Securing Information Systems
Chapter Overview
- Importance of securing information systems in management.
- Vulnerabilities arise from destruction, error, and abuse.
- Security and control provide business value.
- Cybersecurity involves a centralized strategy approach.
Video Cases
- Stuxnet and Cyber Warfare
- Cyber Espionage: The Chinese Threat
- UBS Access Key: IBM Zone Trusted Information Channel
- Sony PlayStation Hack
- Zappos Security Breach
- Anonymous Hackers on Sony
Vulnerabilities and Threats
System Vulnerability
- Network accessibility
- Hardware and software issues
- Disasters and external use
- Loss/theft of devices
Internet and Wireless Vulnerabilities
- Open networks and fixed targets
- Unencrypted VOIP and email vulnerabilities
- Wireless easy to scan; war driving
- Wi-Fi networks vulnerable to sniffer programs
Malware Types
- Viruses and worms
- Trojan horses and SQL injection
- Ransomware and spyware
- Key loggers and other malicious software
Hacking and Computer Crime
- Hackers vs. crackers
- Spoofing, sniffing, and denial-of-service attacks (DoS and DDoS)
- Identity theft and phishing
- Cyberterrorism and cyberwarfare
Internal and Software Threats
- Insider threats from employees
- Vulnerabilities in commercial software
- Role of patches and updates
Business Impact
- Security breaches affect market value and legal liabilities
- Regulatory requirements: HIPAA, Gramm-Leach-Bliley, Sarbanes-Oxley
- Importance of electronic evidence and computer forensics
Security Framework
General and Application Controls
- Software, hardware, and operations controls
- Data security and implementation controls
- Application controls specific to software processes
Risk Assessment
- Identifying threats and evaluating risk
- Security policies and acceptable use policies (AUP)
Identity Management
- Validating users and controlling access
- Identity management systems and access rules
Planning and Audits
- Disaster recovery and business continuity planning
- Information systems audits for security evaluation
Tools and Technologies
Authentication and Firewalls
- Passwords, tokens, smart cards, and biometric systems
- Firewalls: Protection against unauthorized access
Intrusion Detection and Antivirus
- Monitoring hotspot networks
- Unified threat management (UTM)
Encryption
- Methods: Symmetric and public key encryption
- Digital certificates and public key infrastructure (PKI)
System Availability and Traffic Control
- Fault-tolerant systems and deep packet inspection
- Managed security service providers (MSSPs)
Cloud and Mobile Security
- Ensuring data protection in cloud services
- Mobile device management and security
Ensuring Software Quality
- Software metrics and testing
- Debugging and walkthrough processes
Discussion Questions
- Is cyberwarfare a serious issue and why?
- Analyzing technology issues in security breaches (e.g., MWEB case).
The lecture stresses the importance of a comprehensive approach to securing information systems, addressing both technical vulnerabilities and organizational policies.