Top Banner
Information Systems Security
26

Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Dec 17, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Information Systems Security

Page 2: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Introduction

Sharon Garcia• UNM Graduate Student• Masters of Accountancy-Information

Assurance Track• Information Systems Security Course

Project

Page 3: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Why Does ISS Matter?

• To some extent everyone creates and uses technology.

• It matters because all information that is generated has economic potential.

• This information can be collected, organized, and turned into something more than it originally started as.

http://www.wired.co.uk/news/archive/2013-02/05/weakness-in-tsl-protocol/viewgallery/293669

Page 4: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Facebook…

• Signing up for Facebook does not “cost” you anything… or does it?

• Facebook makes money in different ways but mainly from advertising.

• Instead of charging you a fee for the service they offer they record your personal information, along with all the other information you generate and sell that information to external vendors.

Page 5: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

So… Why do Facebook’s profits matter?

• If Facebook is compromised, their profits are directly affected.

• In other words, when it’s users’ accounts are compromised they lose money. Tons of money.

http://money.cnn.com/2012/02/02/technology/thebuzz/

Page 6: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Facebook, other companies, and the United States government, all need employees who can detect vulnerabilities in their information systems.

• Programmers• Data Analysts• Web Designers• Network Administrators• Forensic Analysts

Page 7: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

What Type Of Technologies and Techniques Do They Use in ISS?

• A Whole Ton.• Cryptography, Steganography,

Redundancy, Network Safety and Password Protections (Policies and Procedures), Data Analytics (Benford’s Law), and on and on.

Page 8: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Cryptography

• Heartbleed affects potentially two-thirds of systems on the Internet

• “The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software.” –www.heartbleed.com

• What is SSL and OpenSSL?

Page 9: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Cryptography• You’ve definitely heard of

this… but not by this name.• Encryption takes data and

translates it into something that is undecipherable unless you have the “key” that will translate it back into the original data.

Page 10: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Cryptography Example

http://en.wikipedia.org/wiki/Cryptography

Page 11: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Question for You

What are some ways that Heartbleed can be stopped?

Page 12: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Steganography• Steganography has been used for

hundreds of years.• ZeusVM Trojan – stole property from

approximately “70 enterprises and agencies across 14 countries.” - http://www.crn.com.au/

Page 13: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Steganography

• Uses something to hide something in…

• Enables a user to hide a message, picture, or audio file, within a picture or audio file…

• What?

http://www.giuseppe-arcimboldo.org/Winter-(L'Inverno).html

Page 14: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Steganography Example

• I want to send my best friend a message without anyone knowing that I sent it to her. I could write a message, hide it within a picture using steganography software, and then send her the picture with the message inside it. My best friend would then have to use the same program to extract the message from the picture.

Page 15: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Question For You

What was the name of the Malware that attacked

approximately 70 enterprises in 14 countries?

Page 16: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Redundancy (Backups)

• Dropped your laptop?• Spilled soda on your computer?• Dog chewed through the power cord while

you were working on an assignment?

• Hopefully you saved your work somewhere else than on the device you were using!

Page 17: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Redundancy

• Dividing a computer’s disk drives in ways that allow for data to be spread across them. This lets the data exist in multiple places at once in the event that one disk crashes, gets hacked, catches fire, or worse.

Page 18: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Redundancy Example• RAID 0, RAID 1, RAID 2…

http://en.wikipedia.org/wiki/File:RAID_6.svg

Page 19: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Question For You

What are some other ways you can protect your data?

Page 20: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Network Safety and Password Protections (Policies and Procedures)

• You are only as strong (or safe) as your weakest link.

• Policies and Procedures ensure that everyone on the network utilizes the same method to protect against vulnerabilities and threats.

Policies and Procedures

Page 21: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Question For You

What is considered a “strong” password?

Page 22: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Forensic Analytics

• Using the data generated to find inconsistencies that may expose unethical, fraudulent, or criminal activities.

• Benford’s Law• Microsoft Excel, Microsoft

Access, IDEA, Qlickview

Page 23: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Forensic Analytics Example

• Benford’s Law

http://www.isaca.org/Journal/Past-Issues/2011/Volume-3/Pages/Understanding-and-Applying-Benfords-Law.aspx

Page 24: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Question For You

What is the equation for Benford’s Law?

Page 25: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Conclusion

• There are many different types of ISS that exist.

• White Hats and Black Hats.• Use technology safely.

Page 26: Information Systems Security. Introduction Sharon Garcia UNM Graduate Student Masters of Accountancy-Information Assurance Track Information Systems Security.

Questions?