+ All Categories
Home > Documents > Management Information Systems By Effy Oz & Andy Jones

Management Information Systems By Effy Oz & Andy Jones

Date post: 23-Jan-2016
Category:
Upload: zubeda
View: 108 times
Download: 20 times
Share this document with a friend
Description:
Management Information Systems By Effy Oz & Andy Jones. Chapter 13: Risks, Security and Disaster Recovery. www.cengage.co.uk/oz. Objectives. Describe the primary goals of information security Enumerate the main types of risks to information systems - PowerPoint PPT Presentation
44
Use with Management Information Systems 1e By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning Management Information Systems By Effy Oz & Andy Jones www.cengage.co.uk/oz Chapter 13: Risks, Security and Disaster Recovery
Transcript
Page 1: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Management Information SystemsBy Effy Oz & Andy Jones

www.cengage.co.uk/oz

Chapter 13: Risks, Security and Disaster Recovery

Page 2: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Objectives• Describe the primary goals of information

security

• Enumerate the main types of risks to information systems

• List the various types of attacks on networked systems

• Describe the types of controls required to ensure the integrity of data entry and processing and uninterrupted e-commerce

Page 3: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Objectives (continued)

• Describe the various kinds of security measures that can be taken to protect data and ISs

• Outline the principles of developing a recovery plan

• Explain the economic aspects of information security

Page 4: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Goals of Information Security

• Protecting IT resources is a primary concern

• Securing corporate ISs increasingly challenging

• Major goals of information security– Reduce risk of systems ceasing operation– Maintain information confidentiality– Ensure integrity of data resources– Ensure uninterrupted availability of resources– Ensure compliance with policies

Page 5: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Risks to Information Systems

• Downtime: time when IS is not available

• Extremely expensive

• Pan-European survey by data centre provider, Global Switch, found IT downtime cost businesses €400,000 per hour

Page 6: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Risks to Hardware• Major causes of damage to machine

– Natural disasters• Fire

• Flood

• Storms

– Blackouts and brownouts• Blackout: total loss of electricity

• Brownout: partial loss of electricity

• Uninterruptible power supply (UPS): backup power

– Vandalism• Deliberate destruction

Page 7: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Risks to Data and Applications• Data primary concern because unique• Susceptible to

– Disruption– Damage– Theft

• Keystroke logging: record individual keystrokes• Social engineering: con artists pretending to be

service people• Identity theft: pretending to be another person

Page 8: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Risks to Data and Applications (continued)

• Risk to data– Alteration

– Destruction

– Web defacement

• Deliberate alteration or destruction is a prank

• Target may be Web site

• Honeytoken: bogus record in networked database– Used to combat hackers

Page 9: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Risks to Data and Applications (continued)

• Honeypot: server containing mirrored copy of database– Educated security officers of vulnerable points

• Virus: spread from computer to computer• Worm: spread in network without human

intervention• Antivirus software: protect against viruses• Trojan horse: virus disguised as legitimate

software

Page 10: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Risks to Data and Applications (continued)

• Logic bomb: cause damage at specific time

• Unintentional damage– Human error– Lack of adherence to backup procedures– Poor training– Unauthorized downloading may cause damage

Page 11: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Risks to Online Operations

• Many hackers try to interrupt business daily

• Attacks– Unauthorized access– Data theft– Defacing of Web pages– Denial-of-service– Hijacking

Page 12: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Denial of Service

• Denial of service (DoS): launch large number of information requests– Slow down legitimate traffic to site

• Distributed denial-of-service (DDoS): launch DoS attack from multiple computers– No definitive cure– Can filter illegitimate traffic

Page 13: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Computer Hijacking

• Hijacking: linking computer to public network without consent– Done for DDoS– Done by installing bot on computer– Hijackers usually send SPAM

• Bot planted by exploiting security holes– Install e-mail forwarding software

Page 14: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Controls

• Controls: constraints on user or system– Can secure against risks– Ensure nonsensical data is not entered– Can reduce damage

Page 15: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Controls (continued)

Page 16: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Program Robustness and Data Entry Controls

• Computer free of bugs is robust

• Handle situations well

• Resist inappropriate usage

• Provide clear messages

• Translate business policies into system features

Page 17: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Backup• Backup: duplication of all data

• Redundant Arrays of Independent Disks (RAID): set of disks programmed to replicate stored data

• Data must be routinely transported off-site

• Some companies specialize in data backup

Page 18: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Access Controls• Access controls: require authorized access

– Physical locks– Software locks

• Three types of access controls– What you know

• User ID and password

– What you have• Require special devices

– What you are• Physical characteristics

Page 19: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Access Controls (continued)

• Passwords stored in OS or database

• Security card more secure than password– Allows two-factor access

• Biometric: unique physical characteristic– Fingerprints– Retinal pictures– Voiceprints

• Many people forget passwords

Page 20: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Atomic Transactions

• Atomic transaction: set of indivisible transactions– All executed or none– Ensure only full entry occurs– Control against malfunction and fraud

Page 21: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Atomic Transactions (continued)

Page 22: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Audit Trail

• Audit trail: documented facts that help detect who recorded transactions

• Sometimes automatically created

• Certain policies on audit trail controls required in some countries

• Information systems auditor: find and investigate fraudulent cases

Page 23: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Security Measures

• Organizations can protect against attacks– Firewalls– Authentication– Encryption– Digital signatures– Digital certificates

Page 24: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Firewalls and Proxy Servers• Firewall: best defense

– Hardware and software– Blocks access to computing resources– Routinely integrated into routers

• DMZ: demilitarized zone approach– One end of network connected to trusted network

other end to public network

• Proxy server: represent another server– Employs firewall

Page 25: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Firewalls and Proxy Servers (continued)

Page 26: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Authentication and Encryption• Encrypt and authenticate messages to ensure

security• Message may not be text

– Image– Sound

• Authentication: process of ensuring sender is valid

• Encryption: coding message to unreadable form

Page 27: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Authentication and Encryption (continued)

Page 28: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Authentication and Encryption (continued)

• Encryption programs– Plaintext: original message

– Ciphertext: coded message

– Uses mathematical algorithm and key• Key is combination of bits that deciphers ciphertext

• Symmetric encryption: sender and recipient use same key

• Asymmetric encryption: public and private key used

Page 29: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Authentication and Encryption (continued)

Page 30: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Authentication and Encryption (continued)

• Transport Layer Security (TLS): protocol for transactions on Web

• Uses combination of public and symmetric key encryption

• HTTPS: secure version of HTTP

• Digital signature: way to authenticate online messages

• Message digest: unique fingerprint of file

Page 31: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Authentication and Encryption (continued)

Page 32: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Authentication and Encryption (continued)

• Digital certificates: identify identity with public key– Issued by certificate authority

• Certificate authority (CA): trusted third party– Contains

• Name

• Serial number

• Expiration dates

• Copy of holder’s public key

Page 33: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Authentication and Encryption (continued)

Page 34: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

The Downside of Security Measures

• Single sign-on (SSO): user name/password entered only once

• Saves time

• Encryption slows down communication

• IT specialists must clearly explain implications of security measures

Page 35: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Recovery Measures

• Uncontrolled disasters need recovery measures

• Redundancy may be used– Expensive– Alternatives must be taken

Page 36: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

The Business Recovery Plan• Business recovery plans: plan to recover from

disaster– Nine steps

• Obtain management’s commitment

• Establish planning committee

• Perform risk assessment and impact analysis

• Prioritize recovery needs

• Select recovery plan

• Select vendors

• Develop and implement plan

• Test plan

• Continually test and evaluate

Page 37: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Recovery Planning and Hot Site Providers

• Can outsource recovery plans

• Hot sites: alternative sites– Backup sites to continue operation

Page 38: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

The Economics of Information Security

• Security analogous to insurance

• Spending should be proportional to potential damage

• Access minimum rate of system downtime

Page 39: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

How Much Security Is Enough Security?

• Two costs to consider– Cost of potential damage– Cost of implementing preventative measure

• Companies try to find optimal point

• Need to define what needs to be protected

• Never exceed value of protected system

Page 40: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

How Much Security Is Enough Security? (continued)

Page 41: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Calculating Downtime

• Try to minimize downtime

• Mission-critical systems must be connected to alternative source of power

• More ISs interfaced with other systems

• Interdependent systems have greater downtime

• Redundancy reduces downtime

Page 42: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Summary

• Purpose of controls and security measures is to maintain functionality of ISs

• Risks to IS include risks to hardware, data, and networks, and natural disaster and vandalism

• Risks to data include theft, data alteration, data destruction, defacement of Web sites, and viruses

• Risk to online systems include denial of service and hijacking

Page 43: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Summary (continued)

• Controls used to minimize disruption

• Access controls require information to be entered before resources are made available

• Atomic transactions ensures data integrity

• Firewalls protect against Internet attacks

• Encryption schemes protect messaging on Internet

Page 44: Management Information Systems By Effy Oz & Andy Jones

Use with Management Information Systems 1e

By Effy Oz & Andy Jones ISBN 9781844807581 © 2008 Cengage Learning

Summary (continued)• TLS and HTTPS are encryption standards designed

for Web• Keys and digital certificates purchased from

certificate authority• Many organizations have business recovery plans

which may be outsourced• Careful evaluation of amount spent on security

measures is necessary• Government is obliged to protect citizens against

crime and terrorism


Recommended