Ch.5 It Security, Crime, Compliance, and Continuity Lecture 4.

15
Ch.5 It Security, Crime, Compliance, and Continuity Lecture 4

Transcript of Ch.5 It Security, Crime, Compliance, and Continuity Lecture 4.

Page 1: Ch.5 It Security, Crime, Compliance, and Continuity Lecture 4.

Ch.5 It Security, Crime, Compliance, and Continuity

Lecture 4

Page 2: Ch.5 It Security, Crime, Compliance, and Continuity Lecture 4.

5.1 Protecting Data and Business Operations

5-2

IT security: the protection of data, systems,networks, and operations.

Technology defenses are necessary, but they’re not sufficient because protecting data and business op-erations also involves:

• Implementing and enforcing acceptable use policies (AUPs).

• Complying with government regulations and laws.

• Making data available 24x7 while restricting access.

• Promoting secure and legal sharing of information.

Page 3: Ch.5 It Security, Crime, Compliance, and Continuity Lecture 4.

IT Security Principles

5-3

Page 4: Ch.5 It Security, Crime, Compliance, and Continuity Lecture 4.

Know Your Enemy and Your Risks

• IT security risks are business risks

• Threats range from high-tech exploits to gain ac-cess to a company’s networks to non-tech tactics such as stealing laptops or items of value. Com-mon examples:

– Malware (malicious software): viruses, worms, trojan horses, spyware, and disruptive or destructive programs

– insider error or action, either intentional or uninten-tional.

– Fraud

– Fire, flood, or other natural disasters

5-4

Page 5: Ch.5 It Security, Crime, Compliance, and Continuity Lecture 4.

IT at Work 5.1 $100 Million Data Breach

• May 2006: a laptop and external hard drive be-longing to the U.S. Dept of Veterans Affairs (VA) were stolen during a home burglary.

• Data on 26.5 million veterans and spouses had been stored in plaintext.

• VA Secretary Jim Nicholson testified before Congress that it would cost at least $10 million just to inform veterans of the security breach.

• Total cost of data breach: $100 million

5-5

Page 6: Ch.5 It Security, Crime, Compliance, and Continuity Lecture 4.

Risks• Cloud computing• Social networks• Phishing• Search engine manipulation• Money laundering• Organized crime• Terrorist financing

5-6

Page 7: Ch.5 It Security, Crime, Compliance, and Continuity Lecture 4.

IT Security Defense-in-Depth Model

5-7

Page 8: Ch.5 It Security, Crime, Compliance, and Continuity Lecture 4.

5.2 IS Vulnerabilities and Threats

• Unintentional– human error– environmental hazards– computer system failure

• Intentional– hacking– malware – manipulation

5-8

Page 9: Ch.5 It Security, Crime, Compliance, and Continuity Lecture 4.

5-9

Figure 5.4 How a computer virus can spread

Page 10: Ch.5 It Security, Crime, Compliance, and Continuity Lecture 4.

Malware and Botnet De-fenses• Anti-virus software

• Firewalls

• Intrusion detection systems (IDS)

• Intrusion prevention systems (IPS)

5-10

Page 11: Ch.5 It Security, Crime, Compliance, and Continuity Lecture 4.

5.4 IT and Network Secu-rity

Objectives of a defense strategy

1. Prevention and deterrence

2. Detection

3. Containment (minimize loses, damage con-

trol)

4. Recovery

5. Correction

6. Awareness and compliance

5-11

Page 12: Ch.5 It Security, Crime, Compliance, and Continuity Lecture 4.

Major categories of general controls

• physical controls

• access controls

• biometric controls

• communication network controls

• administrative controls

• application controls

• endpoint security and control

5-12

Page 13: Ch.5 It Security, Crime, Compliance, and Continuity Lecture 4.

5-13

Figure 5.7 Intelligent agents

Page 14: Ch.5 It Security, Crime, Compliance, and Continuity Lecture 4.

5.5 Network Security

5-14

Figure 5.8 Three layers of network security measures

Page 15: Ch.5 It Security, Crime, Compliance, and Continuity Lecture 4.

Ethical issues

• Implementing security programs raises many ethical issues.

• Handling the privacy versus security dilemma is tough.

• Ethical and legal obligations that may require compa-nies to “invade the privacy” of employees and monitor their actions.

• Under the doctrine of duty of care, senior managers and directors have a obligation to use reasonable care to protect the company’s business operations.

5-15