1 of 49

Experiencing M I S

Tenth Edition

Chapter 10

Information Systems Security

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

2 of 49

“I Think You’ll See That We Really Do Take Security Seriously.” (1 of 2)

  • Video conference with C I O of Tampa General Hospital (potential iMed Analytics partner).
  • Security concerns about integrating iMed Analytics with Tampa General’s internal information systems.
  • Does iMed Analytics have acceptable levels of security? Should an external system be allowed to access medical data and protected systems that Tampa General has worked hard to secure?
  • Can the system get hacked? Damage their systems? Medical data stolen?

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

3 of 49

“I Think You’ll See That We Really Do Take Security Seriously.” (2 of 2)

  • Does iMed Analytics include secure coding practices to protect patient data?
  • iMed Analytics implements secure coding practices and secure data connections and backend storage.
  • Parameterization is used to sanitize data coming into the system from IoT medical devices or external data stores.
  • Users interact with radio buttons, dropdown menus, and other interactive elements.
  • Reduces the possibility of an S Q L injection attack.
  • New technology typically brings new risks.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

4 of 49

Study Questions

10.1 What is the goal of information systems security?

10.2 How big is the computer security problem?

10.3 How should you respond to security threats?

10.4 How should organizations respond to security threats?

10.5 How can technical safeguards protect against security threats?

10.6 How can data safeguards protect against security threats?

10.7 How can human safeguards protect against security threats?

10.8 How should organizations respond to security incidents?

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

5 of 49

Information Systems Security Threats

10.1 What is the goal of information systems security?

Figure 10.1 Threat/Loss Scenario

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

6 of 49

Examples of Threat/Loss

10.1 What is the goal of information systems security?

Figure 10.2 Examples of Threat/Loss

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

7 of 49

What are the Sources of Threats?

10.1 What is the goal of information systems security?

Figure 10.3 Security Problems and Sources

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

8 of 49

What Types of Security Loss Exists?

10.1 What is the goal of information systems security?

  • Unauthorized Data Disclosure
    • Pretexting
    • Phishing
    • Spoofing
    • Sniffing
    • Hacking
    • Natural disasters

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

9 of 49

Incorrect Data Modification

10.1 What is the goal of information systems security?

  • Procedures incorrectly designed or not followed.
  • Increasing customer’s discount or incorrectly modifying employee’s salary.
  • Placing incorrect data on company Web site.
  • Cause
    • Improper internal controls on systems.
    • System errors.
    • Faulty recovery actions after a disaster.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

10 of 49

Faulty Service

10.1 What is the goal of information systems security?

  • Problems from incorrect system operation.
    • Incorrect data modification
    • Systems working incorrectly
    • Procedural mistakes
    • Programming errors
    • I T installation errors
    • Usurpation
    • Denial of service (unintentional)
    • Denial-of-service attacks (intentional)

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

11 of 49

Denial of Service

10.1 What is the goal of information systems security?

  • Denial of service (unintentional)
    • Human error in following procedures (or lack of procedures) results in Web server shutdowns
    • Starting a computationally intensive application can prevent normal operations from taking place
  • Denial-of-service attacks (intentional)
    • Malicious outsider floods a Web server with millions of bogus service requests so that normal requests cannot be processed
  • Natural disasters can cause systems to fail

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

12 of 49

Loss of Infrastructure

10.1 What is the goal of information systems security?

  • Human accidents
  • Theft and terrorist events
  • Disgruntled or terminated employee
  • Natural disasters
  • Advanced Persistent Threat
    • A P T 41 (Double Dragon) (China)
    • Targeting healthcare and technology companies
    • Focuses on hacking supply chains, cryptocurrency manipulation, intelligence gathering, injecting malware into legitimate software updates

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

13 of 49

Goal of Information Systems Security

10.1 What is the goal of information systems security?

  • Find appropriate trade-off between risk of loss and cost of implementing safeguards.
  • Protective actions.
    • Use antivirus software.
    • Delete browser cookies?
    • Make appropriate trade-offs to protect yourself and your business.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

14 of 49

Computer Crime Attacks: Percent of Attacks by Type

10.2 How big is the computer security problem?

Figure 10.4 Percent of Companies Experiencing Attacks by Attack Type

Source: Based on Accenture, The Cost of Cyber Crime Study, March 2021.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

15 of 49

Costs of Computer Crime by Attack Type

10.2 How big is the computer security problem?

Figure 10.5 Average Annual Computer Crime Costs by Attack Type

Source: Based on I B M, Cost of a Data Breach Report, April 2020.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

16 of 49

Cost of the Consequences of Attack

10.2 How big is the computer security problem?

Figure 10.6 Data Breach Costs by Category

Source: Based on I B M, Cost of a Data Breach Report, April 2020.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

17 of 49

Accenture Study Findings (2019)

10.2 How big is the computer security problem?

  • Credential attacks and cloud misconfigurations are serious security threats.
  • Business disruption is a major cost of computer crime.
  • Security safeguards work.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

18 of 49

Personal Security Safeguards

10.3 How should you respond to security threats?

Figure 10.7 Personal Security Safeguards

  • Take security seriously
  • Create strong passwords
  • Use multiple passwords
  • Send no valuable data via email or I M
  • Use https at trusted, reputable vendors
  • Remove high-value assets from computers
  • Clear browsing history, temporary files, and cookies (CCleaner or equivalent)
  • Regularly update antivirus software
  • Demonstrate security concern to your fellow workers
  • Follow organizational security directives and guidelines
  • Consider security for all business initiatives

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

19 of 49

Security Policies

10.4 How should organizations respond to security threats?

  • Senior management creates company-wide policies:
    • What sensitive data will be stored?
    • How will that data be processed?
    • Will data be shared with other organizations?
    • How can employees and others obtain copies of data stored about them?
    • How can employees and others request changes to inaccurate data?
  • Senior management manages risks.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

20 of 49

Security Safeguards and the Five Components

10.4 How should organizations respond to security threats?

Figure 10.8 Security Safeguards as They Relate to the Five Components

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

21 of 49

Technical Safeguards

10.5 How can technical safeguards protect against security threats?

Figure 10.9 Technical Safeguards

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

22 of 49

The Essence of h t t p s (S S L or T L S)

10.5 How can technical safeguards protect against security threats?

Figure 10.10 The Essence of https (S S L or T L S)

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

23 of 49

Use of Multiple Firewalls

10.5 How can technical safeguards protect against security threats?

Figure 10.11 Use of Multiple Firewalls

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

24 of 49

Malware Protection (Viruses, Spyware, Adware)

10.5 How can technical safeguards protect against security threats?

  1. Install antivirus and antispyware programs.
  2. Scan frequently.
  3. Update malware definitions.
  4. Open email attachments only from known sources.
  5. Install software updates promptly.
  6. Browse only reputable Internet neighborhoods.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

25 of 49

Types of Malware and Spyware/Adware Symptoms

10.5 How can technical safeguards protect against security threats?

  • Malware
    • Viruses
      • Payload
    • Trojan horses
    • Worms
    • Spyware
      • Keyloggers
    • Adware
    • Ransomware

Figure 10.12 Spyware and Adware Symptoms

  • Slow system startup
  • Sluggish system performance
  • Many pop-up advertisements
  • Suspicious browser homepage changes
  • Suspicious changes to the taskbar and other system interfaces
  • Unusual hard-disk activity

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

26 of 49

Design for Secure Applications

10.5 How can technical safeguards protect against security threats?

  • S Q L injection attack
    • User enters S Q L statement into a form instead of a name or other data.
    • Result
      • S Q L code becomes part of database commands issued.
      • Improper data disclosure, data damage and loss possible.
    • Well designed applications make injections ineffective.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

27 of 49

Data Safeguards

10.6 How can data safeguards protect against security threats?

  • Data safeguards
  • Data administration
  • Database administration
  • Key escrow

Figure 10.13 Data Safeguards

  • Define data policies
  • Data rights and responsibilities
  • Rights enforced by user accounts authenticated by passwords
  • Data encryption
  • Backup and recovery procedures
  • Physical security

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

28 of 49

Legal Safeguards for Data

10.6 How can data safeguards protect against security threats?

  • Legal standards specify safeguards organizations must follow regarding data collected and stored
  • Payment Card Industry Data Security Standard (P C I D S S)
    • Specifies secure storage and processing requirements for credit card data
    • Gramm-Leach-Bliley Act (G L B A)—protections for consumer financial data stored by financial institutions
    • Health Insurance Portability and Accountability Act (H I P P A)—standards that govern health data access and protection.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

29 of 49

Security Policies for In-House Staff (1 of 2)

10.7 How can human safeguards protect against security threats?

  • Position definition
    • Separate duties and authorities
    • Determine least privilege
    • Document position sensitivity
  • Hiring and screening

Figure 10.14 Security Policy for In-House Staff (continues on next slide)

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

30 of 49

Security Policies for In-House Staff (2 of 2)

10.7 How can human safeguards protect against security threats?

  • Dissemination and enforcement
    • Responsibility
    • Accountability
    • Compliance
  • Termination
    • Friendly
    • Unfriendly

Figure 10.14 Security Policy for In-House Staff (continues on next slide)

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

31 of 49

Human Safeguards for Nonemployee Personnel

10.7 How can human safeguards protect against security threats?

  • Temporary personnel, vendors, partner personnel (employees of business partners), and the public.
  • Require vendors and partners to perform appropriate screening and security training.
  • Contract specifies security responsibilities.
  • Provide accounts and passwords with least privilege and remove accounts as soon as possible.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

32 of 49

Public User Considerations

10.7 How can human safeguards protect against security threats?

  • Public users of Web sites and other openly accessible information systems cannot be held accountable for security violations.
    • Hardening—reduce the system’s vulnerabilities
      • Special versions of operating system.
      • Lock down or eliminate operating systems features and functions not required by application.
    • Protect such users from internal company security problems.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

33 of 49

Account Administration

10.7 How can human safeguards protect against security threats?

  • Account Management
    • Standards for new user accounts, modification of account permissions, removal of unneeded accounts.
  • Password Management
    • Users change passwords frequently.
  • Help Desk Policies
    • Provide means of authenticating users.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

34 of 49

Sample Account Acknowledgement Form

10.7 How can human safeguards protect against security threats?

Figure 10.15 Sample Account Acknowledgement Form

I hereby acknowledge personal receipt of the system password(s) associated with the user IDs listed below. I understand that I am responsible for protecting the password(s), will comply with all applicable system security standards, and will not divulge my password(s) to any person. I further understand that I must report to the Information Systems Security Officer any problem I encounter in the use of the password(s) or when I have reason to believe that the private nature of my password(s) has been compromised.

Source: National Institute of Standards and Technology, Introduction to Computer Security: The N I S T Handbook, Publication 800–812.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

35 of 49

Systems Procedures

10.7 How can human safeguards protect against security threats?

Figure 10.16 Systems Procedures

Blank

System Users

Operations Personnel

Normal

Operation

Use the system to perform job tasks, with security appropriate to sensitivity.

Operate data center equipment, manage networks, run Web servers, and do related operational tasks.

Backup

Prepare for loss of system functionality.

Back up Website resources, databases, administrative data, account and password data, and other data.

Recovery

Accomplish job tasks during failure. Know tasks to do during system recovery.

Recover systems from backed up data. Perform role of help desk during recovery.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

36 of 49

Security Monitoring (1 of 2)

10.7 How can human safeguards protect against security threats?

  • Server activity logs
    • Firewall log
      • Lists of all dropped packets, infiltration attempts, unauthorized access, attempts from within the firewall.
    • D B M S
      • Successful and failed logins.
    • Web servers
      • Voluminous logs of Web activities.
  • P C O/S produce record of log-ins and firewall activities.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

37 of 49

Security Monitoring (2 of 2)

10.7 How can human safeguards protect against security threats?

  • Employ utilities to assess vulnerabilities.
  • Honeypots for computer criminals to attack.
  • Investigate security incidents.
  • Constantly monitor to determine adequacy of existing security policy and safeguards.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

38 of 49

Factors in Incident Response

10.8 How should organizations respond to security incidents?

Figure 10.17 Factors in Incident Response

  • Have plan in place
  • Centralized reporting
  • Specific responses
    • Speed
    • Preparation pays
    • Don’t make problem worse
  • Practice

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

39 of 49

How Does the Knowledge in This Chapter Help You?

  • Awareness of:
    • Threats to computer security as an individual, business professional, employer
    • Risk trade offs
    • Technical, data, human safeguards to protect computing devices and data
    • How organizations should respond to security threats
    • How organizations should respond to security incidents
    • Importance of creating and using strong passwords!

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

40 of 49

New from Black Hat

So What?

  • Deepfakes: high-fidelity photos or videos created using powerful artificial intelligence and machine learning technologies in which the likeness of one individual is replaced by the likeness of another. How to identify deepfakes and protect the integrity of information?
  • Integrations between IoT devices and apps offer many potential vulnerabilities. How to balance easy integration and security?
  • How to provide accurate election results with secure election technology?

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

41 of 49

Using Tech to Mitigate COVID-19 Risks

Security Guide

  • Organizations have several tech-oriented options to help reduce risk and promote a safe employee environment:
    • Smartphone apps to track employee movements and interactions with others
    • Thermal cameras to identify employees with a fever
    • Behavioral surveys
  • Do organizations have the right to collect this data?
  • Once the need for COVID-19 monitoring diminishes, will employers stop collecting the employee tracking data?

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

42 of 49

Cyber Systems Engineer

Career Guide

Chris Heywood at Northrop Grumman

Q. What attracted you to this field?

A. “I always thought it would be awesome to know how to break into systems and know how to defend systems from hackers…I decided that I would love to protect myself and others from the malicious intents of hackers and to keep our information safe.”

Q. What advice would you give to someone who is considering working in your field?

A. “Work really hard to understand how information technology works and don’t be afraid to experiment with it. Set up labs and virtual machines to help you understand how networking, system administration, and cybersecurity work. Apply the things that you learn in classes and get as much practical experience as you can..”

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

43 of 49

White Hat, Blackballed

Ethics Guide

  • Understand how and why customers make purchase decisions, then customize the site for each visitor to increase purchases.
  • Web sites are now storing and analyzing everything that visitors do on the site—not just pages they visit or the products that they add to a shopping cart, but all of the mouse movements, keystrokes, and scrolling behavior, too.
    • Researchers can analyze mouse movement to uncover emotion.
  • Could be sold to 3rd party.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

44 of 49

Active Review

10.1 What is the goal of information systems security?

10.2 How big is the computer security problem?

10.3 How should you respond to security threats?

10.4 How should organizations respond to security threats?

10.5 How can technical safeguards protect against security threats?

10.6 How can data safeguards protect against security threats?

10.7 How can human safeguards protect against security threats?

10.8 How should organizations respond to security incidents?

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

45 of 49

CrowdStrike

Case Study 10

  • Lost 40 million credit and debit card numbers.
  • Later, announced additional 70 million customer accounts stolen that included names, emails, addresses, phone numbers, etc.
  • 98 million customers affected.
    • 31% of 318 million people in U.S.
  • Stolen from point-of-sale (P O S) systems at Target stores during holiday shopping season.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

46 of 49

How Did They Do It?

Case Study 10

  1. Bought malware
  2. Spear-phished users at Fazio to get login credentials on Target vendor server.
  3. Attackers escalated privileges, accessed Target’s internal network, and planted malware.
  4. Trojan.P O S R A M extracted data from P O S terminals.
  5. Sent data to drop servers

Figure 10.18 Target Data Breach

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

47 of 49

Damage (1 of 2)

Case Study 10

  • Card and pin numbers of 2 million cards for $26.85 each ($53.7M).
  • Costs
    • Upgraded P O S terminals to support chip-and-pin cards,
    • Increased insurance premiums,
    • Paid legal fees,
    • Settled with credit card processors,
    • Paid consumer credit monitoring,
    • Paid regulatory fines.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

48 of 49

Damage (2 of 2)

Case Study 10

  • Loss of customer confidence and drop in revenues (46% loss for quarter).
  • Direct loss to Target as high as $450 million.
  • C I O resigned, C E O paid $16 million to leave.
  • Cost credit unions and banks more than $200 million to issue new cards.
  • Insurers demand higher premiums, stricter controls, and more system auditing.
  • Consumers must watch their credit card statements, and fill out paperwork if fraudulent charges appear.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved

49 of 49

Copyright

This work is protected by United States copyright laws and is provided solely for the use of instructors in teaching their courses and assessing student learning. Dissemination or sale of any part of this work (including on the World Wide Web) will destroy the integrity of the work and is not permitted. The work and materials from it should never be made available to students except by instructors using the accompanying text in their classes. All recipients of this work are expected to abide by these restrictions and to honor the intended pedagogical purposes and the needs of other instructors who rely on these materials.

Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved