38: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

Risk Perception, Trust and Credibility

• Hypothesis:– once trust and credibility exist in a relationship among

the stakeholders during risk communication, stakeholders do not get involved in the analysis of risk factors individually, and

– information systems security becomes less important to people when dealing with a trustworthy and credible institution.

Page 39: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

Risk Perception, Trust and Credibility

• Personality of the communicator with attributes of ability and integrity are also important in establishing trust.

• Overall; message, communicator, institution, and the social context are the major factors in establishing trust within an organisation.

Page 40: Administering Security. Personal Computer Security Management Security problems for personal computers are more serious than on mainframe computers –people.

Risk Perception, Trust and Credibility

• Inferential analysis:– inverse correlation between trust and security on the

internet

– the higher the trust placed on an organisation the lower was the security concern.