Laudon - Emis13 - PPT - ch08 (Updated)

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 22

Essentials of Management Information

Systems
Thirteenth Edition

Chapter 8
Securing Information
Systems

Copyright © 2019 Pearson Education Ltd.


Why Systems are Vulnerable (1 of 2)
• Security
– Policies, procedures, and technical measures used to
prevent unauthorized access, alteration, theft, or
physical damage to information systems
• Controls
– Methods, policies, and organizational procedures that
ensure safety of organization’s assets; accuracy and
reliability of its accounting records; and operational
adherence to management standards

Copyright © 2019 Pearson Education Ltd.


Why Systems are Vulnerable (2 of 2)
• Accessibility of networks
• Hardware problems (breakdowns, configuration errors,
damage from improper use or crime)
• Software problems (programming errors, installation
errors, unauthorized changes)
• Disasters
• Use of networks/computers outside of firm’s control
• Loss and theft of portable devices

Copyright © 2019 Pearson Education Ltd.


Figure 8.1 Contemporary Security
Challenges and Vulnerabilities

Copyright © 2019 Pearson Education Ltd.


Internet Vulnerabilities
• Network open to anyone
• Size of Internet means abuses can have wide impact
• Use of fixed Internet addresses with cable / DSL modems
creates fixed targets for hackers
• Unencrypted VOIP
• Email, P2P, IM
– Interception
– Attachments with malicious software
– Transmitting trade secrets

Copyright © 2019 Pearson Education Ltd.


Wireless Security Challenges
• Radio frequency bands easy to scan
• SSIDs (service set identifiers)
– Identify access points, broadcast multiple times,
can be identified by sniffer programs
• War driving
– Eavesdroppers drive by buildings and try to detect
SSID and gain access to network and resources
– Once access point is breached, intruder can gain
access to networked drives and files
• Rogue access points
Copyright © 2019 Pearson Education Ltd.
Figure 8.2 Wi-Fi Security Challenges

Copyright © 2019 Pearson Education Ltd.


Malicious Software: Viruses, Worms,
Trojan Horses, and Spyware (1 of 2)
• Malware (malicious software)
• Viruses
• Worms
• Worms and viruses spread by
– Downloads and drive-by downloads
– Email, IM attachments
• Mobile device malware
• Social network malware

Copyright © 2019 Pearson Education Ltd.


Malicious Software: Viruses, Worms,
Trojan Horses, and Spyware (2 of 2)
• Trojan horse
• SQL injection attacks
• Ransomware
• Spyware
– Key loggers
– Other types
▪ Reset browser home page
▪ Redirect search requests
▪ Slow computer performance by taking up memory

Copyright © 2019 Pearson Education Ltd.


Interactive Session Technology – WannaCry and the
SWIFT System Hacking Attacks: Theft on a
Worldwide Scale
• Class discussion
– Compare the WannaCry and SWIFT system hacking
attacks. What security vulnerabilities were exploited in
each of these attacks?
– What people, organization, and technology factors
contributed to these security weaknesses?
– How could these attacks have been prevented?
– What was the business and social impact of these
attacks?

Copyright © 2019 Pearson Education Ltd.


Hackers and Computer Crime (1 of 3)
• Hackers v s. crackers
ersu

• Activities include:
– System intrusion
– System damage
– Cybervandalism
▪ Intentional disruption, defacement, destruction of
website or corporate information system
• Spoofing and sniffing

Copyright © 2019 Pearson Education Ltd.


Hackers and Computer Crime (2 of 3)
• Denial-of-service attacks (DoS)
• Distributed denial-of-service attacks (DDoS)
• Botnets
• Spam
• Computer crime
– Computer may be target of crime
– Computer may be instrument of crime

Copyright © 2019 Pearson Education Ltd.


Hackers and Computer Crime (3 of 3)
• Identity theft
– Phishing
– Evil twins
– Pharming
• Click fraud
• Cyberterrorism
• Cyberwarfare

Copyright © 2019 Pearson Education Ltd.


Internal Threats: Employees
• Security threats often originate inside an organization
• Inside knowledge
• Sloppy security procedures
– User lack of knowledge
• Social engineering
• Both end users and information systems specialists are
sources of risk

Copyright © 2019 Pearson Education Ltd.


Software Vulnerability
• Commercial software contains flaws that create security
vulnerabilities
– Bugs (program code defects)
– Zero defects cannot be achieved
– Flaws can open networks to intruders
• Zero-day vulnerabilities
• Patches
– Small pieces of software to repair flaws
– Patch management

Copyright © 2019 Pearson Education Ltd.


Encryption and Public Key
Infrastructure (1 of 3)
• Encryption
– Transforming text or data into cipher text that cannot
be read by unintended recipients
– Two methods for encryption on networks
▪ Secure Sockets Layer (SSL) and successor
Transport Layer Security (TLS)
▪ Secure Hypertext Transfer Protocol (S-HTTP)

Copyright © 2019 Pearson Education Ltd.


Encryption and Public Key
Infrastructure (2 of 3)
• Two methods of encryption of messages
– Symmetric key encryption
▪ Sender and receiver use single, shared key
– Public key encryption
▪ Uses two, mathematically related keys: public key
and private key
▪ Sender encrypts message with recipient’s public
key
▪ Recipient decrypts with private key

Copyright © 2019 Pearson Education Ltd.


Figure 8.6 Public Key Encryption

Copyright © 2019 Pearson Education Ltd.


Encryption and Public Key
Infrastructure (3 of 3)
• Digital certificate
– Data file used to establish the identity of users and
electronic assets for protection of online transactions
– Uses a trusted third party, certification authority (C A), to
validate a user's identity
– CA verifies user’s identity, stores information in C A server,
which generates encrypted digital certificate containing
owner ID information and copy of owner’s public key
• Public key infrastructure (P KI)
– Use of public key cryptography working with certificate
authority
– Widely used in e-commerce
Copyright © 2019 Pearson Education Ltd.
Figure 8.7 Digital Certificates

Copyright © 2019 Pearson Education Ltd.


Ensuring System Availability
• Online transaction processing requires 100% availability
• Fault-tolerant computer systems
– Contain redundant hardware, software, and power
supply components that create an environment that
provides continuous, uninterrupted service
• Deep packet inspection
• Security outsourcing
– Managed security service providers (MSSPs)

Copyright © 2019 Pearson Education Ltd.


How Will MIS Help My Career?
• The Business: No. 1 Value Supermarkets
• Position Description
• Job Requirements
• Interview Questions

Copyright © 2019 Pearson Education Ltd.

You might also like