Securing Information Systems
Securing Information Systems
Securing Information Systems
SYSTEMS
Management Information Systems
Learning objectives
Security:
Policies, procedures and technical measures used to prevent
unauthorized access, alteration, theft, or physical damage to
information systems
Controls:
Methods, policies, and organizational procedures that ensure safety
of organization’s assets; accuracy and reliability of its accounting
records; and operational adherence to management standards
Access controls are necessary to protect the confidentiality, integrity
and availability of objects. The term access control is used to
describe a broad range of controls, from forcing a user to provide a
valid username and a Password to log on to preventing users from
gaining access to a resource outside of their sphere of access.
Access controls
Passwords
Passwords
The most commonly used authentication technique is the use of passwords, but they are also
considered to be the weakest form of protection. Passwords are poor security mechanisms for
several reasons, including the following:
Users typically choose passwords that are easy to remember, and therefore easy to guess or crack.
Randomly generated passwords are hard to remember, thus many users write them down.
Passwords are easily shared, written down, and forgotten.
Passwords can be stolen through many means, including observation, recording and playback, and
security database theft.
Passwords are often transmitted in clear text or with easily broken encryption protocols.
Password databases are often stored in publicly accessible online locations.
Short passwords can be discovered quickly in brute force attacks
Dynamic passwords change after a specified interval of time or use. One-time passwords or single-
use passwords are a variant of dynamic passwords that are changed every time they are used.
FIGURE 8-1 The architecture of a Web-based application typically includes a Web client, a server, and corporate information systems linked to databases. Each of
these components presents security challenges and vulnerabilities. Floods, fires, power failures, and other electrical problems can cause disruptions at
any point in the network.
WI-FI SECURITY
CHALLENGES
Many Wi-Fi networks can be
penetrated easily by intruders
using sniffer programs to
obtain an address to access
the resources of a network
without authorization.
Security challenges
When a malicious user or attacker seeks to obtain passwords, there are several methods
they can employ, including network traffic analysis, password file access, brute force
attacks, dictionary attacks, and social engineering.
Network traffic analysis is the process of capturing network traffic (also known as sniffing)
when a user is entering a password for authentication. Once the password is discovered,
the attacker attempts to replay the packet containing the password against the network to
gain access. If an attacker can gain access to the password database file, it can be copied
and a password cracking tool used against it to extract usernames and passwords.
Brute force and dictionary attacks are types of password attacks that can be waged against
a stolen password database file or a system’s logon prompt.
In a dictionary attack, the attacker uses a script of common passwords and dictionary
words to attempt to discover an account’s password. In a brute force attack, a systematic
trial of all possible character combinations is used to discover an account’s password.
A social engineering attack is an attempt by an attacker to obtain logon capabilities
through deceiving a user, usually over the telephone, into performing specific actions on
the system, such as changing the password of an executive who’s on the road or creating a
user account for a new fictitious employee.
Malware (cont.)
SQL injection attacks
Hackerssubmit data to Web forms that exploits site’s
unprotected software and sends rogue SQL query to
database
Spyware
Smallprograms install themselves surreptitiously on
computers to monitor user Web surfing activity and serve
up advertising
Key loggers
Recordevery keystroke on computer to steal serial
numbers, passwords, launch Internet attacks
Vandalism
Deliberate destruction
15
Risks to Data and Applications
Data should be a primary concern because it is often a
unique resource
Data and applications are susceptible to disruption,
damage, and theft
The culprit in damage to software or data is almost
always human
Keystroke logging: records individual keystrokes
Social engineering: con artists pretend to be service
people, and ask for passwords
Identity theft: pretending to be another person
16
Risks to Data and Applications (continued)
Risks to data include:
Alteration
Destruction
Web defacement
Deliberate alteration or destruction is often done as a
prank, but has a high cost
The target may be a company’s Web site
17
Risks to Data and Applications (continued)
Virus: spreads from computer to computer
Worm: spreads in a network without human
intervention
Antivirus software: protects against viruses
Trojan horse: a virus disguised as legitimate software
18
Risks to Data and Applications (continued)
Logic bomb: software that is programmed to cause
damage at a specific time
Unintentional, nonmalicious damage can be caused
by:
Human error
Lack of adherence to backup procedures
Poor training
Unauthorized downloading and installation of software
may cause damage
19
Risks to Online Operations
Many hackers try daily to interrupt online businesses
Types of attacks include:
Unauthorized access
Data theft
Defacing of Web pages
Denial of service
Hijacking
20
Denial of Service
Denial of service (DoS): an attacker launches a large
number of information requests
Slows down legitimate traffic to site
Distributed denial of service (DDoS): an attacker
launches a DoS attack from multiple computers
Usually launched from hijacked personal computers
called “zombies”
No definitive cure for this
A site can filter illegitimate traffic
21
Computer Hijacking
Hijacking: using some or all of a computer’s resources
without the consent of its owner
Often done for making a DDoS attack
Done by installing a software bot on the computer
Main purpose of hijacking is usually to send spam
Bots are planted by exploiting security holes in
operating systems and communications software
A bot usually installs e-mail forwarding software
22
Controls
Controls are constraints and other restrictions imposed on a
user or a system, and they can be used to secure systems
against the risks just discussed or to reduce damage caused to
systems, applications, and data. Controls are implemented
not only for access but also to implement policies and ensure
that nonsensical data is not entered into corporate databases.
Controls: constraints and restrictions imposed on a user or a
system
Controls can be used to secure against risks
Controls are also used to ensure that nonsensical data is not entered
Controls can reduce damage caused to systems, application, and
data
23
Controls (continued)
24
Application Reliability
and Data Entry Controls
A reliable application is one that can resist
inappropriate usage such as incorrect data entry or
processing
The application should provide clear messages when
errors or deliberate misuses occur
Controls also translate business policies into system
features
25
Backup
Backup: periodic duplication of all data
Redundant Arrays of Independent Disks
(RAID): set of disks programmed to replicate
stored data
Data must be routinely transported off-site as
protection from a site disaster
Some companies specialize in data backup services
or backup facilities for use in the event of a site
disaster
26
Access Controls
Access controls: measures taken to ensure only authorized users have access
to a computer, network, application, or data
Physical locks: lock the equipment in a secure facility
Software locks: determine who is authorized
Three types of access controls:
Experts like to classify access controls into three groups: what you know, what
you have, and who you are. “What you know” includes access codes such as user
IDs, account numbers, and passwords. “What you have” is some kind of a
device, such as a security card, which you use directly or which continuously
changes coordinated access codes and displays them for you. “Who you are”
includes your unique physical characteristics.
27
Access Controls (continued)
Access codes and passwords are usually stored in the
OS or in a database
Security card is more secure than a password
Allows two-factor access
Biometric: uses unique physical characteristics such
as fingerprints, retinal scans, or voiceprints
Up to 50% of help desk calls are from people who have
forgotten their passwords
Biometrics can eliminate these kinds of calls
28
Atomic Transactions
Atomic transaction: a set of indivisible transactions
All of the transactions in the set must be completely
executed, or none can be
Ensures that only full entry occurs in all the appropriate
files to guarantee integrity of the data
Is also a control against malfunction and fraud
29
Atomic Transactions (continued)
30
Audit Trail
Audit trail: a series of documented facts that help
detect who recorded which transactions, at what time,
and under whose approval
Sometimes automatically created using data and
timestamps
Certain policy and audit trail controls are required in
some countries
Information systems auditor: a person whose job is
to find and investigate fraudulent cases
31
Security Measures
Organizations can protect against attacks using
various approaches, including:
Firewalls
Authentication
Encryption
Digital signatures
Digital certificates
32
Firewalls and Proxy Servers
Firewall: the best defense against unauthorized access over the
Internet
Consists of hardware and software that blocks access to computing
resources
Firewalls are now routinely integrated into routers
DMZ: demilitarized zone approach
One end of the network is connected to the trusted network, and the
other end to the Internet
Proxy server: represents another server
Employs a firewall, and is usually placed between the Internet and
the trusted network. When a business hires the services of an ISP, the
proxy server is often the one operated by the ISP.
33
Authentication and Encryption
Authentication: the process of ensuring that you are
who you say you are
Encryption: coding a message into an unreadable
form
Messages are encrypted and authenticated to ensure
security
A message may be text, image, sound, or other digital
information
34
Authentication and Encryption (continued)
35
Authentication and Encryption (continued)
Encryption programs scramble the transmitted
information
Plaintext: the original message
Ciphertext: the encoded message
Encryption uses a mathematical algorithm and a key
Key: a unique combination of bits that will decipher
the ciphertext
Public-key encryption: uses two keys, one public
and one private
36
37
Digital Signatures
A digital signature is away to authenticate online
messages, analogous to a physical signature on a piece of
paper, but implemented with public-key cryptography.
The digital signature authenticates the identity of the
sender of a message and also guarantees that no one has
altered the sent document; it is as if the message were
carried in an electronically sealed envelope.
The Downside of Security Measures
Single sign-on (SSO): a user must enter his or her
name/password only once
Single sign-on saves employees time
Encryption slows down communication
Every message must be encrypted and then decrypted
IT specialists must clearly explain the implications of
security measures to upper management
39
Recovery Measures
Security measures may reduce mishaps, but no one
can control all disasters.
Preparation for uncontrolled disasters requires that
recovery measures are in place.
40
The
Business Recovery Plan
Business recovery plan: A plan about how to recover
from a disaster
Also called disaster recovery plan, business resumption
plan, or business continuity plan
Nine steps to develop a business recovery plan:
1. Obtain management’s commitment to the plan
2. Establish a planning committee
3. Perform risk assessment and impact analysis
4. Prioritize recovery needs
Mission-critical applications: those without which the
business cannot conduct operations
41
The Business Recovery Plan (continued)
Nine steps to develop a business recovery plan
(continued):
5. Select a recovery plan
6. Select vendors
7. Develop and implement the plan
8. Test the plan
9. Continually test and evaluate
The plan should include key personnel and their
responsibilities
42
Recovery Planning and Hot Site Providers
Can outsource recovery plans to firms that specialize
in disaster recover planning
Hot sites: alternative sites that a business can use
when a disaster occurs
Backup sites provide desks, computer systems, and
Internet links
43
The Economics of Information Security
Security measures should be regarded as analogous to
insurance
Spending for security measures should be
proportional to the potential damage
A business must assess the minimum acceptable rate
of system downtime and ensure that the company can
financially sustain the downtime
44
How Much Security is Enough Security?
Two costs should be considered:
Cost of the potential damage
Cost of implementing a preventative measure
As the cost of security measures increases, the cost of
potential damage decreases
Companies try to find the optimal point
The company must define what needs to be protected
Security measures should never exceed the value of
protected system
45
Summary
The purpose of controls and security measures is to
maintain the functionality of ISs
Risks to ISs include risks to hardware, data, and
networks, and natural disaster and vandalism
Risks to data and applications include theft of
information, identity theft, data alteration, data
destruction, defacement of Web sites, viruses,
worms, logic bombs, and non malicious mishaps
Risks to online systems include denial of service and
hijacking
46
Summary (continued)
Controls are used to minimize disruption
Access controls require information to be entered
before resources are made available
Atomic transactions ensure data integrity
Firewalls protect against Internet attacks
Encryption schemes scramble messages to protect
them on the Internet
A key is used to encrypt and decrypt messages
47
Summary (continued)
Keys and digital certificates can be purchased from a
certificate authority
Many organizations have business recovery plans,
which may be outsourced
Careful evaluation of the amount spent on security
measures is necessary
Redundancy reduces the probability of downtime
Governments are obliged to protect citizens against
crime and terrorism
48