Chapter 8
Chapter 8
Chapter 8
Securing Information
Systems
Management Information Systems
Chapter 8 Securing Information Systems
LEARNING OBJECTIVES
• Security:
• Policies, procedures and technical measures used to prevent
unauthorized access, alteration, theft, or physical damage to
information systems
• Controls:
• Methods, policies, and organizational procedures that ensure
safety of organization’s assets; accuracy and reliability of its
accounting records; and operational adherence to
management standards
Management Information Systems
Chapter 8 Securing Information Systems
The architecture of a Web-based application typically includes a Web client, a server, and corporate information
systems linked to databases. Each of these components presents security challenges and vulnerabilities.
Floods, fires, power failures, and other electrical problems can cause disruptions at any point in the network.
Figure 8-1
Management Information Systems
Chapter 8 Securing Information Systems
• Internet vulnerabilities
• Network open to anyone
• E-mail attachments
Figure 8-2
Many Wi-Fi networks can be
penetrated easily by intruders
using sniffer programs to obtain
an address to access the
resources of a network without
authorization.
Management Information Systems
Chapter 8 Securing Information Systems
• Spoofing
• Misrepresenting oneself by using fake e-mail addresses or
masquerading as someone else
• Redirecting Web link to address different from intended one,
with site masquerading as intended destination
• Sniffer: Eavesdropping program that monitors information
traveling over network
• Denial-of-service attacks (DoS): Flooding server with
thousands of false requests to crash the network
• Distributed denial-of-service attacks (DDoS): Use of
numerous computers to launch a DoS
• Botnets: Networks of “zombie” PCs infiltrated by bot malware
• Logic Bomb, Dumpster Driving
Management Information Systems
Chapter 8 Securing Information Systems
• Computer crime
• Defined as “any violations of criminal law that involve a
knowledge of computer technology for their perpetration,
investigation, or prosecution”
• Computer may be target of crime, e.g.:
• Breaching confidentiality of protected computerized data
• Accessing a computer system without authority
• Computer may be instrument of crime, e.g.:
• Theft of trade secrets
• Using e-mail for threats or harassment
Management Information Systems
Chapter 8 Securing Information Systems
• Click fraud
• Individual or computer program clicks online ad
without any intention of learning more or making a
purchase
• Global threats - Cyberterrorism and cyberwarfare
• Concern that Internet vulnerabilities and other
networks make digital networks easy targets for
digital attacks by terrorists, foreign intelligence
services, or other groups
Management Information Systems
Chapter 8 Securing Information Systems
• Software vulnerability
• Commercial software contains flaws that create
security vulnerabilities
• Hidden bugs (program code defects)
• Zero defects cannot be achieved because complete testing
is not possible with large programs
• Flaws can open networks to intruders
• Patches
• Vendors release small pieces of software to repair flaws
• However, amount of software in use can mean exploits created
faster than patches be released and implemented
Management Information Systems
Chapter 8 Securing Information Systems
• Electronic evidence
• Evidence for white collar crimes often found in
digital form
• Data stored on computer devices, e-mail, instant messages,
e-commerce transactions
• Proper control of data can save time, money when
responding to legal discovery request
• Computer forensics:
• Scientific collection, examination, authentication, preservation,
and analysis of data from computer storage media for use as
evidence in court of law
• Includes recovery of ambient and hidden data
Management Information Systems
Chapter 8 Securing Information Systems
• Application controls
• Specific controls unique to each computerized application,
such as payroll or order processing
• Include both automated and manual procedures
• Ensure that only authorized data are completely and
accurately processed by that application
• Types of application controls:
• Input controls
• Processing controls
• Output controls
Management Information Systems
Chapter 8 Securing Information Systems
• Risk assessment
• Determines level of risk to firm if specific activity or process is
not properly controlled
• Types of threat
• Probability of occurrence during year
• Potential losses, value of threat
• Expected annual loss
• Security policy
• Ranks information risks, identifies acceptable security goals,
and identifies mechanisms for achieving these goals
• Drives other policies
• Acceptable use policy (AUP): Defines acceptable uses
of firm’s information resources and computing equipment
• Authorization policies: Determine differing levels of user
access to information assets
Figure 8-3
These two examples
represent two security
profiles or data security
patterns that might be
found in a personnel
system. Depending on
the security profile, a
user would have certain
restrictions on access to
various systems,
locations, or data in an
organization.
Management Information Systems
Chapter 8 Securing Information Systems
• MIS audit
• Examines firm’s overall security environment as well as
controls governing individual information systems
• Reviews technologies, procedures, documentation, training,
and personnel
• May even simulate disaster to test response of technology, IS
staff, other employees
• Lists and ranks all control weaknesses and estimates
probability of their occurrence
• Assesses financial and organizational impact of each threat
Management Information Systems
Chapter 8 Securing Information Systems
Figure 8-4
This chart is a sample page from
a list of control weaknesses that
an auditor might find in a loan
system in a local commercial
bank. This form helps auditors
record and evaluate control
weaknesses and shows the
results of discussing those
weaknesses with management,
as well as any corrective actions
taken by management.
Management Information Systems
Chapter 8 Securing Information Systems
A Corporate Firewall
Figure 8-5
Management Information Systems
Chapter 8 Securing Information Systems
• Encryption:
• Transforming text or data into cipher text that cannot
be read by unintended recipients
• Two methods for encrypting network traffic
• Secure Sockets Layer (SSL) and successor Transport
Layer Security (TLS)
• Secure Hypertext Transfer Protocol (S-HTTP)
• Two methods of encryption
• Symmetric key encryption
• Public key encryption
Management Information Systems
Chapter 8 Securing Information Systems
A public key encryption system can be viewed as a series of public and private keys that lock data when they are
transmitted and unlock the data when they are received. The sender locates the recipient’s public key in a directory and
uses it to encrypt a message. The message is sent in encrypted form over the Internet or a private network. When the
encrypted message arrives, the recipient uses his or her private key to decrypt the data and read the message.
Figure 7-6
Management Information Systems
Chapter 8 Securing Information Systems
• Digital certificate:
• Data file used to establish the identity of users and electronic
assets for protection of online transactions
• Uses a trusted third party, certification authority (CA), to
validate a user’s identity
• CA verifies user’s identity, stores information in CA server,
which generates encrypted digital certificate containing
owner ID information and copy of owner’s public key
• Public key infrastructure (PKI)
• Use of public key cryptography working with certificate
authority
• Widely used in e-commerce
Management Information Systems
Chapter 8 Securing Information Systems
Digital Certificates
Figure 8-7
Digital certificates help
establish the identity of
people or electronic assets.
They protect online
transactions by providing
secure, encrypted, online
communication.
Management Information Systems
Chapter 8 Securing Information Systems
• Recovery-oriented computing
• Designing systems that recover quickly with capabilities to
help operators pinpoint and correct of faults in multi-
component systems
• Controlling network traffic
• Deep packet inspection (DPI)
• Security outsourcing
• Managed security service providers (MSSPs)
Management Information Systems
Chapter 8 Securing Information Systems