MIS Chapter 5
MIS Chapter 5
2
Chapter IV
Introduction
➢ Goals
➢ Definition of IS ➢ Inadvertent act ➢ Strategy
Security ➢ Deliberate SW attack ✓ Policy
➢ Dimensions of IS ✓ Virus, Hacking, ✓ Authentication
Security identity theft, ✓ Access control
➢ Definition of IS cyber-harassment, ✓ Encryption
Security Threats war, crime ✓ Backup
➢ Natural Disaster ✓ Firewall
➢ Technical Failure ✓ IDS
➢ Management failure ✓ Physical security
3
Chapter IV
4
Definition of Information System Security
Security is defined as “the quality/state of being secured – to
be secured from danger”
Information security – practice of defending digital
information from unauthorized:
➢ Access
➢ Use
➢ Recording
➢ Disruption
➢ Modification
➢ Destruction
5
Dimensions of Information Security
Information is:
➢ stored on computer hardware
➢ manipulated by software
➢ transmitted by communication network
➢ used by people, etc.
7
Chapter IV
8
Cont.
INADVERTENT ACTS
✓ Communication error
9
Cont.
DELEBERATE SOFTWARE ATTACKS
➢ Deliberate action aimed to violate/ compromise a system’s security
through the use of software:
✓ Use of malware
✓ Password cracking
✓ Spoofing
✓ Sniffing
10
Cont.
NATURAL DISASTER
➢ Managers:
✓ Update, develop proper plan for good protection of the
information, Committed to upgrade 11
Computer Crime
What is computer crime?
➢ Using a computer to commit an illegal act
✓ Targeting a computer while committing an
offense
❖ Unauthorized access of a server to destroy data
12
Cont.
Who commits a crime?
➢ Current or former employees; insider threat
➢ People with technical knowledge who commit business or
information sabotage for personal gain
13
Types of Computer Crimes
Identity
Hacking & Cracking
Theft
Computer
Viruses
Cyber harassment,
Cyberstalking, Piracy
Cyberbullying
14
Hackers & Crackers
Hackers
➢ Anyone who can gain unauthorized access to computers
Crackers
➢ Individuals who break into computer systems with the
intent to commit crime or do damage
➢ Also called black hat hackers
Hacktivists:
➢ Crackers who are motivated by political or ideological
goals and who use cracking to promote their interests
15
Computer Viruses
perverse software which cause malicious
activity (spread destructive program routines)
➢hindering execution of other programs
16
Cont.
➢Revenge on company/person
➢ act of maniac
17
Spyware, Spam, and Cookies
19
Sniffing
use of a program or device that can monitor data
traveling over a network
20
Identity Theft
Stealing Social Security, credit card, bank account
numbers and information
➢ thieves even withdraw money directly from victims’
bank accounts
➢ organizations keep information about individuals in
accessible databases
using software that isn’t properly licensed and paid for, such as by
purchasing one copy of a product and then using it on multiple
computers.
23
Goals of Information Security
Availability:
➢ Ensuring that legitimate users can access the system
Integrity
➢ Preventing unauthorized manipulations of data and systems
Confidentiality
➢ Protecting data from unauthorized access
Accountability
➢ Ensuring that actions can be traced
24
Developing IS Security Strategy
Options for addressing information security risks
➢ Risk Reduction
✓ Actively installing countermeasures
➢ Risk Acceptance
➢ Risk Transference
➢ Risk Avoidance
25
Cont.
A strategy is developed detailing the information security controls
Types of Controls
➢ Preventive:
➢ Detective
➢ Corrective
26
Cont.
IS Security Mechanisms:
➢ Developing Information System Security Policy
➢ Access control
➢ Back-ups
➢ Firewalls
➢ Physical Security
27
IS Security Policy & Procedure
28
Authentication Mechanism
30
Chapter V
Physical Security
Locked doors
Environmental monitoring
➢ monitoring temperature, humidity, airflow → for servers
31
Chapter V
Antivirus
used to prevent, detect and remove malware
32
Thank you !!!!
33