Chapter 6 - Information Systems Security

Info Security Life Cycle

•  Systems Planning – Tone at top

•  System Analysis - Analyze system vulnerabilities (threats & loss exposure)

• 

•  Systems Design – Design security measures & contingency plans

•  Systems Implementation – Implement security measures & contingency plans

•  Systems Operation, Evaluation & Control - Operate system & assess effectiveness & efficiency. Make changes as needed

Analyzing Vulnerabilities & Threats

•  Quantitative Approach

•  Qualitative Approach

consider......

–  business interruption

–  loss of software or hardware

–  loss of data

–  loss of facilities

–  loss of personnel

–  loss of customers / negative publicity!!!!!!!

•  Vulnerability - weakness in a system

•  Threat - potential exploitation of a vulnerability

–  Active Threats - Fraud and Computer Sabotage

–  Passive Threats -

•  System Faults (component equipment failures (disk failures, power outages))
•  Natural Disasters (earthquakes, floods, fires, hurricanes)

This is serious.....

•  Computer-based crimes are part of the general problem of white collar crime

–  fraud and embezzlement exceed losses from bribery, burglary, and shoplifting

Who to watch out for....it could be anyone!!!

•  Computer systems personnel

–  Computer maintenance personnel

–  Programmers

–  Network Operators

–  Information Systems Management

–  Data Control Clerks

•  Users

•  Intruders & Hackers (unnoticed intruders, wiretappers, piggy backers, impersonating intruders, eavesdroppers)

Control Environment (the foundation for overall control)

•  Mgt Philosophy & Operating Style

•  Org. Structure

•  Board of Directors and Committee

•  Mgt Control Activities

•  Internal Audit Function

•  Personnel Policies & Practices

•  External Influences

What are Active Threats?

•  Input Manipulation - the easiest & most common

•  Program Alteration (trap door)

•  Direct File Alteration

•  Data Theft

•  Sabotage

–  Logic bomb

–  Trojan horse

–  Virus program

–  Worm

•  Misappropriation /Theft of Info Resources

Computer Virus

•  A computer program that alters the performance of the system or its computer files

–  Computer virus detection programs are one guard against this

Controls for Active Threats

•  Use the layered look (layered approach to access control)

•  1st - classify data (according to importance & vulnerability)

•  Site Access Controls (badges, biometric hardware authentication)

•  System Access Controls (User ID & Passwords)

•  File Access Controls (data & program files)

AUTHENTICATE

•  Make sure something is what it is - Potential users are valid

•  Biometrics – fingerprints, retina eye patterns, signatures, voice recognition.

•  PINs

•  ID or plastic cards

PASSWORDS

•  1st line of defense!

•  Easy to remember but hard to guess

•  Combines Alpha & Numeric

•  Which of the following would be most common? Now which is best?

–  CATDOG

–  12345678

–  BUSTER

–  GGGG1234

–  GR1267JE

•  Typical Passwords – are static (stay the same – at least for 30 days or so)

•  TOKEN “Smart” cards – dynamic password – one-time only (strongest protection against unauthorized access to a network

Controls for Passive Threats

•  Fault-Tolerant Systems

–  monitoring & redundancy

Network communications (dup. Communication paths)

CPU processors (watchdog processor)

DASDs (read-after-write checks, bad-sector lockouts, disk mirroring or shadowing)

power supply (uninterruptible power supply (UPS))

individual transactions (rollback processing / database shadowing)

•  Correcting Faults: File Back-ups

(Over 50% of individuals do not properly back-up their files)

full back up, incremental or differential back up

Internet Security

•  Intranets

•  Firewalls

•  Reject incoming packets of data that do not originate from pre-approved IP addresses

•  Encryption

Encryption

•  Encryption is the transformation of input data (referred to as plain text or cleartext) it cipher text using a cryptographic technique

•  Secret-Key Encryption - A single private key is used of both encryption and decryption. The DES (data encryption standard) is probably the most widely used private-key encryption algorithm

•  Public Key Encryption - 2 keys -- public key that everyone knows, and a private key that only one person knows. Each key unlocks the code that the other makes. RSA is a well-known public-key encryption

•  Double-Key Encryption - Uses elements of bother private-key & public-key encryption

Disaster Risk Management

•  Preventing Disasters

•  Contingency Planning

–  Disaster Recovery & Business Resumption

–  Assess Critical Needs

•  List Priorities for Recovery

Recovery Strategies & Procedures

•  Emergency Response Center

•  Escalation Procedures

•  Alternate Processing Arrangements

–  hot site (dedicated contingency facility)

–  warm site

–  cold site (empty shell)

–  service bureau (may be good for small companies) - Comdisco

–  Shared contingency agreement / reciprocal disaster agreement

•  Personal Relocation / Replacement

•  Salvage Plan

•  Testing & Maintaining the System

Seg. of Duties in Data Processing

•  Systems Analysts

•  Database Administrators

•  Programmers

•  Computer Operators

•  Librarian

•  Data Control Group

•  Most critical – separate developing applications from those operating apps – WHY???

Chapter 6 – Information Security Page 3 of 5