1. Trang chủ
  2. » Giáo án - Bài giảng

Experiencing MIS 7th by m kronenke chapter 12

45 164 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Chapter 12 Information Security Management “We Have to Design It for Privacy and Security.” • Tension between Maggie and Ajit regarding terminology to use with Dr Flores • Overly technical communication is a common problem for techies when talking with business professionals • Maggie and Ajit discuss security design later Copyright © 2015 Pearson Education, Inc 12-2 PRIDE Design for Security Copyright © 2015 Pearson Education, Inc 12-3 Study Questions Q1: What is the goal of information systems security? Q2: How big is the computer security problem? Q3: How should you respond to security threats? Q4: How should organizations respond to security threats? Q5: How can technical safeguards protect against security threats? Q6: How can data safeguards protect against security threats? Q7: How can human safeguards protect against security threats? Q8: How should organizations respond to security incidents? Q9: 2024? Copyright © 2015 Pearson Education, Inc 12-4 Q1: What Is the Goal of Information Systems Security? Copyright © 2015 Pearson Education, Inc 12-5 Examples of Threat/ Loss Copyright © 2015 Pearson Education, Inc 12-6 What Are the Sources of Threats? Copyright © 2015 Pearson Education, Inc 12-7 What Types of Security Loss Exists? • Unauthorized Data Disclosure – Pretexting – Phishing – Spoofing IP spoofing Email spoofing • Drive-by sniffers ã Hacking ã Natural disasters Copyright â 2015 Pearson Education, Inc 12-8 Incorrect Data Modification • Procedures incorrectly designed or not followed • Increasing a customer’s discount or incorrectly modifying employee’s salary • Placing incorrect data on company the Web site • Improper internal controls on systems • System errors ã Faulty recovery actions after a disaster Copyright â 2015 Pearson Education, Inc 12-9 Faulty Service • Incorrect data modification • Systems working incorrectly • Procedural mistakes • Programming errors • IT installation errors • Usurpation • Denial of service (unintentional) ã Denial-of-service attacks (intentional) Copyright â 2015 Pearson Education, Inc 12-10 Q7: How Can Human Safeguards Protect Against Security Threats? Copyright © 2015 Pearson Education, Inc 12-31 Account Administration • Account Management  Standards for new user accounts, modification of account permissions, and removal of accounts that are not needed • Password Management  Users should change passwords frequently ã Help Desk Policies Copyright â 2015 Pearson Education, Inc 12-32 Sample Account Acknowledgment Form Copyright © 2015 Pearson Education, Inc 12-33 Systems Procedures Copyright © 2015 Pearson Education, Inc 12-34 Q8: How Should Organizations Respond to Security Incidents? Copyright © 2015 Pearson Education, Inc 12-35 Security Wrap Up • Be aware of threats to computer security as an individual, business professional, or an employee • Know trade-offs of loss risks and the cost of safeguards • Ways to protect your computing devices and data • Understand technical, data, and human safeguards • Understand how organizations should respond to security incidents Copyright © 2015 Pearson Education, Inc 12-36 Q9: 2024 • APTs more common, inflicting serious damage • Continued concern about balance of national security and data privacy • Computer crimes targeting mobile devices leads to improved operating systems security • Improved security procedures and employee training • Criminals focus on less protected mid-sized and smaller organizations, and individuals • Electronic lawlessness by organized gangs • Strong local “electronic” sheriffs electronic border and enforce existing laws? Copyright © 2015 Pearson Education, Inc 12-37 Guide: Metasecurity • What are the security problems? • What are the managers’ responsibilities for controls over the security system? • All major software vendors are obvious targets for security attacks against their networks What these companies to prevent this? • What extra precautions can you take when you hire and manage employees such as white-hat hackers? Copyright © 2015 Pearson Education, Inc 12-38 Guide: The Final, Final Word • Routine work will migrate to countries with lower labor costs • Be a symbolic-analytic worker – Abstract thinking – How to experiment – Systems thinking – Collaboration • The best is yet to come! What you with it is up to you Copyright © 2015 Pearson Education, Inc 12-39 Active Review Q1: What is the goal of information systems security? Q2: How big is the computer security problem? Q3: How should you respond to security threats? Q4: How should organizations respond to security threats? Q5: How can technical safeguards protect against security threats? Q6: How can data safeguards protect against security threats? Q7: How can human safeguards protect against security threats? Q8: How should organizations respond to security incidents? Q9: 2024 Copyright © 2015 Pearson Education, Inc 12-40 Case 12: Will You Trust FIDO? • One-third of all people record passwords somewhere, whether on a sticky note or in a computer file • Malicious code searches for files that include "password" or some variant • Many web sites offer to authenticate you using your Facebook or other common credentials • Use credentials only at site where created Copyright © 2015 Pearson Education, Inc 12-41 Alternatives to Passwords • Biometric: Fingerprints, retinal scans, keystroke rhythm • Picture password in Windows User makes three gestures over a photo Asking user to name people in group photo or provide facts about people in photo • One defect: If user’s authentication compromised once, it is compromised for all sites where that authentication method used Copyright © 2015 Pearson Education, Inc 12-42 Fast Identity OnLine (FIDO) Copyright © 2015 Pearson Education, Inc 12-43 Will You Trust FIDO? Probably • FIDO does not eliminate need to send private data over the Internet, but substantially reduces it • Password or PIN never sent over a network • Forming open standards and asking the community to find holes and problems long before standard is implemented • Support of major, well-funded organizations Copyright © 2015 Pearson Education, Inc 12-44 12-45 ... Inc 12- 15 Ponemon 2 012 Studies Summary • • • • Median cost of computer crime increasing Malicious insiders increasingly serious security threat Data loss is principal cost of computer crime Survey... Attacks by Type (5 Most Expensive Types) Copyright © 2015 Pearson Education, Inc 12- 14 Ponemon Study Findings (2 012) • It is difficult to estimate the exact cost of a computer crime • Cost of computer... Education, Inc 12- 12 Q2: How Big Is the Computer Security Problem? Computer Crime Costs per Organizational Respondent Copyright © 2015 Pearson Education, Inc 12- 13 Average Computer Crime Cost and

Ngày đăng: 17/01/2018, 16:33

Xem thêm:

Mục lục

    PRIDE Design for Security

    Q1: What Is the Goal of Information Systems Security?

    Examples of Threat/ Loss

    What Are the Sources of Threats?

    What Types of Security Loss Exists?

    Goal of Information Systems Security

    Q2: How Big Is the Computer Security Problem?

    Q3: How Should You Respond to Security Threats?

    Q4: How Should Organizations Respond to Security Threats?

    Security Policy Should Stipulate

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN