LS - Securing Information Systems
LS - Securing Information Systems
Banking Services
Security:
Policies, procedures and technical measures used to prevent
unauthorized access, alteration, theft, or physical damage to
information systems
Controls:
Methods, policies, and organizational procedures that ensure
safety of organization’s assets; accuracy and reliability of its
accounting records; and operational adherence to management
standards
System Vulnerability and Abuse
Hardware problems
Breakdowns, configuration errors, damage from improper use or crime
Software problems
Programming errors, installation errors, unauthorized changes)
Disasters
Power failures, flood, fires, etc.
Use of networks and computers outside of firm’s control
E.g., with domestic or offshore outsourcing vendors
System Vulnerability and Abuse
The architecture of a Web-based application typically includes a Web client, a server, and corporate
information systems linked to databases. Each of these components presents security challenges
and vulnerabilities. Floods, fires, power failures, and other electrical problems can cause disruptions
at any point in the network.
System Vulnerability and Abuse
Internet vulnerabilities
Network open to anyone
E-mail attachments
Spoofing
Misrepresenting oneself by using fake e-mail addresses or
masquerading as someone else
Redirecting Web link to address different from intended one,
with site masquerading as intended destination
Computer crime
Defined as “any violations of criminal law that involve a knowledge of
computer technology for their perpetration, investigation, or
prosecution”
Click fraud
Individual or computer program clicks online ad without
any intention of learning more or making a purchase
Software vulnerability
Commercial software contains flaws that create
security vulnerabilities
• Hidden bugs (program code defects)
Zero defects cannot be achieved because complete
testing is not possible with large programs
• Flaws can open networks to intruders
Patches
• Vendors release small pieces of software to repair flaws
• However, amount of software in use can mean exploits
created faster than patches be released and implemented
Plan of Presentation
Electronic evidence
Evidence for white collar crimes often found in
digital form
Data stored on computer devices, e-mail, instant messages, e-
commerce transactions
Computer forensics:
Scientific collection, examination, authentication, preservation, and
analysis of data from computer storage media for use as evidence
in court of law
Includes recovery of ambient and hidden data
Plan of Presentation
Application controls
Specific controls unique to each computerized application,
such as payroll or order processing
Include both automated and manual procedures
Ensure that only authorized data are completely and accurately
processed by that application
Types of application controls:
• Input controls
• Processing controls
• Output controls
Establishing a Framework for Security and Control
Risk assessment
Determines level of risk to firm if specific activity or process is
not properly controlled
• Types of threat
• Probability of occurrence during year
• Potential losses, value of threat
• Expected annual loss
Security policy
Ranks information risks, identifies acceptable security goals,
and identifies mechanisms for achieving these goals
Drives other policies
• Acceptable use policy (AUP): Defines acceptable uses
of firm’s information resources and computing equipment
• Authorization policies: Determine differing levels of user
access to information assets
MIS audit
Examines firm’s overall security environment as well as
controls governing individual information systems
Reviews technologies, procedures, documentation, training,
and personnel
May even simulate disaster to test response of technology, IS
staff, other employees
Lists and ranks all control weaknesses and estimates
probability of their occurrence
Assesses financial and organizational impact of each threat
Plan of Presentation
A Corporate Firewall
The firewall is
placed between
the firm’s private
network and the
public Internet or
another distrusted
network to protect
against
unauthorized traffic.
Technologies and Tools for Security
Encryption:
Transforming text or data into cipher text that cannot be read
by unintended recipients
Two methods for encrypting network traffic
• Secure Sockets Layer (SSL) and successor Transport
Layer Security (TLS)
• Secure Hypertext Transfer Protocol (S-HTTP)
• Two methods of encryption
• Symmetric key encryption
• Public key encryption
Technologies and Tools for Security
A public key encryption system can be viewed as a series of public and private keys that lock data
when they are transmitted and unlock the data when they are received. The sender locates the
recipient’s public key in a directory and uses it to encrypt a message. The message is sent in
encrypted form over the Internet or a private network. When the encrypted message arrives, the
recipient uses his or her private key to decrypt the data and read the message.
Technologies and Tools for Security
Digital certificate:
Data file used to establish the identity of users and electronic assets
for protection of online transactions
Uses a trusted third party, certification authority (CA), to validate a
user’s identity
CA verifies user’s identity, stores information in CA server, which
generates encrypted digital certificate containing owner ID
information and copy of owner’s public key
Digital Certificates
Digital certificates
help establish the
identity of people or
electronic assets.
They protect online
transactions by
providing secure,
encrypted, online
communication.
Technologies and Tools for Security
Recovery-oriented computing
Designing systems that recover quickly with capabilities to help
operators pinpoint and correct of faults in multi-component systems
Security outsourcing
Managed security service providers (MSSPs)
Technologies and Tools for Security