Top Banner
Information Security Management Chapter 12
37

Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

Apr 01, 2015

Download

Documents

Gavin Bodle
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

Information

Security Management

Chapter 12

Page 2: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-4

Study Questions

Q1: What is the goal of information systems security?

Q2: How big is the computer security problem?

Q3: How should you respond to security threats?

Q4: How should organizations respond to security threats?

Q5: How can technical safeguards protect against security threats?

Q6: How can data safeguards protect against security threats?

Q7: How can human safeguards protect against security threats?

Q8: How should organizations respond to security incidents?

Page 3: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-5

Q1: What Is the Goal of Information Systems Security?

Page 4: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-6

Examples of Threat/Loss

Page 5: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-7

What Are the Sources of Threats?

Page 6: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

Unauthorized data disclosure—inadvertent release of data in violation of policy

Pretexting—pretending to be someone else via phone callPhishing—pretexting using email; email spoofing

Spoofing—disguising as a different IP address or different email sender, web spoofing

IP spoofing—impersonating another computing system

Email spoofing—synonym for phishing

Drive-by Sniffing—intercepting computer communications

Unauthorized Data Disclosure

12-8

Hacking, natural disasters, etc.

Page 7: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-9

Incorrect Data Modification

• Procedures not followed or incorrectly designed procedures

• Increasing a customer’s discount or incorrectly modifying employee’s salary

• Placing incorrect data on company Web site

• Improper internal controls on systems

• System errors

• Faulty recovery actions after a disaster

Page 8: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-10

Faulty Service

• Incorrect data modification

• Systems working incorrectly

• Procedural mistakes

• Programming errors

• IT installation errors

• Usurpation

• Denial of service (unintentional)

• Denial-of-service attacks (intentional)

Page 9: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-11

Loss of Infrastructure

• Human accidents

• Theft and terrorist events

• Disgruntled or terminated employee

• Natural disasters

• Advanced Persistent Threat (APT) or cyberwarfare

Page 10: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

• 155% increase in mobile malware apps from 2010 to 2011

• Apps for snooping – track location, record phone calls, save and display chats and messages.

• “jailbreak” targeted at App Store of iPhone

• Sniffer programs to access Wi-Fi networks unauthorized.

• Kaspersky, Lookout, DroidSecurity, Sandboxing

• Performing a remote wipe of offending apps

Mobile Security

12-12

Page 11: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-13

Q2: How Big Is the Computer SecurityProblem?

Page 12: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-14

Verizon–Secret Service Findings 2011

• Number of data-loss security incidents reached all-time high, but number of data records lost fell dramatically for second year in a row

• Data theft most successful at small and medium-sized businesses

Page 13: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-15

Verizon–Secret Service Findings 2011 (cont'd)

Four most frequent computer crimes

1. Criminal activity against servers

2. Viruses

3. Code insertion

4. Data loss on user computer

Page 14: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-16

Types of Attacks Experienced

Page 15: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-17

Intrusion Detection System (IDS)

• Computer program that senses when another computer is attempting to scan disk or otherwise access a computer

• “When I run an IDS on a computer on the public Internet,... I get more than 1,000 attempts, mostly from foreign countries. There is nothing you can do about it except use reasonable safeguards.”

Page 16: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-18

Q3: How Should You Respond to Security Threats?

Page 17: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-19

Q4: How Should Organizations Respond to Security Threats?

• Establish a company-wide security policy– What sensitive data to store– How it will process that data– Will data be shared with other

organizations– How employees and others can obtain

copies of data stored about them

Page 18: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-20

Q4: How Should Organizations Respond to Security Threats? (cont'd)

– How employees and others can request changes to inaccurate data

– What employees can do with their own mobile devices at work

– What non-organizational activities employees can take with employee-owned equipment

Page 19: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-21

Security Safeguards as They Relate to the Five IS Components

Page 20: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-22

Q5: How Can Technical Safeguards Protect Against Security Threats?

Page 21: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

• Password• Smart card• Biometric

Authentication methods

• Microchip embedded with identifying data

• Authentication by PINSmart cards

• Fingerprints, face scans, retina scans

• See http://searchsecurity.techtarget.com

Biometric authentication

• Authenticate to network and other serversSingle sign-o

n for multiple systems

Identification and Authentication (Access)

12-23

Page 22: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

Encryption algorithms (DES, 3DES, AES, blowfish, idea)

Key—a number used to encrypt the data

Symmetric encryptionAsymmetric encryption—public/private keyHTTPS (HTTP + SSL/TLS)Secure Sock Layer (SSL) (Predecessor of TLS)Transport Layer Security (TLS) (DC, Privacy, PKE)

Encryption Terminology

12-24

Page 23: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-25

Encryption: Essence of HTTPS (SSL or TLS)

Page 24: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-26

Firewalls

Page 25: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-27

Malware Types and Spyware and Adware Symptoms

• Viruses Payload Trojan horses Worms Beacons

Spyware & Adware Symptoms

Page 26: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-28

Malware Safeguards

1. Install antivirus and antispyware programs

2. Scan frequently

3. Update malware definitions

4. Open email attachments only from known sources

5. Install software updates from legitimate sources

6. Browse only reputable Internet neighborhoods

Page 27: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-31

Q6: How Can Data Safeguards ProtectAgainst Security Threats?

Page 28: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-32

Q7: How can Human SafeguardsProtect Against Security Threats?

Page 29: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-33

Account Administration

• Account Management Standards for new user accounts,

modification of account permissions, removal of unneeded accounts

• Password Management Users should change passwords frequently

• Help Desk Policies

Page 30: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-34

Sample Account Acknowledgment Form

Page 31: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-35

Systems Procedures

Data recovery; online recovery - the process of salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally.

Page 32: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

•Firewall logs•DBMS log-in records•Web server logs

Activity log analyses

• In-house and external security professionalsSecurity testing

•How did the problem occur? Investigation of incidents

• Indication of potential vulnerability and needed corrective actions

Learn from incidences

Review and update security and safeguard policies

Security Monitoring Functions

12-36

Page 33: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-37

What Is Necessary for Disaster Preparedness?

• Disaster― Substantial loss of

infrastructure caused by acts of nature, crime, or terrorism

• Appropriate location― Avoid places prone to

floods, earthquakes, tornadoes, hurricanes, avalanches, car/truck accidents

― Not in unobtrusive buildings, basements, backrooms, physical perimeter

― Fire-resistant buildings

Page 35: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

What Is Necessary for Disaster preparedness? (cont’d)

12-39

Backup processing centers in geographically removed site

Create backups for critical resources

Contract with “hot site” or “cold site” provider• Hot site provides all equipment needed to continue

operations there• Cold site provides space but you set up and install

equipment• www.ragingwire.com/managed_services?=recovery

Periodically train and rehearse cutover of operations

Cloud Backup: a service that provides users with a system for the backup and storage of computer files. A form of cloud computing

Page 36: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-40

Q8: How Should OrganizationsRespond to Security Incidents?

Page 37: Information Security Management Chapter 12. 12-2 “We Have to Design It for Privacy and Security.” Tension between Maggie and Ajit regarding terminology.

12-41

How Does the Knowledge in thisChapter Help You?

• Aware of threats to computer security as an individual, business professional and employee

• Know trade-offs of loss risks and cost of safeguards

• Ways to protect your computing devices and data• Understand technical, data, and human

safeguards• Understand how organizations should respond to

security incidents