MIS 205 Chapter 8
MIS 205 Chapter 8
MIS 205 Chapter 8
Chapter 8
SECURING INFORMATION
SYSTEMS
Internet vulnerabilities
Network open to anyone
Size of Internet means abuses can have
wide impact
Use of fixed Internet addresses with
cable or DSL modems creates fixed
targets hackers
Unencrypted VOIP
E-mail, P2P, IM
Interception
Attachments with malicious software
Transmitting trade secrets
3
Worms
Independent computer programs that copy
themselves from one computer to other
computers over a network.
Trojan horses
Software program that appears to be benign
but then does something other than expected.
5
Malware (cont.)
Key loggers
Spoofing
Redirecting Web link to address
different from intended one, with
site masquerading as intended
destination
Sniffer
Eavesdropping program that monitors
information traveling over network
Enables hackers to steal proprietary
information such as e-mail, company
files, etc.
9
10
11
12
Computer crime
Computer may be target of crime, e.g.:
Breaching confidentiality of protected
computerized data
Accessing a computer system without
authority
13
Phishing
Setting up fake Web sites or sending
e-mail messages that look like
legitimate businesses to ask users
for confidential personal data.
14
17
Click fraud
Occurs when individual or computer
program fraudulently clicks on
online ad without any intention of
learning more about the advertiser
or making a purchase
18
19
Software vulnerability
Commercial software contains flaws that
create security vulnerabilities
Hidden bugs (program code defects)
Zero defects cannot be achieved because
complete testing is not possible with large
programs
Patches
Vendors release small pieces of software
to repair flaws
However exploits often created faster
than patches be released and implemented
20
Electronic evidence
Evidence for white collar crimes often in
digital form
Computer forensics:
Scientific collection, examination,
authentication, preservation, and analysis
of data from computer storage media for use
as evidence in court of law
21
22
Security policy
Ranks information risks, identifies
acceptable security goals, and
identifies mechanisms for achieving
these goals
Drives other policies
Acceptable use policy (AUP)
Defines acceptable uses of firms information
resources and computing equipment
Authorization policies
Determine differing levels of user access to
information assets
23
24
25
26
27
28
29
Encryption:
Transforming text or data
into cipher text that cannot
be read by unintended
recipients
31
33
34