尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Information Security
Management
Threats to Information
Security and what we
can do about it
Before we start our Conversation…
Ordering a Pizza?
What are the threats to information security?
• In order to adequately
protect information
resources, managers must
be aware of the sources of
threats to those resources,
the types of security
problems the threats
present, and how to
safeguard against both. The
three most common
sources of threats are:
– Human error and
mistakes
– Malicious human
activity
– Natural events and
disasters.
• Human error and mistakes stem from
employees and nonemployees.
– They may misunderstand operating procedures and
inadvertently cause data to be deleted.
– Poorly written application programs and poorly
designed procedures may allow employees to enter
data incorrectly or misuse the system.
– Employees may make physical mistakes like
unplugging a piece of hardware that causes the
system to crash.
Human Threats
• Malicious human
activity results from
employees, former
employees, and hackers
who intentionally
destroy data or system
components. These
actions include:
• Breaking into systems
with the intent of
stealing, altering or
destroying data.
• Introducing viruses
and worms into a
system.
• Acts of terrorism.
Natural Events and Disasters
• The last source of threats to information security are
those caused by natural events and disasters. These
threats pose problems stemming not just from the
initial loss of capability and service but also problems a
company may experience as it recovers from the initial
problem. They include:
• Fires
• Floods
• Hurricanes
• Earthquakes
and
• Other acts of nature
 This chart shows some of the security problems a company may
experience and the possible sources of the problems.
What are unauthorized data disclosure
threats?
• For example, a new university dept.
administrator posts student names, numbers,
and grades in a public place.
• Or, an employee unknowingly posts restricted
data on a company website that can be
reached by search engines over the Web.
Malicious unauthorized data disclosure threats
• Pre-texting: when
someone deceives by
pretending to be someone
else
• Phishing: the phisher
pretends to be a legitimate
company and sends an
email requesting
confidential data such as
account numbers, social
security numbers,
passwords, and so forth.
• Spoofing: is pretending to be
someone else. Email spoofing
is a synonym for phishing
• Sniffing: is a technique for intercepting computer
communications.
• With wireless networks, drive-by sniffers simply
take computers with wireless connections through
an area and search for unprotected wireless
networks.
• They can monitor and intercept wireless traffic at
will.
• There are three components of a sound
organizational security program:
1. Senior management must establish a security policy
and manage risks.
2. Safeguards of various kinds must be established for
all five components of an IS as the figure on the next
slide demonstrates.
3. The organization must plan its incident response
before any problems occur.
Security Safeguards as They Relate to the Five
Components
What is senior management’s security role?
 The NIST Handbook of Security Elements lists the necessary elements of
an effective security program as this figure shows.
*National Institute of Standards and technology
• Senior managers should ensure their
organization has an effective security policy that
includes these elements:
1. A general statement of the organization’s security
program
2. Issue-specific policies like personal use of email and
the Internet
3. System-specific policies that ensure the company is
complying with laws and regulations.
• Senior managers must also manage risks
associated with information systems security
1. Risk is the likelihood of an adverse occurrence.
2. You can reduce risk but always at a cost. The
amount of money you spend on security
influences the amount of risk you must assume.
3. Uncertainty is defined as the things we do not
know that we do not know
Senior Managements Security Role
 When you’re
assessing risks to
an information
system you must
first determine:
 What the threats are
 How likely they are to
occur
 The consequences if
they occur
Fig 12-4 Risk Assessment Factors
 When you’re assessing risks to an information system you must first determine:
 What the threats are.
 How likely they are to occur.
 The consequences if they occur.
 The figure below lists the factors you should include in a risk assessment.
 Once you’ve assessed the risks to your information system, you must make
decisions about how much security you want to pay for. Each decision carries
consequences.
 Some risk is easy and inexpensive.
 Some risk is expensive and difficult.
 Managers have a fiduciary
responsibility to the organization
to adequately manage risk.
What technical safeguards are
available?
 You can establish five technical
safeguards for the hardware and
software components of an
information system as the figure
on the next slide shows.
– Identification and
authentication includes
– passwords (what you
know),
– smart cards (what you
have), and
– biometric authentication
(what you are).
 Since users must access
many different systems, it’s
often more secure, and
easier, to establish a single
sign-on for multiple
systems.
Security Layers We’ll Discuss!
What’s Encryption?
• The process of changing original text to a
secret message using cryptography
• Cryptography is the science of transforming
information so that it is secure while it is being
transmitted or stored
Firewalls
• Firewalls, the third technical safeguard, should
be installed and used with every computer
that’s connected to any network, especially
the Internet.
• Firewalls can be hardware or software, used
independently of each other or used together
Perimeter & Internal Firewalls
– The diagram shows how
perimeter and internal
firewalls are special
devices that help protect
a network.
– Packet-filtering firewalls
are programs on
general-purpose
computers or on routers
that examine each
packet entering the
network
Act as a gateway
to the network
Malware Protection
• Malware Protection is
the fourth technical
safeguard. We’ll
concentrate on spyware
and adware here.
– Spyware are programs that
may be installed on your
computer without your
knowledge or permission.
– Adware is a benign
program that’s also
installed without your
permission. It resides in
your computer’s
background and
observes your behavior.
• If your computer displays
any of the symptoms in this
figure, you may have one of
these types of malware on
your computer.
safeguard your computer against
malware:
– Install antivirus and antispyware programs.
– Scan your computer frequently for malware.
– Update malware definitions often or use an automatic update
process.
– Open email attachments only from known sources and even then be
wary.
– Promptly install software updates from legitimate sources like
Microsoft for your operating system or McAfee for your spyware
programs.
– Browse only in reputable Internet neighborhoods. Malware is often
associated with rogue Web sites.
What data safeguards are available?
 To protect databases and other data sources, an organization should
follow the safeguards listed in this figure.
 Remember, data and the information from it are one of the most
important resources an organization has.
What human safeguards are available?
• Human safeguards
for employees are
some of the most
important safeguards
an organization can
deploy.
• They should be
coupled with
effective procedures
to help protect
information systems.
• An organization needs human safeguards for
nonemployees whether they are temporary employees,
vendors, business partners, or the public. Here are a few
suggestions:
– Ensure any contracts between the organization and other
workers include security policies. Third-party employees should
be screened and trained the same as direct employees.
– Web sites used by third-party employees and the public should
be hardened against misuse or abuse.
– Protect outside users from internal security problems. If your
system gets infected with a virus, you should not pass it on to
others.
Account Administration
• Account administration is the third type of
human safeguard and has three components
—account management, password
management, and help-desk policies.
– Account management focuses on
• Establishing new accounts
• Modifying existing accounts
• Terminating unnecessary accounts.
More Human Safeguards
 Password management
requires that users
 Immediately change newly
created passwords
 Change passwords periodically
 Sign an account acknowledgment
form like the one in this figure.
Fig 12-13 Sample Account Acknowledgement Form
– Help-desks have been a source of problems for
account administration because of the inherent
nature of their work.
• It is difficult for the help-desk to determine exactly with
whom they’re speaking. Users call up for a new password
without the help-desk having a method of definitively
identifying who is on the other end of the line.
• There must be policies in place to provide ways of
authenticating users like asking questions only the user
would know the answers to.
• Users have a responsibility to help the help-desk by
responsibly controlling their passwords.
• Effective system procedures can help increase security and reduce
the likelihood of computer crime. As this figure shows, procedures
should exist for both system users and operations personnel that
cover normal, backup, and recovery procedures.
Fig 12-14 Systems Procedures Security monitoring is
the last human
safeguard. It includes:
 Activity log analyses
 Security testing
 Investigating and
learning from security
incidents.
How should organizations respond to security
incidents?
• No system is fail-proof. Every organization must have
an effective plan for dealing with a loss of computing
systems. This figure describes disaster preparedness
tasks for every organization, large and small. The last
item that suggests an organization train and rehearse
its disaster preparedness plans is very important.
What is the extent of computer crime?
• The full extent of computer crime is unknown.
There is no national census because many
organizations are reluctant to report losses for
fear of alienating customers, suppliers, and
business partners. dollar loss.

More Related Content

What's hot

Asset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & ControlAsset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & Control
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
information security management
information security managementinformation security management
information security management
Gurpreetkaur838
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
Ali Habeeb
 
Information security management system
Information security management systemInformation security management system
Information security management system
Arani Srinivasan
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
jayashri kolekar
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
Mohamed Loey
 
Security risk management
Security risk managementSecurity risk management
Security risk management
G Prachi
 
Information security
Information securityInformation security
Information security
avinashbalakrishnan2
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
Vaughan Olufemi ACIB, AICEN, ANIM
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1
MLG College of Learning, Inc
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
CAS
 
12 security policies
12 security policies12 security policies
12 security policies
Saqib Raza
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
Sachin Darekar
 
Information risk management
Information risk managementInformation risk management
Information risk management
Akash Saraswat
 
Security threats
Security threatsSecurity threats
Security threats
Qamar Farooq
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
Dhani Ahmad
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
PECB
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Sam Bowne
 

What's hot (20)

Asset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & ControlAsset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & Control
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
information security management
information security managementinformation security management
information security management
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Information security
Information securityInformation security
Information security
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
12 security policies
12 security policies12 security policies
12 security policies
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Information risk management
Information risk managementInformation risk management
Information risk management
 
Security threats
Security threatsSecurity threats
Security threats
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 

Viewers also liked

Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
ControlCase
 
Prosedur selamatkan diri daripada kebakaran bangunan
Prosedur selamatkan diri daripada kebakaran bangunanProsedur selamatkan diri daripada kebakaran bangunan
Prosedur selamatkan diri daripada kebakaran bangunanSabri Khalizasabarifayuim
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101
Jerod Brennen
 
Evolution of Security Management
Evolution of Security ManagementEvolution of Security Management
Evolution of Security Management
Christophe Briguet
 
Kertas kerja & Lampiran surat latihan kebakaran bersama bomba SKST 2016
Kertas kerja & Lampiran surat latihan kebakaran bersama bomba SKST 2016Kertas kerja & Lampiran surat latihan kebakaran bersama bomba SKST 2016
Kertas kerja & Lampiran surat latihan kebakaran bersama bomba SKST 2016
Rosdi Ramli
 
Pengenalan kebakaran dan tindakan (Asnan Alias)
Pengenalan kebakaran dan tindakan (Asnan Alias)Pengenalan kebakaran dan tindakan (Asnan Alias)
Pengenalan kebakaran dan tindakan (Asnan Alias)
Asnan Alias Enterprise
 
Fire drill sekolah
Fire drill sekolahFire drill sekolah
Fire drill sekolah
Amimah Yusoff
 
Sistem pencegah kebakaran
Sistem pencegah kebakaranSistem pencegah kebakaran
Sistem pencegah kebakaran
UTHM
 

Viewers also liked (8)

Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
Prosedur selamatkan diri daripada kebakaran bangunan
Prosedur selamatkan diri daripada kebakaran bangunanProsedur selamatkan diri daripada kebakaran bangunan
Prosedur selamatkan diri daripada kebakaran bangunan
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101
 
Evolution of Security Management
Evolution of Security ManagementEvolution of Security Management
Evolution of Security Management
 
Kertas kerja & Lampiran surat latihan kebakaran bersama bomba SKST 2016
Kertas kerja & Lampiran surat latihan kebakaran bersama bomba SKST 2016Kertas kerja & Lampiran surat latihan kebakaran bersama bomba SKST 2016
Kertas kerja & Lampiran surat latihan kebakaran bersama bomba SKST 2016
 
Pengenalan kebakaran dan tindakan (Asnan Alias)
Pengenalan kebakaran dan tindakan (Asnan Alias)Pengenalan kebakaran dan tindakan (Asnan Alias)
Pengenalan kebakaran dan tindakan (Asnan Alias)
 
Fire drill sekolah
Fire drill sekolahFire drill sekolah
Fire drill sekolah
 
Sistem pencegah kebakaran
Sistem pencegah kebakaranSistem pencegah kebakaran
Sistem pencegah kebakaran
 

Similar to Information security management

Mis 1
Mis 1Mis 1
Mis 1
Rohit Garg
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
bodo-con
 
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
maqib8373
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfUnit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
SujanTimalsina5
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!
Caroline Johnson
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
David Sweigert
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
Brian Pichman
 
Your Skill Boost Masterclass Online Safety and Cybersecurity Tips
Your Skill Boost Masterclass Online Safety and Cybersecurity TipsYour Skill Boost Masterclass Online Safety and Cybersecurity Tips
Your Skill Boost Masterclass Online Safety and Cybersecurity Tips
Excellence Foundation for South Sudan
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need It
Slick Cyber Systems
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
Acend Corporate Learning
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Accellis Technology Group
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
jondon17
 
Keamanan informasi
Keamanan informasiKeamanan informasi
Keamanan informasi
Nova Novelia
 
Why is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital WorldWhy is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital World
Expeed Software
 
Cyber Security Briefing
Cyber Security BriefingCyber Security Briefing
Cyber Security Briefing
Marshall Frett Jr.
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
Michael O'Phelan
 
I0516064
I0516064I0516064
I0516064
IOSR Journals
 
InformationSecurity.ppt
InformationSecurity.pptInformationSecurity.ppt
InformationSecurity.ppt
AnshikaGoel42
 

Similar to Information security management (20)

Mis 1
Mis 1Mis 1
Mis 1
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdfUnit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
Unit 03 Computer and Internet Crime [5 hrs] v1.2.pdf
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Your Skill Boost Masterclass Online Safety and Cybersecurity Tips
Your Skill Boost Masterclass Online Safety and Cybersecurity TipsYour Skill Boost Masterclass Online Safety and Cybersecurity Tips
Your Skill Boost Masterclass Online Safety and Cybersecurity Tips
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need It
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Keamanan informasi
Keamanan informasiKeamanan informasi
Keamanan informasi
 
Why is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital WorldWhy is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital World
 
Cyber Security Briefing
Cyber Security BriefingCyber Security Briefing
Cyber Security Briefing
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
I0516064
I0516064I0516064
I0516064
 
InformationSecurity.ppt
InformationSecurity.pptInformationSecurity.ppt
InformationSecurity.ppt
 

More from UMaine

Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
UMaine
 
Information systems management
Information systems managementInformation systems management
Information systems management
UMaine
 
Erp case study
Erp case studyErp case study
Erp case study
UMaine
 
Erp case study
Erp case studyErp case study
Erp case study
UMaine
 
Bua 235 teamwork
Bua 235 teamwork Bua 235 teamwork
Bua 235 teamwork
UMaine
 
Bua 235 teamwork
Bua 235 teamwork Bua 235 teamwork
Bua 235 teamwork
UMaine
 
Business intelligence systems
Business intelligence systemsBusiness intelligence systems
Business intelligence systems
UMaine
 
Chap 8 ecommerce-scm
Chap 8  ecommerce-scmChap 8  ecommerce-scm
Chap 8 ecommerce-scm
UMaine
 
Bua 235 bpm-chap 7
Bua 235 bpm-chap 7Bua 235 bpm-chap 7
Bua 235 bpm-chap 7
UMaine
 
Data communications
Data communicationsData communications
Data communications
UMaine
 
Chapter 5 data processing
Chapter 5 data processingChapter 5 data processing
Chapter 5 data processing
UMaine
 
Chap 4 hardware & software
Chap 4 hardware & softwareChap 4 hardware & software
Chap 4 hardware & software
UMaine
 
Is for competitive advantage
Is for competitive advantageIs for competitive advantage
Is for competitive advantage
UMaine
 
Chap 2 collaboration information systems and teamwork
Chap 2 collaboration information systems and teamworkChap 2 collaboration information systems and teamwork
Chap 2 collaboration information systems and teamwork
UMaine
 
Week 1 bua 235
Week 1 bua 235Week 1 bua 235
Week 1 bua 235
UMaine
 
E Business & E Commerce +
E Business & E Commerce +E Business & E Commerce +
E Business & E Commerce +
UMaine
 
Chapter 3 E Business
Chapter 3 E BusinessChapter 3 E Business
Chapter 3 E Business
UMaine
 
Chapter 2 Decision Making
Chapter 2 Decision MakingChapter 2 Decision Making
Chapter 2 Decision Making
UMaine
 
Welcome To BUA 235-Intro
Welcome To BUA 235-IntroWelcome To BUA 235-Intro
Welcome To BUA 235-Intro
UMaine
 
Enterprise Systems: SCM, CRM, & ERP
Enterprise Systems: SCM, CRM, & ERPEnterprise Systems: SCM, CRM, & ERP
Enterprise Systems: SCM, CRM, & ERP
UMaine
 

More from UMaine (20)

Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Information systems management
Information systems managementInformation systems management
Information systems management
 
Erp case study
Erp case studyErp case study
Erp case study
 
Erp case study
Erp case studyErp case study
Erp case study
 
Bua 235 teamwork
Bua 235 teamwork Bua 235 teamwork
Bua 235 teamwork
 
Bua 235 teamwork
Bua 235 teamwork Bua 235 teamwork
Bua 235 teamwork
 
Business intelligence systems
Business intelligence systemsBusiness intelligence systems
Business intelligence systems
 
Chap 8 ecommerce-scm
Chap 8  ecommerce-scmChap 8  ecommerce-scm
Chap 8 ecommerce-scm
 
Bua 235 bpm-chap 7
Bua 235 bpm-chap 7Bua 235 bpm-chap 7
Bua 235 bpm-chap 7
 
Data communications
Data communicationsData communications
Data communications
 
Chapter 5 data processing
Chapter 5 data processingChapter 5 data processing
Chapter 5 data processing
 
Chap 4 hardware & software
Chap 4 hardware & softwareChap 4 hardware & software
Chap 4 hardware & software
 
Is for competitive advantage
Is for competitive advantageIs for competitive advantage
Is for competitive advantage
 
Chap 2 collaboration information systems and teamwork
Chap 2 collaboration information systems and teamworkChap 2 collaboration information systems and teamwork
Chap 2 collaboration information systems and teamwork
 
Week 1 bua 235
Week 1 bua 235Week 1 bua 235
Week 1 bua 235
 
E Business & E Commerce +
E Business & E Commerce +E Business & E Commerce +
E Business & E Commerce +
 
Chapter 3 E Business
Chapter 3 E BusinessChapter 3 E Business
Chapter 3 E Business
 
Chapter 2 Decision Making
Chapter 2 Decision MakingChapter 2 Decision Making
Chapter 2 Decision Making
 
Welcome To BUA 235-Intro
Welcome To BUA 235-IntroWelcome To BUA 235-Intro
Welcome To BUA 235-Intro
 
Enterprise Systems: SCM, CRM, & ERP
Enterprise Systems: SCM, CRM, & ERPEnterprise Systems: SCM, CRM, & ERP
Enterprise Systems: SCM, CRM, & ERP
 

Recently uploaded

An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
ScyllaDB
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
ThousandEyes
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
dipikamodels1
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
Facilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptxFacilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptx
Knoldus Inc.
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
ScyllaDB
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
Neeraj Kumar Singh
 
An Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise IntegrationAn Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise Integration
Safe Software
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
ScyllaDB
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
Databarracks
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
Cynthia Thomas
 

Recently uploaded (20)

An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
Facilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptxFacilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptx
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0Chapter 5 - Managing Test Activities V4.0
Chapter 5 - Managing Test Activities V4.0
 
An Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise IntegrationAn Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise Integration
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
 

Information security management

  • 1. Information Security Management Threats to Information Security and what we can do about it
  • 2. Before we start our Conversation… Ordering a Pizza?
  • 3. What are the threats to information security? • In order to adequately protect information resources, managers must be aware of the sources of threats to those resources, the types of security problems the threats present, and how to safeguard against both. The three most common sources of threats are: – Human error and mistakes – Malicious human activity – Natural events and disasters.
  • 4. • Human error and mistakes stem from employees and nonemployees. – They may misunderstand operating procedures and inadvertently cause data to be deleted. – Poorly written application programs and poorly designed procedures may allow employees to enter data incorrectly or misuse the system. – Employees may make physical mistakes like unplugging a piece of hardware that causes the system to crash.
  • 5. Human Threats • Malicious human activity results from employees, former employees, and hackers who intentionally destroy data or system components. These actions include: • Breaking into systems with the intent of stealing, altering or destroying data. • Introducing viruses and worms into a system. • Acts of terrorism.
  • 6. Natural Events and Disasters • The last source of threats to information security are those caused by natural events and disasters. These threats pose problems stemming not just from the initial loss of capability and service but also problems a company may experience as it recovers from the initial problem. They include: • Fires • Floods • Hurricanes • Earthquakes and • Other acts of nature
  • 7.  This chart shows some of the security problems a company may experience and the possible sources of the problems.
  • 8. What are unauthorized data disclosure threats? • For example, a new university dept. administrator posts student names, numbers, and grades in a public place. • Or, an employee unknowingly posts restricted data on a company website that can be reached by search engines over the Web.
  • 9. Malicious unauthorized data disclosure threats • Pre-texting: when someone deceives by pretending to be someone else • Phishing: the phisher pretends to be a legitimate company and sends an email requesting confidential data such as account numbers, social security numbers, passwords, and so forth. • Spoofing: is pretending to be someone else. Email spoofing is a synonym for phishing
  • 10. • Sniffing: is a technique for intercepting computer communications. • With wireless networks, drive-by sniffers simply take computers with wireless connections through an area and search for unprotected wireless networks. • They can monitor and intercept wireless traffic at will.
  • 11. • There are three components of a sound organizational security program: 1. Senior management must establish a security policy and manage risks. 2. Safeguards of various kinds must be established for all five components of an IS as the figure on the next slide demonstrates. 3. The organization must plan its incident response before any problems occur.
  • 12. Security Safeguards as They Relate to the Five Components
  • 13. What is senior management’s security role?  The NIST Handbook of Security Elements lists the necessary elements of an effective security program as this figure shows. *National Institute of Standards and technology
  • 14. • Senior managers should ensure their organization has an effective security policy that includes these elements: 1. A general statement of the organization’s security program 2. Issue-specific policies like personal use of email and the Internet 3. System-specific policies that ensure the company is complying with laws and regulations.
  • 15. • Senior managers must also manage risks associated with information systems security 1. Risk is the likelihood of an adverse occurrence. 2. You can reduce risk but always at a cost. The amount of money you spend on security influences the amount of risk you must assume. 3. Uncertainty is defined as the things we do not know that we do not know
  • 16. Senior Managements Security Role  When you’re assessing risks to an information system you must first determine:  What the threats are  How likely they are to occur  The consequences if they occur
  • 17. Fig 12-4 Risk Assessment Factors  When you’re assessing risks to an information system you must first determine:  What the threats are.  How likely they are to occur.  The consequences if they occur.  The figure below lists the factors you should include in a risk assessment.  Once you’ve assessed the risks to your information system, you must make decisions about how much security you want to pay for. Each decision carries consequences.  Some risk is easy and inexpensive.  Some risk is expensive and difficult.  Managers have a fiduciary responsibility to the organization to adequately manage risk.
  • 18. What technical safeguards are available?  You can establish five technical safeguards for the hardware and software components of an information system as the figure on the next slide shows. – Identification and authentication includes – passwords (what you know), – smart cards (what you have), and – biometric authentication (what you are).  Since users must access many different systems, it’s often more secure, and easier, to establish a single sign-on for multiple systems.
  • 20. What’s Encryption? • The process of changing original text to a secret message using cryptography • Cryptography is the science of transforming information so that it is secure while it is being transmitted or stored
  • 21. Firewalls • Firewalls, the third technical safeguard, should be installed and used with every computer that’s connected to any network, especially the Internet. • Firewalls can be hardware or software, used independently of each other or used together
  • 22. Perimeter & Internal Firewalls – The diagram shows how perimeter and internal firewalls are special devices that help protect a network. – Packet-filtering firewalls are programs on general-purpose computers or on routers that examine each packet entering the network Act as a gateway to the network
  • 23. Malware Protection • Malware Protection is the fourth technical safeguard. We’ll concentrate on spyware and adware here. – Spyware are programs that may be installed on your computer without your knowledge or permission. – Adware is a benign program that’s also installed without your permission. It resides in your computer’s background and observes your behavior.
  • 24. • If your computer displays any of the symptoms in this figure, you may have one of these types of malware on your computer.
  • 25. safeguard your computer against malware: – Install antivirus and antispyware programs. – Scan your computer frequently for malware. – Update malware definitions often or use an automatic update process. – Open email attachments only from known sources and even then be wary. – Promptly install software updates from legitimate sources like Microsoft for your operating system or McAfee for your spyware programs. – Browse only in reputable Internet neighborhoods. Malware is often associated with rogue Web sites.
  • 26. What data safeguards are available?  To protect databases and other data sources, an organization should follow the safeguards listed in this figure.  Remember, data and the information from it are one of the most important resources an organization has.
  • 27. What human safeguards are available? • Human safeguards for employees are some of the most important safeguards an organization can deploy. • They should be coupled with effective procedures to help protect information systems.
  • 28. • An organization needs human safeguards for nonemployees whether they are temporary employees, vendors, business partners, or the public. Here are a few suggestions: – Ensure any contracts between the organization and other workers include security policies. Third-party employees should be screened and trained the same as direct employees. – Web sites used by third-party employees and the public should be hardened against misuse or abuse. – Protect outside users from internal security problems. If your system gets infected with a virus, you should not pass it on to others.
  • 29. Account Administration • Account administration is the third type of human safeguard and has three components —account management, password management, and help-desk policies. – Account management focuses on • Establishing new accounts • Modifying existing accounts • Terminating unnecessary accounts.
  • 30. More Human Safeguards  Password management requires that users  Immediately change newly created passwords  Change passwords periodically  Sign an account acknowledgment form like the one in this figure. Fig 12-13 Sample Account Acknowledgement Form
  • 31. – Help-desks have been a source of problems for account administration because of the inherent nature of their work. • It is difficult for the help-desk to determine exactly with whom they’re speaking. Users call up for a new password without the help-desk having a method of definitively identifying who is on the other end of the line. • There must be policies in place to provide ways of authenticating users like asking questions only the user would know the answers to. • Users have a responsibility to help the help-desk by responsibly controlling their passwords.
  • 32. • Effective system procedures can help increase security and reduce the likelihood of computer crime. As this figure shows, procedures should exist for both system users and operations personnel that cover normal, backup, and recovery procedures. Fig 12-14 Systems Procedures Security monitoring is the last human safeguard. It includes:  Activity log analyses  Security testing  Investigating and learning from security incidents.
  • 33. How should organizations respond to security incidents? • No system is fail-proof. Every organization must have an effective plan for dealing with a loss of computing systems. This figure describes disaster preparedness tasks for every organization, large and small. The last item that suggests an organization train and rehearse its disaster preparedness plans is very important.
  • 34. What is the extent of computer crime? • The full extent of computer crime is unknown. There is no national census because many organizations are reluctant to report losses for fear of alienating customers, suppliers, and business partners. dollar loss.
  翻译: