1. Trang chủ
  2. » Giáo án - Bài giảng

Experiencing mis 6th by kronenke ch12

39 319 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Chapter 12 Information Security Management “We Have to Design It for Privacy and Security ” • Tension between Maggie and Ajit regarding terminology to use with Dr Flores • Common problem for techies when talking with business professionals – Use too much technical language Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-2 PRIDE Design for Security Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-3 Study Guide Q1: What is the goal of information systems security? Q2: How big is the computer security problem? Q3: How should you respond to security threats? Q4: How should organizations respond to security threats? Q5: How can technical safeguards protect against security threats? Q6: How can data safeguards protect against security threats? Q7: How can human safeguards protect against security threats? Q8: How should organizations respond to security incidents? Q9: 2023? Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-4 Q1: What Is the Goal of Information Systems Security? Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-5 Examples of Threat/Loss Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-6 What Are the Sources of Threats? Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-7 What Types of Security Loss Exist? • Unauthorized Data Disclosure – Pretexting – Phishing – Spoofing  IP spoofing  Email spoofing – Drive-by sniffers – Hacking – Natural disasters Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-8 Incorrect Data Modification • Procedures not followed or incorrectly designed • Increasing a customer’s discount or incorrectly modifying employee’s salary • Placing incorrect data on company Web site • Improper internal controls on systems • System errors • Faulty recovery actions after a disaster Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-9 Faulty Service • Incorrect data modification • Systems working incorrectly • Procedural mistakes • Programming errors • IT installation errors • Usurpation • Denial of service (unintentional) • Denial-of-service attacks (intentional) Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-10 Malware Types and Spyware and Adware Symptoms • Viruses  Payload  Trojan horses  Worms  Beacons Spyware & Adware Symptoms Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-25 Malware Safeguards Use antivirus and antispyware programs Scan frequently Update malware definitions Open email attachments only from known sources Install software updates Browse only reputable Internet neighborhoods Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-26 Design for Secure Applications • SQL injection attack – User enters SQL statement into a form instead of a name or other data – Improperly designed form accepts this code and makes it part of a database command that it issues – Result: Improper data disclosure and data damage and loss possible – Properly designed applications make injections ineffective Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-27 Q6: How Can Data Safeguards Protect Against Security Threats? Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-28 Q7: How can Human Safeguards Protect Against Security Threats? Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-29 Account Administration • Account Management – Standards for new user accounts, modification of account permissions, removal of unneeded accounts • Password Management – Users should change passwords frequently • Help Desk Policies Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-30 Sample Account Acknowledgment Form Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-31 Systems Procedures Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-32 Q8: How Should Organizations Respond to Security Incidents? Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-33 Q9: 2023 • APTs more common, inflicting serious damage • Security mobile devices improved • Improved security procedures and employee training • Criminals focus on less protected mid-sized and smaller organizations, and individuals • Electronic lawlessness by organized gangs • Electronic sheriffs patrol electronic borders Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-34 Guide: Metasecurity • What are the security problems? • What are the managers’ responsibilities for  controls over the security system? Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-35 Guide: The Final, Final Word • Routine work will migrate to low labor-cost countries • Be a symbolic-analytic worker – Abstract thinking – How to experiment – Systems thinking – Collaboration Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-36 Active Review Q1: What is the goal of information systems security? Q2: How big is the computer security problem? Q3: How should you respond to security threats? Q4: How should organizations respond to security threats? Q5: How can technical safeguards protect against security threats? Q6: How can data safeguards protect against security threats? Q7: How can human safeguards protect against security threats? Q8: How should organizations respond to security incidents? Q9: 2023? Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-37 Case 12: Moore’s Law, One More Time … • Doubling CPU speed helps criminals – Enables more powerful password crackers • iOS, Android phones, and millions of mobile devices increase data communications and exponential opportunities for computer criminals Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-38 Copyright © 2014 Pearson Education, Inc Publishing as Prentice Hall 12-39 ... Unauthorized Data Disclosure – Pretexting – Phishing – Spoofing  IP spoofing  Email spoofing – Drive -by sniffers – Hacking – Natural disasters Copyright © 2014 Pearson Education, Inc Publishing as... Hall 12-9 Faulty Service • Incorrect data modification • Systems working incorrectly • Procedural mistakes • Programming errors • IT installation errors • Usurpation • Denial of service (unintentional)... Administration • Account Management – Standards for new user accounts, modification of account permissions, removal of unneeded accounts • Password Management – Users should change passwords frequently

Ngày đăng: 17/01/2018, 16:20

Xem thêm:

Mục lục

    PRIDE Design for Security

    Q1: What Is the Goal of Information Systems Security?

    Examples of Threat/Loss

    What Are the Sources of Threats?

    What Types of Security Loss Exist?

    Q2: How Big Is the Computer Security Problem?

    Verizon–Secret Service Findings 2011

    Verizon–Secret Service Findings 2011 (cont'd)

    Types of Attacks Experienced

    Intrusion Detection System (IDS)

TÀI LIỆU CÙNG NGƯỜI DÙNG

  • Đang cập nhật ...

TÀI LIỆU LIÊN QUAN