Experiencing M I S
Tenth Edition
Chapter 10
Information Systems Security
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
“I Think You’ll See That We Really Do Take Security Seriously.” (1 of 2)
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
“I Think You’ll See That We Really Do Take Security Seriously.” (2 of 2)
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Study Questions
10.1 What is the goal of information systems security?
10.2 How big is the computer security problem?
10.3 How should you respond to security threats?
10.4 How should organizations respond to security threats?
10.5 How can technical safeguards protect against security threats?
10.6 How can data safeguards protect against security threats?
10.7 How can human safeguards protect against security threats?
10.8 How should organizations respond to security incidents?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Information Systems Security Threats
10.1 What is the goal of information systems security?
Figure 10.1 Threat/Loss Scenario
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Examples of Threat/Loss
10.1 What is the goal of information systems security?
Figure 10.2 Examples of Threat/Loss
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
What are the Sources of Threats?
10.1 What is the goal of information systems security?
Figure 10.3 Security Problems and Sources
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
What Types of Security Loss Exists?
10.1 What is the goal of information systems security?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Incorrect Data Modification
10.1 What is the goal of information systems security?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Faulty Service
10.1 What is the goal of information systems security?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Denial of Service
10.1 What is the goal of information systems security?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Loss of Infrastructure
10.1 What is the goal of information systems security?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Goal of Information Systems Security
10.1 What is the goal of information systems security?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Computer Crime Attacks: Percent of Attacks by Type
10.2 How big is the computer security problem?
Figure 10.4 Percent of Companies Experiencing Attacks by Attack Type
Source: Based on Accenture, The Cost of Cyber Crime Study, March 2021.
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Costs of Computer Crime by Attack Type
10.2 How big is the computer security problem?
Figure 10.5 Average Annual Computer Crime Costs by Attack Type
Source: Based on I B M, Cost of a Data Breach Report, April 2020.
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Cost of the Consequences of Attack
10.2 How big is the computer security problem?
Figure 10.6 Data Breach Costs by Category
Source: Based on I B M, Cost of a Data Breach Report, April 2020.
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Accenture Study Findings (2019)
10.2 How big is the computer security problem?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Personal Security Safeguards
10.3 How should you respond to security threats?
Figure 10.7 Personal Security Safeguards
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Security Policies
10.4 How should organizations respond to security threats?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Security Safeguards and the Five Components
10.4 How should organizations respond to security threats?
Figure 10.8 Security Safeguards as They Relate to the Five Components
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Technical Safeguards
10.5 How can technical safeguards protect against security threats?
Figure 10.9 Technical Safeguards
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
The Essence of h t t p s (S S L or T L S)
10.5 How can technical safeguards protect against security threats?
Figure 10.10 The Essence of https (S S L or T L S)
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Use of Multiple Firewalls
10.5 How can technical safeguards protect against security threats?
Figure 10.11 Use of Multiple Firewalls
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Malware Protection (Viruses, Spyware, Adware)
10.5 How can technical safeguards protect against security threats?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Types of Malware and Spyware/Adware Symptoms
10.5 How can technical safeguards protect against security threats?
Figure 10.12 Spyware and Adware Symptoms
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Design for Secure Applications
10.5 How can technical safeguards protect against security threats?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Data Safeguards
10.6 How can data safeguards protect against security threats?
Figure 10.13 Data Safeguards
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Legal Safeguards for Data
10.6 How can data safeguards protect against security threats?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Security Policies for In-House Staff (1 of 2)
10.7 How can human safeguards protect against security threats?
Figure 10.14 Security Policy for In-House Staff (continues on next slide)
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Security Policies for In-House Staff (2 of 2)
10.7 How can human safeguards protect against security threats?
Figure 10.14 Security Policy for In-House Staff (continues on next slide)
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Human Safeguards for Nonemployee Personnel
10.7 How can human safeguards protect against security threats?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Public User Considerations
10.7 How can human safeguards protect against security threats?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Account Administration
10.7 How can human safeguards protect against security threats?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Sample Account Acknowledgement Form
10.7 How can human safeguards protect against security threats?
Figure 10.15 Sample Account Acknowledgement Form
I hereby acknowledge personal receipt of the system password(s) associated with the user IDs listed below. I understand that I am responsible for protecting the password(s), will comply with all applicable system security standards, and will not divulge my password(s) to any person. I further understand that I must report to the Information Systems Security Officer any problem I encounter in the use of the password(s) or when I have reason to believe that the private nature of my password(s) has been compromised.
Source: National Institute of Standards and Technology, Introduction to Computer Security: The N I S T Handbook, Publication 800–812.
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Systems Procedures
10.7 How can human safeguards protect against security threats?
Figure 10.16 Systems Procedures
Blank | System Users | Operations Personnel |
Normal Operation | Use the system to perform job tasks, with security appropriate to sensitivity. | Operate data center equipment, manage networks, run Web servers, and do related operational tasks. |
Backup | Prepare for loss of system functionality. | Back up Website resources, databases, administrative data, account and password data, and other data. |
Recovery | Accomplish job tasks during failure. Know tasks to do during system recovery. | Recover systems from backed up data. Perform role of help desk during recovery. |
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Security Monitoring (1 of 2)
10.7 How can human safeguards protect against security threats?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Security Monitoring (2 of 2)
10.7 How can human safeguards protect against security threats?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Factors in Incident Response
10.8 How should organizations respond to security incidents?
Figure 10.17 Factors in Incident Response
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
How Does the Knowledge in This Chapter Help You?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
New from Black Hat
So What?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Using Tech to Mitigate COVID-19 Risks
Security Guide
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Cyber Systems Engineer
Career Guide
Chris Heywood at Northrop Grumman
Q. What attracted you to this field?
A. “I always thought it would be awesome to know how to break into systems and know how to defend systems from hackers…I decided that I would love to protect myself and others from the malicious intents of hackers and to keep our information safe.”
Q. What advice would you give to someone who is considering working in your field?
A. “Work really hard to understand how information technology works and don’t be afraid to experiment with it. Set up labs and virtual machines to help you understand how networking, system administration, and cybersecurity work. Apply the things that you learn in classes and get as much practical experience as you can..”
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
White Hat, Blackballed
Ethics Guide
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Active Review
10.1 What is the goal of information systems security?
10.2 How big is the computer security problem?
10.3 How should you respond to security threats?
10.4 How should organizations respond to security threats?
10.5 How can technical safeguards protect against security threats?
10.6 How can data safeguards protect against security threats?
10.7 How can human safeguards protect against security threats?
10.8 How should organizations respond to security incidents?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
CrowdStrike
Case Study 10
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
How Did They Do It?
Case Study 10
Figure 10.18 Target Data Breach
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Damage (1 of 2)
Case Study 10
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Damage (2 of 2)
Case Study 10
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Copyright
This work is protected by United States copyright laws and is provided solely for the use of instructors in teaching their courses and assessing student learning. Dissemination or sale of any part of this work (including on the World Wide Web) will destroy the integrity of the work and is not permitted. The work and materials from it should never be made available to students except by instructors using the accompanying text in their classes. All recipients of this work are expected to abide by these restrictions and to honor the intended pedagogical purposes and the needs of other instructors who rely on these materials.
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved