MIS Chapter 5
MIS Chapter 5
Information System
Security
Chapter IV
Introduction
MAJOR THREATS TO
INFORMATION SYSTEM
SECURITY
3
Definition of Information System Security
Security is defined as “the quality/state of being
secured – to be secured from danger”
Information security – practice of defending digital
information from unauthorized:
Access
Use
Recording
Disruption
Modification
Destruction
4
Dimensions of Information Security
Information is:
stored on computer hardware
manipulated by software
transmitted by communication network
used by people, etc.
(intentional/non-intentional)
Events: type of action that poses the threat
6
Chapter IV
FACTORS CONTRIBUTING TO
THREAT
7
Cont.
INADVERTENT ACTS
Communication error
8
Cont.
DELEBERATE SOFTWARE ATTACKS
Deliberate action aimed to violate/ compromise a system’s
security through the use of software:
Use of malware
Password cracking
Spoofing
Sniffing
9
Cont.
NATURAL DISASTER
an offense
Unauthorized access of a server to destroy data
gambling 11
Cont.
Who commits a crime?
Current or former employees; insider threat
People with technical knowledge who commit business
or information sabotage for personal gain
Career criminals who use computers to assist in crimes
Outside crackers — commit millions of intrusions per
year
12
Types of Computer Crimes
Identity
Hacking & Cracking
Theft
Computer
Viruses
Cyber harassment,
Cyberstalking, Piracy
Cyberbullying
13
Hackers & Crackers
Hackers
Anyone who can gain unauthorized access to
computers
White hat hackers don’t intend to do harm
Crackers
Individuals who break into computer systems with
the intent to commit crime or do damage
Also called black hat hackers
Hacktivists:
Crackers who are motivated by political or
ideological goals and who use cracking to
14
promote their interests
Computer Viruses
perverse software which cause malicious
activity (spread destructive program routines)
hindering execution of other programs
15
Cont.
Revenge on company/person
act of maniac
16
Spyware, Spam, and Cookies
17
Denial-of-Service (DoS)
A denial-of-service attack seeks to
overload servers, typically using a
network of hacked computers that are
controlled remotely, by sending too
many requests or messages to the server
for it to handle.
When a server has too many requests to
handle, it becomes overloaded and
unable to serve the requests of
legitimate users.
18
Sniffing
use of a program or device that can monitor
data traveling over a network
Unauthorized sniffers – sniff/extract critical
information; can’t be detected
19
Identity Theft
Stealing Social Security, credit card, bank
account numbers and information
thieves even withdraw money directly from
victims’ bank accounts
organizations keep information about individuals
in accessible databases
One of the fastest growing information crimes
Possible solutions
Government and private sector working together
to change practices
Use of biometrics and encryption
20
Software Piracy
Unauthorized copying of computer programs, which is intellectual
property protected by copy right law.
using software that isn’t properly licensed and paid for, such as by
purchasing one copy of a product and then using it on multiple
computers.
Huge profit loss by software publishers.
22
Goals of Information Security
Availability:
Ensuring that legitimate users can access the system
Integrity
Preventing unauthorized manipulations of data and
systems
Confidentiality
Protecting data from unauthorized access
Accountability
Ensuring that actions can be traced
23
Developing IS Security Strategy
Options for addressing information security risks
Risk Reduction
Risk Acceptance
Risk Transference
Risk Avoidance
24
Cont.
A strategy is developed detailing the information security
controls
Types of Controls
Preventive:
Detective
Corrective
IS Security Mechanisms:
Developing Information System Security
Policy
Use of authentication mechanism
Access control
Back-ups
Firewalls
Physical Security 26
IS Security Policy & Procedure
destroying
Security policy: access limitations, audit-control software,
firewalls, etc.
Use policy: proper use
29
Chapter V
Physical Security
Locked doors
Physical intrusion detection
Security cameras
30
Chapter V
Antivirus
used to prevent, detect and remove malware
It runs in the background at all times.
It should be kept updated.
It runs computer disk scans periodically.
Eg. McAfee, Norton, Kaspersky.
31