MIS Chapter 8
MIS Chapter 8
If you operate a business today, you need to make security and control a top priority.
Security refers to the policies, procedures, and technical measures used to prevent
unauthorized access, alteration, theft, or physical damage to information systems. Controls
are methods, policies, and organizational procedures that ensure the safety of the
organization’s assets, the accuracy and reliability of its records, and operational adherence to
management standards.
1
Security Risks and Vulnerabilities
5. Natural Disasters:
o Power failures, floods, fires, and other natural disasters can significantly
disrupt computer systems.
6. Partnering Risks:
2
o Collaborating with other companies, especially those offshore, can expose
systems to vulnerabilities if sensitive information resides on external
networks.
INTERNET VULNERABILITIES:
Large public networks, such as the Internet, are more vulnerable than internal networks
because they are virtually open to anyone. The Internet is so huge that when abuses do occur,
they can have an enormously widespread impact. When the Internet links to the corporate
network, the organization’s information systems are even more vulnerable to actions from
outsiders.
Vulnerability has also increased from widespread use of email, instant messaging
(IM), and peer-to-peer (P2P) file-sharing programs.
Email may contain attachments that serve as springboards for malicious software or
unauthorized access to internal corporate systems. Employees may use email
messages to transmit valuable trade secrets, financial data, or confidential customer
information to unauthorized recipients.
Instant messaging activity over the Internet can in some cases be used as a back door
to an otherwise secure network.
Sharing files over P2P networks, such as those for illegal music sharing, can also
transmit malicious software or expose information on either individual or corporate
computers to outsiders.
1. Ease of Access Wi-Fi networks can be easily targeted by attackers with basic tools
like laptops and software. The design of Wi-Fi makes it easy for devices to connect,
but this also opens the door to intrusions.
2. SSID Exposure Wi-Fi networks broadcast their names (SSIDs) frequently, making
them easy to detect. Attackers can use sniffing tools to capture these names and learn
about the network.
3. War Driving Many wireless networks lack protections against war driving, where
attackers drive around to find unprotected networks. They can intercept data from a
distance without needing direct access.
3
4. Unauthorized Access If an intruder connects to a network (even without the right
credentials), they can explore the network and potentially access other users' files and
sensitive information.
5. Rogue Access Points Attackers can create fake access points near legitimate ones.
Unsuspecting users might connect to these rogue points, allowing attackers to capture
sensitive data like usernames and passwords.
6. Lack of Basic Protections Many wireless networks do not use strong security
measures like WPA3, which protects data with encryption. This makes them
vulnerable to attacks and data interception.
Solutions
Malicious software programs are referred to as malware and include a variety of threats such
as computer viruses, worms, and Trojan horses.
(In the context of computer viruses, a "payload" refers to the harmful actions or
effects that the virus carries out once it infects a system. This can include deleting
files, stealing data, displaying unwanted messages, or causing other damage to the
computer or its software. Essentially, the payload is the part of the virus that performs
the actual malicious activity.)
2. Worms are independent computer programs that copy themselves from one computer
to other computers over a network. Unlike viruses, worms can operate on their own
without attaching to other computer program files and rely less on human behavior to
spread rapidly from computer to computer. Worms destroy data and programs as well
as disrupt or even halt the operation of computer networks.
4
4. SQL Injection Attacks: These attacks take advantage of weaknesses in poorly
designed web applications to insert harmful code into a company's systems. This
happens when the application doesn’t properly check or filter user input, like when
placing an order online. An attacker exploits this flaw by sending a malicious SQL
query to the database, allowing them to access data, install harmful code, or reach
other systems on the network.
8. Drive-by downloads, consisting of malware that comes with a downloaded file that a
user intentionally or unintentionally requests. Drive-by downloads are a type of cyber
attack where malicious software is automatically downloaded to a user's device
without their consent or knowledge. This typically occurs when a user visits a
compromised or malicious website, often through deceptive links or ads.
Prevention Tips
To protect against these types of malware, users should:
Use Antivirus Software: Regularly update and run scans to detect and remove
malware.
5
Be Cautious with Downloads: Only download software from trusted sources and
avoid clicking on suspicious links.
Keep Software Updated: Ensure operating systems and applications are up to date to
fix vulnerabilities.
Educate Yourself: Stay informed about the latest security threats and safe browsing
practices.
Denial-of-Service Attacks
In a denial-of-service (DoS) attack , hackers flood a network server or web server with
many thousands of false communications or requests for services to crash the network. The
network receives so many queries that it cannot keep up with them and is thus unavailable to
service legitimate requests.
6
hackers infect enough computers, they can use the amassed resources of the botnet to launch
DDoS attacks, phishing campaigns, or unsolicited spam email.
Effect of DOS or DDOS attack: Although DoS attacks do not destroy information or access
restricted areas of a company’s information systems, they often cause a website to shut down,
making it impossible for legitimate users to access the site. For busy e-commerce sites, these
attacks are costly; while the site is shut down, customers cannot make purchases. Especially
vulnerable are small and midsize businesses whose networks tend to be less protected than
those of large corporations.
Computer Crime
Computer crime is defined by the U.S. Department of Justice as “any violations of criminal
law that involve a knowledge of computer technology for their perpetration, investigation, or
prosecution
Identity Theft
Identity theft : With the growth of the Internet and electronic commerce, identity theft has
become especially troubling. Identity theft is a crime in which an imposter obtains key pieces
of personal information, such as social security numbers, driver’s license numbers, or credit
card numbers, to impersonate someone else. The information may be used to obtain credit,
merchandise, or services in the name of the victim or to provide the thief with false
credentials. Identity theft has flourished on the Internet, with credit card files a major target
of website hackers.
7
Phishing: One increasingly popular tactic is a form of spoofing called phishing. Phishing
involves setting up fake websites or sending email messages that look like those of legitimate
businesses to ask users for confidential personal data. The email message instructs recipients
to update or confirm records by providing social security numbers, bank and credit card
information, and other confidential data, either by responding to the email message, by
entering the information at a bogus website, or by calling a telephone number.
Spear phishing: In a more targeted form of phishing called spear phishing, messages appear
to come from a trusted source, such as an individual within the recipient’s own company or a
friend.
Evil twins: Evil twins are wireless networks that pretend to offer trustworthy Wi-Fi
connections to the Internet, such as those in airport lounges, hotels, or coffee shops. The
bogus network looks identical to a legitimate public network. Fraudsters try to capture
passwords or credit card numbers of unwitting users who log on to the network.
Pharming: Pharming is a cyber attack that redirects users from legitimate websites to
fraudulent ones without their knowledge. This is often done to steal sensitive information,
such as usernames, passwords, and financial data.
Click Fraud
Click fraud is a type of cybercrime where an individual or automated program (bot)
generates false clicks on online ads to inflate advertising costs. This fraudulent activity can
occur in various forms, primarily in pay-per-click (PPC) advertising models.
Some companies hire third parties (typically from low-wage countries) to click a competitor’s
ads fraudulently to weaken them by driving up their marketing costs. Click fraud can also be
perpetrated with software programs doing the clicking, and botnets are often used for this
purpose.
The global nature of the Internet makes it possible for cybercriminals to operate—and to do
harm—anywhere in the world. Internet vulnerabilities have also turned individuals and even
entire nation-states into easy targets for politically motivated hacking to conduct sabotage and
espionage.
Cyberterrorism refers to politically motivated attacks carried out by individuals or groups to
create fear or disrupt societal functions through cyber means. The primary aim is often to
instill fear, influence government policies, or draw attention to a cause. Typical targets
include government websites, critical infrastructure (like power grids), and large
corporations.
Software Vulnerability
Software errors pose a constant threat to information systems, causing untold losses in
productivity and sometimes endangering people who use or depend on systems. Growing
complexity and size of software programs, coupled with demands for rapid delivery to
markets, have contributed to an increase in software flaws or vulnerabilities.
Bugs: A major problem with software is the presence of hidden bugs or program code
defects. Studies have shown that it is virtually impossible to eliminate all bugs from large
programs. The main source of bugs is the complexity of decision-making code.
Patches: To correct software flaws once they are identified, the software vendor creates
small pieces of software called patches to repair the flaws without disturbing the proper
operation of the software. It is up to users of the software to track these vulnerabilities, test,
and apply all patches. This process is called patch management.
9
Failure to implement proper security measures can result in costly litigation for data exposure
or theft, making organizations liable for risks and damages due to negligence in protecting
confidential information.
Legal and Regulatory Requirements for Electronic Records Management (Not
important)
Government regulations worldwide are forcing companies to take security and control more
seriously by mandating the protection of data from abuse, exposure, and unauthorized access.
Firms face new legal obligations for the retention and storage of electronic records as well as
for privacy protection.
Example: If you work in the U.S. healthcare industry, your firm will need to comply with the
Health Insurance Portability and Accountability Act (HIPAA) of 1996. HIPAA. If you work
in a firm providing financial services, your firm will need to comply with the Financial
Services Modernization Act of 1999, better known as the Gramm-Leach-Bliley Act If you
work in a publicly traded company, your company will need to comply with the Public
Company Accounting Reform and Investor Protection Act of 2002, better known as the
Sarbanes-Oxley Act
Security, control, and electronic records management have become essential for responding
to legal actions. Much of the evidence today for stock fraud, embezzlement, theft of company
trade secrets, computer crime, and many civil cases is in digital form. In addition to
information from printed or typewritten pages, legal cases today increasingly rely on
evidence represented as digital data stored on portable storage devices, CDs, and computer
hard disk drives as well as in email, instant messages, and e-commerce transactions over the
Internet.
An effective electronic document retention policy ensures that electronic documents, email,
and other records are well organized, accessible, and neither retained too long nor discarded
too soon. It also reflects an awareness of how to preserve potential evidence for computer
forensics.
10
Companies must respond to discovery requests for information that may serve as evidence,
and failure to produce this data can lead to significant costs, especially if data is corrupted or
destroyed. Courts impose severe penalties for improper destruction of electronic documents.
3. Benefits of a Retention Policy
An effective electronic document retention policy ensures that electronic documents, email,
and other records are well organized, accessible, and neither retained too long nor discarded
too soon. It also reflects an awareness of how to preserve potential evidence for computer
forensics.
Electronic evidence can exist on computer storage media as visible files or ambient data,
which is often not accessible to the average user. For instance, deleted files from a PC hard
drive can frequently be recovered using specialized techniques. Computer forensics experts
focus on retrieving this hidden data to present it as evidence in legal proceedings.
Even with the best security tools, your information systems won’t be reliable and secure
unless you know how and where to deploy them. You’ll need to know where your company
is at risk and what controls you must have in place to protect your information systems.
You’ll also need to develop a security policy and plans for keeping your business running if
your information systems aren’t operational.
11
Information systems controls are both manual and automated and consist of general and
application controls.
General controls:
General controls govern the design, security, and use of computer programs and the security
of data files in general throughout the organization’s information technology infrastructure.
On the whole, general controls apply to all computerized applications and consist of a
combination of hardware, software, and manual procedures that create an overall control
environment.
General controls include software controls, physical hardware controls, computer operations
controls, data security controls, controls over the systems development process, and
administrative controls.
Software controls: Monitor the use of system software and prevent unauthorized access and
use of software programs, system software, and computer programs.
Hardware controls: Ensure that computer hardware is physically secure and check for
equipment malfunction. Organizations that are critically dependent on their computers also
must make provisions for backup or continued operation to maintain constant service.
Computer operations controls: Oversee the work of the computer department to ensure that
programmed procedures are consistently and correctly applied to the storage and processing
of data. They include controls over the setup of computer processing jobs and backup and
recovery procedures for processing that ends abnormally.
Data security controls: Ensure that valuable business data files maintained internally or by
an external hosting service are not subject to unauthorized access, change, or destruction
while they are in use or in storage.
Application controls:
Application controls are specific controls unique to each computerized application, such as
payroll or order processing. They include both automated and manual procedures that ensure
that only authorized data are completely and accurately processed by that application.
Application controls can be classified as (1) input controls, (2) processing controls, and (3)
output controls.
12
Input controls check data for accuracy and completeness when they enter the system. There
are specific input controls for input authorization, data conversion, data editing, and error
handling.
Processing controls establish that data are complete and accurate during updating.
Output controls ensure that the results of computer processing are accurate, complete, and
properly distributed.
Risk Assessment
Before your company commits resources to security and information systems controls, it
must know which assets require protection and the extent to which these assets are
vulnerable. A risk assessment helps answer these questions and determine the most cost-
effective set of controls for protecting assets.
A risk assessment evaluates the potential risks to a firm if specific activities or processes are
inadequately controlled. While not all risks can be predicted or quantified, businesses can
gain insight into the risks they face. Managers, in collaboration with information systems
specialists, should focus on determining the value of information assets, identifying
vulnerabilities, assessing the likelihood of issues, and understanding the potential for damage.
For example, if an event is likely to occur no more than once a year, with a maximum of a
$1000 loss to the organization, it is not wise to spend $20,000 on the design and maintenance
of a control to protect against that event. However, if that same event could occur at least
once a day, with a potential loss of more than $300,000 a year, $100,000 spent on a control
might be entirely appropriate.
Security Policy
After you’ve identified the main risks to your systems, your company will need to develop a
security policy for protecting the company’s assets.
The security policy drives other policies determining acceptable use of the firm’s information
resources and which members of the company have access to its information assets. An
acceptable use policy (AUP) defines acceptable uses of the firm’s information resources and
computing equipment, including desktop and laptop computers, mobile devices, telephones,
and the Internet. A good AUP defines unacceptable and acceptable actions for every user and
specifies consequences for noncompliance.
Disaster recovery planning devises plans for the restoration of disrupted computing and
communications services. Disaster recovery plans focus primarily on the technical issues
13
involved in keeping systems up and running, such as which files to back up and the
maintenance of backup computer systems or disaster recovery services.
Business continuity planning focuses on how the company can restore business operations
after a disaster strikes. The business continuity plan identifies critical business processes and
determines action plans for handling mission-critical functions if systems go down.
An information systems audit examines the firm’s overall security environment as well as
controls governing individual information systems. The auditor should trace the flow of
sample transactions through the system and perform tests, using, if appropriate, automated
audit software. The information systems audit may also examine data quality.
8-4 WHAT ARE THE MOST IMPORTANT TOOLS AND TECHNOLOGIES FOR
SAFEGUARDING INFORMATION RESOURCES?
Identity management software automates the process of keeping track of all these users and
their system privileges, assigning each user a unique digital identity for accessing each
system. It also includes tools for authenticating users, protecting user identities, and
controlling access to system resources.
Users often forget passwords, share them, or choose poor passwords that are easy to guess,
which compromises security. Password systems that are too rigorous hinder employee
productivity. When employees must change complex passwords frequently, they often take
shortcuts, such as choosing passwords that are easy to guess or keeping their passwords at
their workstations in plain view. Passwords can also be sniffed if transmitted over a network
or stolen through social engineering.
14
A token is a physical device, similar to an identification card, that is designed to prove the
identity of a single user. Tokens are small gadgets that typically fit on key rings and display
passcodes that change frequently.
A smart card is a device about the size of a credit card that contains a chip formatted with
access permission and other data. (Smart cards are also used in electronic payment systems.)
A reader device interprets the data on the smart card and allows or denies access.
Biometric authentication uses systems that read and interpret individual human traits, such
as fingerprints, irises, and voices to grant or deny access. Biometric authentication is based
on the measurement of a physical or behavioral trait that makes each individual unique. It
compares a person’s unique characteristics, such as the fingerprints, face, voice, or retinal
image, against a stored profile of these characteristics to determine any differences between
these characteristics and the stored profile. If the two profiles match, access is granted.
The steady stream of incidents in which hackers have been able to access traditional
passwords highlights the need for more secure means of authentication. Two-factor
authentication increases security by validating users through a multistep process. To be
authenticated, a user must provide two means of identification, one of which is typically a
physical token, such as a smartcard or chip-enabled bank card, and the other of which is
typically data, such as a password or personal identification number (PIN). Biometric data,
such as fingerprints, iris prints, or voice prints, can also be used as one of the authenticating
mechanisms.
Without protection against malware and intruders, connecting to the Internet would be very
dangerous. Firewalls, intrusion detection systems, and antimalware software have become
essential business tools.
FIREWALLS:
Firewalls prevent unauthorized users from accessing private networks. A firewall is a
combination of hardware and software that controls the flow of incoming and outgoing
network traffic. It is generally placed between the organization’s private internal networks
and distrusted external networks, such as the Internet, although firewalls can also be used to
protect one part of a company’s network from the rest of the network (see Figure 8. 5 ).
The firewall acts like a gatekeeper that examines each user’s credentials before it grants
access to a network. The firewall identifies names, IP addresses, applications, and other
characteristics of incoming traffic. It checks this information against the access rules that the
network administrator has programmed into the system. The firewall prevents unauthorized
communication into and out of the network.
There are a number of firewall screening technologies, including static packet filtering,
stateful inspection, Network Address Translation, and application proxy filtering. They are
frequently used in combination to provide firewall protection.
15
o This method examines each packet of data against a set of predefined rules. It
checks attributes like source and destination IP addresses, port numbers, and
protocols to determine whether to allow or block the packet. It's fast but does
not track the state of connections, making it less effective against sophisticated
attacks.
2. Stateful Inspection:
o Unlike static packet filtering, stateful inspection keeps track of active
connections and their states. It monitors the entire session and allows packets
that are part of an established connection while blocking those that are not.
This provides better security by understanding the context of the traffic.
3. Network Address Translation (NAT):
o NAT is used to hide internal IP addresses from external networks. It allows
multiple devices on a local network to share a single public IP address. By
translating private IP addresses to a public address, NAT adds a layer of
security and helps prevent direct access to internal devices from the outside.
4. Application Proxy Filtering:
o This technique involves using an intermediary server (proxy) that intercepts
requests between users and the internet. The proxy can inspect and filter traffic
based on application-specific rules, providing enhanced security by preventing
direct connections to external servers and allowing for more detailed content
filtering.
o
INTRUSION DETECTION SYSTEMS:
In addition to firewalls, commercial security vendors now provide intrusion detection tools
and services to protect against suspicious network traffic and attempts to access files and
databases. Intrusion detection systems feature full-time monitoring tools placed at the most
vulnerable points or hot spots of corporate networks to detect and deter intruders continually.
The system generates an alarm if it finds a suspicious or anomalous event. Scanning software
looks for patterns indicative of known methods of computer attacks such as bad passwords,
checks to see whether important files have been removed or modified, and sends warnings of
vandalism or system administration errors.
Anti-malware Software
Defensive technology plans for both individuals and businesses must include anti-malware
protection for every computer. Anti-malware software prevents, detects, and removes
malware, including computer viruses, computer worms, Trojan horses, spyware, and adware.
However, most anti-malware software is effective only against malware already known when
the software was written. To remain effective, the software must be continually updated.
Even then it is not always effective because some malware can evade detection.
Organizations need to use additional malware detection tools for better protection.
16
(UTM) systems. UTM products are available for all sizes of networks. Leading UTM
vendors include Fortinent, Sophos, and Check Point, and networking vendors such as Cisco
Systems and Juniper Networks provide some UTM capabilities in their products.
In June 2004 WPA2 replaces WEP with stronger security standards. Instead of the static
encryption keys used in WEP, the new standard uses much longer keys that continually
change, making them harder to crack. The most recent specification is WPA3, introduced in
2018.
Two methods for encrypting network traffic on the web are SSL and S-HTTP.
Secure Sockets Layer (SSL) and its successor, Transport Layer Security (TLS), enable
client and server computers to manage encryption and decryption activities as they
communicate with each other during a secure web session. Secure Hypertext Transfer
Protocol (S-HTTP) is another protocol used for encrypting data flowing over the Internet,
but it is limited to individual messages, whereas SSL and TLS are designed to establish a
secure connection between two computers.
The capability to generate secure sessions is built into Internet client browser software and
servers. The client and the server negotiate what key and what level of security to use. Once a
secure session is established between the client and the server, all messages in that session are
encrypted.
Two methods of encryption are symmetric key encryption and public key encryption.
In symmetric key encryption, the sender and receiver establish a secure Internet session by
creating a single encryption key and sending it to the receiver so both the sender and receiver
17
share the same key. The strength of the encryption key is measured by its bit length. Today, a
typical key will be 56 to 256 bits long (a string of from 56 to 256 binary digits) depending on
the level of security desired. The longer the key, the more difficult it is to break the key. The
downside is that the longer the key, the more computing power it takes for legitimate users to
process the information.
The problem with all symmetric encryption schemes is that the key itself must be shared
somehow among the senders and receivers, which exposes the key to outsiders who might
just be able to intercept and decrypt the key.
A more secure form of encryption called public key encryption uses two keys: one shared
(or public) and one totally private as shown in Figure 8. 6 . The keys are mathematically
related so that data encrypted with one key can be decrypted using only the other key. To
send and receive messages, communicators first create separate pairs of private and public
keys. The public key is kept in a directory, and the private key must be kept secret. The
sender encrypts a message with the recipient’s public key. On receiving the message, the
recipient uses his or her private key to decrypt it.
Digital certificates are data files used to establish the identity of users and electronic assets
for protection of online transactions (see Figure 8. 7 ). A digital certificate system uses a
trusted third party, known as a certificate authority (CA), to validate a user’s identity. There
are many CAs in the United States and around the world, including Symantec, GoDaddy, and
Comodo. The CA verifies a digital certificate user’s identity offline. This information is put
into a CA server, which generates an encrypted digital certificate containing owner
identification information and a copy of the owner’s public key. The certificate authenticates
that the public key belongs to the designated owner.
The digital certificate system would enable, for example, a credit card user and a merchant to
validate that their digital certificates were issued by an authorized and trusted third party
before they exchange data. Public key infrastructure (PKI) , the use of public key
cryptography working with a CA, is now widely used in e-commerce
Public Key Infrastructure (PKI) is a framework that enables secure communication and the
management of digital certificates using public key cryptography. It consists of a
combination of hardware, software, policies, and procedures to create, manage, distribute,
and revoke digital certificates, which are essential for verifying the identity of users, devices,
and services.
Blockchain technology is a decentralized and distributed digital ledger system that securely
records transactions across multiple computers. Each transaction is grouped into a block,
which is then linked to the previous block, forming a chain. This structure ensures that once
data is recorded, it cannot be altered without altering all subsequent blocks, making it highly
resistant to tampering and fraud. Blockchain operates on a consensus mechanism, allowing
participants in the network to agree on the validity of transactions without the need for a
central authority. Its transparency, security, and ability to facilitate trust among parties make
18
it a foundational technology for cryptocurrencies, smart contracts, and various applications
across industries, from finance to supply chain management.
As companies increasingly rely on digital networks for revenue and operations, they need to
take additional steps to ensure that their systems and applications are always available. Firms
such as those in the airline and financial services industries with critical applications
requiring online transaction processing have traditionally used fault-tolerant computer
systems for many years to ensure 100 percent availability.
Fault-tolerant computer systems contain redundant hardware, software, and power supply
components that create an environment that provides continuous, uninterrupted service.
Fault-tolerant computers use special software routines or self-checking logic built into their
circuitry to detect hardware failures and automatically switch to a backup device. Parts from
these computers can be removed and repaired without disruption to the computer or
downtime. Downtime refers to periods of time in which a system is not operational.
Deep Packet Inspection (DPI) is a technology that analyzes the data packets sent over a
network in detail. Unlike standard methods that only check the basic information in a packet,
DPI looks at the content itself, allowing it to identify specific applications and types of data.
This can help in improving network security by spotting threats, managing bandwidth, and
ensuring better performance. However, it also raises privacy concerns since it involves
examining potentially sensitive information.
Security Outsourcing
Security Outsourcing
Many companies, especially small businesses, lack the resources or expertise to provide a
secure high-availability computing environment on their own. They can outsource many
security functions to managed security service providers (MSSPs) that monitor network
activity and perform vulnerability testing and intrusion detection. SecureWorks, AT&T,
Verizon, IBM, Perimeter eSecurity, and Symantec are leading providers of MSSP services.
SECURITY ISSUES FOR CLOUD COMPUTING AND THE MOBILE DIGITAL
PLATFORM
19
Although cloud computing and the emerging mobile digital platform have the potential to
deliver powerful benefits, they pose new challenges to system security and reliability.
Cloud computing is highly distributed. Cloud applications reside in large remote data centers
and server farms that supply business services and data management for multiple corporate
clients. To save money and keep costs low, cloud computing providers often distribute work
to data centers around the globe where work can be accomplished most efficiently. When you
use the cloud, you may not know precisely where your data are being hosted.
Encryption is essential: Cloud providers should use encryption for both data
transmission and storage to protect against unauthorized access.
DDoS attacks pose a threat: Companies should be aware of the risk of DDoS attacks
and ensure their cloud provider has measures in place to mitigate them.
Reliability is crucial: While cloud providers have improved reliability, occasional
outages can still occur.
Data protection is paramount: Cloud users must confirm that their data is stored
and processed in accordance with their corporate security requirements.
Jurisdiction matters: Data should be stored and processed in jurisdictions with
appropriate privacy laws.
Data segregation and encryption: Cloud providers should ensure that data is
segregated from other companies' data and that encryption mechanisms are robust.
Disaster recovery planning is essential: Cloud users should understand the
provider's disaster recovery plan, including data restoration capabilities and timelines.
External audits and certifications are valuable: Cloud providers should be subject
to external audits and security certifications to demonstrate their commitment to
security.
Service level agreements (SLAs) should address security: SLAs should include
specific security requirements and performance guarantees.
Cloud Security Alliance (CSA) standards provide guidance: The CSA offers
industry-wide standards for cloud security best practices.
Mobile devices need robust security: Similar to desktops and laptops, they require
protection against malware, theft, loss, unauthorized access, and hacking.
Corporate security policies must include mobile devices: Companies should have
specific guidelines for mobile device support, protection, and usage.
Mobile device management tools are essential: These tools help manage device
inventory, control updates, and remotely lock or erase lost devices.
Data loss prevention technology is crucial: This technology identifies data
movement and helps prevent unauthorized access and data breaches.
20
Guidelines for approved platforms and software are necessary: Companies should
define acceptable mobile platforms and applications for corporate use.
Remote access procedures must be secure: Guidelines should be in place for remote
access to corporate systems, including encryption requirements.
Unsecured consumer applications should be prohibited: Employees should not use
personal applications for transferring or storing corporate data.
Encryption is essential: Communication should be encrypted whenever possible to
protect sensitive information.
Password usage is mandatory: All mobile device users should be required to use
strong passwords.
Software metrics are objective assessments of the system in the form of quantified
measurements. Ongoing use of metrics allows the information systems department and end
users to measure the performance of the system jointly and identify problems as they occur.
Early, regular, and thorough testing will contribute significantly to system quality. Many
view testing as a way to prove the correctness of work they have done.
Good testing begins before a software program is even written, by using a walkthrough —a
review of a specification or design document by a small group of people carefully selected
based on the skills needed for the particular objectives being tested.
When developers start writing software programs, coding walkthroughs can also be used to
review program code. However, code must be tested by computer runs. When errors are
discovered, the source is found and eliminated through a process called debugging.
21